{"id":1995,"date":"2021-06-04T15:37:07","date_gmt":"2021-06-04T10:07:07","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1995"},"modified":"2021-06-04T15:37:09","modified_gmt":"2021-06-04T10:07:09","slug":"find-new-cryptocurrency-hacks-and-get-115000-cybercriminals","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/","title":{"rendered":"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals"},"content":{"rendered":"\n<p><p style=\"text-align: justify;\">One of the top Russian-language underground forums has been organized a \u201ccontest\u201d for the past month, calling on its community to submit \u201ceccentric\u201d ways to manage cryptocurrency attacks.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The forum\u2019s organizer, in a broadcast made on April 2020-21, appeals to the members to submit papers that assess the probability of targeting cryptocurrency-related technology consist up the theft of private keys and wallets, in inclusion to covering unconventional cryptocurrency mining software, smart contracts, and non-fungible tokens (NFTs).<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">The contest consists of total prize money of $115,000 awarded to the best research which is likely to continue till September 1.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Which Research is Suppose to be at the Top?<\/strong><\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"728\" height=\"380\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/crypto-currency-hack-image.jpg\" alt=\"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals\" class=\"wp-image-2000\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/crypto-currency-hack-image.jpg 728w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/crypto-currency-hack-image-300x157.jpg 300w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cSo deep, the top research (according to forum member voting) consist topics like creating a blockchain front-end websites that captures crucial data such as private keys, and balance , generating a new cryptocurrency blockchain by scratch, expansion of the hash rate speed of mining farms and botnets, and demonstrating a characteristic tool that interprets logs for cryptocurrency amount from victim machines,\u201d said Michael DeBolt, Intel 471\u2019s Senior Vice President of Global Intelligence, in an email with the Researchers.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Various entries are considered at managing APIs from well-known cryptocurrency-related services or decentralized-file technology to generate private keys to cryptocurrency wallets as well as generating phishing websites that permit criminals to accumulate keys to cryptocurrency wallets and their seed terminology.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Granting the sensitive role played by underground marketplaces like Hydra permitting cybercrime gangs to cash out their cryptocurrency harvest, it\u2019s credible that the process that allows Ransomware-as-a-Service (RaaS) operators to exploit pressure on victims and force them to deliver into their ransom demands could get traction. But DeBolt stated that various entries so far have been about guidance or tools for how to devastate cryptocurrency assets, which are implausible to be of any \u201curgent momentous value\u201d to RaaS cartels.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What are the Other Contests?<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify;\">Even though other details of encouraging contests involving topics like mobile OS botnets, ATM and point-of-sale (PoS) setups, and duplicate GPS signals have been seen before in the cybercrime underground, the current evolution is yet another gesture that criminals are increasingly analyzed cutting-edge approaches to help further their aims.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">\u201cThe considerable outcome from the attacker side is that this type of motivate knowledge-sharing strengthen the existing interconnected and collective cybercrime underground by centralizing unauthorized resources in one place and making it easier for like-minded adversary who wish to seek cryptocurrency hacks by providing them a platform to participate, confer, and share ideas,\u201d DeBolt concluded.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify;\">Further, he added that \u201cConversely, the huge outcome from the opposite side is that we can take advantage of these open contests, to increase awareness of recent and materialize techniques and tactics that we can assemble for. It also brightens things for us and helps to level up the playing fields.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the top Russian-language underground forums has been organized a \u201ccontest\u201d for the past month, calling on its community to submit \u201ceccentric\u201d ways to manage cryptocurrency attacks. The forum\u2019s organizer, in a broadcast made on April 2020-21, appeals to the members to submit papers that assess the probability of targeting cryptocurrency-related technology consist up [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1997,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[15],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Find New Cryptocurrency Hacks and get $115,000- Cybercriminals - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"One of the top Russian-language underground forums has been organized a \u201ccontest\u201d for the past month, calling on its community to submit \u201ceccentric\u201d ways to manage cryptocurrency attacks. The forum\u2019s organizer, in a broadcast made on April 2020-21, appeals to the members to submit papers that assess the probability of targeting cryptocurrency-related technology consist up [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-04T10:07:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-04T10:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/Find-New-Cryptocurrency-Hacks-and-get-115000-Cybercriminals-featureed-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals\",\"datePublished\":\"2021-06-04T10:07:07+00:00\",\"dateModified\":\"2021-06-04T10:07:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\"},\"wordCount\":471,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Infosec News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\",\"url\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\",\"name\":\"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-06-04T10:07:07+00:00\",\"dateModified\":\"2021-06-04T10:07:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/","og_locale":"en_US","og_type":"article","og_title":"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals - Xiarch Solutions Private Limited","og_description":"One of the top Russian-language underground forums has been organized a \u201ccontest\u201d for the past month, calling on its community to submit \u201ceccentric\u201d ways to manage cryptocurrency attacks. The forum\u2019s organizer, in a broadcast made on April 2020-21, appeals to the members to submit papers that assess the probability of targeting cryptocurrency-related technology consist up [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-06-04T10:07:07+00:00","article_modified_time":"2021-06-04T10:07:09+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/Find-New-Cryptocurrency-Hacks-and-get-115000-Cybercriminals-featureed-image.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals","datePublished":"2021-06-04T10:07:07+00:00","dateModified":"2021-06-04T10:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/"},"wordCount":471,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Infosec News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/","url":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/","name":"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-06-04T10:07:07+00:00","dateModified":"2021-06-04T10:07:09+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/find-new-cryptocurrency-hacks-and-get-115000-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Find New Cryptocurrency Hacks and get $115,000- Cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1995"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1995"}],"version-history":[{"count":2,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1995\/revisions"}],"predecessor-version":[{"id":2001,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1995\/revisions\/2001"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1997"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1995"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1995"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1995"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}