Giter Site home page Giter Site logo

overview's Introduction

#Research #Analysis #Advisory #Malware #Threat #Encryption #CyberSecurity #CyberArmour General Overview Cyber Warfare is a free and open source international intrusion detection and prevention advisory Cyber Security Analyst & Research organization. Analysing malware threat. Repository for code samples for Cyber Warfare against individualts, corporations and government organizations.

Join our forum on Linkedin "Quantum Blockchain & Artificial Intelligence" at https://www.linkedin.com/groups/8371715/

Specialities

Tokens, most token based on the old ERC20 standard has design mistakes including tokens issued by the major players. Learn more at https://cryptortrust.com/2018/11/20/erc20-token-design-mistakes-vs-erc223-token/
Cryptocurrencies, many cryptocurrencies is clones of early cryptocurrencies issues. Thus they have heritages issues lurking to ermerge in the future.
Malware, prepare for malware attack against your org. and systems.
Open source code of major threat is free for educational purposes. Contact us for advisory. Retainer is USD 5.000 paid in advance.

Overview

Overview of actors, tools, how they operate Articles

Facts about cryptocurrency theft methods
https://www.cryptolinenews.com/industry-analysis/facts-about-cryptocurrency-theft-methods/
https://bitcoinmagazine.com/articles/how-the-plustoken-scam-absconded-with-over-1-percent-of-the-bitcoin-supply

What is a Botnet HTTP-Botnets: The Dark Side of a Standard Protocol! https://securityaffairs.co/wordpress/13747/cyber-crime/http-botnets.html
https://usa.kaspersky.com/resource-center/threats/botnet-attacks

How to build your own botnet, a framework for security researchers and developers to build and operate a basic botnet https://www.youtube.com/watch?v=TBSh_w0I-z8
https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/

What is a Trojon Virus https://usa.kaspersky.com/resource-center/threats/trojans

Hos to make a Trojan Virus https://usa.kaspersky.com/resource-center/threats/trojans using Phyton https://www.youtube.com/watch?v=eSPLRuOezGc

Trojans - Vidar information-stealing Trojan / Qulab trojans
https://cointelegraph.com/news/new-malware-campaign-spreads-trojans-through-clone-crypto-trading-website

RAT (Remote Access Trojan), which they named InnfiRAT
https://bitcoinist.com/a-new-malware-can-steal-data-from-crypto-wallets/

Hackers Now Hiding ObliqueRAT Payload in Images to Evade Detection
https://thehackernews.com/2021/03/hackers-now-hiding-obliquerat-payload.html

The Rise of Super-Stealthy Digitally Signed Malware—Thanks to the Dark Web https://thehackernews.com/2017/11/malware-digital-certificate.html

Best Torrent sites https://thehackernews.com/2016/12/kickass-torrents-site.html

Deep Web Search Engines to Explore the Hidden Internet https://thehackernews.com/2016/02/deep-web-search-engine.html

Grams - First Search Engine for Underground Black Markets https://thehackernews.com/2014/04/grams-first-search-engine-for.html

New Android Malware Framework Turns Apps Into Powerful Spyware https://thehackernews.com/2018/08/android-malware-spyware.html https://www.theverge.com/2019/7/10/20688885/agent-smith-android-malware-25-million-infections

Hackers Are Using These Tools to Reel in New Victims https://darkwebnews.com/hacking/hacking-tools-used-by-hackers/ https://www.fortinet.com/blog/threat-research/jbifrost-yet-another-incarnation-of-the-adwind-rat.html https://darknetlive.com/post/what-to-do-when-dread-goes-down/

Ethereum and Tokens Attacks

Tokens
https://cryptortrust.com/2018/11/20/erc20-token-design-mistakes-vs-erc223-token/

Wallets
https://www.wired.com/story/blockchain-bandit-ethereum-weak-private-keys/

Mining Attacks
https://www.cryptolinenews.com/2018/11/ethereum-network-token-attacked-by-malicious-minting-attack/?fbclid=IwAR2C-r1X8cuy0gdkq2U91DhNvHjDjsbOtLfYRnA50bFixuFH9oB1if1TRsM
A New Wave of Attacks on Ethereum Mining Rigs
https://cryptonews.com/news/a-new-wave-of-attacks-on-ethereum-mining-rigs-3055.htm
https://blog.quillhash.com/potential-attack-on-ethereum-network-to-mint-gastokens/

Hacking a Blockchain vs a DApp
https://hackernoon.com/hacking-a-blockchain-vs-hacking-a-dapp-a-response-to-mike-orcutts-mit-article-7dfc6973df52

Virtual Kidnapping
https://edition.cnn.com/2019/05/15/tech/virtual-kidnapping/index.html?utm_source=digg&utm_medium=email

RANSOMEWARE
https://dwealth.news/2021/05/colonial-pipeline-ransomware-bad-guys-unmasked/ CryptON Ransomware Installed Using Hacked Remote Desktop Services https://www.bleepingcomputer.com/news/security/crypton-ransomware-installed-using-hacked-remote-desktop-services/

Locky Ransomware Information, Help Guide, and FAQ https://www.bleepingcomputer.com/virus-removal/locky-ransomware-information-help
https://beincrypto.com/russian-nationals-bitcoin-ransomware-trial-begins-in-paris/

