Cyberespionage U.S. Officials Say Defenses Are up against Alleged Russian Hacking Published 2 years ago on October 21, 2016 By Rebecca Campbell The U.S. has put measures into place that is reported to stop Russia from hacking into emails that could influence the upcoming presidential election, reports NBC News. Back in July, it was reported that Hillary Clinton’s campaign manager Robby Mook said that Russian state-sponsored hackers may have hacked the Democratic Party’s network and email system in an attempt to help Republican presidential candidate Donald Trump. He said: …experts are now saying that the Russians are releasing these emails for the purpose of actually helping Donald Trump…that’s disturbing. But could Russia really be looking into hacking the U.S. presidential elections? It seems that rather than take the chance of finding it out too late, U.S. officials have put defensive measures in place designed to block hacking paths that the Russians are alleged to have utilized. It has been reported that emails were stolen from high-profile Democrats which were made public through WikiLeaks, DCleaks, and Guccifer 2.0. However, while these defensive measures are being put into place, how long will it take before ways are found that can infiltrate the new measures? According to Juan Zarate, a top counterterrorism official from 2005 to 2009, who spoke to NBC News, he said it wouldn’t take long before the Russians – both the state actors and their proxies – were able to find vulnerabilities. He said: This isn’t going to be the end of the story by any stretch. WikiLeaks When it comes to WikiLeaks they have not been shy releasing information pertaining to government and state documents. Earlier this month, Julian Assange, WikiLeaks founder, spoke via a video conference from the Ecuador embassy in London. He has been in asylum since August 2014. He announced that the upcoming release of information WikiLeaks had access to could impact the U.S. presidential elections. He said: [They] are revealing, but also the government/state reactions to the releases are revealing also. Even though leak sites and hackers are believed to have access to emails that have yet to be made public, U.S. officials are confident that its new defensive measures have stopped Russians from stealing further information, according to NBC News. It remains to be seen whether or not this is in fact the case. The U.S. Hits Back Naturally, the U.S. doesn’t plan on taking these hacks lying down. So-much-so, that it was reported earlier this month that the White House is planning a massive, unprecedented cyberattack on the Russian government. This is in retaliation for the alleged Russian hacking into the U.S. presidential elections. This news doesn’t seem too surprising considering the fact that President Obama revealed that he had concerns over the government’s cybersecurity measures particularly after he admitted that the White House had been the target of hackers. Featured image from Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (0 votes, average: 0.00 out of 5)You need to be a registered member to rate this. Loading... Rebecca Campbell Follow @HackedCom Feedback or Requests? Related Topics:President ObamarussiaUS Presidential Electionwikileaks Up Next Breathe Easy Bitcoiners, Quantum Computing No Match For Sha-2 Encryption Don't Miss The New York Times Website is Offline You may like Pre Market: CPI Misses as Syrian Conflict Escalates, Markets in Turmoil Crypto Regulations Coming to Russia, Finance Ministry Confirms The Heartland Has Been Devastated: Peter Thiel Speaks Up Is Russia Really Looking to Hack the U.S. Presidential Elections? Julian Assange: Wikileaks is About to Reveal Information That Could Damage Clinton, or Trump, or Both New York Times: Russian Intelligence Hackers Targeted Us Click to comment You must be logged in to post a comment Login Leave a Reply Cancel replyYou must be logged in to post a comment. Cyberespionage North Korea is now Targeting Crypto Users with Macs Published 1 month ago on September 6, 2018 By Nic Puckrin The Lazarus group has earned quite a reputation for themselves in cyber-security circles. This group of North Korean hackers have been responsible for some of the most well known intrusions in the past few years. For example, they were behind the Sony Pictures hack in 2014, the Bangladesh central bank heist in 2016 and the Wannacry ransomware outbreak in 2017. It is safe to say that these are quite effective operators. However, with the popularity of cryptocurrencies, the Lazarus group has changed their attack vectors and are targeting every day users with Malware. The latest report now has the hackers using MacOS malware to hoover up information from those cryptocurrency users who work on Macbooks. “AppleJeus” This was the first time that the Lazarus group has developed malware to target Mac users. Indeed, Mac operating systems are far less susceptible to Malware than Windows based systems. It was a surprise for researchers at Kaspersky Lab to have learned about the latest Lazarus attempt to target users with there macOS malware. They have labelled it “AppleJeus”. This was first spotted on machines that were being used by cryptocurrency company in Asia. Indeed, this is no coincidence as the Lazarus group has often targeted cryptocurrency related businesses and exchanges in South Korea. How Does it Work? AppleJeus hides itself inside the code of a seemingly legitimate piece of cryptocurrency trading software called Celas Trade Pro. The user will download the app from the website of the developer. When it is first downloaded, there are no signs that anything could be