1
|
Economy / Reputation / BD Crypto violates forum rules and should be banned.
|
on: August 31, 2023, 12:42:52 PM
|
I found some matches in the BD Crypto profile that indicate that this account previously had several alternate accounts, one of which is already banned. https://bitcointalk.org/index.php?action=trust;u=1324004Can I, @BD Crypto, ask you how you are connected to the https://bpip.org/profile.aspx?p=coinliker account? Did you know that if one of your accounts is banned, you can't register other accounts? Follow. https://ninjastic.space/addresses?address=1KW3N3LmfUDRaXy8ZRGkbwpaBEjQNdiwPeBD Crypto removed these registration details in an attempt to hide the wallet number. But we can see that alik111 last used this wallet number on July 18, 2020 06:17:25 UTC. That is, much earlier than the publication of BD Crypto. Also, before that, there were several posts saying that the alik111 account had alternative accounts. https://bitcointalk.org/index.php?topic=5252044.msg54528210#msg54528210Similarly, banned account coinlikerposted his link with the YouTube channel address earlier than alik111. Similarly, the name of the YouTube channel is similar to the nickname of the third account BD Crypto https://www.youtube.com/@CryptobdSchoolA few more alternative accounts were discovered by users earlier. If you look at his history post, he already backs to his habits to the social media bounty hunter so maybe he will not responding anymore since he already got 1 merits for the bounty. Also he have a few alt accounts and using them for the bounty, so basically he already aware of the forum. OP registered about 1.5 years ago and only has 15 posts--that might be part of the problem. On the other hand, I bet he's got more accounts than just this one.
Here the list: #Proof of ownership : - @alikmou - eth address: 0x97d58E5E4ECDc3e63A0a90D9607f4B7ae12F9a2c
#proof of authentication ETH wallet address: 0x97d58e5e4ecdc3e63a0a90d9607f4b7ae12f9a2cMail ID: a1alikhasan@gmail.comusername telegram : @alikmou username twitter : @AlikKhandoker ETH Address : 0x97d58E5E4ECDc3e63A0a90D9607f4B7ae12F9a2c
https://bpip.org/smerit.aspx?from=alik111&to=BD%20CryptoThere is also a joint participation of two accounts in the company hhampuz and yahoo62278. https://ninjastic.space/post/54806899https://ninjastic.space/post/54808522I did not find if there were any prohibitions for the participation of alternative accounts. In conclusion, BD Crypto violates forum rules and should be banned.
|
|
|
2
|
Economy / Reputation / Another giveaway, or how merit hunters smell the catch.
|
on: July 28, 2023, 02:19:54 PM
|
After creating a JollyGood thread about a weird merit giveaway, I happened upon a thread in which merit was generously distributed to several accounts, and the strangest thing was that the accounts were already seen as one single farm. How it all started: An account brought up an old thread that has been dormant since June 1, 2022, at 05:33:23 AM. https://bitcointalk.org/index.php?topic=716530.msg62189264#msg62189264The newbie account immediately received 10 merits from the author of the theme, which was already created in 2014. The donator himself also made his first post since June 1, 2022, as he is also a newly awakened one. Previously, he distributed it to four users, after which the account itself was inactive. So, what is next? Further merits flowed on the accounts: https://bitcointalk.org/index.php?action=merit;u=102873TraPole 10 Newbie RewFrew 10 (Bengali) Merit Catcher in the Pizza Contest Popkon6 10 (Bengali) Merit Catcher in the Pizza and Pumpkin Competition Rigon 10 (Bengali) Merit Catcher in the Pizza and Pumpkin Competition NicNacCoin 10 (Bengali) Merit Catcher in the Pizza and Pumpkin Competition LDL 10 (Bengali) Merit Catcher in the Pizza and Pumpkin Competition Dimitri94 10 (Bengali) Merit Catcher in the Pizza and Pumpkin Competition GigaBit 10 (Bengali) Merit Catcher in the Pizza gabbie2010 10 EarnOnVictor 10 Bitcoin_people 5 (Bengali) Merit Catcher in the Pizza competition Patrol69 5 (Bengali) Merit Catcher in the Pizza competition Interestingly, all but two of these accounts have been repeatedly accused of merit farming. Does anyone see a pattern again?
