#Research #Analysis #Advisory #Malware #Threat #Encryption #CyberSecurity #CyberArmour General Overview Cyber Warfare is a free and open source international intrusion detection and prevention advisory Cyber Security Analyst & Research organization. Analysing malware threat. Repository for code samples for Cyber Warfare against individualts, corporations and government organizations.
Join our forum on Linkedin "Quantum Blockchain & Artificial Intelligence" at https://www.linkedin.com/groups/8371715/
Specialities
Tokens, most token based on the old ERC20 standard has design mistakes including tokens issued by the major players. Learn more at https://cryptortrust.com/2018/11/20/erc20-token-design-mistakes-vs-erc223-token/
Cryptocurrencies, many cryptocurrencies is clones of early cryptocurrencies issues. Thus they have heritages issues lurking to ermerge in the future.
Malware, prepare for malware attack against your org. and systems.
Open source code of major threat is free for educational purposes. Contact us for advisory. Retainer is USD 5.000 paid in advance.
Overview of actors, tools, how they operate Articles
Facts about cryptocurrency theft methods
https://www.cryptolinenews.com/industry-analysis/facts-about-cryptocurrency-theft-methods/
https://bitcoinmagazine.com/articles/how-the-plustoken-scam-absconded-with-over-1-percent-of-the-bitcoin-supply
What is a Botnet HTTP-Botnets: The Dark Side of a Standard Protocol!
https://securityaffairs.co/wordpress/13747/cyber-crime/http-botnets.html
https://usa.kaspersky.com/resource-center/threats/botnet-attacks
How to build your own botnet, a framework for security researchers and developers to build and operate a basic botnet
https://www.youtube.com/watch?v=TBSh_w0I-z8
https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/
What is a Trojon Virus https://usa.kaspersky.com/resource-center/threats/trojans
Hos to make a Trojan Virus https://usa.kaspersky.com/resource-center/threats/trojans using Phyton https://www.youtube.com/watch?v=eSPLRuOezGc
Trojans - Vidar information-stealing Trojan / Qulab trojans
https://cointelegraph.com/news/new-malware-campaign-spreads-trojans-through-clone-crypto-trading-website
- https://www.group-ib.com/blog/moneytaker
Cerberus Banking Trojan
https://thehackernews.com/2019/08/cerberus-android-banking-trojan.html
https://cointelegraph.com/news/threat-alert-new-trojans-targeting-major-crypto-exchanges-apps-discovered
RAT (Remote Access Trojan), which they named InnfiRAT
https://bitcoinist.com/a-new-malware-can-steal-data-from-crypto-wallets/
Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection
https://thehackernews.com/2021/03/hackers-now-hiding-obliquerat-payload.html
The Rise of Super-Stealthy Digitally Signed Malware—Thanks to the Dark Web https://thehackernews.com/2017/11/malware-digital-certificate.html
Best Torrent sites https://thehackernews.com/2016/12/kickass-torrents-site.html
Deep Web Search Engines to Explore the Hidden Internet https://thehackernews.com/2016/02/deep-web-search-engine.html
Grams - First Search Engine for Underground Black Markets https://thehackernews.com/2014/04/grams-first-search-engine-for.html
New Android Malware Framework Turns Apps Into Powerful Spyware https://thehackernews.com/2018/08/android-malware-spyware.html https://www.theverge.com/2019/7/10/20688885/agent-smith-android-malware-25-million-infections
Hackers Are Using These Tools to Reel in New Victims https://darkwebnews.com/hacking/hacking-tools-used-by-hackers/ https://www.fortinet.com/blog/threat-research/jbifrost-yet-another-incarnation-of-the-adwind-rat.html https://darknetlive.com/post/what-to-do-when-dread-goes-down/
Ethereum and Tokens Attacks
Tokens
https://cryptortrust.com/2018/11/20/erc20-token-design-mistakes-vs-erc223-token/
Wallets
https://www.wired.com/story/blockchain-bandit-ethereum-weak-private-keys/
Mining Attacks
https://www.cryptolinenews.com/2018/11/ethereum-network-token-attacked-by-malicious-minting-attack/?fbclid=IwAR2C-r1X8cuy0gdkq2U91DhNvHjDjsbOtLfYRnA50bFixuFH9oB1if1TRsM
A New Wave of Attacks on Ethereum Mining Rigs
https://cryptonews.com/news/a-new-wave-of-attacks-on-ethereum-mining-rigs-3055.htm