CryptoLocker Ransomware Information Guide and FAQ https://www.bleepingcomputer.com/virus-removal/cryptolocker-ransomware-information

CryptorBit and HowDecrypt Information Guide and FAQ https://www.bleepingcomputer.com/virus-removal/cryptorbit-ransomware-information

CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ https://www.bleepingcomputer.com/virus-removal/cryptodefense-ransomware-information

U-Boot's Trusted Boot Validation Bypassed https://www.bleepingcomputer.com/news/security/u-boots-trusted-boot-validation-bypassed/

Locky Poser, PyLocky Ransomware
https://blog.trendmicro.com/trendlabs-security-intelligence/a-closer-look-at-the-locky-poser-pylocky-ransomware/

Viro Botnet https://blog.trendmicro.com/trendlabs-security-intelligence/virobot-ransomware-with-botnet-capability-breaks-through/

Ubuntu Botnet
https://hackernoon.com/is-this-a-ubuntu-based-botnet-deploying-tor-relays-and-bridges-b4ce1a612039

Linux - Phyton Botnet
https://www.f5.com/labs/articles/threat-intelligence/new-python-based-crypto-miner-botnet-flying-under-the-radar

Mirai Botnet (semiautonomously - seeking out targets and spreading itself) https://www.bloomberg.com/news/features/2019-12-20/spiderman-hacker-daniel-kaye-took-down-liberia-s-internet
https://krebsonsecurity.com/2017/07/who-is-the-govrat-author-and-mirai-botmaster-bestbuy/

Necur
https://threatpost.com/necurs-botnet-in-crosshairs-of-global-takedown-offensive/153607/

DDG botnet
https://www.forbes.com/sites/leemathews/2020/04/10/a-sinister-new-botnet-could-prove-nearly-impossible-to-stop/?fbclid=IwAR1WOSx76zeSvkcQ9cz42VdQnNiks3krdJh5DqFuMITVQzZ3dYVFdeeiSmY#1530df537c5c
https://threatpost.com/p2p-ddg-botnet-unstoppable/154650/

Cerber Ransomware steals bitcoin wallets
https://blog.trendmicro.com/trendlabs-security-intelligence/cerber-ransomware-evolves-now-steals-bitcoin-wallets/

Ryyuk Ransomware (Very profitable)
https://cointelegraph.com/news/research-suggests-russian-based-hackers-behind-ryuk-ransomwares-25-million-gains
https://www.csoonline.com/article/3541810/ryuk-ransomware-explained-a-targeted-devastatingly-effective-attack.html

Gustuff
https://www.bleepingcomputer.com/news/security/gustuff-android-malware-targets-100-banking-and-32-cryptocurrency-apps/

Baldr Malware https://darkwebnews.com/hacking/baldr-malware-circulation-in-hacking-forums/

GoldBrute
https://thehackernews.com/2019/06/windows-rdp-brute-force.html

Shade Ransomeware
https://threatpost.com/shade-ransomware-expands-us/145020/

Scranos Malware
https://www.zdnet.com/article/this-data-stealing-malware-has-returned-with-new-attacks-and-nasty-upgraded-features/

Zeppelin ransomware
https://krebsonsecurity.com/2022/11/researchers-quietly-cracked-zeppelin-ransomware-keys/

Turla
https://www.wired.com/story/turla-history-russia-fsb-hackers/
https://securelist.com/tomiris-called-they-want-their-turla-malware-back/109552/

GoldenJackal APT group
https://securelist.com/goldenjackal-apt-group/109677/

Botnets
Smominru Botnet MyKings (alternatively as DarkCloud or Smominru pt Hexmen)
https://thehackernews.com/2019/09/smominru-botnet.html https://cointelegraph.com/news/monero-malware-botnet-lurks-behind-taylor-swift-jpegs
https://www.sophos.com/en-us/medialibrary/pdfs/technical-papers/sophoslabs-uncut-mykings-report.pdf
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-a-mykings-variant-with-bootloader-persistence-via-managed-detection-and-response/
https://blog.netlab.360.com/mykings-the-botnet-behind-multiple-active-spreading-botnets/
https://www.guardicore.com/2016/06/the-photominer-campaign/
https://www.proofpoint.com/us/threat-insight/post/smominru-monero-mining-botnet-making-millions-operators https://s.tencent.com/research/report/765.html
https://www.zscaler.com/blogs/research/darkcloud-bootkit
https://vms.drweb.com/virus/?_is=1&i=14934685
https://www.antiy.com/response/20190822.html
https://securitynews.sonicwall.com/xmlpost/new-variant-pcshare-trojan-with-ups2-version-1-0-2-server-dec-2018/
https://www.cyber.nj.gov/threat-profiles/botnet-variants/smominru
https://www.cyberscoop.com/mykings-botnet-sophos-smominru/
https://www.itspmagazine.com/from-the-newsroom/top-3-crypto-mining-botnets-smominru-ddg-and-adbminer
https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/
https://blogs.akamai.com/sitr/2021/02/bitcoins-blockchains-and-botnets.html