|
|
|
3
|
Other / Beginners & Help / Apple ID Vulnerability Exposes CryptoWallets To Theft
|
on: May 21, 2023, 02:49:02 PM
|
Recent news again warns that if you have a crypto wallet installed on your phone, and the Apple ID is not yours, but you bought it, then you need to transfer your funds from the iPhone, in order to avoid theft. "Some countries have country or region restrictions on app downloads in the App Store", so users are sometimes forced to buy other people's Apple IDs. A recent research study conducted by the security agency DilationEffect has raised concerns about the potential risk of cryptocurrency theft associated with buying someone’s Apple ID. The findings suggest that individuals who gain unauthorized access to an Apple ID could exploit the recovered data to steal cryptocurrency assets from the victim’s wallet.
https://twitter.com/WuBlockchain/status/1659388868561625090The study highlights the existence of sophisticated criminal networks involved in these illegal activities, with the data on the blockchain indicating that the stolen coins have surpassed a staggering $10 million. The research brings to light a new dimension of vulnerability for cryptocurrency holders, as their digital assets could be compromised through a seemingly unrelated account, such as an Apple ID. The theft is made possible by recovering data associated with the victim’s cryptocurrency wallet from the compromised Apple ID. With this information in hand, criminals can gain access to the victim’s wallet and siphon off their funds.
The security agency’s findings underscore the growing sophistication of criminal gangs involved in cryptocurrency theft. These groups have developed mature operations, targeting unsuspecting individuals and exploiting any available vulnerabilities. The stolen funds, exceeding $10 million, demonstrate the substantial financial impact of such criminal activities.
The research has prompted a renewed focus on enhancing security measures for both cryptocurrency assets and personal accounts. It serves as a reminder for individuals to maintain robust security practices, including using strong and unique passwords, enabling two-factor authentication, and regularly updating security settings https://catcoin.com/news/apple-id-vulnerability-exposes-cryptocurrency-wallets-to-theft/I did not find a similar topic, if a similar topic has been created, I will immediately close the topic
|
|
|
5
|
Other / Beginners & Help / Zaraza Bot Credential Stealer, or time to change the browser.
|
on: April 17, 2023, 01:04:25 PM
|
I didn't find a post about this news, so it's better to be warned and be armed. The latest news says that a bot called "Zaraza bot" has been created that can steal passwords from 38 known browsers. To be precise, it seems that all these browsers are based on the Blink engine (correct me if I'm wrong about all 38).  And it is these browsers that have become the focus of attention for Russian hackers, who sell their bots through Telegram. This is sold on Telegram and uses the messenger as a command and control server (C2, C&C). "Once the program extracts login credentials from online bank accounts, cryptocurrency wallets, email accounts, and other important websites, it immediately sends all passwords and data to the Telegram bot." You may notice that the Firefox browser does not fall into the list of victims. And also think about installing Linux systems. https://www.uptycs.com/blog/zaraza-bot-credential-password-stealer
|
|
|
6
|
Economy / Reputation / Maxre Stop deceiving people. I will leave him a negative tag.
|
on: April 09, 2023, 01:50:14 PM
|
I'm sick of seeing members who seem to know nothing in this forum, instead of wanting to make a good contribution, actually want to trick other members of this forum, to sympathize.
Stop fooling the other members in this forum.