https://blog.quillhash.com/potential-attack-on-ethereum-network-to-mint-gastokens/
Hacking a Blockchain vs a DApp
https://hackernoon.com/hacking-a-blockchain-vs-hacking-a-dapp-a-response-to-mike-orcutts-mit-article-7dfc6973df52
Virtual Kidnapping
https://edition.cnn.com/2019/05/15/tech/virtual-kidnapping/index.html?utm_source=digg&utm_medium=email
RANSOMEWARE
https://dwealth.news/2021/05/colonial-pipeline-ransomware-bad-guys-unmasked/
CryptON Ransomware Installed Using Hacked Remote Desktop Services
https://www.bleepingcomputer.com/news/security/crypton-ransomware-installed-using-hacked-remote-desktop-services/
Locky Ransomware Information, Help Guide, and FAQ
https://www.bleepingcomputer.com/virus-removal/locky-ransomware-information-help
https://beincrypto.com/russian-nationals-bitcoin-ransomware-trial-begins-in-paris/
CryptoLocker Ransomware Information Guide and FAQ https://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information
CryptorBit and HowDecrypt Information Guide and FAQ https://www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware-information
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ https://www.bleepingcomputer.com/virus-removal/cryptodefense-ransomware-information
U-Boot's Trusted Boot Validation Bypassed https://www.bleepingcomputer.com/news/security/u-boots-trusted-boot-validation-bypassed/
Locky Poser, PyLocky Ransomware
https://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-the-locky-poser-pylocky-ransomware/
Ubuntu Botnet
https://hackernoon.com/is-this-a-ubuntu-based-botnet-deploying-tor-relays-and-bridges-b4ce1a612039
Linux - Phyton Botnet
https://www.f5.com/labs/articles/threat-intelligence/new-python-based-crypto-miner-botnet-flying-under-the-radar
Mirai Botnet (semiautonomously - seeking out targets and spreading itself)
https://www.bloomberg.com/news/features/2019-12-20/spiderman-hacker-daniel-kaye-took-down-liberia-s-internet
https://krebsonsecurity.com/2017/07/who-is-the-govrat-author-and-mirai-botmaster-bestbuy/
Necur
https://threatpost.com/necurs-botnet-in-crosshairs-of-global-takedown-offensive/153607/
DDG botnet
https://www.forbes.com/sites/leemathews/2020/04/10/a-sinister-new-botnet-could-prove-nearly-impossible-to-stop/?fbclid=IwAR1WOSx76zeSvkcQ9cz42VdQnNiks3krdJh5DqFuMITVQzZ3dYVFdeeiSmY#1530df537c5c
https://threatpost.com/p2p-ddg-botnet-unstoppable/154650/
Cerber Ransomware steals bitcoin wallets
https://blog.trendmicro.com/trendlabs-security-intelligence/cerber-ransomware-evolves-now-steals-bitcoin-wallets/
Ryyuk Ransomware (Very profitable)
https://cointelegraph.com/news/research-suggests-russian-based-hackers-behind-ryuk-ransomwares-25-million-gains
https://www.csoonline.com/article/3541810/ryuk-ransomware-explained-a-targeted-devastatingly-effective-attack.html
Baldr Malware https://darkwebnews.com/hacking/baldr-malware-circulation-in-hacking-forums/
GoldBrute
https://thehackernews.com/2019/06/windows-rdp-brute-force.html
Shade Ransomeware
https://threatpost.com/shade-ransomware-expands-us/145020/
Scranos Malware
https://www.zdnet.com/article/this-data-stealing-malware-has-returned-with-new-attacks-and-nasty-upgraded-features/
Zeppelin ransomware
https://krebsonsecurity.com/2022/11/researchers-quietly-cracked-zeppelin-ransomware-keys/
Turla
https://www.wired.com/story/turla-history-russia-fsb-hackers/
https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/
GoldenJackal APT group
https://securelist.com/goldenjackal-apt-group/109677/
Botnets
Smominru Botnet MyKings (alternatively as DarkCloud or Smominru pt Hexmen)
https://thehackernews.com/2019/09/smominru-botnet.html
https://cointelegraph.com/news/monero-malware-botnet-lurks-behind-taylor-swift-jpegs
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophoslabs-uncut-mykings-report.pdf
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/
https://blog.netlab.360.com/mykings-the-botnet-behind-multiple-active-spreading-botnets/
https://www.guardicore.com/2016/06/the-photominer-campaign/
https://www.proofpoint.com/us/threat-insight/post/smominru-monero-mining-botnet-making-millions-operators
https://s.tencent.com/research/report/765.html
https://www.zscaler.com/blogs/research/darkcloud-bootkit