Bulehero Botnet
https://forums.juniper.net/t5/Threat-Research/Anatomy-of-the-Bulehero-Cryptomining-Botnet/ba-p/458787

Mokes" and "Netwire
https://cointelegraph.com/news/report-record-breaking-coincheck-hack-perpetrated-by-virus-tied-to-russian-hackers

LockBit Ransomware Gang
https://www.wired.co.uk/article/lockbit-ransomware-attacks
https://www.chainalysis.com/blog/nca-ofac-sanctions-dmitry-khoroshev-lockbit-ransomware-2024/

MINING Beapy File based mining. Most lucrative mining strategy
https://bitcoinmagazine.com/articles/new-cryptojacking-campaign-infects-asia-using-more-profitable-tactics/
https://www.symantec.com/blogs/threat-intelligence/beapy-cryptojacking-worm-china https://www.symantec.com/blogs/threat-intelligence/cryptojacking-modern-cash-cow https://www.symantec.com/content/dam/symantec/docs/security-center/white-papers/istr-cryptojacking-modern-cash-cow-en.pdf

https://www.vanityfair.com/news/2019/11/the-big-bitcoin-heist

Hacker Tools Top Ten Our Recommended Pentesting Tools and Hacking Software For 2018 https://www.concise-courses.com/hacking-tools/top-ten/

https://en.wikipedia.org/wiki/Hacking_tool https://www.cybersecuritymastersdegree.org/2017/11/top-ten-tools-for-cybersecurity-pros-and-black-hat-hackers/ https://www.guru99.com/learn-everything-about-ethical-hacking-tools-and-skills.html https://www.darknet.org.uk/category/hacking-tools/ https://fossbytes.com/best-hacking-tools-of-2016-windows-linux-mac-osx/ https://www.greycampus.com/blog/information-security/top-wireless-hacking-tools

WhatsApp / Whatsup https://www.linkedin.com/pulse/new-hacks-modify-whatsup-chat-ajay-upadhyay/

LocalBitcoin https://bitcoinmagazine.com/articles/phishing-scam-hits-localbitcoins-clients-lose-funds/

Android https://www.linkedin.com/pulse/new-man-in-the-disk-attack-leaves-millions-android-phones-upadhyay/ https://thehackernews.com/2019/10/remove-xhelper-android-malware.html
https://threatpost.com/xhelper-russian-nesting-doll-android-malware/154519/

Iphone
https://www.vanityfair.com/news/2016/11/how-bill-marczak-spyware-can-control-the-iphone

Windows
Windows Torrent File Malware Can Swap Out Crypto Addresses, Researcher Warns https://cointelegraph.com/news/windows-torrent-file-malware-can-swap-out-crypto-addresses-researcher-warns
https://www.techrepublic.com/article/nasty-botnet-uses-wannacry-exploit-to-mine-cryptocurrency-from-your-servers/
https://www.wired.com/story/nsa-windows-10-vulnerability-disclosure/#intcid=recommendations_wired-homepage-right-rail-popular_8647e7a8-5e06-4f07-99c2-569573f1586b_popular4-1

CISCO Router https://www.wired.com/story/cisco-router-bug-secure-boot-trust-anchor/

Bitcoin ATM Hacks
https://bravenewcoin.com/insights/bitcoin-atm-numbers-are-booming

Github https://www.darkreading.com/application-security/its-time-to-take-github-threats-seriously/a/d-id/1331577

Kraken Cryptor is able to prey on victims and gain revenue through its affiliate program, a ransomware-as-a-service (RaaS) model https://darkwebnews.com/dark-web/kraken-darknet-expansion/

Monappy Wallet Provider
https://coinfomania.com/18-year-old-monacoin-theft-japan/?fbclid=IwAR3SW4HigAczkr5o9MSzVLWHnrFcsEIbXxRPFst0kAZ-i0CaTUOM4XJfpvQ

Phishing
https://darknetlive.com/post/empire-phishing/
https://darknetlive.com/post/a-warning-about-darkweb-market-phishing-sites

Malware market - New market https://www.cryptolinenews.com/2018/06/cryptocurrencies-have-given-birth-to-another-market/

Mobile Network Hacking of Crypto Currencies https://coinfomania.com/nicholas-truglia-convicted-for-crypto-theft/?fbclid=IwAR3_1ClKPdN14F6B1hrH4UXmgMgQyjka2Aj9L0O3zLkS120hSfPmJ8Sf1VY https://breakermag.com/doctored-images-are-yet-another-way-for-hackers-to-steal-your-crypto/

SamSam Randsomware https://blog.malwarebytes.com/cybercrime/2018/05/samsam-ransomware-need-know/

GameOver ZeuS Botnet / Evgeniy Bogachev - one of the most successful hackers http://nautil.us/issue/66/clockwork/the-100-million-bot-heist?utm_source=digg&utm_medium=email