MaxreAfter an account under the nickname fennic commits plagiarism, and the moderators do not react to it in any way, after receiving a negative tag, he connects a second account under the nickname classicman1. With whom he successfully exchanges merits. @YOSHIE's investigation that these two accounts are alternate. https://bitcointalk.org/index.php?topic=5415701.msg61049983#msg61049983Then there is another discovery by @YOSHIE where he shows that in addition to these two accounts, there are two more previously blocked accounts. https://bitcointalk.org/index.php?topic=5415850.msg61090146#msg61090146@Nutildah now finds a post using an AI tool, and after verifying the Maxre account, you can see that it belongs to the old owner again. And also confirms his other accounts. https://bitcointalk.org/index.php?topic=5448045.msg62060049#msg62060049Obviously, this account has been bought. https://bpip.org/Profile?p=MaxreBut the owner is so stupid that he does not stop using his old social networks. https://archive.fo/Ipc9ghttps://loyce.club/archive/posts/6082/60820043.htmlhttps://archive.fo/qneS7 https://ninjastic.space/post/59412237 https://ninjastic.space/post/58234124https://ninjastic.space/addresses?address=0x6924d6086cEb27Df4256d07b672D289a537bAe05In addition, many of his posts are the most common shitposting. @YOSHIE, you were right. Stop deceiving people. I will leave him a negative tag. As well as a request to ban this account. https://bitcointalk.org/index.php?topic=5094661.msg62056782#msg62056782
|
|
|
7
|
Other / Off-topic / Malicious keylogger and PassGAN created using ChatGPT
|
on: April 08, 2023, 08:08:22 AM
|
Recently, we heard about the invention of ChatGPT. The first enthusiasm seems to end in sobriety. Realizing that the best can be the enemy of the good The news that the BlackMamba keylogger has appeared on the web is not at all rosy. This keylogger can spread over the internet and adapts to the needs of each victim. The spy collects personal information, including passwords and user card data, and it is possible that it can target crypto users, waiting for the possibility of stealing seed phrases and passwords. "The BlackMamba threat is also compatible with Windows, Linux, and even Mac, which are famous for their high security, so it is important for users on all devices to be careful." https://www.hackread.com/chatgpt-blackmamba-malware-keylogger/In addition, there is a second unpleasant story about the "successes" of ChatGPT. This tool attacks our passwords. How secure do you think your passwords are? You can check it out by following this link. https://www.homesecurityheroes.com/ai-password-cracking/
|
|
|
8
|
Other / Beginners & Help / Android malware targets 13 bitcoin wallets and 400 banks
|
on: March 11, 2023, 01:12:39 PM
|
New article on Xenomorph malware. https://twitter.com/ThreatFabric/status/1634131991216914432?cxt=HHwWgICwyeqYza0tAAAA The Xenomorph v3 version is much more powerful than the previous ones that were previously discovered. The software targeted several banks Chase, Citibank, American Express, ING, HSBC, Deutsche Bank, Wells Fargo and other banks from around the world, as well as crypto wallets: Binance, BitPay, KuCoin, Gemini and Coinbase. "Xenomorph v3 is currently being distributed via the Zombinder platform on the Google Play Store, posing as a currency converter and switching to using the Play Protect icon after installing a malicious payload." ThreatFabric has included a list of all targeted banks in the appendix of its report, but it would be too long to present here. In addition, 13 cryptocurrency wallets, including Binance, BitPay, KuCoin, Gemini, and Coinbase, are targeted by malware.
The most noticeable addition to the latest Xenomorph version is the ATS framework, which gives hackers the ability to automatically extract credentials, monitor account balances, make transactions, and steal money from target apps without requiring them to perform remote activities.
Instead, the operator merely sends JSON scripts, which the Xenomorph interprets as a list of activities and then carries out on the infected device on its own.
According to experts at ThreatFabrics, the [ATS execution] engine utilized by Xenomorph differs from its rivals due to the range of programmable potential actions that can be included in ATS scripts and a system that permits conditional execution and action prioritization.
One of the malware’s ATS framework’s most outstanding features is its ability to record third-party authentication programs’ content, circumventing MFA (multi-factor authentication) safeguards that would otherwise prevent automated transactions.
One-time codes can be obtained from Google Authenticator by extracting the relevant codes (ThreatFabric). It concerns that Xenomorph may access authenticator applications on the same device as banks, who are gradually moving away from SMS MFA and advising consumers to use authenticator apps instead.
In addition to the aforementioned, the new Xenomorph has a cookie stealer capable of stealing cookies from the Android CookieManager, where the user’s session cookies are kept.
In order to fool the victim into providing their login information, the thief launches a browser window with the URL of a reliable service and the JavaScript interface turned on.
The threat actors steal the cookies, allowing them to hijack the victim’s web sessions and access their accounts. A significant new malware that entered the world of cybercrime a year ago was Xenomorph, an Android threat.