https://vms.drweb.com/virus/?_is=1&i=14934685
https://www.antiy.com/response/20190822.html
https://securitynews.sonicwall.com/xmlpost/new-variant-pcshare-trojan-with-ups2-version-1-0-2-server-dec-2018/
https://www.cyber.nj.gov/threat-profiles/botnet-variants/smominru
https://www.cyberscoop.com/mykings-botnet-sophos-smominru/
https://www.itspmagazine.com/from-the-newsroom/top-3-crypto-mining-botnets-smominru-ddg-and-adbminer
https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/
https://blogs.akamai.com/sitr/2021/02/bitcoins-blockchains-and-botnets.html
Bulehero Botnet
https://forums.juniper.net/t5/Threat-Research/Anatomy-of-the-Bulehero-Cryptomining-Botnet/ba-p/458787
Mokes" and "Netwire
https://cointelegraph.com/news/report-record-breaking-coincheck-hack-perpetrated-by-virus-tied-to-russian-hackers
LockBit Ransomware Gang
https://www.wired.co.uk/article/lockbit-ransomware-attacks
https://www.chainalysis.com/blog/nca-ofac-sanctions-dmitry-khoroshev-lockbit-ransomware-2024/
MINING
Beapy File based mining. Most lucrative mining strategy
https://bitcoinmagazine.com/articles/new-cryptojacking-campaign-infects-asia-using-more-profitable-tactics/
https://www.symantec.com/blogs/threat-intelligence/beapy-cryptojacking-worm-china
https://www.symantec.com/blogs/threat-intelligence/cryptojacking-modern-cash-cow
https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-cryptojacking-modern-cash-cow-en.pdf
https://www.vanityfair.com/news/2019/11/the-big-bitcoin-heist
Hacker Tools Top Ten Our Recommended Pentesting Tools and Hacking Software For 2018 https://www.concise-courses.com/hacking-tools/top-ten/
https://en.wikipedia.org/wiki/Hacking_tool https://www.cybersecuritymastersdegree.org/2017/11/top-ten-tools-for-cybersecurity-pros-and-black-hat-hackers/ https://www.guru99.com/learn-everything-about-ethical-hacking-tools-and-skills.html https://www.darknet.org.uk/category/hacking-tools/ https://fossbytes.com/best-hacking-tools-of-2016-windows-linux-mac-osx/ https://www.greycampus.com/blog/information-security/top-wireless-hacking-tools
WhatsApp / Whatsup https://www.linkedin.com/pulse/new-hacks-modify-whatsup-chat-ajay-upadhyay/
LocalBitcoin https://bitcoinmagazine.com/articles/phishing-scam-hits-localbitcoins-clients-lose-funds/
Android
https://www.linkedin.com/pulse/new-man-in-the-disk-attack-leaves-millions-android-phones-upadhyay/
https://thehackernews.com/2019/10/remove-xhelper-android-malware.html
https://threatpost.com/xhelper-russian-nesting-doll-android-malware/154519/
Iphone
https://www.vanityfair.com/news/2016/11/how-bill-marczak-spyware-can-control-the-iphone
Windows
Windows Torrent File Malware Can Swap Out Crypto Addresses, Researcher Warns
https://cointelegraph.com/news/windows-torrent-file-malware-can-swap-out-crypto-addresses-researcher-warns
https://www.techrepublic.com/article/nasty-botnet-uses-wannacry-exploit-to-mine-cryptocurrency-from-your-servers/
https://www.wired.com/story/nsa-windows-10-vulnerability-disclosure/#intcid=recommendations_wired-homepage-right-rail-popular_8647e7a8-5e06-4f07-99c2-569573f1586b_popular4-1
CISCO Router https://www.wired.com/story/cisco-router-bug-secure-boot-trust-anchor/
Bitcoin ATM Hacks
https://bravenewcoin.com/insights/bitcoin-atm-numbers-are-booming
Kraken Cryptor is able to prey on victims and gain revenue through its affiliate program, a ransomware-as-a-service (RaaS) model https://darkwebnews.com/dark-web/kraken-darknet-expansion/
Monappy Wallet Provider
https://coinfomania.com/18-year-old-monacoin-theft-japan/?fbclid=IwAR3SW4HigAczkr5o9MSzVLWHnrFcsEIbXxRPFst0kAZ-i0CaTUOM4XJfpvQ
Phishing
https://darknetlive.com/post/empire-phishing/
https://darknetlive.com/post/a-warning-about-darkweb-market-phishing-sites
Malware market - New market https://www.cryptolinenews.com/2018/06/cryptocurrencies-have-given-birth-to-another-market/
Mobile Network Hacking of Crypto Currencies https://coinfomania.com/nicholas-truglia-convicted-for-crypto-theft/?fbclid=IwAR3_1ClKPdN14F6B1hrH4UXmgMgQyjka2Aj9L0O3zLkS120hSfPmJ8Sf1VY https://breakermag.com/doctored-images-are-yet-another-way-for-hackers-to-steal-your-crypto/