Inside North Korea’s Hacker Army (Lazarus Hacker Group)
https://www.bloomberg.com/news/features/2018-02-07/inside-kim-jong-un-s-hacker-army
https://coinidol.com/north-korean-lazarus/
https://thehackernews.com/2019/05/north-korean-hacking-tool.html
https://www.wired.com/story/how-north-korea-robs-banks-around-world/
https://www.wsj.com/articles/north-korea-is-suspected-in-bitcoin-heist-1522303177 https://thenextweb.com/hardfork/2018/10/19/cryptocurrency-attack-report/
https://tokenhell.com/us-authority-charged-two-chinese-officials-with-laundering-cryptocurrency-worth-100m/
https://www.the-blockchain.com/2020/03/13/two-chinese-nationals-charged-with-hacking-cryptocurrency-exchange-and-laundering-over-100-million-in-cryptocurrency/
https://www.altfi.com/article/9685_more-than-540m-laundered-through-renbridge
https://www.infosecurity-magazine.com/news/lazarus-dtrack-target-europe-and/
Lazarus Group Poses as VC Firms to Spread Malware https://decrypt.co/118031/north-korea-linked-lazarus-group-poses-as-vc-firms-to-spread-malware
https://securelist.com/the-lazarus-group-deathnote-campaign/109490/

Inside Iran's Hacker Army
Holmium Group / APT33 Group https://www.marketscreener.com/MICROSOFT-CORPORATION-4835/news/Microsoft-Iranian-Hackers-Have-Hit-Hundreds-of-Companies-in-Past-Two-Years-2nd-Update-28123238/
https://portswigger.net/daily-swig/iranian-cyber-threat-groups-make-up-for-lack-of-technical-sophistication-with-social-engineering-trickery

Inside Russia's Hacker Army
https://www.bloomberg.com/news/articles/2021-06-11/russian-hackers-thrive-as-putin-prepares-to-meet-with-u-s-president-biden
APT28 / Russia's 'Fancy Bear' Hackers
https://www.wired.com/story/fancy-bear-hotel-hack/
Russia's Evil Corp / Using Dridex malware (Also known as Bugat / Cridex)
https://www.bloomberg.com/news/articles/2019-12-05/u-s-sanctions-evil-corp-blamed-for-100-million-cyber-theft
https://blog.chainalysis.com/reports/ofac-sanction-suex-september-2021/
https://blog.chainalysis.com/reports/eastern-europe-cryptocurrency-geography-report-2021-preview/
https://blog.chainalysis.com/reports/ofac-sanction-chatex-revil-sodinokibi-november-2021/
https://blog.chainalysis.com/reports/2022-crypto-crime-report-preview-russia-ransomware-money-laundering/?fbclid=IwAR08fTQ64VEqYnDBraTRx5q-Yv5p7tcHGGLGWW3IF3sQIfQpGaFoM8uKTOY

Inside Indias Hacker Army
https://portswigger.net/daily-swig/indian-cyber-espionage-activity-rising-amid-growing-rivalry-with-china-pakistan

Inside Chinas Hacker Army
https://portswigger.net/daily-swig/behind-the-great-firewall-chinese-cyber-espionage-adapts-to-post-covid-world-with-stealthier-attacks

Lurk Group
https://securityaffairs.co/wordpress/67262/cyber-crime/wannacry-lurk-group.html

DARKNET MARKETS Darknet Ecommerce, Hydra, Empire Market Bypass Shop, etc.

Hydra
https://www.elliptic.co/blog/5-billion-darknet-market-hydra-seized-by-german-authorities
https://www.wired.com/story/hydra-market-shutdown/
https://medium.com/@Nethone_/russian-darknet-market-hydra-is-expanding-whats-the-threat-d0613d34a358
https://portswigger.net/daily-swig/authorities-seize-hydra-servers-in-bust-against-darknet-cybercrime-marketplace

DeSnake / AlphaBay
https://www.wired.com/story/alphabay-desnake-dark-web-interview/
https://www.wired.com/story/alphabay-series-part-2-pimp-alex-91/
https://www.wired.com/story/alphabay-series-part-3-alpha-male/
https://www.wired.com/story/alphabay-series-part-4-face-to-face/
https://www.wired.com/story/alphabay-series-part-5-takedown/
https://www.wired.com/story/alphabay-series-part-6-endgame/

Other
https://www.expressvpn.com/blog/best-onion-sites-on-dark-web/
http://s4k4ceiapwwgcm3mkb6e4diqecpo7kvdnfr5gg7sph7jjppqkvwwqtyd.onion/ Overview of onion links

Stateown Intelligence Agencies: Russian Intelligence Agency, Federal Security Bureau (FSB)
https://www.cryptoknowmics.com/news/bbc-russian-service-450-million-worth-of-bitcoin-connected-to-russia
https://wearechange.org/10-things-you-didnt-know-about-the-cia-before-yesterday/?fbclid=IwAR0QMLBXXE6vbBAC5HEaZMnYskb5Ydfc4oGsrT_AOMgfJvQeARcMmF8tzyk
https://www.bloomberg.com/news/articles/2020-11-13/a-russian-cyber-guru-finds-ways-to-distance-company-from-kremlin?srnd=premium-europe
https://portswigger.net/daily-swig/who-is-behind-apt29-what-we-know-about-this-nation-state-cybercrime-group

Sandworm may be best known for the NotPetya ransomware attack https://techcrunch.com/2022/04/27/state-sandworm-russian-hackers-ukraine/

Inside China's Hacker Army
https://portswigger.net/daily-swig/behind-the-great-firewall-chinese-cyber-espionage-adapts-to-post-covid-world-with-stealthier-attacks