It is now a far bigger threat to Android users all over the world after the release of its third major version. Users who download apps via Google Play should exercise caution, read reviews, and perform background checks on the publisher because of the app’s current distribution method, the Zombinder.
https://informationsecuritybuzz.com/xenomorph-android-malware-steals-banks/
|
|
|
10
|
Alternate cryptocurrencies / Service Discussion (Altcoins) / Hackers hide malware in fake NFT game
|
on: January 11, 2023, 05:42:30 AM
|
Another discovery of fraudulent activities was made by Korean specialists from AhnLab. The game is distributed through phishing sites or through a mailing list; it is a simple Pokémon NFT card game. After installing the game, RAT, a computer remote control virus, is installed on the victim's computer, which ultimately allows hackers to fully monitor all the victim's actions, including stealing passwords and seed phrases. Hackers have been using a fake NFT game claiming to be Pokémon-branded to spread malware to unsuspecting users, according to cybersecurity firm AhnLab. The phishing website, which is still active at the time of writing, appears to offer a legitimate NFT marketplace and the option to buy tokens and stake NFTs based on the popular Japanese media brand. However, users who download the site's content are actually installing a remote access program called NetSupport Manager that gives hackers control over their device
https://metaverse.sg/nft-news/fake-pokemon-nft-game-distributes-malwareThe remote control can be configured as the most common process on Windows, which the user will never mistake for malicious, which also applies to antivirus software, although some completely refuse to detect it. As a result, the simple truth rings again: do not open anything on the Internet, do not open attachments from strangers, and start self-education on Linux systems in order to completely abandon leaky Windows.
|
|
|
11
|
Economy / Scam Accusations / A new godfather virus for android that steals data from cryptocurrency applicati
|
on: January 11, 2023, 05:16:58 AM
|
The new year began with another discovery of viruses aimed at stealing cryptocurrencies. Although the Trojan was discovered in 2021, it was not finalized then. At this time, the virus can read SMS in the victim's phones, thereby bypassing two-factor authorization. The new malware was designed to collect user data, and it is targeting primarily banking and cryptocurrency applications. Once it infects a device, the malware begins to display fake websites of regular banking and crypto apps in order to steal the login data of users. BaFin revealed that the malware is targeting around 400 banking and crypto apps, including those operating in Germany.
We also know that Godfather relies on push notifications to obtain two-factor authentication codes, and that cybercriminals can use this data to gain access to consumers’ accounts and wallets.
https://thepaypers.com/cryptocurrencies/bafin-warns-of-new-godfather-banking-and-crypto-malware--1259756
|
|
|
12
|
Economy / Scam Accusations / ViperSoftX - A new Trojan that steals cryptocurrencies through a Chrome extensio
|
on: November 22, 2022, 11:11:23 AM
|
Avast experts have discovered malware that steals information from users of Windows systems. We’ve been closely monitoring an information stealer called ViperSoftX. They named the USA, India, Italy and Brazil among the most affected countries. This multi-stage stealer exhibits interesting hiding capabilities, concealed as small PowerShell scripts on a single line in the middle of otherwise innocent-looking large log files, among others. ViperSoftX focuses on stealing cryptocurrencies, clipboard swapping, fingerprinting the infected machine, as well as downloading and executing arbitrary additional payloads, or executing commands. One of the payloads ViperSoftX distributes is a specific information stealer in the form of a browser extension for Chromium-based browsers. Due to its standalone capabilities and uniqueness, we decided to give it its own name, VenomSoftX. The malicious extension provides full access to every page the victim visits, carries out man-in-the-browser attacks to perform cryptocurrency addresses swapping by tampering with API requests’ data on popular cryptocurrency exchanges, steals credentials and clipboard content, tampers with crypto addresses on visited websites, reports events using MQTT to the C&C server, and more.
ViperSoftX is mostly spread via cracked software such as Adobe Illustrator, Corel Video Studio, Microsoft Office, and more, commonly distributed over torrents. https://decoded.avast.io/janrubin/vipersoftx-hiding-in-system-logs-and-spreading-venomsoftx/What are we seeing? Again, Windows systems and the Chrome browser Everyone is strongly advised to start studying Linux systems and not to trust this browser and, even more, various extensions that supposedly simplify the work on the Internet.
|
|
|
13
|
Other / Meta / The resurrection of an old topic.
|
on: November 18, 2022, 10:07:46 AM
|
I have a question, what if an old topic is raised and a discussion starts, and users actively quote the OP giving a targeted answer to his post, don't people see the date the thread was created? I'm talking about this topic. https://bitcointalk.org/index.php?topic=5397790.0Looks like she's getting another wave of spam. The question is always relevant, but people's answers look like a conversation with the void. Whoever created this thread has been blocked. Some dumb newbie recently brought up some old threads and all the users gleefully started pushing them further, completely oblivious to the date of the first post. I complained several times about necroposting, but posts are being deleted selectively. Does the forum need such topics? And how do we stop their discussion? Is it fair to complain about someone who quotes the author, knowing full well that quite a lot of time has passed? Is anyone interested in answers to a question that was asked a very long time ago?