SamSam Randsomware https://blog.malwarebytes.com/cybercrime/2018/05/samsam-ransomware-need-know/
GameOver ZeuS Botnet / Evgeniy Bogachev - one of the most successful hackers http://nautil.us/issue/66/clockwork/the-100-million-bot-heist?utm_source=digg&utm_medium=email
Inside North Korea’s Hacker Army (Lazarus Hacker Group)
https://www.bloomberg.com/news/features/2018-02-07/inside-kim-jong-un-s-hacker-army
https://coinidol.com/north-korean-lazarus/
https://thehackernews.com/2019/05/north-korean-hacking-tool.html
https://www.wired.com/story/how-north-korea-robs-banks-around-world/
https://www.wsj.com/articles/north-korea-is-suspected-in-bitcoin-heist-1522303177
https://thenextweb.com/hardfork/2018/10/19/cryptocurrency-attack-report/
https://tokenhell.com/us-authority-charged-two-chinese-officials-with-laundering-cryptocurrency-worth-100m/
https://www.the-blockchain.com/2020/03/13/two-chinese-nationals-charged-with-hacking-cryptocurrency-exchange-and-laundering-over-100-million-in-cryptocurrency/
https://www.altfi.com/article/9685_more-than-540m-laundered-through-renbridge
https://www.infosecurity-magazine.com/news/lazarus-dtrack-target-europe-and/
Lazarus Group Poses as VC Firms to Spread Malware
https://decrypt.co/118031/north-korea-linked-lazarus-group-poses-as-vc-firms-to-spread-malware
https://securelist.com/the-lazarus-group-deathnote-campaign/109490/
Inside Iran's Hacker Army
Holmium Group / APT33 Group
https://www.marketscreener.com/MICROSOFT-CORPORATION-4835/news/Microsoft-Iranian-Hackers-Have-Hit-Hundreds-of-Companies-in-Past-Two-Years-2nd-Update-28123238/
https://portswigger.net/daily-swig/iranian-cyber-threat-groups-make-up-for-lack-of-technical-sophistication-with-social-engineering-trickery
Inside Russia's Hacker Army
https://www.bloomberg.com/news/articles/2021-06-11/russian-hackers-thrive-as-putin-prepares-to-meet-with-u-s-president-biden
APT28 / Russia's 'Fancy Bear' Hackers
https://www.wired.com/story/fancy-bear-hotel-hack/
Russia's Evil Corp / Using Dridex malware (Also known as Bugat / Cridex)
https://www.bloomberg.com/news/articles/2019-12-05/u-s-sanctions-evil-corp-blamed-for-100-million-cyber-theft
https://blog.chainalysis.com/reports/ofac-sanction-suex-september-2021/
https://blog.chainalysis.com/reports/eastern-europe-cryptocurrency-geography-report-2021-preview/
https://blog.chainalysis.com/reports/ofac-sanction-chatex-revil-sodinokibi-november-2021/
https://blog.chainalysis.com/reports/2022-crypto-crime-report-preview-russia-ransomware-money-laundering/?fbclid=IwAR08fTQ64VEqYnDBraTRx5q-Yv5p7tcHGGLGWW3IF3sQIfQpGaFoM8uKTOY
Inside Indias Hacker Army
https://portswigger.net/daily-swig/indian-cyber-espionage-activity-rising-amid-growing-rivalry-with-china-pakistan
Inside Chinas Hacker Army
https://portswigger.net/daily-swig/behind-the-great-firewall-chinese-cyber-espionage-adapts-to-post-covid-world-with-stealthier-attacks
Lurk Group
https://securityaffairs.co/wordpress/67262/cyber-crime/wannacry-lurk-group.html
DARKNET MARKETS Darknet Ecommerce, Hydra, Empire Market Bypass Shop, etc.
Hydra
https://www.elliptic.co/blog/5-billion-darknet-market-hydra-seized-by-german-authorities
https://www.wired.com/story/hydra-market-shutdown/
https://medium.com/@Nethone_/russian-darknet-market-hydra-is-expanding-whats-the-threat-d0613d34a358
https://portswigger.net/daily-swig/authorities-seize-hydra-servers-in-bust-against-darknet-cybercrime-marketplace
DeSnake / AlphaBay
https://www.wired.com/story/alphabay-desnake-dark-web-interview/
https://www.wired.com/story/alphabay-series-part-2-pimp-alex-91/
https://www.wired.com/story/alphabay-series-part-3-alpha-male/
https://www.wired.com/story/alphabay-series-part-4-face-to-face/
https://www.wired.com/story/alphabay-series-part-5-takedown/
https://www.wired.com/story/alphabay-series-part-6-endgame/
Other
https://www.expressvpn.com/blog/best-onion-sites-on-dark-web/
http://s4k4ceiapwwgcm3mkb6e4diqecpo7kvdnfr5gg7sph7jjppqkvwwqtyd.onion/ Overview of onion links
Stateown Intelligence Agencies: Russian Intelligence Agency, Federal Security Bureau (FSB)
https://www.cryptoknowmics.com/news/bbc-russian-service-450-million-worth-of-bitcoin-connected-to-russia