Cubas's Hacker Army https://www.infosecurity-magazine.com/news/cuba-ransomware-actors-pocket-60m/

FIN7 Hacker group (Also known to others as Cobalt Strike or Carbanak) https://darkwebnews.com/hacking/researchers-claim-hacking-group-fin7-still-on-loose/ https://www.wired.com/story/fin7-carbanak-hacking-group-behind-a-string-of-big-breaches/ https://www.wired.com/story/jackpotting-atm-hacks/

Hacker providers
https://www.reuters.com/article/us-india-cyber-mercenaries-exclusive/exclusive-obscure-indian-cyber-firm-spied-on-politicians-investors-worldwide-idUSKBN23G1GQ?il=0

Wordfence
https://www.wordfence.com/blog/2018/12/wordpress-botnet-attacking-wordpress/?utm_source=list&utm_medium=email&utm_campaign=120518b&_hsenc=p2ANqtz--jcl1J96VqQy3hm-sqWtfR8Nubmaca5rZOoWM7u6NaDeNnW5nGU2gBce5lCBfw93LjYx99hKfCLFWKUVqUC3VJPxZAQA&_hsmi=68097177

Whonix or Tails? https://darkwebnews.com/anonymity/whonix-or-tails/

Sim Card teft
https://www.digitaltrends.com/mobile/sim-swap-fraud-explained/ https://coinfomania.com/20-year-old-dawson-bakies-accused-crypto-theft/?fbclid=IwAR2BKqr8NecknuA7Wyxj4a0dTA5jpnVytab5w35S91zNjDp_Ca8jBhr4Q00

Domain Squatting https://darkwebnews.com/scams/btc-scammer-made-760k-through-darknet-typosquatting/ https://cointelegraph.com/news/europol-arrests-six-people-allegedly-behind-27-million-bitcoin-theft?fbclid=IwAR2IFxAx_2mCM-VwUIasko61tcJ8g_4vSb7n0zy_2y1szHhRbw2VmfZvR1A
https://portswigger.net/daily-swig/dark-web-typosquatters-raking-in-a-fortune

New Advanced Malware Targeting Windows Computers Available on the Dark Web
https://darkwebnews.com/hacking/malware-targeting-windows-computers/

New Trends https://bitcoinmagazine.com/articles/2019-saw-most-exchange-attacks-ever-with-hackers-becoming-more-savvy
https://bitcoinmagazine.com/articles/cryptomining-attacks-remain-one-of-the-nastiest-malware-threats-of-2019

MINING ON OTHER PEOPLES COMPUTOR Crypto Illegal Mining Beating Ransomware as Top Cyber Threat
https://www.bloomberg.com/news/articles/2018-12-14/crypto-illegal-mining-seen-beating-ransomware-as-cyber-threat?srnd=premium-europe
https://www.csoonline.com/article/3253572/internet/what-is-cryptojacking-how-to-prevent-detect-and-recover-from-it.html
https://www.zdnet.com/article/a-giant-botnet-is-forcing-windows-servers-to-mine-cryptocurrency/
https://www.siliconrepublic.com/enterprise/wannamine-smominru-botnets-cryptocurrency
https://www.infosecurity-magazine.com/news/hackers-malicious-file-systems/

Mining on other peoples computer - pirate Bay, mining Monero https://www.zdnet.com/article/how-much-does-the-pirate-bays-cryptocurrency-miner-make/ https://steemit.com/news/@runicar/pirate-mining-cryptojacking-your-cpu-to-mine-crypto-is-your-pc-under-attack-soultions-how-to-stop-it
https://hackernoon.com/how-to-block-hackers-from-mining-cryptocurrency-on-your-computer-and-smartphones-c0c485b6eae6

Private Surveillance Is a Lethal Weapon Anybody Can Buy
https://www.nytimes.com/2019/07/19/opinion/private-surveillance-industry.html?action=click&module=Opinion&pgtype=Homepage&utm_source=digg&utm_medium=email

Monero https://www.zdnet.com/article/ransomware-why-the-crooks-are-ditching-bitcoin-and-where-they-are-going-next/ https://blog.barracuda.com/2017/03/23/kirk-ransomware-does-things-differently/
https://cointelegraph.com/news/new-instance-of-monero-malware-sees-cryptojackers-target-linux-users
https://cointelegraph.com/news/research-warns-familiar-monero-mining-malware-is-infecting-windows-systems
https://blog.trendmicro.com/trendlabs-security-intelligence/monero-miner-malware-uses-radmin-mimikatz-to-infect-propagate-via-vulnerability/
https://www.trendmicro.com/vinfo/us/threat-encyclopedia/malware/Trojan.Win32.MIMIKATZ.ADU?_ga=2.67727382.60182665.1551811519-1187802437.1551811518
https://github.com/search?q=smominru&type=Code
https://www.techrepublic.com/article/nasty-botnet-uses-wannacry-exploit-to-mine-cryptocurrency-from-your-servers/
https://cointelegraph.com/news/monero-malware-botnet-lurks-behind-taylor-swift-jpegs
https://www.guardicore.com/2016/06/the-photominer-campaign/
https://www.forbes.com/sites/leemathews/2020/04/10/a-sinister-new-botnet-could-prove-nearly-impossible-to-stop/?fbclid=IwAR1WOSx76zeSvkcQ9cz42VdQnNiks3krdJh5DqFuMITVQzZ3dYVFdeeiSmY#1530df537c5c
https://decrypt.co/44005/a-monero-malware-has-been-upgraded-and-can-now-steal-passwords
https://unit42.paloaltonetworks.com/black-t-cryptojacking-variant/
https://cointelegraph.com/news/alarming-growth-of-difficult-to-detect-lemon-duck-crypto-mining-botnet
https://blog.talosintelligence.com/2020/10/lemon-duck-brings-cryptocurrency-miners.html
https://decrypt.co/44005/a-monero-malware-has-been-upgraded-and-can-now-steal-passwords
https://unit42.paloaltonetworks.com/black-t-cryptojacking-variant/