|
|
|
14
|
Economy / Reputation / A large bounty hunter farm (67 or more).
|
on: October 22, 2022, 02:24:32 PM
|
+67 Accounts Connected Accounts Connected: (Note: Banned shown in red / Inactive in Blue)
1.mesnakirik April 21, 2019, 08:46:15 PM 2.airdrop5s April 21, 2019, 09:07:09 PM 3.tesikedeo May 06, 2021, 02:37:35 PM 4.shivamgren May 19, 2021, 04:25:19 PM 5.dobokoy May 19, 2021, 04:34:09 AM 6.miyemee May 19, 2021, 09:41:59 AM 7.dofipill May 20, 2021, 01:08:41 PM 8.metegich May 20, 2021, 02:07:59 PM 9.gidirop453 May 20, 2021, 04:18:33 PM 10.anhphuongbountyy May 20, 2021, 07:51:49 PM 11.nguyenphuongcryptol May 20, 2021, 06:50:30 PM 12.thangtaibounty May 20, 2021, 08:12:09 PM 13.dinhquangcoin May 20, 2021, 08:28:47 AM 14.datefen May 20, 2021, 09:03:05 PM 15.gawapaa May 20, 2021, 09:18:44 PM 16.yawaxaa May 20, 2021, 09:37:42 AM 17.nejixaw May 20, 2021, 10:10:37 AM 18.nijejoo May 20, 2021, 10:51:08 PM 19.lafacfarmm May 21, 2021, 08:06:32 AM 20.jecsihai May 21, 2021, 10:11:18 PM 21.yicasimee May 21, 2021, 04:43:49 AM 22.nisomodo May 21, 2021, 05:12:16 AM 23.kacanadd May 21, 2021, 05:38:08 AM 24.bawafeg May 21, 2021, 07:59:00 AM 25.kacanda7 May 22, 2021, 08:11:04 AM 26.sixof58 May 22, 2021, 08:16:49 AM 27.hicocej June 03, 2021, 08:10:37 PM 28.revutapo June 03, 2021, 09:23:08 AM 29.dogiwod0 June 03, 2021, 09:32:21 PM 30.dinikitdy June 03, 2021, 10:17:23 PM 31.saxicodo June 03, 2021, 10:39:59 PM 32.kojawadal June 04, 2021, 02:42:07 PM 33.sonstimot June 04, 2021, 03:08:50 PM 34.slowimole June 04, 2021, 03:45:21 PM 35.wehoraka June 04, 2021, 04:08:05 PM 36.cafexite June 04, 2021, 05:57:02 PM 37.cejakey June 04, 2021, 06:27:48 PM 38.sitiliayo June 04, 2021, 06:56:32 PM 39.ciwosomodo June 04, 2021, 07:19:34 PM 40.relumyxe June 04, 2021, 07:44:37 PM 41.momekfeg June 05, 2021, 12:50:34 AM 42.navigoko June 07, 2021, 06:56:37 PM 43.jixmopi June 07, 2021, 07:37:07 PM 44.daxemake June 07, 2021, 08:13:57 PM 45.kittyfiny June 07, 2021, 08:42:14 PM 46.mekewewi June 07, 2021, 09:35:08 PM 47.caniwakey June 11, 2021, 08:47:13 PM 48.jivamexi June 11, 2021, 08:52:14 PM 49.slovimmo June 11, 2021, 08:58:52 PM 50.honomokho June 11, 2021, 09:07:56 PM 51.setivafi June 11, 2021, 09:23:00 PM 52.bobafaviba June 11, 2021, 09:30:34 PM 53.cohixaya June 11, 2021, 09:36:31 PM 54.lopelese June 11, 2021, 09:40:57 PM 55.kotobekum June 12, 2021, 09:42:39 AM 56.Ribocitii June 15, 2021, 04:33:31 PM 57.beyadenta June 15, 2021, 07:20:40 PM 58.hevemivik June 15, 2021, 07:48:12 PM 59.Xanijobo June 15, 2021, 08:15:03 PM 60.yakokema June 15, 2021, 08:37:03 PM 61.wocelebey June 16, 2021, 05:14:11 AM 62.woyefetdy June 16, 2021, 05:40:23 AM 63.mitagokho June 16, 2021, 06:22:45 AM 64.getilepe June 16, 2021, 07:44:52 AM 65.trunganhbounty August 01, 2020, 08:24:01 PM 66.tranglebounty August 15, 2020, 11:27:12 PM 67.hadacete September 04, 2021, 10:37:19 PM
Proof:
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
[ archive ] [ archive ]
Telegram Username: @Xedeckip
[ archive ] Telegram Username: @Xedeckip
[ archive ]
[ archive ] [ archive ]
Telegram Username: @Tebewid
[ archive ] Telegram Username: @Tebewid
[ archive ]
|
|
|
16
|
Other / Beginners & Help / UN proposes to strengthen regulatory methods for cryptocurrencies
|
on: July 20, 2022, 04:40:17 PM
|