https://wearechange.org/10-things-you-didnt-know-about-the-cia-before-yesterday/?fbclid=IwAR0QMLBXXE6vbBAC5HEaZMnYskb5Ydfc4oGsrT_AOMgfJvQeARcMmF8tzyk
https://www.bloomberg.com/news/articles/2020-11-13/a-russian-cyber-guru-finds-ways-to-distance-company-from-kremlin?srnd=premium-europe
https://portswigger.net/daily-swig/who-is-behind-apt29-what-we-know-about-this-nation-state-cybercrime-group
Sandworm may be best known for the NotPetya ransomware attack https://techcrunch.com/2022/04/27/state-sandworm-russian-hackers-ukraine/
Inside China's Hacker Army
https://portswigger.net/daily-swig/behind-the-great-firewall-chinese-cyber-espionage-adapts-to-post-covid-world-with-stealthier-attacks
Cubas's Hacker Army https://www.infosecurity-magazine.com/news/cuba-ransomware-actors-pocket-60m/
FIN7 Hacker group (Also known to others as Cobalt Strike or Carbanak) https://darkwebnews.com/hacking/researchers-claim-hacking-group-fin7-still-on-loose/ https://www.wired.com/story/fin7-carbanak-hacking-group-behind-a-string-of-big-breaches/ https://www.wired.com/story/jackpotting-atm-hacks/
Whonix or Tails? https://darkwebnews.com/anonymity/whonix-or-tails/
Sim Card teft
https://www.digitaltrends.com/mobile/sim-swap-fraud-explained/
https://coinfomania.com/20-year-old-dawson-bakies-accused-crypto-theft/?fbclid=IwAR2BKqr8NecknuA7Wyxj4a0dTA5jpnVytab5w35S91zNjDp_Ca8jBhr4Q00
Domain Squatting https://darkwebnews.com/scams/btc-scammer-made-760k-through-darknet-typosquatting/
https://cointelegraph.com/news/europol-arrests-six-people-allegedly-behind-27-million-bitcoin-theft?fbclid=IwAR2IFxAx_2mCM-VwUIasko61tcJ8g_4vSb7n0zy_2y1szHhRbw2VmfZvR1A
https://portswigger.net/daily-swig/dark-web-typosquatters-raking-in-a-fortune
New Advanced Malware Targeting Windows Computers Available on the Dark Web
https://darkwebnews.com/hacking/malware-targeting-windows-computers/
New Trends https://bitcoinmagazine.com/articles/2019-saw-most-exchange-attacks-ever-with-hackers-becoming-more-savvy
https://bitcoinmagazine.com/articles/cryptomining-attacks-remain-one-of-the-nastiest-malware-threats-of-2019
MINING ON OTHER PEOPLES COMPUTOR
Crypto Illegal Mining Beating Ransomware as Top Cyber Threat
https://www.bloomberg.com/news/articles/2018-12-14/crypto-illegal-mining-seen-beating-ransomware-as-cyber-threat?srnd=premium-europe
https://www.csoonline.com/article/3253572/internet/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html
https://www.zdnet.com/article/a-giant-botnet-is-forcing-windows-servers-to-mine-cryptocurrency/
https://www.siliconrepublic.com/enterprise/wannamine-smominru-botnets-cryptocurrency
https://www.infosecurity-magazine.com/news/hackers-malicious-file-systems/
Mining on other peoples computer - pirate Bay, mining Monero
https://www.zdnet.com/article/how-much-does-the-pirate-bays-cryptocurrency-miner-make/
https://steemit.com/news/@runicar/pirate-mining-cryptojacking-your-cpu-to-mine-crypto-is-your-pc-under-attack-soultions-how-to-stop-it
https://hackernoon.com/how-to-block-hackers-from-mining-cryptocurrency-on-your-computer-and-smartphones-c0c485b6eae6
Private Surveillance Is a Lethal Weapon Anybody Can Buy
https://www.nytimes.com/2019/07/19/opinion/private-surveillance-industry.html?action=click&module=Opinion&pgtype=Homepage&utm_source=digg&utm_medium=email
Monero
https://www.zdnet.com/article/ransomware-why-the-crooks-are-ditching-bitcoin-and-where-they-are-going-next/
https://blog.barracuda.com/2017/03/23/kirk-ransomware-does-things-differently/
https://cointelegraph.com/news/new-instance-of-monero-malware-sees-cryptojackers-target-linux-users
https://cointelegraph.com/news/research-warns-familiar-monero-mining-malware-is-infecting-windows-systems
https://blog.trendmicro.com/trendlabs-security-intelligence/monero-miner-malware-uses-radmin-mimikatz-to-infect-propagate-via-vulnerability/
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Trojan.Win32.MIMIKATZ.ADU?_ga=2.67727382.60182665.1551811519-1187802437.1551811518
https://github.com/search?q=smominru&type=Code
https://www.techrepublic.com/article/nasty-botnet-uses-wannacry-exploit-to-mine-cryptocurrency-from-your-servers/
https://cointelegraph.com/news/monero-malware-botnet-lurks-behind-taylor-swift-jpegs