Bitcoin
https://www.globalbankingandfinance.com/bitcoin-stealers-are-back-hunt-for-users-cryptosavings-continues/
https://www.wired.com/story/opinion-bitcoins-greatest-feature-is-also-its-existential-threat/

Tether
https://bitfinexed.medium.com/bitfinex-and-tether-is-unauditable-why-they-will-never-do-a-real-audit-3324e002b185
https://bitfinexed.medium.com/understanding-bogus-usd-crypto-currency-volume-why-you-should-disregard-fakeusd-prices-and-c0933c72e3e5
https://bitfinexed.medium.com/spoiler-alert-the-institution-buying-tethers-is-bitfinex-themselves-f56af29ce60c
https://bitfinexed.medium.com/bitfinex-never-repaid-their-tokens-bitfinex-started-a-ponzi-scheme-86a9291add29
https://bitfinexed.medium.com/fake-it-till-you-make-it-when-bitfinex-themselves-used-to-spoof-their-entire-orderbook-18294585338
https://bitfinexed.medium.com/wash-trading-bitcoin-part-ii-who-and-why-is-someone-wash-trading-on-bitfinex-e1c7b5e0b3bb
https://medium.com/hackernoon/the-curious-tale-of-tethers-6b0031eead87 https://medium.com/hackernoon/meet-spoofy-how-a-single-entity-dominates-the-price-of-bitcoin-39c711d28eb4
https://www.nytimes.com/2017/11/21/technology/bitcoin-bitfinex-tether.html
https://www.forbes.com/sites/stevenehrlich/2022/12/21/inside-tether-cryptos-so-far-unbreakable-buck/?sh=1e2a6e0173fa&fbclid=IwAR3mhXp76afQ2EX7Yj5l0tnjPtCfjybhbO1dqA3icP587EoKrSvG4Oy0cMg

https://thehackernews.com/2019/09/smominru-botnet.html

Malware that mines the privacy-focused open source cryptocurrency turtlecoin (TRTL) https://cointelegraph.com/news/researchers-say-50-000-servers-worldwide-infected-with-privacy-coin-cryptojacking-malware

IOTA https://coinfomania.com/missing-11-million-iota-tokens-recovered-report/?fbclid=IwAR2RLRl3CDFeVK9C_7UwYtaMYe7KS3TTE5ebHsVluB3OQl0s0XkYzeGL8_c

The Leaked NSA Spy Tool That Hacked the World
https://www.wired.com/story/eternalblue-leaked-nsa-spy-tool-hacked-world/

Shadow Brokers
https://en.wikipedia.org/wiki/The_Shadow_Brokers
https://medium.com/@shadowbrokerss/dont-forget-your-base-867d304a94b1
https://twitter.com/shadowbrokerss
https://steemit.com/shadowbrokers/@theshadowbrokers/theshadowbrokers-monthly-dump-service-july-2017

WIFI sniffers https://www.crc.id.au/tracking-people-via-wifi-even-when-not-connected/
https://hackerfall.com/story/passive-wifi-tracking

Emailsscam committed through a wide array of “sextortion” blackmail strategies, which included the weaponization of emails
https://bitcoinmagazine.com/articles/report-claims-that-sextortionists-absconded-with-over-300000-in-crypto-in-2018/

Fake Tor Browser https://cointelegraph.com/news/fake-tor-browser-steals-bitcoin-from-darknet-users-warns-eset

Google Store / Google Chrome
https://cointelegraph.com/news/fake-ledger-live-chrome-extension-stole-14m-xrp-researchers-claim

Bots https://ice9bot.blogspot.com/ https://readwrite.com/2013/07/31/how-to-build-a-botnet-in-15-minutes/

TrickBot
https://www.csoonline.com/article/3599908/trickbot-gets-new-uefi-attack-capability-that-makes-recovery-incredibly-hard.html
https://eclypsium.com/2020/12/03/trickbot-now-offers-trickboot-persist-brick-profit/

IPFS
https://www.technadu.com/cybercriminals-cloudflares-ipfs-gateway-phishing-attacks/43456/

Deep Learing Resources/ Artificial Intelligence
https://www.edureka.co/blog/deep-learning-with-python/
https://www.cybersecurity-insiders.com/the-malware-of-the-future-will-be-independent-and-adaptable/
https://www.rebellionresearch.com/blog/ai-security-with-adversarial-robustness-and-explainable-ai
https://www.rebellionresearch.com/blog/ai-vs-fraud
https://portswigger.net/daily-swig/trojannet-a-simple-yet-effective-attack-on-machine-learning-models