off. The app appears to operate normally. Screenshot of Celas Trade, the offending program. Source: kaspersky labs Once the app is installed on the device, it will request to update the software. This sort of request is present in authentic software and as such will not trigger any alerts. However, there is malicious code that is inside of this update. The moment that the update is installed, it will scan the computer and gather as much information as possible. This will then be sent back the hacker’s server so that they can make a decision on whether the person is worth attacking. If they think that there is valuable information (or cryptocurrency) on the machine then they will instruct the software to install a trojan called “Fallchill”. For those who do not know, Trojans are malicious malware that will install a “backdoor” into the machine Fallchill is a particularly robust trojan and can gather a great deal of information from the machine. This includes data such as financial information, login credentials and of course, information about cryptocurrency trading accounts. Once the hackers have this personal information, they can either access your online accounts or they can conduct other spear phishing attacks against you. It is indeed a troubling development and according to Vitaly Kamluk of Kaspersky: “For macOS users this case is a wakeup call, especially if they use their Macs to perform operations with cryptocurrencies” So now that you know North Korea is actively trying to get their hands on your cryptocurrency, how do you protect yourself? Keeping Safe from AppleJeus The most effetive way to protect yourself from this Malware is to make sure that you only download software that is well known and reputable. This of course goes without saying but it is far too often that relatively inexperienced cryptocurrency traders will avoid doing their research. The researchers have recommended that people and businesses do not download the software of Celas Trade. Even though they appear to have a a good reputation and verified digital certificates, this cannot be fully trusted. You should also consider investing in some effective anti-malware software that you should use to scan all files that you have downloaded. This should be done even if you trust the source because hackers have been known to infiltrate trusted websites. Cryptocurrency Security 101 Even if you are unlucky enough to have your machine infected with crypto grabbing malware, basic crypto security best practices will still protect you. If you do a great deal of online trading with your cryptocurrency then it is essential that you secure your accounts with 2 factor authentication. This way, you are at least able to reduce the number of attack vectors. You should always secure your large cryptocurrency holdings in hardware wallet. This is because the wallets operate external from the machine and hence the trojan cannot read your private key information. Caution and a healthy does of scepticism will protect you from the an unhealthy does of AppleJeus. Featured Image via Fotolia. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (2 votes, average: 5.00 out of 5)You need to be a registered member to rate this. Loading... Nic Puckrin 5 stars on average, based on 5 rated postsNic is an ex Investment Banker and current crypto enthusiast. When he is not sitting behind six screens trading Bitcoin, he is maintaining his numerous mining rigs. Follow @HackedCom Feedback or Requests? Continue Reading Cyberespionage The NSA Is Tracking Bitcoin Users, According to Snowden Papers Published 7 months ago on March 21, 2018 By Sam Bourgi The U.S. National Security Agency (NSA) used its vast powers to spy on and track down bitcoin users globally, according to classified documents released by Edward Snowden. The revelations send a chilling message to crypto investors that their activity may be monitored by federal agencies under the guise of anti-money laundering programs. Deep State Targets Bitcoin Users The spy agency used sophisticated techniques to monitor senders and receivers of digital currency as far back as 2013, according to several memos that were published by The Intercept. The classified reports also seemed to indicate that the NSA may have collected information from users’ personal computers. The reports obscure the identity of the agents involved in the investigation, referring to them only with code names. One particularly telling passage was taken from a weekly report dated Mar. 2-8, 2013: “S2F214 [the agent] is hoping to use the access for their mission of looking at organized crime and cyber targets that utilize online e-currency services to move and launder money. These illicit finance networks provide user access to international monetary systems, while providing a high-degree of anonymity.” In a Mar. 15, 2013 report, the spy agency referred to bitcoin as the “#1 priority”. Julian Assange commented on the newly leaked documents, where he called out various media platforms for neglecting to follow the WikiLeaks model NSA: "Bitcoin #1 priority". Good work by @samfbiddle — but #Bitcoin'ers have suffered 4.5 years of attacks they didn't need to because @theintercept, WaPo and Guardian did not follow the @WikiLeaks model & continue to conceal most of the @Snowden archive https://t.co/t4ALgLDY7f — Julian Assange ⌛ (@JulianAssange) March 20, 2018 According to the documents, the NSA monitored bitcoin using a program called MONEYROCKET, which gathered information from the Middle East, Asia, Europe and South America. Interestingly, the reports show that bitcoin wasn’t the only area targeted by the NSA. Liberty Reserve, a now defunct