https://www.guardicore.com/2016/06/the-photominer-campaign/
https://www.forbes.com/sites/leemathews/2020/04/10/a-sinister-new-botnet-could-prove-nearly-impossible-to-stop/?fbclid=IwAR1WOSx76zeSvkcQ9cz42VdQnNiks3krdJh5DqFuMITVQzZ3dYVFdeeiSmY#1530df537c5c
https://decrypt.co/44005/a-monero-malware-has-been-upgraded-and-can-now-steal-passwords
https://unit42.paloaltonetworks.com/black-t-cryptojacking-variant/
https://cointelegraph.com/news/alarming-growth-of-difficult-to-detect-lemon-duck-crypto-mining-botnet
https://blog.talosintelligence.com/2020/10/lemon-duck-brings-cryptocurrency-miners.html
https://decrypt.co/44005/a-monero-malware-has-been-upgraded-and-can-now-steal-passwords
https://unit42.paloaltonetworks.com/black-t-cryptojacking-variant/
Bitcoin
https://www.globalbankingandfinance.com/bitcoin-stealers-are-back-hunt-for-users-cryptosavings-continues/
https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/
Tether
https://bitfinexed.medium.com/bitfinex-and-tether-is-unauditable-why-they-will-never-do-a-real-audit-3324e002b185
https://bitfinexed.medium.com/understanding-bogus-usd-crypto-currency-volume-why-you-should-disregard-fakeusd-prices-and-c0933c72e3e5
https://bitfinexed.medium.com/spoiler-alert-the-institution-buying-tethers-is-bitfinex-themselves-f56af29ce60c
https://bitfinexed.medium.com/bitfinex-never-repaid-their-tokens-bitfinex-started-a-ponzi-scheme-86a9291add29
https://bitfinexed.medium.com/fake-it-till-you-make-it-when-bitfinex-themselves-used-to-spoof-their-entire-orderbook-18294585338
https://bitfinexed.medium.com/wash-trading-bitcoin-part-ii-who-and-why-is-someone-wash-trading-on-bitfinex-e1c7b5e0b3bb
https://medium.com/hackernoon/the-curious-tale-of-tethers-6b0031eead87
https://medium.com/hackernoon/meet-spoofy-how-a-single-entity-dominates-the-price-of-bitcoin-39c711d28eb4
https://www.nytimes.com/2017/11/21/technology/bitcoin-bitfinex-tether.html
https://www.forbes.com/sites/stevenehrlich/2022/12/21/inside-tether-cryptos-so-far-unbreakable-buck/?sh=1e2a6e0173fa&fbclid=IwAR3mhXp76afQ2EX7Yj5l0tnjPtCfjybhbO1dqA3icP587EoKrSvG4Oy0cMg
https://thehackernews.com/2019/09/smominru-botnet.html
Malware that mines the privacy-focused open source cryptocurrency turtlecoin (TRTL) https://cointelegraph.com/news/researchers-say-50-000-servers-worldwide-infected-with-privacy-coin-cryptojacking-malware
The Leaked NSA Spy Tool That Hacked the World
https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/
Shadow Brokers
https://en.wikipedia.org/wiki/The_Shadow_Brokers
https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
https://twitter.com/shadowbrokerss
https://steemit.com/shadowbrokers/@theshadowbrokers/theshadowbrokers-monthly-dump-service-july-2017
WIFI sniffers
https://www.crc.id.au/tracking-people-via-wifi-even-when-not-connected/
https://hackerfall.com/story/passive-wifi-tracking
Emailsscam committed through a wide array of “sextortion” blackmail strategies, which included the weaponization of emails
https://bitcoinmagazine.com/articles/report-claims-that-sextortionists-absconded-with-over-300000-in-crypto-in-2018/
Fake Tor Browser https://cointelegraph.com/news/fake-tor-browser-steals-bitcoin-from-darknet-users-warns-eset
Google Store / Google Chrome
https://cointelegraph.com/news/fake-ledger-live-chrome-extension-stole-14m-xrp-researchers-claim
Bots https://ice9bot.blogspot.com/ https://readwrite.com/2013/07/31/how-to-build-a-botnet-in-15-minutes/
TrickBot
https://www.csoonline.com/article/3599908/trickbot-gets-new-uefi-attack-capability-that-makes-recovery-incredibly-hard.html
https://eclypsium.com/2020/12/03/trickbot-now-offers-trickboot-persist-brick-profit/
IPFS
https://www.technadu.com/cybercriminals-cloudflares-ipfs-gateway-phishing-attacks/43456/
Deep Learing Resources/ Artificial Intelligence
https://www.edureka.co/blog/deep-learning-with-python/
https://www.cybersecurity-insiders.com/the-malware-of-the-future-will-be-independent-and-adaptable/
https://www.rebellionresearch.com/blog/ai-security-with-adversarial-robustness-and-explainable-ai
https://www.rebellionresearch.com/blog/ai-vs-fraud
https://portswigger.net/daily-swig/trojannet-a-simple-yet-effective-attack-on-machine-learning-models