I read that there are "security recommendations" from the UN, which propose to reduce interest in cryptocurrencies by increasing the tax deductions received from them and also propose to ban advertising of crypto projects in social networks and in public places... There is a Full list that contains these recommendations, but at the core lies the fear that cryptocurrency is gaining more and more trust from the public, and it is becoming increasingly difficult for regulators to take everything under their control. The following policies, among others, have the potential to curb the further spread of the risks of cryptocurrencies and stablecoins: (a) Ensuring comprehensive financial regulation, through the following actions: - Require the mandatory registration of crypto-exchanges and digital wallets and make the use of cryptocurrencies less attractive, for example by charging entry fees for crypto-exchanges and digital wallets and/or imposing financial transaction taxes on cryptocurrency trading; - Ban regulated financial institutions from holding stablecoins and cryptocurrencies or offering related products to clients; - Regulate decentralized finance (such finance may, in fact, not be fully decentralized, given its central management and ownership, which form an entry point for regulation18); (b) Restricting or prohibiting the advertisement of crypto-exchanges and digital wallets in public spaces and on social media. This new type of virtual, and often disguised, advertisement requires policymakers to expand the scope of regulation beyond traditional media. This is an urgent need in terms of consumer protection in countries with low levels of financial literacy, as even limited exposure to cryptocurrencies may lead to significant losses; (c) Creating a public payment system to serve as a public good, such as a central bank digital currency. In the light of the regulatory and technological complexity of central bank digital currencies and the urgent need to provide safe, reliable and affordable payment systems, authorities could also examine other possibilities, including fast retail payment systems.
https://unctad.org/system/files/official-document/presspb2022d8_en.pdf?fbclid=IwAR1whBoNCSpqzAEBkLViqwe2CFemCkkWGvW2_2VON2yaFkt50zXAYg57ZVw
|
|
|
17
|
Other / Beginners & Help / RedLine malware now spreads via YouTube using NFT theme
|
on: May 13, 2022, 02:32:23 PM
|
Another piece of news from the cybersecurity community. The RedLine malware is now spreading via YouTube using the NFT theme. As we see, everything new that becomes popular does not lose the attention of scammers. Attackers have now used the popular YouTube platform. Researchers have uncovered a new campaign to spread the RedLine Stealer – a low-cost password stealer sold on underground forums – through a series of YouTube videos that take advantage of global interest in NFTs.
The lure is a bot’s offer to allow a user to automatically purchase Binance NFT Mystery Boxes when they become available. The bot is fake, however. Video descriptions on YouTube pages lead victims to unwittingly download RedLine Stealer from a GitHub link, according to Gustavo Palazolo, malware analyst at Netskope Threat Labs.
Hackers deploying the malware launched thousands of attacks against systems in more than 150 countries and territories in April.
RedLine allows attackers to access system information such as usernames, hardware, installed browsers, and antivirus software before exfiltrating passwords, credit cards, crypto wallets, and VPN connections to a remote command and control server.