digital currency service, also received careful attention. Based in Costa Rica, Liberty Reserve was shut down in 2013 by the United States government for criminal activity. Prosecutors appealed to the controversial Patriot Act to dissolve the entity following an investigation with 16 other countries. The platform’s founder, Arthur Budovsky, and six others were charged with money laundering. Financial Privacy The recent documents released by Snowden sent a clear warning sign to cryptocurrency users that their financial information could be intercepted by big government agencies. Although some news outlets have used the documents to question bitcoin’s privacy features, many within the crypto community know that the original blockchain isn’t necessarily the most anonymous. In fact, dark web criminals are beginning to disavow bitcoin for one of the many privacy coins in circulation today. Chief among them are Zcash and Monero. A report released in February also drew attention to the meteoric rise of Litecoin on the dark web. Assessed purely in terms of privacy, many believe Zcash provides the best protections. Unlike other protocols, Zcash uses advanced encryption to obscure the sender’s address. Privacy isn’t the only consideration cyber criminals weigh when deciding which cryptocurrency to exploit. According to Recorded Future researchers, transaction fees and speed are also important factors. Disclaimer: The author owns bitcoin, Ethereum and other cryptocurrencies. He holds investment positions in the coins, but does not engage in short-term or day-trading. Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (3 votes, average: 5.00 out of 5)You need to be a registered member to rate this. Loading... Sam Bourgi 4.6 stars on average, based on 647 rated postsSam Bourgi is Chief Editor to Hacked.com, where he specializes in cryptocurrency, economics and the broader financial markets. Sam has nearly eight years of progressive experience as an analyst, writer and financial market commentator where he has contributed to the world's foremost newscasts. Follow @HackedCom Feedback or Requests? Continue Reading Cryptocurrencies Spectre And Meltdown Madness: What It Means For Ethereum Published 9 months ago on January 8, 2018 By James Waggoner To anyone who talks in terms of a cryptocurrency bubble, consider the following fun facts. In the short period of a few days following the bombshell announcement of Meltdown and Spectre, crypto prices responded in the following manner: Bitcoin +18% ETH +41% Litecoin +30% In my view, this is clear evidence of a market that is responding rationally to information coming from responsible sources. To appreciate what all the noise is about you must appreciate what Meltdown and Spectre are and why they present a danger to the big companies providing cloud storage for the corporate world. Once this is clear, then you will better appreciate why Ether’s 41%+ short-term price spike left the others in the dust. But first lets dig into the Meltdown and Spectre situation. The Secret Got Out On January 3 the secret about a new class of security vulnerabilities leaked out to the public. Not only was this seriously bad news but the leak also gave hackers advanced notice before anyone could begin to fix the twin problems. The degree of seriousness is in the fact that almost all major microprocessor chips are vulnerable. This opens the door to hackers stealing information from personal as well as cloud services. Researchers claim that Meltdown can be fixed with a patch. Shortly thereafter about every major player announced their patch. But there are two issues here. Will the patches fully solve they problem? Casting A Cloud Over The Cloud When a corporation becomes a cloud customer, even the largest share machines with other customers. This is the basic flaw in the centralized structure of cloud storage. Contrast this with the decentralized structure of blockchain technology and you begin to appreciate the force behind the sudden price spike in cryptocurrencies that we highlighted above. Even though security tools and protocols are designed to separate customers date, the recently discovered Meltdown and Spectre flaws still leave serious vulnerabilities. Meltdown, hackers could rent space on a cloud service, just like any other business customer. Once they were on the service, the flaw would allow them to grab information like passwords from other customers. Secondly, reports on cloud services like Amazon, Google and Microsoft claim that it creates as much as 30% slower computation speeds. That clearly won’t make for happy customers. Jerky NetFlix Virtually everyone reviewing the situation believes individual computer users are the least vulnerable. That may be true. Hackers are in the hunt for the biggest prize and that would be the big three cloud companies. But how do you think families are going to react if their Netflix stalls and buffers every few minutes? In the final analysis, the Meltdown flaw affects virtually every computer chip fabricated by Intel in use today. You are talking about 90% of the Internet and business world. But Meltdown is just one flaw. Spectre is the other flaw and this one is the more insidious of the two. There is no known fix. Intel, AMD and others have claimed how complex a project it would be for hackers to breech the Spectre vulnerability. That is pretty hollow comfort. After all, hasn’t the FBI security been breeched. Those guys were supposed to be airtight. Boom Days For Blockchain In so many ways, last year marked a tipping point in the spread and acceptance of blockchain technology. The uses for Bitcoin are probably best gauged by