Hide Your IP address / Anonoumus DNS providers https://darkwebnews.com/anonymity/dns-providers-that-dont-log-queries/

Exchanges Hacked / Fake / leaking
https://medium.com/@info_85454/idax-pro-scammed-crypto-projects-for-up-to-5-000-000-usd-c2d10a0dd14e
https://www.rollingstone.com/culture/culture-news/the-rise-and-fall-of-a-bitcoin-kingpin-43198/
https://cointelegraph.com/news/researchers-claim-crypto-exchange-hacks-happen-in-three-ways
https://cointelegraph.com/news/kucoin-hack-unpacked-more-crypto-possibly-stolen-than-first-feared
https://valid.network/post/financially-exploiting-the-blockchain-with-frontrunning?utm_source=social&utm_medium=share&utm_campaign=blog

DAO hacking
https://www.forbes.com/sites/laurashin/2022/02/22/exclusive-austrian-programmer-and-ex-crypto-ceo-likely-stole-11-billion-of-ether/?sh=c39325c7f589

Website hijacking
https://www.wired.com/2016/10/anonymous-notorious-hacker-back-hes-gone-legit/#intcid=recommendations_wired-homepage-right-rail_b25757e7-e0bf-40bc-a95d-aeb6f786c6e6_popular4-1

Ponzi scheme https://bitcoinmagazine.com/articles/did-the-plustoken-scam-cause-a-bitcoin-price-dip
https://news.8btc.com/crypto-wallet-plustoken-a-3-billion-ponzi-scheme-went-bust
https://news.8btc.com/just-vanished-wallet-tokenstore-sued-by-2100-victims

Bridges - also works as mixing services
https://cointelegraph.com/news/the-aftermath-of-axie-infinity-s-650m-ronin-bridge-hack
https://www.elliptic.co/blog/540-million-stolen-from-the-ronin-defi-bridge
https://www.altfi.com/article/9685_more-than-540m-laundered-through-renbridge
Ren Bridge https://www.coindesk.com/business/2022/02/23/ren-labs-raises-75m-for-catalog-cross-chain-exchange/

Mixing services like CoinJoin, CoinShuffle. TumbleBit, NTumbleBit, Tornado Cash
https://bitcoinmagazine.com/guides/bitcoin-anonymous
https://bitcoinmagazine.com/articles/better-bitcoin-privacy-scalability-developers-are-making-tumblebit-reality/
https://bitcoinmagazine.com/articles/darknet-markets-cant-live-with-or-without-bitcoin
https://bitcoinmagazine.com/guides/what-are-bitcoin-mixers
POSSIBLE? ANONYMOUS TRANSACTIONS https://pragmaticcoders.com/blog/anonymous-transactions-on-the-public-blockchain/
https://bitcoinmagazine.com/articles/do-coinjoin-mixes-really-require-equal-transaction-amounts-for-privacy-part-two-knapsack
https://bitcoinmagazine.com/articles/how-payswap-can-confuse-blockchain-analysts-benefiting-bitcoin-privacy-for-all
https://bitcoinmagazine.com/articles/maintaining-transaction-privacy-in-the-age-of-government-blockchain-analysis
https://bitcoinmagazine.com/articles/coinjoins-first-steps-how-dark-wallet-paved-the-way-for-a-more-private-bitcoin
https://cryptonews.com/news/incognito-launches-anonymous-way-to-swap-monero-with-bitcoin-5876.htm
https://cointelegraph.com/news/coin-mixers-record-breaking-month-proves-bitcoin-users-want-anonymity
https://medium.com/tozex/how-do-criminals-launder-money-through-blockchain-dc66916b5d81
https://cointelegraph.com/news/bitmex-faces-lawsuit-for-alleged-racketeering-and-extensive-illicit-activities
https://bitcoinmagazine.com/articles/the-human-rights-foundation-is-now-funding-bitcoin-privacy-development-starting-with-coinswap
https://github.com/AdamISZ/CoinswapCS
https://news.bitcoin.com/john-mcafee-announces-privacy-coin-airdrop-today/
https://mcafeedex.com/#/erc20
https://www.coindesk.com/us-officials-arrest-alleged-operator-of-336m-bitcoin-mixing-service
https://www.coindesk.com/darknet-markets-are-mixing-bitcoins-at-blistering-pace-report
https://medium.com/meetbitfury/darknet-use-and-bitcoin-a-crypto-activity-report-by-crystal-blockchain-353a8678730
https://www.elliptic.co/blog/bitcoin-money-laundering
https://dwealth.news/2021/05/colonial-pipeline-ransomware-bad-guys-unmasked/
https://cointelegraph.com/news/alameda-wallets-funnel-over-1-7m-via-crypto-mixers-overnight
https://www.forbes.com/sites/thomasbrewster/2023/03/15/us-shuts-down-crypto-mixer-chipmixer-used-by-russian-and-north-korea-spies/?utm_medium=browser_notifications&utm_source=pushly&utm_campaign=2780664&sh=54928aa35721