Hide Your IP address / Anonoumus DNS providers https://darkwebnews.com/anonymity/dns-providers-that-dont-log-queries/
Exchanges Hacked / Fake / leaking
https://medium.com/@info_85454/idax-pro-scammed-crypto-projects-for-up-to-5-000-000-usd-c2d10a0dd14e
https://www.rollingstone.com/culture/culture-news/the-rise-and-fall-of-a-bitcoin-kingpin-43198/
https://cointelegraph.com/news/researchers-claim-crypto-exchange-hacks-happen-in-three-ways
https://cointelegraph.com/news/kucoin-hack-unpacked-more-crypto-possibly-stolen-than-first-feared
https://valid.network/post/financially-exploiting-the-blockchain-with-frontrunning?utm_source=social&utm_medium=share&utm_campaign=blog
Ponzi scheme
https://bitcoinmagazine.com/articles/did-the-plustoken-scam-cause-a-bitcoin-price-dip
https://news.8btc.com/crypto-wallet-plustoken-a-3-billion-ponzi-scheme-went-bust
https://news.8btc.com/just-vanished-wallet-tokenstore-sued-by-2100-victims
Bridges - also works as mixing services
https://cointelegraph.com/news/the-aftermath-of-axie-infinity-s-650m-ronin-bridge-hack
https://www.elliptic.co/blog/540-million-stolen-from-the-ronin-defi-bridge
https://www.altfi.com/article/9685_more-than-540m-laundered-through-renbridge
Ren Bridge
https://www.coindesk.com/business/2022/02/23/ren-labs-raises-75m-for-catalog-cross-chain-exchange/
Mixing services like CoinJoin, CoinShuffle. TumbleBit, NTumbleBit, Tornado Cash
https://bitcoinmagazine.com/guides/bitcoin-anonymous
https://bitcoinmagazine.com/articles/better-bitcoin-privacy-scalability-developers-are-making-tumblebit-reality/
https://bitcoinmagazine.com/articles/darknet-markets-cant-live-with-or-without-bitcoin
https://bitcoinmagazine.com/guides/what-are-bitcoin-mixers
POSSIBLE? ANONYMOUS TRANSACTIONS https://pragmaticcoders.com/blog/anonymous-transactions-on-the-public-blockchain/
https://bitcoinmagazine.com/articles/do-coinjoin-mixes-really-require-equal-transaction-amounts-for-privacy-part-two-knapsack
https://bitcoinmagazine.com/articles/how-payswap-can-confuse-blockchain-analysts-benefiting-bitcoin-privacy-for-all
https://bitcoinmagazine.com/articles/maintaining-transaction-privacy-in-the-age-of-government-blockchain-analysis
https://bitcoinmagazine.com/articles/coinjoins-first-steps-how-dark-wallet-paved-the-way-for-a-more-private-bitcoin
https://cryptonews.com/news/incognito-launches-anonymous-way-to-swap-monero-with-bitcoin-5876.htm
https://cointelegraph.com/news/coin-mixers-record-breaking-month-proves-bitcoin-users-want-anonymity
https://medium.com/tozex/how-do-criminals-launder-money-through-blockchain-dc66916b5d81
https://cointelegraph.com/news/bitmex-faces-lawsuit-for-alleged-racketeering-and-extensive-illicit-activities
https://bitcoinmagazine.com/articles/the-human-rights-foundation-is-now-funding-bitcoin-privacy-development-starting-with-coinswap
https://github.com/AdamISZ/CoinswapCS
https://news.bitcoin.com/john-mcafee-announces-privacy-coin-airdrop-today/
https://mcafeedex.com/#/erc20
https://www.coindesk.com/us-officials-arrest-alleged-operator-of-336m-bitcoin-mixing-service
https://www.coindesk.com/darknet-markets-are-mixing-bitcoins-at-blistering-pace-report
https://medium.com/meetbitfury/darknet-use-and-bitcoin-a-crypto-activity-report-by-crystal-blockchain-353a8678730
https://www.elliptic.co/blog/bitcoin-money-laundering
https://dwealth.news/2021/05/colonial-pipeline-ransomware-bad-guys-unmasked/
https://cointelegraph.com/news/alameda-wallets-funnel-over-1-7m-via-crypto-mixers-overnight
https://www.forbes.com/sites/thomasbrewster/2023/03/15/us-shuts-down-crypto-mixer-chipmixer-used-by-russian-and-north-korea-spies/?utm_medium=browser_notifications&utm_source=pushly&utm_campaign=2780664&sh=54928aa35721
Etereum Mixers
https://www.coindesk.com/hacker-drains-defi-liquidity-balancer
https://medium.com/@tornado.cash/introducing-private-transactions-on-ethereum-now-42ee915babe0
https://medium.com/@tornado.cash/how-to-stay-anonymous-with-tornado-cash-and-similar-solutions-efdecdbd7d37
https://uniswap.info/home
RenBTC is wrapped Bitcoin. Hackers will swap ETH for renBTC, then unwrap the asset on the native Bitcoin blockchain.