With RedLine Stealer, hackers have the ability to extract login credentials from web browsers, FTP clients, email apps, instant messaging clients, and VPNs before selling them on underground markets The malware does not run, Palazolo said, if the infected computer is detected in one of these countries:
Armenia Azerbaijan Belarus Kazakhstan Kyrgyzstan Moldova Russia Tajikistan Ukraine Uzbekistan https://ikoku-news.com/nft/password-stealer-now-propagates-from-a-github-link-that-uses-nft-content-as-bait/
|
|
|
19
|
Economy / Reputation / Nutildah?
|
on: April 11, 2022, 06:26:09 AM
|
Nutildah finally showed signs of life. This is very pleasing. On April 1, he changed his avatar. Nutildah, come back, the forum misses you. I have learned a lot from you, and I would like to have you among us. Does anyone know about nutildah's future plans? 
|
|
|
20
|
Economy / Reputation / The old farm is alive. The attention of CryptopreneurBrainboss managers and othe
|
on: April 09, 2022, 04:57:55 PM
|
After YOSHIE exposed the farm participating in BlockX, the owner left negative accounts and started cheating with other accounts. Accounts colored in red already have a negative tag from YOSHIE, CryptopreneurBrainboss, and FatFork. They have the same wallet number as the quoted account. Transfer to one wallet at the same time received tokens from the [🦊BOUNTY🦊] PayRue - 5,000,000 PROPEL Tokens (5 weeks) bounty. 1. TungayETH May 13, 2018, 11:30:54 AM 2. AltCoinShooter May 13, 2018, 01:03:51 AM 3. StringFire May 13, 2018, 12:52:55 AM 4. ShiftLocker May 13, 2018, 12:48:30 AM 5. Tappertit May 13, 2018, 12:24:59 PM 6. CorneliaMarket May 13, 2018, 12:16:33 PM 7. BTCisAngelCoin May 13, 2018, 01:26:57 AM 8. bitcoinminer566 June 25, 2018, 08:50:40 PM 9. SparklesCoin June 28, 2018, 10:57:03 PM 10. BlackandRed654 June 30, 2018, 11:19:32 PM 11. blackmagic111 July 01, 2018, 09:48:18 PM 12. cryptoVinc5599 July 01, 2018, 04:08:01 PM 13. learningcrypto5421 July 02, 2018, 08:49:40 PM 14. Sionsak July 02, 2018, 08:40:59 PM 15. fourplealise July 02, 2018, 08:38:04 PM 16. cryptocrabs2 July 06, 2018, 03:05:23 PM 17. blackwell77 July 26, 2018, 18:32:36 AM 18. Horraygram July 26, 2018, 02:27:18 AM 19. Antelopez2 July 27, 2018, 05:14:00 AM 20. Barrycuda007 July 29, 2018, 02:34:42 AM 21. Rangerman July 29, 2018, 04:11:33 AM Proof:Transfer to one wallet at the same time received tokens from the [🦊BOUNTY🦊] PayRue - 5,000,000 PROPEL Tokens (5 weeks) bounty. https://bscscan.com/tokentxns?a=0x86f72c8a25f6e9256849c6781e4a65c3707cc252  BSC Wallet Address: 0xB10b168f4B64ED3a0c36C169D01bd7408e5358B5
[ archive ] MoneyCryptor520BSC Wallet Address: 0x181a18E1E975c0156999D82575157a3C2E07b503
[ archive ] BSC Wallet Address: 0x34E5e9749ceB185e29cd239EA631324dD03Bf90A
[ archive ] BSC Wallet Address: 0xDd2f54eb7A6918011Ee03BD0b5495E498e580a56
[ archive ] scribble2BSC Wallet Address: 0x46a11F8852309569C4605C64B2Dd835edeb2c09A
[ archive ] liripoopBSC Wallet Address: 0x019Ea615570803aD763D11e65F0D9ff412A633e1
[ archive ] coinagesBSC Wallet Address: 0xDFBC2D5A13A1E3Cd6527ae3E358A6Ec26bEeEbA6
[ archive ] Bsc Address; 0xAF655128e47bf55140493EA9AdbC4354A34745a2
