Connect with us

Hackers

Hackers Exploit El Salvador’s Chivo BTC Wallet’s Setup Process

Published

on

  • Hundreds of El Salvadorans say that hackers opened their Chivo Wallets.
  • The hackers reportedly use the users’ ID numbers.
  • Hackers did this to claim the $30 BTC incentive from Bukele’s government.

With El Salvador’s adoption of Bitcoin (BTC) as a legal tender, others took this as an opportunity to perform fraudulent acts. According to reports, hackers have stolen the identities of hundreds of El Salvadorans. These hackers, moreover, used people’s identities to claim the $30 BTC incentive from Bukele’s government.

One citizen, Cynthia Gutierrez, reiterated her ill experience to reporters. According to Gutierrez, at first, she refused to download Chivo — El Salvador’s digital wallet developed by its government. She then decided to open the app on October 16th, after knowing that hackers have already victimized her fellow El Salvadorans. The hackers reportedly activated wallets associated with the 9-digit numbers on their identity cards, known as DUI (for its acronym in Spanish).

Gutierrez commented, “This was growing more and more, reaching into my close circle.” Furthermore, when Gutierrez entered her details, the app prompted that her document number was already associated with a wallet.

In fact, Gutierrez’s case is only one among the hundreds of El Salvadorans who experienced the same thing. Between October 14 – 19, Cristosal, a human rights organization in the country, has already received more than 700 notifications reporting identity theft on the Chivo App.

Advertisement

Chivo’s official website, however, states that opening an account requires scanning the DUI front and back, as well as facial recognition. Still, several El Salvadorans reported evidence that somehow, their system is flawed.

Some citizens called Chivo’s hotline (192) like Gabriela Sosa. Sosa narrated,  “I kept calling for several days until they told me I had to go to a Chivo point.” She even went to Chivo’s help center and her account, as well as her money, was only recovered after a long discussion and waiting.

The victims emphasized that they are not against Bukele’s government or his decision to legalize Bitcoin (BTC). Rather, they just wanted to raise awareness that such fraudulent acts occur presently.

Advertisement

Thankfully, there are non-government organizations like Cristosal and Acción Ciudadana who are trying their best to help solve this matter.

For now, the public is yet to see how El Salvador will bring resolution to this challenge. Surely, in no time, Bukele’s government will propose a sturdy solution for it soon enough and ease its citizen’s worries and fears.

News Source

Advertisement

Hackers

This hacker got to Twitter and added Ethereum tipping option, on the same day Jack Dorsey left

Published

on

  • A Hong Kong hacker has accessed Twitter’s internals and tinkered with it to add Ethereum tipping to her profile on the same day that BTC maxi Dorsey resigned.
  • The hacker told one outlet that she believes that as Dorsey leaves, Twitter will include Ethereum as it diversifies into other cryptocurrencies.

Twitter grabbed the headlines in early September when it added Bitcoin as an option on its tipping feature, allowing its users to send the cryptocurrency to their favorite content creators on the social media platform. But why not Ethereum as well? One hacker took it upon herself to bring the king of altcoins to the tipping jar, accessing and tinkering with Twitter’s internals to add her Ethereum wallet.

Twitter has been rolling out its Bitcoin tipping feature moderately, despite the outgoing CEO Jack Dorsey being a super Bitcoin maximalist. For the most part, this feature has been available only to iOS users, but the company is slowly rolling it out to Android users.

What’s more, the company hasn’t made any indication that it would ever introduce Ethereum into this setup.

One hacker from Hong Kong took it upon herself to change this dynamic.

Advertisement

Jane Manchun Wong has gained notoriety globally in recent years for her ability to get into the code of popular platforms and discover their unreleased features, sometimes even before the employees of these platforms. When Instagram planned to introduce a feature that would hide likes, she uncovered and tweeted about it two weeks before the company officially unveiled it. She also famously discovered the ‘Stories for Playlists’ feature on Spotify 155 days before the company started testing it.

And now, she has done it with Twitter.

Ethereum on Twitter?

Speaking to one media outlet, the hacker explained:

The feature has been there since at least September. But I don’t think it’s widely available yet. I did my magic to add the address to my tip jar. I tinker around the internals of the Twitter app.

There are no indications on whether Twitter intends to do what some like Spotify and Instagram have done and launch a feature that Jane revealed first. When reached out for a comment, Twitter claimed to be looking into the issue and said it would be making a comment in due time.

Advertisement

The big coincidence is that Jane’s Twitter ‘infiltration’ happened on the same day that long-time CEO and Bitcoin maximalist Jack Dorsey announced his resignation.

Jack has never been a big fan of Ethereum, even though he once sold an NFT of the first-ever tweet on the network. He has even been on the receiving end of jabs fired by Ethereum founder Vitalik Buterin after apparently referring to Ethereum as a scam.

Advertisement

As Jack leaves, former Twitter CTO Parag Agrawal will take over the CEO’s position. Agrawal has no known affiliation with any cryptocurrency, be it Bitcoin or Ethereum. However, sources inside the company say that he is a great cryptocurrency fan overall and was behind some of Dorsey’s big moves geared towards promoting Bitcoin on Twitter.

