Coins: 4681
Market Cap: $250.64B
24h Vol: $58.36B
Dominance: BTC 56.50% ETH 10.55% BCH 2.90%
Sky Net Security
Sky Net Security (DSCOIN)
$0.00007 -3.33 %
Website skynetwork.top
Explorer etherscan.io
Community Facebook | Twitter
Market Cap
$0.00
24 Hour Trading Volume
$15,273.73
24h Low / 24h High
$0.00007 / $0.00007
Available Supply
0

Sky Net Security (DSCOIN) price, performance and general information

24h
7d
14d
30d
60d
1y
-3.33 %
16.10 %
104.57 %
278.97 %
261.01 %

Sky Net Security (DSCOIN) News

New Cryptojacking Campaign Infects Asia Using More Profitable Tactics

Cryptojacking — the process of infecting computers with malware to mine cryptocurrency — has declined alongside prices during cryptowinter. But like any dextrous organism facing extinction, the virus and its propagators are adapting.According to a report by cybersecurity analytics firm Symantec, cryptojacking incidents have plummeted 52 percent since January 2018, but the method of delivery, the execution and the targeting schemes have grown more sophisticated.Specifically, Symantec’s latest report focused on Beapy, a cryptojacking campaign sweeping through Asia by taking specific aim at business and enterprise. Using a software exploit called EternalBlue, which was developed by the United States’ own NSA, the virus is spread via email. Symantec first tuned into the growing threat in January of this year.With infection rates spiking in March and continuing an exponential upward trajectory since, the firm has concluded that, based on the virus’s infection route, “it was probably always intended to spread throughout enterprise networks.” Described as a “worm” by the report, the virus effectively infiltrated vulnerable devices and, using a matrix of cyber tunnels, bored its way into devices connected to the same server or network.“This campaign demonstrates that while cryptojacking has declined in popularity with cyber criminals since its peak at the start of 2018, it is still a focus for some of them, with enterprises now their primary target,” the introduction to the report asserts.Graph courtesy of SymantecSome 98 percent of infected parties are enterprise related, the report continues, mirroring 2018 trends in ransomware attacks wherein a drop in overall threats corresponded with an increase in enterprise-focused infections. These attacks, Symantec Threat Intelligence Analyst Allan Neville told Bitcoin Magazine, can “[render] some devices unusable due to high CPU usage.”China has become the main target of this particular attack, dwarfing all other affected countries with a staggering 83 percent share of all infections. Other afflicted countries include Japan, Vietnam, South Korea, Hong Kong, Taiwan, Bangladesh, Philippines and — the only two outside of the Eastern Hemisphere — Jamaica and Japan.Virus Infection StrategyThe virus was initially spread through Windows devices via an infected Excel spreadsheet. Once opened, the spreadsheet would create a backdoor into the computer’s OS, making use of the DoublePulse exploit that was leaked in the same batch of cyber tools that gave the attackers the EternalBlue vector for their operations.Exploiting a weak point in Windows’ Server Message Block protocol, the files containing the virus could then be spread “laterally across networks.”The mining malware also commandeered credentials, such as passwords and usernames, from infected devices to spread to other computers in a network. Moreover, the firm found versions of Beapy on a public-facing web server, using a list of IP addresses connected to this server to create a hit list of potential victims.More Upside Than BeforeOne of the study’s most interesting findings is that Beapy is unlike the run-of-the-mill cryptojacking malware most often employed when infections were at their zenith in early 2018.Most of these campaigns employed browser-based miners. These viruses largely leveraged the Coinhive protocol, a non-malicious software implementation that was employed by such sites as UNICEF, allowing its website visitors to voluntarily mine Monero for charity through their browsers upon visiting the site. Coinhive shuttered operations in March of 2019, and this, coupled with Monero’s steep depreciation in the bear market, likely led to a steady decline in cryptojacking, the report surmises.Beapy, however, doesn’t rely on browser mining, opting instead for a much more lucrative and complex file mining approach. Unlike browser mining, file mining is more resource efficient and makes for a greater haul: the average 30-day return for this technique, for instance, could net the virus’s blackhats $750,000, making the browser mining alternative’s return seem paltry at $30,000.Image courtesy of SymantecDespite it being on the rise, “file-based coinmining isn’t new,” Neville told Bitcoin Magazine; it’s just “taken a back seat to browser-based coinmining the past couple of years” due to the fact that browser-based mining cryptojacking takes less technical skill.“The launch of Coinhive — with its ready made scripts — lowered this barrier even further,” he added.Furthermore, even if a computer is patched against the virus, they will still execute browser mining if they visit a site “that has coin-mining code injected into it.”Neville clarified that it’s “too early to tell if we’ll see a resurgence in file-based mining compared to browser-based mining.” Still, as detection and protection against Coinminers improves, cyber criminals will look toward “alternative revenue sources.”“As cyber criminals hone their tactics, we’ve also seen that their approach becomes more targeted.”Defending Against the ThreatThe report ends by listing the side effects of such cryptojacking infections, including device overheating and excessive battery consumption, which can lead to device degradation and spikes in electricity costs.It also details the precautions that companies can take to insulate against such attacks. On the hardware and software side, companies can employ security solutions “to guard against single-point failures in any specific technology or protection method,” including firewalls and vulnerability assessments; robust passwords and multi-factor authentication are also a bonus.On the employee side, education is key. In addition to basic cyber hygiene, the report prescribes lessons on what cryptojacking is and how to spot it, like watching for spikes in CPU usage and a battery drain. Neville reiterated many of these points at the end of our correspondence.“Beyond ensuring that employees receive regular training to recognize and report phishing emails used to deliver malware, businesses should implement overlapping and mutually supportive defensive systems to guard against single-point failures in any specific technology or protection method. This includes deployment of endpoint, email and web gateway protection technologies, as well as firewalls and vulnerability assessment solutions. It’s also crucial to keep these security solutions up to date with the latest protections and ensure systems are protected against exploits such as EternalBlue. This article originally appeared on Bitcoin Magazine.