[ archive ] BSC Wallet Address: 0x922d58f28EeeA56d51a4bb42Ae6E2b6a08C796a2
[ archive ] BSC Wallet Address: 0x1DA0720081ab868605679d7675DF28AAECd8a8a4
[ archive ] BSC Wallet Address: 0x195e095bA615b142d0921c2c6D1437ad2C7a7757
[ archive ] BSC Wallet Address: 0xF0cc06EB69D706EaaE1d5406056D18539B459636
[ archive ] cryptosmith03BSC Wallet Address: 0x15d24aDd749F797a7164eE2d1Cbd63B5C3a15dE9
[ archive ] BSC Wallet Address: 0xA81371bB1C1EBF5B28d986619e7FabB4907242dc
[ archive ] LinkinPrak852BSC Wallet Address: 0x2c84f5f5596894675dA72ae3c279ed2A9422b4eF
[ archive ] BSC Wallet Address: 0xF46a9e110A4E4912CE19B6B46291B18607C95615
[ archive ] BSC Wallet Address: 0x1d922238CdD8bbD57bb27A4b927051e2048ffCC0
[ archive ] BSC Wallet Address: 0xc1B60b1C7127387f775D94C2D7a733C24Bf39917
[ archive ] TheBitcoinBadger10BSC Wallet Address: 0x3784Ec44d4bf51b9A727e3dC12488cc598Eeb43c
[ archive ] BitCoinGuy10BSC Wallet Address: 0x981499bf97ee8bf9dda67d0CD464a2b7177a4418
[ archive ] BSC Wallet Address: 0xE3471A337386cC484f79f7f68Adfc59d3e76E02e
[ archive ] bitcoindigger71Related Addresses:BSC Wallet Address: 0x181a18E1E975c0156999D82575157a3C2E07b503 BSC Wallet Address: 0xB10b168f4B64ED3a0c36C169D01bd7408e5358B5 BSC Wallet Address: 0x34E5e9749ceB185e29cd239EA631324dD03Bf90A BSC Wallet Address: 0xDd2f54eb7A6918011Ee03BD0b5495E498e580a56 BSC Wallet Address: 0x46a11F8852309569C4605C64B2Dd835edeb2c09A BSC Wallet Address: 0x019Ea615570803aD763D11e65F0D9ff412A633e1 BSC Wallet Address: 0xDFBC2D5A13A1E3Cd6527ae3E358A6Ec26bEeEbA6 BSC Wallet Address: 0xAF655128e47bf55140493EA9AdbC4354A34745a2 BSC Wallet Address: 0x922d58f28EeeA56d51a4bb42Ae6E2b6a08C796a2 BSC Wallet Address: 0x1DA0720081ab868605679d7675DF28AAECd8a8a4 BSC Wallet Address: 0x195e095bA615b142d0921c2c6D1437ad2C7a7757 BSC Wallet Address: 0xF0cc06EB69D706EaaE1d5406056D18539B459636 BSC Wallet Address: 0x15d24aDd749F797a7164eE2d1Cbd63B5C3a15dE9 BSC Wallet Address: 0x2c84f5f5596894675dA72ae3c279ed2A9422b4eF BSC Wallet Address: 0xA81371bB1C1EBF5B28d986619e7FabB4907242dc BSC Wallet Address: 0xF46a9e110A4E4912CE19B6B46291B18607C95615 BSC Wallet Address: 0x1d922238CdD8bbD57bb27A4b927051e2048ffCC0 BSC Wallet Address: 0xc1B60b1C7127387f775D94C2D7a733C24Bf39917 BSC Wallet Address: 0x3784Ec44d4bf51b9A727e3dC12488cc598Eeb43c BSC Wallet Address: 0x981499bf97ee8bf9dda67d0CD464a2b7177a4418 BSC Wallet Address: 0xE3471A337386cC484f79f7f68Adfc59d3e76E02e
Miscellaneous:cheating bounty programs. BBNToken's Bounty Campaign | Budget: 139M $BBNT ~ $100k | 4 weeks | ESCROWED.manager @CryptopreneurBrainboss https://docs.google.com/spreadsheets/d/18PyXaSfjEJOERPZLR17Jp-cppVppN6Mp6kGt17l0jcM/edit#gid=0 Jungle Kingdom Bounty Campaign | Budget: 1M tokens ~ $100k | Duration: 4 weeks.manager @CryptopreneurBrainboss https://docs.google.com/spreadsheets/d/1_c_DAlrGk4uaQxMMAEcsmp88nKwXHg6IVtL0NM4gAI8/edit#gid=0 GRN GRID Bounty <Signature updated> |12 weeks | 50k ~GRN & $10k USDT {pESCROWED}manager @CryptopreneurBrainboss https://docs.google.com/spreadsheets/d/1dFQB13X9Ea6ay85EPPCTC15z8JkSm_DXLqW0FLLZWNg/edit [🦊BOUNTY🦊] PayRue - 5,000,000 PROPEL Tokens (5 weeks)manager @Jawadu
|
|
|
|