News Source

Advertisement
Continue Reading

Hackers

Hackers mining crypto using compromised Google Cloud accounts- Report

Published

on

  • According to the Google Threat Horizon Report, malicious actors are breaking into cloud accounts to mine cryptos.
  • The report disclosed that about 86 percent of the 50 recent cases had to do with hackers mining crypto with compromised accounts. 

The surge of crypto prices has had a direct correlation with cyberattacks in multiple reports published over the last three years. This has been confirmed by the recent Google Threat Horizon Report released earlier this week. According to the report, the demand for these valuable coins has influenced malicious actors to break into Google Cloud accounts to mine them.

The report disclosed that about 86 percent of the 50 recent cases had to do with hackers mining crypto with compromised accounts. 

Malicious actors were observed performing cryptocurrency mining within compromised Cloud instances.

According to the Google Cybersecurity Action Team, two common objectives behind these operations were found to be “traffic pumping” and “obtaining profit.” 

The research was meant to “provide actionable intelligence that enables organizations to ensure their cloud environments are best protected.”

Advertisement

The malicious actors were found to be Russian speakers. In addition to secretly mining cryptos, they actively stream live videos promising people to contribute funds to qualify for a giveaway. 

The actors behind this campaign, which we attribute to a group of hackers recruited in a Russian-speaking forum, lure their target with fake collaboration opportunities.

The Google report also noted that hackers replace the account name, profile picture, and content with the brand of a renowned crypto exchange or firm to deceive users. Some of the other cyber-threats discovered were malware, spam, launching DDoS, and hosting unauthorized content. 

How hackers access these Google Cloud accounts

The report discovered that hackers primarily took advantage of poor customer security practices to get access to the cloud accounts. 

Advertisement

Malicious actors gained access to the Google Cloud instances by taking advantage of poor customer security practices or vulnerable third-party software in nearly 75% of all cases.

Interestingly, 48 percent of compromised instances were linked to hackers gaining control over the Internet-facing Cloud instance. Compromised user accounts or API connections were said to either have no passwords or weaker passwords. This subjected the Google Cloud accounts to brute force. It was also realized that the public IP address space was frequently scanned for vulnerable clouds. This was discovered after realizing that in 40 percent of the instances, the time taken to compromise was under eight hours. 

Google Cloud customers who stand up non-secure Cloud instances will likely be detected and attacked in a relatively period of time. Given that most instances were used for cryptocurrency mining rather than exfiltration of data, Google analysts concluded the Google Cloud IP address range was scanned rather than particular Google Cloud customers being targeted.

The report suggests that Google Cloud users must use Container Analysis for Vulnerability Scanning and metadata storage for containers. Users are also urged to make use of the Web Security Scanner in addition to using a stronger password and routinely updating third-party software. 

News Source

Advertisement
Continue Reading

Hackers

Hacker Returns All Stolen Assets From $643,000,000 Crypto Heist

Published

on

After suffering a massive $643 million hack in early August, decentralized finance (DeFi) protocol Poly Network just retrieved all the stolen funds from the crypto hacker.

On August 10th, Poly Network suffered a large hack involving 59 different crypto assets.

The hack was allegedly conducted by a pseudonymous attacker known as Mr. White Hat. Shortly after the incident occurred, Poly Network began working with the hacker to retrieve the stolen crypto assets.

Advertisement

After receiving the last $33 million that was locked up in the stablecoin Tether (USDT), Poly Network announced it had successfully recovered all of the stolen funds.

“Yay! PolyNetwork has completed the recovery of all PolyNetworkExploit affected user assets.

PolyBridge has now restored cross-chain functionality for a total of 59 assets. Other advanced functions will be gradually restored.”

Advertisement

Tether also took to Twitter to confirm that funds had been safely redistributed.

“After working closely with PolyNetwork through the strict protocols to unfreeze the funds involved in the recent hack, Tether can confirm that the funds have been released today to the legitimate owners.”

Following the hack, Mr. White Hat allegedly left a personal message encoded in the Ethereum transaction history, apologizing for the inconvenience to the project and stressing that the hacking saga was a learning experience for the DeFi community.

Advertisement

“DEAR POLY TEAM,

KEEP CALM AND THIS IS THE HAPPY ENDING! I HAVE TO ADMIT THAT MY WILD OR MAD BEHAVIORS HAVE LED CRISES TO YOUR PROJECT, YOUR TEAM, AND EVEN YOUR LIVES. SORRY FOR THE INCONVENIENCE! IT MUST BE ONE OF THE MOST WILD ADVENTURES IN OUR LIVES…

WHY DO WE FALL? SO WE CAN LEARN TO PICK OURSELVES UP. THIS INCIDENT MUST BE A SERIOUS LESSON TO MANY OF US, OR EVEN THE WHOLE DEFI COMMUNITY. PERSONALLY, I HAVE LEARNT AND PRACTISED A LOT. AND I TRIED TO POINT OUT SOME CRUCIAL FACTS ABOUT THIS CRAZY DEFI WORLD (PLEASE IGNORE MY BAD JOKES SINCE THE BEGINNING), AND HOPEFULLY, MY PHILOSOPHY COULD BE INSPIRING, ESPECIALLY TO THOSE GEEKS WHO HAD MISBEHAVED ACCIDENTALLY.”

Advertisement

Poly Network thanked the hacker for returning the funds back.

“Dear ‘Hacker’,

Thank You! We are ready for a new journey.”

Advertisement

News Source

Continue Reading