https://weissratings.com/en/weiss-crypto-daily/ftx-account-drainer-puts-sell-pressure-on-eth
Tornado Cash
https://blog.chainalysis.com/reports/tornado-cash-sanctions-challenges/
https://decrypt.co/108159/professor-republishes-tornado-cash-code-following-github-takedown
https://github.com/orgs/tornado-repositories/repositories?type=all
https://archive.softwareheritage.org/browse/search/?q=tornadocash&with_visit=true&with_content=true
https://beincrypto.com/learn/tornado-cash/
https://www.coindesk.com/tech/2023/03/06/tornado-cash-fork-privacy-pools-deployed-on-optimism-testnet/
https://www.immunebytes.com/blog/what-is-tornado-cash-why-is-it-popular-with-hackers/
https://etherscan.io/address/0x910cbd523d972eb0a6f4cae4618ad62622b39dbf contract
https://blog.chainalysis.com/reports/tornado-cash-sanctions-challenges/#:~:text=The%20user%20can%20then%20either,0.05%25%20to%200.2%25%20fee.
https://tornadocash.sh/docs/general/how-to-use-tornado-cash-with-tor/
https://tornadocash.sh/docs/how-does-tornado.cash-work/
https://github.com/tornadocash-community/docs/blob/en/general/how-to-use-tornado-cash-with-tor.md
https://tornadocash.gitbook.io/docs/generals/introduction-to-tornado-cash
https://nova.tornadocash.eth.link/ tornadocash on web3
https://www.coindesk.com/tech/2022/01/25/tornado-cash-co-founder-says-the-mixer-protocol-is-unstoppable/
https://www.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion/r/ethdev/comments/g0jehk/why_i_think_using_tornadocash_might_be_a_bad_idea/
Swap with monero as an alt.
https://www.reddit.com/r/tornado_cash/
https://www.reddit.com/r/ethereum/comments/xlwkzn/can_i_use_tornado_cash/
https://github.com/AthanorLabs/atomic-swap
Mixing to crypto to USD
https://www.southworld.net/mexico-of-the-cyber-narcos-cartels/
Telegram
https://gbhackers.com/masad-stealer/
https://www.coindesk.com/business/2022/12/07/attacker-targets-wealthy-crypto-funds-using-telegram-chats/
Cybersecurity firms https://www.newyorker.com/magazine/2019/11/04/a-cybersecurity-firms-sharp-rise-and-stunning-collapse?utm_source=digg&utm_medium=email
https://assets.ctfassets.net/kisruz03w7zs/1Mg3NZrElrcbkGZdYhsgql/0f5798852c0ab67b950252ee410eac16/Nethone_-_Brief_history_of_the_biggest_Eng_and_Rus_DNMs.pdf
https://dwealth.news/2021/05/colonial-pipeline-ransomware-bad-guys-unmasked/
Forums
https://chklst.ru/discussion/1596/maynery-kriptovalyut-ispolzuyut-eternalblue-doublepulsar
https://gbhackers.com/
https://hackforum.pro/
Future Dissident tech development https://bitcoinmagazine.com/articles/amir-taaki-on-bitcoin-and-building-dissident-technology-in-2020
LOST YOUR BITCOIN? HERE IS HOW YOU CAN RECOVER IT
https://bitcoinist.com/lost-your-bitcoin-here-is-how-you-can-recover-it/
Surveilence / monitoring transactions
SHADOWY US SPY FIRM PROMISES TO SURVEIL CRYPTO USERS FOR THE HIGHEST BIDDER
https://www.mintpressnews.com/anomaly-6-surveil-crypto-users-highest-bidder/283036/
Artificial Intelligence AI Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots. Cybercriminals have started using OpenAI’s artificially intelligent chatbot ChatGPT to quickly build hacking tools. Scammers are also testing ChatGPT’s ability to build other chatbots designed to impersonate young females to ensnare targets, one expert monitoring criminal forums told Forbes. https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?utm_medium=browser_notifications&utm_source=pushly&utm_campaign=2591994&sh=afb904f55349
Darknet Exchanges for drugs, etc. using Tor
https://bitcoinist.com/us-doj-100m-in-crypto-dark-web-drug-trafficking/
https://www.justice.gov/opa/pr/incognito-market-owner-arrested-operating-one-largest-illegal-narcotics-marketplaces