Link
Lazarus Hacker Group Continues to Target Crypto Using Faked Trading Software

This article was originally published by 8btc and written by Lylian Tang.The Chinese security service provider 360 Security has issued a warning that a large number of crypto exchanges have been targeted by the North Korean hacker group Lazarus and that the number is still rising after the recent hacks of crypto exchanges DragonEx, Etbox and BiKi.360 Core Security found that Lazarus, also known as the ATP-C-26 group, used software called “Worldbit-bot” to carry out its active attacks. The crypto exchange DragonEx fell victim to it on March 24, 2019, leading to a loss of $7.09 million, according to the 360 Security report.The analysis by the 360 Advanced Threat Response Team detailed that the attacking group registered two domains, wb-invest.net and wb-bot.org, last October in preparation for the attacks. Then they faked the cryptocurrency trading software Worldbit-bot based on the open-sourced “Qt Bitcoin Trader,” which was embedded with malicious code. The malicious software was then camouflaged within a regular automated crypto trading platform under the domains of wb-invest.net and wb-bot.org, which kept normal operation for half a year.Domain wb-invest.net and wb-bot.org registered in October 2018.Faked cryptocurrency trading software “Worldbit-bot” based on the open-sourced “Qt Bitcoin Trader.”Worldbit-bot runs under the domain of wb-invest.net and wb-bot.org.The attackers targeted a large number of internal staff at cryptocurrency exchanges for the software promotion. The latest phishing attacks took place in January and March 2019.According to China-based JohnWick Security, which has been assisting DragonEx in investigating its hacking incident, the customer service staff at DragonEx appear to have opened an installation package named wbbot.dmg from an unknown source. Analysis indicates a backdoor was embedded in the installation package, through which hackers acquired the internal staff’s authorization and then obtained the wallet private key.The “Worldbit-bot” software operates in much the same manner, with the faked crypto trading software “Celas Trade Pro,” and was detected by the same team at 360 Security last August. Users of Bitfinex, Bitstamp, Bitmarket, BTCChina, GOC.io, Indacoin, OKCoin, WEX and Y0bit were susceptible to the threat at that time.First, the process information is collected and encrypted:System information is collected:Malicious codes are executed and decrypted for file execution:The security company is recommending that crypto exchanges be on the lookout for warning signs such as abnormal exchange earnings, tampered addresses of cold and hot wallets, large sum transfers and multiple account logins for coin withdrawal.Lazarus is an infamous hacking group backed by North Korea. According to research, the group’s earliest attack may have been associated with “Operation Flame,” a large-scale DDOS attack on the South Korean government website in 2007. Lazarus is also alleged to have been the group behind the Sony Pictures hacking incident of 2014, the Bank of Bangladesh data breach of 2016 and the “Wannacry” ransomware attack that swept across the globe in 2017. Since 2017, the group has been expanding its targets of attack, increasingly aiming them at a variety of economic interests. In earlier attacks, the group mainly targeted the banking systems of traditional financial institutions. Now, it has begun to attack global cryptocurrency businesses and individuals.As previously reported, Lazarus is purportedly responsible for $571 million of the $882 million in cryptocurrency that was stolen from exchanges from 2017 to 2018, almost 65 percent of the total amount. Out of 14 exchange attacks, five were attributed to the group, including the industry record-breaking $532 million NEM hack of Japan’s Coincheck. This article originally appeared on Bitcoin Magazine.

