Start your day with intelligence. Get The OODA Daily Pulse.
Much rending of hair and gnashing of teeth has been taking place since a leak in the New York Times revealed the existence of a Presidentially authorized secret program to intercept and exploit the communications of suspected terrorists that might be operating in the US. Under a presidential order signed in 2002, [NSA] has monitored…
Via Judeoscope: [Hezbollah] — regarded by many as even more sophisticated than al-Qaeda — has sharpened its counterintelligence expertise over the years by keeping a step ahead of Mossad, Israel’s secret service. [They have] become ever more adept at intercepting electronic surveillance, penetrating cellphone networks and recruiting computer science technicians. “Hezbollah has a long history…
Infamous North Korean hacking group Lazarus is attempting to target Apple Inc. Mac users via fake job offers. Detailed Aug. 16 by security researchers at ESET s.r.o on Twitter, the new Lazarus campaign involves phony emails impersonating Coinbase Inc. developer job listings. The fake job emails include an attachment containing malicious files that can compromise both…
On Wednesday, March 9, President Joe Biden released an executive order regarding cryptocurrency and how his administration intends to approach the rapidly growing industry in 2022. However, after the release of this executive order, the question remains: Is mainstream adoption of cryptocurrency imminent in the U.S.? It’s evident that Joe Biden and his administration are…
If 2018 was the Year of the Hack for centralized crypto exchanges, decentralized blockchain bridges seem destined to win that honor this year. Over $1.9 billion was stolen in cross-chain hacks in the first half of 2022, according to a new blog post by crypto analytic firm Chainalysis. Cross-chain bridges have come under fire in recent weeks…
sudoswap is making NFT trading even easier. Launched in May 2022, sudoswap is crypto’s first NFT automated market maker. The Ethereum-based platform functions similarly to Uniswap, letting users trustlessly trade assets through user-funded liquidity pools. However, instead of trading between two fungible tokens, sudoswap users can trade between NFTs and ETH. At first glance, it might be…
Earlier this week a new type of stablecoin (aUSD), built on a platform (Acala), which itself was built on a blockchain (Polkadot), fell from its $1 peg to $0.009 (which rounds to zero as far as I’m concerned), following an attack on one of the platform’s liquidity pools. If the words following “attack on” seem…
Hackers suspected to be from the North Korean Lazarus group tried their luck at stealing cryptocurrency from deBridge Finance, a cross-chain protocol that enables the decentralized transfer of assets between various blockchains. The threat actor used a phishing email to trick company employees into launching malware that collected various information from Windows systems and allowed the…
According to a recent study conducted by the University of Technology Sydney, researchers estimated that insider trading occurs in 10% to 25% of cryptocurrency listings. In deriving the conclusion, researchers first sampled 146 token listing announcements on cryptocurrency exchange Coinbase between September 25, 2018, and May 1, 2022. Afterward, researchers examined the price movements of the…
From Eminem to Snoop Dog, Tony Hawk to Lionel Messi, William Shatner to Brie Larson, music, sports, and Hollywood celebrities have eagerly jumped on the NFT (non-fungible token) bandwagon. Whether launching their own collections, purchasing an expensive profile pic, or simply endorsing new artists, celebrities have embraced blockchain technology and have been extolling the virtues…
While most of the best Wi-Fi 6 routers have built-in security, Gryphon’s new Wi-Fi 6E router is one of just a few that will use Blockchain for this purpose; through a project called MetaSafe, it will protect passwords and other valuable information. Although a single Gryphon 6E can provide a strong Wi-Fi signal to a 3,000…
The next generation web — Web3 — has been hailed as more secure than the current incarnation of cyberspace, but a report released Tuesday warns that may not be so. While Web3 may be difficult to subvert on an infrastructure level, there are other points of attack that may offer threat actors more opportunity for mischief…
Losses arising from cryptocurrency hacks jumped nearly 60% in the first seven months of the year to $1.9 billion, propelled by a surge in funds stolen from decentralized finance (DeFi) protocols, according to a blog post from blockchain analysis firm Chainalysis released on Tuesday. In the same period last year, stolen funds from hacking amounted…
The U.S. Federal Reserve on Tuesday issued additional guidance for banks considering activities involving cryptocurrencies, emphasizing that firms must notify the Fed beforehand and make sure whatever they do is legally permitted. The Fed said in a statement that while cryptocurrencies could present “potential opportunities” to banks, firms needed to make sure they had systems in…
2022 has been a lucrative year for hackers preying on the nascent Web3 and decentralized finance (DeFi) spaces, with more than $2 billion worth of cryptocurrency fleeced in several high-profile hacks to date. Cross-chain protocols have been particularly hard hit, with Axie Infinity’s $650 million Ronin Bridge hack accounting for a significant portion of stolen…