its record $20,000 price in December. For Ethereum, it may have been marked by the formation of the Enterprise Ethereum Alliance (EEA) in February and rise to over 300 members at year-end. No sooner has 2018 begun that the Meltdown and Spectre flaws created unexpected excitement for investors in cryptocurrencies. If I were a software salesman out of work, I would be sending my resume to every crypto company offering to peddle their blockchain. It could be the easiest job since selling web design services in 1995. The Ethereum platform with its smart contracts is not the only crypto capable of addressing this newly uncovered opportunity created by Meltdown and Spectre. You can safely bet this will attract many players and for good reason, today’s blockchain technology is a long way from fast enough for mass adoption. Blockchain security may be a step or two better in it present form than cloud storage, but it has its security issues as well. Building the Ethereum Moat EEA founder Jeremy Millar is clearly a brand ambassador for Ethereum. He believes that CEOs hear the chatter about blockchain and are pre sold not having a clear picture what can be accomplished or the money saved using this technology. The important thing is for IT departments to have a respected brand to attach to their recommendations. The EEA seeks to connect and inform and through this pioneering process spread the gospel of Ethereum. So far this is beginning to build a brand franchise for Ethereum. The EEA is the largest blockchain body and is committed to using open-source Ethereum technology for enterprise blockchain solutions. EEA expects to see great advances in these areas in 2018 with Ethereum technologies. It also helps when Wall Street banks uncover the potential for billions in savings on the trading desks through the applications of the Ethereum platform. So, if you though the last year held plenty of excitement, the Meltdown and Spectre flaws promise to make this year every bit as much fun. Featured image courtesy of Shutterstock. Important: Never invest (trade with) money you can't afford to comfortably lose. Always do your own research and due diligence before placing a trade. Read our Terms & Conditions here. Trade recommendations and analysis are written by our analysts which might have different opinions. Read my 6 Golden Steps to Financial Freedom here. Best regards, Jonas Borchgrevink. Rate this post: Important for improving the service. Please add a comment in the comment field below explaining what you rated and why you gave it that rate. Failed Trade Recommendations should not be rated as that is considered a failure either way. (14 votes, average: 4.14 out of 5)You need to be a registered member to rate this. Loading... James Waggoner 4.4 stars on average, based on 113 rated postsJames Waggoner is a veteran Wall Street analyst and hedge fund manager who has spent the past few years researching the fintech possibilities of cryptocurrencies. He has a special passion for writing about the future of crypto. Follow @HackedCom Feedback or Requests? Continue Reading Recent CommentsChris G on Crypto Update: Altcoin Market Cap on the Verge of Trend Reversaldavidstewartkim on “The Core of Any Blockchain Project is Decentralization” – Jack Zhang, Lightning BitcoinDaniel Won on ICO Analysis: Dusk NetworkSholaO on ICO Analysis: Dusk NetworkDaniel Won on ICO Analysis: Dusk Network Crypto Update: Altcoin Market Cap on the Verge of... Trade Recommendation: Dogecoin Uber: $120 Billion IPO? Market Update: U.S. Stocks Sputter as Fed Minutes... EOS Price Forecast: EOS/USD Heading for Another 30... Pantera Capital’s CIO Predicts 10x Growth in... TRON Price Analysis: TRX/USD Cools After Reports S... Recent Posts Hawkish Fed Lifts Yields, Dollar as Stock-Correction Continues October 18, 2018 Market Update: U.S. Stocks Sputter as Fed Minutes Signal Assertive Rate-Hike Path October 17, 2018 ICO Analysis: FidelityHouse October 17, 2018 Qtum Announced as Amazon’s Partner in China; Coin Price Surges 12% October 17, 2018 Why Would Anyone Have Faith In Tether? October 17, 2018 Pantera Capital’s CIO Predicts 10x Growth in Next “Huge” Crypto Bull Run October 17, 2018 Oil Prices Drop amid Large U.S. Stockpile Accumulation, Saudi Backlash October 17, 2018 EOS Price Forecast: EOS/USD Heading for Another 300% Move? October 17, 2018 Pre-Market Analysis And Chartbook: Risk Assets Under Pressure as Fed Minutes Loom October 17, 2018 Ether Price Eyes Potential Upside as Foundation Awards $3 Million in Grants October 17, 2018 A part of CCN Hacked.com is Neutral and Unbiased Hacked.com and its team members have pledged to reject any form of advertisement or sponsorships from 3rd parties. We will always be neutral and we strive towards a fully unbiased view on all topics. Whenever an author has a conflicting interest, that should be clearly stated in the post itself with a disclaimer. If you suspect that one of our team members are biased, please notify me immediately at jonas.borchgrevink(at)hacked.com. Trending Cryptocurrencies1 week ago Monero vs. ZCash: Privacy Coins Compared Analysis5 days ago Bitcoin Update: 2018 and 2014 Bear Market Comparison Altcoins4 days ago Electroneum’s Benchmark Month Sends ETN Coin Price Up 333% Altcoins1 week ago Bribery on Binance? DigiByte’s Jared Tate Blasts CZ Over DGB Listing Demands Altcoins5 days ago Digitex Futures (DGTX) Cements Top 100 Position with 194% Two-Week Growth Analysis1 week ago Crypto Update: Trade Setups for Bitcoin Cash and 0x Altcoins1 week ago Ripple Price Analysis: XRP/USD at Risk of September Bull Run Being Completely Deflated Bitcoin1 week ago Could Bitcoin Challenge Ethereum?