Site iconSite icon ForkLog

Profiting from Fake Uniswap Hacks, Extortionists File SEC Complaint, and Other Cybersecurity News

Profiting from Fake Uniswap Hacks, Extortionists File SEC Complaint, and Other Cybersecurity News

We’ve gathered the week’s most important cybersecurity news.

  • Fraudsters stole $305,000 in fake hacks of Uniswap and OpenSea.
  • The FBI dismantled the IPStorm botnet; its creator pleaded guilty.
  • BlackCat extortionists file SEC complaint against victim of their attack.

Fraudsters stole $305,000 in fake Uniswap and OpenSea hacks

On X, a number of fraudulent accounts appeared, presenting themselves as well-known blockchain security researchers, including CertiK, Scam Sniffer analysts, and on-chain sleuth ZachXBT.  

The criminals lure victims with posts about hacks of major cryptocurrency platforms such as Uniswap and OpenSea. They offer users to go to some site and connect their wallet, which supposedly will protect assets from theft. But after that they steal all the funds.

The tactic has been active since at least November 9. Since then the attackers have stolen more than $305,000 in crypto. The assets are stored in two wallets (1, 2).

The FBI dismantled the IPStorm botnet, its creator pleaded guilty.

The U.S. Department of Justice announced the takedown of the IPStorm proxy botnet, which has infected thousands of devices worldwide since 2019.

According to investigators, IPStorm targeted devices running Windows, Android, macOS and Linux, including IoT devices. The botnet spread via proxx.io and proxx.net as a service offering “more than 23,000 anonymous proxy servers”.

In September, the IPStorm creator, Sergey Makinin, a dual citizen of Russia and Moldova, pleaded guilty. He said he earned at least $550,000 from selling his proxy servers, and agreed to forfeit cryptocurrency obtained from the crimes.

He faces up to 30 years in prison.

BlackCat extortionists file SEC complaint against victim of their attack

The BlackCat extortion group filed an SEC complaint against MeridianLink, the attacked company, for violating the four-day disclosure deadline following the cyberattack. DataBreaches.net reports this.

Data: BlackCat leak site.

MeridianLink provides digital solutions for a range of financial institutions.

Hackers breached its network on November 7, stealing data but not encrypting systems. In the SEC filing they noted that the public company did not notify the regulator about the incident affecting “customer data and operational information.”

Experts speculate that BlackCat used this to pressure the victim into paying a ransom.

MeridianLink was forced to confirm the cyberattack. However, according to preliminary findings the company did not find any evidence of unauthorized access to production platforms, and the incident led to only minor disruptions to business operations.

LockBit began leaking Boeing data

The LockBit group, which attacked the aircraft manufacturer Boeing in late October, published more than 43 GB of stolen files.

Data: LockBit leak site.

A substantial portion of the leak consists of backups of various systems, the most recent dated 22 October.

Also among the stolen were backups from Citrix devices, which may indicate the use of the recently discovered Citrix Bleed authentication bypass vulnerability.

Boeing did not disclose any technical details of the cyber incident.

MTS contractor insulted operator’s customers in an open Telegram group

Employees at one of MTS’s centers in Omsk created an open Telegram group in which they posted personal data of the operator’s mobile subscribers. This was reported by the Telegram channel Baza.

Representatives explained that the chat was run by the contractor responsible for supplying their SIM cards. Cooperation with this partner has been suspended.

The company is considering approaching law enforcement to hold the culprits to account for violations of data protection laws.

Roskomnadzor gains power to block sites with methods to circumvent restrictions

On November 17, the Russian government granted Roskomnadzor the power to block sites that provide methods of circumventing online restrictions.

Earlier Roskomnadzor developed criteria for such blocks. They directly concern VPN services, the Tor browser, anonymisers, and any information about how to bypass censorship.

Also on ForkLog:

What to read this weekend?

We cover fake token airdrops and related scams.

Exit mobile version