#crypto

anonymiss@despora.de

“EtherHiding” — Hiding #Web2 Malicious Code in #Web3 Smart Contracts

Source: https://labs.guard.io/etherhiding-hiding-web2-malicious-code-in-web3-smart-contracts-65ea78efad16

This is what we see here in this #attack — malicious code is hosted and served in a manner that can’t be blocked. Unlike hosting it on a #Cloudflare Worker service as was mitigated on the earlier variant. Truly, it is a double-edged sword in decentralized tech.

#crypto #Blockchain #technology #smartContract #software #cybercrime #warning #internet #web #www #news

simona@pod.geraspora.de

Halten wir fest wenn es bei #NTV berichtet wird hat es auch der Letzte bemerkt - NFTs sind wertlos...

Siehe: https://www.n-tv.de/wirtschaft/Digitale-Kunst-fast-alle-NFTs-sind-wertlos-article24415805.html

Inzwischen gibt es leider fast nur noch den Verlautbarungsjoutnalismus. Es wird abgeschrieben und umformuliert aber für Recherche keine Zeit. Damit unterstützt man dann die Hypes weil alle darüber berichten und das Ende vom Spiel wird erst berichtet wenn das Pferd schon lange tot ist.

#Journalismus #presse #nft #crypto #nachrichten

anonymiss@despora.de

#PigButchering #scam explained: Everything you need to know

source: https://www.techtarget.com/whatis/feature/Pig-butchering-scam-explained-Everything-you-need-to-know

The pig butchering scam, also known as a #romance scam, is a long-term fraud that combines #investment schemes, romance scams and #cryptocurrency #fraud. This scam originated in Southeast #Asia, and the name originates from the Chinese phrase "Shāz Hū Pán," meaning pig butchering. A ring of cryptocurrency #scammers search dating and social #media sites for victims.

#news #knowhow #internet #crime #cybercrime #crypto #btc

anonymiss@despora.de

'The #Wallet Event': #Crypto #Startup #Bankrupt After Losing #Password to $38.9 Million Physical Crypto Wallet

Source: https://www.404media.co/crypto-startup-prime-trust-files-for-bankruptcy-after-losing-password-to-38-9-million-crypto-wallet/

Rather than write down the seed phrases, Prime Trust opted to laser etch them into a piece of steel called “Cryptosteel Hardware,” which are called “Wallet Access Devices” in the court filings. According to the filing, it lost these devices, which is why it can’t get back into the wallet.

#problem #technology #cryptocurrency #finance #economy #news

anonymiss@despora.de

U.S. #Drug Enforcement Administration sends over $50,000 to a #scammer

Source: https://web3isgoinggreat.com/single/us-drug-enforcement-administration-scammed

Someone observed the #DEA wallet send a small test transaction before transferring the remaining seized funds, and quickly used a crypto wallet address with identical characters at the beginning and end to send an airdrop to the DEA source wallet. When the DEA agent went to send the remaining funds, they copied-and-pasted the address, believing it was the same one they'd sent the test transaction to. This is a common scam in the crypto world known as "address poisoning", and is successful primarily because crypto wallet addresses are very long strings of characters that people usually copy-and-paste, and only identify by the characters at the start and end.

#police #usa #fail #technology #scam #crypto #Tether #FBI #news #money #dollar

diane_a@diasp.org

"A group of cybersecurity researchers has uncovered what they believe is an intentional backdoor in encrypted radios used by police, military, and critical infrastructure entities around the world. The backdoor may have existed for decades, potentially exposing a wealth of sensitive information transmitted across them, according to the researchers.

While the researchers frame their discovery as a backdoor, the organization responsible for maintaining the standard pushes back against that specific term, and says the standard was designed for export controls which determine the strength of encryption. The end result, however, are radios with traffic that can be decrypted using consumer hardware like an ordinary laptop in under a minute. "There's no other way in which this can function than that this is an intentional backdoor," Jos Wetzels, one of the researchers from cybersecurity firm Midnight Blue, told Motherboard in a phone call."

https://www.vice.com/en/article/4a3n3j/backdoor-in-police-radios-tetra-burst

#USA #militarygrade #morons #crypto #defectivebydesign #backdoor