Earlier this year, Roman Semenov, co-founder Tornado Cash, a mixing service for cryptocurrencies, said that it would be “technically impossible” for sanctions to be enforced against decentralized protocols. “All we do is write code and publish it on GitHub,” Semenov told Bloomberg, referring to the internet hosting service. “This is pretty close to the definition of…
Monero, the privacy-oriented decentralized cryptocurrency project, underwent a planned hard fork event on Saturday, introducing new features to boost its privacy and security. The network upgrade was delayed from July 13, when it was first planned for release, due to multi-sig security fixes, critical security patches, and more time needed to resolve hardware wallet incompatibility issues. Completed…
When it comes to crime, illicit activity is still abundant regardless of crypto volatility, according to a new Chainalysis report. “Cryptocurrency transaction volumes this year for both illicit and legitimate entities are tracking behind 2021 through July,” the report stated. “Overall, criminal activity appears to be more resilient in the face of price declines: Illicit volumes…
The now bankrupt Three Arrows Capital (3AC) presented signs of mismanagement before the cryptocurrency hedge fund’s ultimate collapse. A report from New York Magazine reveals that 3AC co-founders Kyle Davies and Su Zhu faced criticism from banks and other traders before the company even entered the crypto market. In its early days, the Singapore-based 3AC got…
Blockchain is evolving into a new foundation for the internet. What began as a closed web is transitioning into an open source system driven by decentralized systems. Every sector is now adopting this technology to better serve its customers. Social communication, in particular, is seeing a lot of promise from blockchain solutions. Popular messaging apps…
Web3 is on the horizon and will likely have a large effect on the cybersecurity field. But what exactly is it — and what are the implications of this latest iteration of the internet for organizations? It’s perhaps easiest to describe Web3 by contrasting it with its predecessors, Web 1.0 and Web 2.0. Web 1.0 refers to…
The Acala Network’s aUSD stablecoin depegged by over 99% over the weekend and forced the Acala team to pause a hacker’s wallet, raising concerns about its claim of being decentralized. On Sunday, a hacker took advantage of a bug on the iBTC/aUSD liquidity pool which resulted in 1.2 billion aUSD being minted without collateral. This…
For the crypto industry, many are looking for 2022 to be the year of comprehensive regulatory and legislative clarity regarding crypto assets for the United States. Indeed, President Biden’s Executive Order earlier this year actually mandated and directed federal agencies to provide this kind of clear, ordered, and meaningful guidance. We’ve seen in the past that…
BlueBenx, a Brazilian crypto lending platform, reportedly blocked all of its 22,000 users from withdrawing their funds following an alleged hack that drained $32 million (or 160 million Brazilian real). While no details about the hack were made available, the company allegedly laid off most of its employees. BlueBenx joins the growing list of crypto companies…
The Dutch government agency responsible for investigating financial crimes said it has arrested an individual suspected of being a developer of the U.S.-sanctioned crypto mixing service Tornado Cash in a move that has rattled some crypto and privacy advocates. The Fiscal Information and Investigation Service said Friday that the arrested 29-year-old man is suspected to be…
Asked for his views on cryptocurrencies, Securities and Exchange Commission Chairman Gary Gensler likes to quote the poet James Whitcomb Riley, who wrote, “When I see a bird that walks like a duck and swims like a duck and quacks like a duck, I call that bird a duck.” The point of Gensler’s “duck test”…
Last week, millions of dollars were hacked from Solana’s ecosystem. While its blockchain wasn’t hacked directly, hackers were able to drain funds from Solana wallets. It’s still unclear exactly how the hackers were able to access the funds, but it appears that they were able to do so by uncovering users’ private keys. Private keys…
Widening mainstream acceptance of cryptocurrency will intensify state-sponsored cybertheft by North Korea, potentially adding to the hereditary despotic monarchy’s billions of funds stolen through hacking, participants in a Washington think tank panel said. North Korean-controlled cybercrime groups have stolen more than $2 billion. Pyongyang has recently turned to cryptocurrency theft, including a more than $600 million…
The pace of crypto hacks hasn’t slowed in the dog days of summer, with tens of millions of dollars stolen in August alone. As the crypto community carries on in the wake of the expensive exploits, many web3 users are biting their tongue waiting for the next big one to strike. On August 1, Nomad,…
Earlier this week at the Black Hat security conference, Belgian researcher Lennert Wouters revealed how he can mount a successful fault injection attack on a terminal for SpaceX’s satellite-based internet system. The successful hack was conducted using a homemade circuit board that Wouters claims cost roughly $25 to develop. The satellite dish used to access…