Etereum Mixers
https://www.coindesk.com/hacker-drains-defi-liquidity-balancer
https://medium.com/@tornado.cash/introducing-private-transactions-on-ethereum-now-42ee915babe0
https://medium.com/@tornado.cash/how-to-stay-anonymous-with-tornado-cash-and-similar-solutions-efdecdbd7d37
https://uniswap.info/home
RenBTC is wrapped Bitcoin. Hackers will swap ETH for renBTC, then unwrap the asset on the native Bitcoin blockchain.
https://weissratings.com/en/weiss-crypto-daily/ftx-account-drainer-puts-sell-pressure-on-eth

Tornado Cash https://blog.chainalysis.com/reports/tornado-cash-sanctions-challenges/
https://decrypt.co/108159/professor-republishes-tornado-cash-code-following-github-takedown
https://github.com/orgs/tornado-repositories/repositories?type=all
https://archive.softwareheritage.org/browse/search/?q=tornadocash&with_visit=true&with_content=true
https://beincrypto.com/learn/tornado-cash/
https://www.coindesk.com/tech/2023/03/06/tornado-cash-fork-privacy-pools-deployed-on-optimism-testnet/
https://www.immunebytes.com/blog/what-is-tornado-cash-why-is-it-popular-with-hackers/
https://etherscan.io/address/0x910cbd523d972eb0a6f4cae4618ad62622b39dbf contract
https://blog.chainalysis.com/reports/tornado-cash-sanctions-challenges/#:~:text=The%20user%20can%20then%20either,0.05%25%20to%200.2%25%20fee.
https://tornadocash.sh/docs/general/how-to-use-tornado-cash-with-tor/
https://tornadocash.sh/docs/how-does-tornado.cash-work/
https://github.com/tornadocash-community/docs/blob/en/general/how-to-use-tornado-cash-with-tor.md
https://tornadocash.gitbook.io/docs/generals/introduction-to-tornado-cash
https://nova.tornadocash.eth.link/ tornadocash on web3 https://www.coindesk.com/tech/2022/01/25/tornado-cash-co-founder-says-the-mixer-protocol-is-unstoppable/
https://www.reddittorjg6rue252oqsxryoxengawnmo46qy4kyii5wtqnwfj4ooad.onion/r/ethdev/comments/g0jehk/why_i_think_using_tornadocash_might_be_a_bad_idea/
Swap with monero as an alt.
https://www.reddit.com/r/tornado_cash/
https://www.reddit.com/r/ethereum/comments/xlwkzn/can_i_use_tornado_cash/
https://github.com/AthanorLabs/atomic-swap

Mixing to crypto to USD
https://www.southworld.net/mexico-of-the-cyber-narcos-cartels/

Telegram https://gbhackers.com/masad-stealer/
https://www.coindesk.com/business/2022/12/07/attacker-targets-wealthy-crypto-funds-using-telegram-chats/

Cybersecurity firms https://www.newyorker.com/magazine/2019/11/04/a-cybersecurity-firms-sharp-rise-and-stunning-collapse?utm_source=digg&utm_medium=email

https://assets.ctfassets.net/kisruz03w7zs/1Mg3NZrElrcbkGZdYhsgql/0f5798852c0ab67b950252ee410eac16/Nethone_-_Brief_history_of_the_biggest_Eng_and_Rus_DNMs.pdf
https://dwealth.news/2021/05/colonial-pipeline-ransomware-bad-guys-unmasked/

Forums https://chklst.ru/discussion/1596/maynery-kriptovalyut-ispolzuyut-eternalblue-doublepulsar
https://gbhackers.com/
https://hackforum.pro/

Future Dissident tech development https://bitcoinmagazine.com/articles/amir-taaki-on-bitcoin-and-building-dissident-technology-in-2020

LOST YOUR BITCOIN? HERE IS HOW YOU CAN RECOVER IT
https://bitcoinist.com/lost-your-bitcoin-here-is-how-you-can-recover-it/

Surveilence / monitoring transactions SHADOWY US SPY FIRM PROMISES TO SURVEIL CRYPTO USERS FOR THE HIGHEST BIDDER
https://www.mintpressnews.com/anomaly-6-surveil-crypto-users-highest-bidder/283036/

Artificial Intelligence AI Armed With ChatGPT, Cybercriminals Build Malware And Plot Fake Girl Bots. Cybercriminals have started using OpenAI’s artificially intelligent chatbot ChatGPT to quickly build hacking tools. Scammers are also testing ChatGPT’s ability to build other chatbots designed to impersonate young females to ensnare targets, one expert monitoring criminal forums told Forbes. https://www.forbes.com/sites/thomasbrewster/2023/01/06/chatgpt-cybercriminal-malware-female-chatbots/?utm_medium=browser_notifications&utm_source=pushly&utm_campaign=2591994&sh=afb904f55349

Darknet Exchanges for drugs, etc. using Tor
https://bitcoinist.com/us-doj-100m-in-crypto-dark-web-drug-trafficking/
https://www.justice.gov/opa/pr/incognito-market-owner-arrested-operating-one-largest-illegal-narcotics-marketplaces

overview's People

Contributors

gmsolem avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.