Research: New Malware Employs Tor and Bittorrent To Steal Bitcoin and Ether

A new trojan called Krypto Cibule uses infested computers’ power to mine cryptocurrency, steal crypto wallet files, and redirect incoming digital assets to a hacker address. The malware rides on the Tor network and the Bittorrent protocol to perform attacks, according to an extensive report by cybersecurity company, ESET. “Krypto Cibule is spread through malicious … Read more

Study Finds Certain Proof of Stake Networks Vulnerable to Low Cost Attacks

On Jan. 22, a team of students from the University of Illinois at Urbana Champaign (UIUC) released a unique study concerning the longevity of certain proof of stake (PoS) networks. According to the research, more than 26 PoS blockchains could suffer from vulnerabilities called “Fake Stake” attacks. Also read: Satoshi’s Bitcoin Whitepaper Is Now Available in … Read more