Link
Report Claims That “Sextortionists” Absconded With Over $300,000 in Crypto in 2018

Most cyberattacks in the crypto space involve hackers finding a way around the security of crypto exchange platforms and gaining access to users’ funds. Last year saw the entry of a new breed of cyber extortionists that seems to be gaining ground, so much so that they were able to steal over $300,000 in bitcoin (BTC) tokens in 2018.According to a report by research and risk assessment firm Digital Shadows, this scam was committed through a wide array of “sextortion” blackmail strategies, which included the weaponization of emails.The report, which was titled “A Tale of Epic Extortions: How Cybercriminals Monetize Our Online Exposure,” revealed that the scam started back in 2017. However, it only gained mainstream notoriety in the middle of 2018, after its list of victims continued to grow.Digital Shadows was able to track over 792,000 targeted emails, where it discovered the loss of about $300,000 worth of bitcoin, which was stolen from over 3,000 bitcoin wallet addresses.How They OperateThe goal of the cybercriminals is to convince the victim that their system had been hacked, allowing them to obtain valuable information that could expose their intimate activities.To look convincing, the extortionists provide the victim with a known password, also known as “proof” of compromise — this is meant to offer evidence of the hack. Then they claim to have footage of the victim watching porn online, urging them to pay a ransom in bitcoin or risk exposure.As with most email scams, the composition of the emails is often a problem. Per the report from Digital Shadows, the construction of the email could make the difference between one that gets past a spam filter and the one that doesn't. Some sophisticated criminals go to great lengths to distribute emails at scale by using freshly minted outlook.com addresses.“Across the emails we collected, there was a variation in the capabilities displayed by the attackers. Certain spammers showed little understanding of how to craft and distribute emails on scale, sending malformed emails that would never make it past a mail server or spam filter,” the report reads.Based on the examination of their IP addresses, the firm noted that the scam wasn’t localized to a single region. Scammers operated across a wide array of locations, with the highest percentage of the emails being sent from a position in Vietnam (amounting to 8.5 percent of the total emails sent); 5.3 percent of the emails were sent from somewhere in Brazil and India came third with 4.7 percent of the total email count.Targeting Married and “High Net Worth” IndividualsThe cybercriminals targeted individuals with high net worth, as they believe these groups could easily pay the ransom without “dragging the process for too long.”The scammers also targeted married individuals. The criminals often use marriage as extra leverage over the victims, providing an additional incentive to convince the victim to make the payment.Online Crowdfunding CampaignsThe Dark Overlord (TDO), a prominent extortionist group which, after a brief break, returned in 2018 with a new modus operandi, was featured in the report.The criminal group changed its model from extorting victims directly to selling “stolen data in batches to other users on criminal forums, and adopted an altogether more unusual tactic: online crowdfunding campaigns.” Using online crowdfunding campaigns, extortionist groups like TDO can raise the ransom the victim would have paid from members of the public desperate to unlock the troves of data in their possession.The extortionist group reportedly started its career selling data on TheRealDeal, a forum on the dark web. When the forum folded, they went on a spree of extortions, including directly contacting their victims and threatening to expose their private information if their demands weren’t met.TDO kept providing regular updates of their operations via their Twitter page. The group went back to the dark web in September 2018, recruiting extra accomplices and selling their acquired data on KickAss, another criminal forum. They set up The Dark Overlord Sales, a subsection of KickAss, to sell their data to other parties on the platform.The cybercriminals victims included insurance provider Hiscox, which lost over 10GB of sensitive data related to the 9/11 bombings to the group. Their operation pattern shows the effectiveness of using crowdfunding platforms to gain more publicity online, while also generating sustainable revenue. This article originally appeared on Bitcoin Magazine.

Link
Darknet Bitcoin Mixer BestMixer.IO Secures its Site with Tor Compatible Website Version

When making cryptocurrency transactions on the dark net, it’s a good idea to ensure that your transactions are always anonymous, not only to protect personal details such as your address from criminals, but also from other individuals or agencies that want to track your transactions. Bitcoin mixer BestMixer delivers anonymity levels not available anywhere else in the industry. BestMixer.io is serious about anonymity and security, and has added a Tor-compatible website version to its product offering. If you surf the dark net, or value your privacy highly, you’re probably already familiar with Tor (The Onion Router) ... Read The Full Article On CryptoCurrencyNews.com Get latest cryptocurrency news on bitcoin, ethereum, initial coin offerings, ICOs, ethereum and all other cryptocurrencies. Learn How to trade on cryptocurrency exchanges. All content provided by Crypto Currency News is subject to our Terms Of Use and Disclaimer.

Link

General

Name Sky Net Security
Symbol DSCOIN
Rank #2694
Sky Net Security price $0.00007
Market Cap $0.00
Trading Volume $15,273.73
24h Low / 24h High $0.00007 / $0.00007

All time high

All time high $0.00021
All time high date 2018-11-21 (6 months ago)
Since all time high -67.21 %

Performance

24 hours -3.33 %
7 days 16.10 %
14 days 104.57 %
30 days 278.97 %
60 days 261.01 %

Social

Facebook likes 0
Reddit subscribers 0
Twitter followers 4

Developer

Stars 0
Forks 0
Merged pull requests 0
Contributors 0