Toggle light / dark theme

Hacker arrested for KMSAuto malware campaign with 2.8 million downloads

A Lithuanian national has been arrested for his alleged involvement in infecting 2.8 million systems with clipboard-stealing malware disguised as the KMSAuto tool for illegally activating Windows and Office software.

The 29-year-old man was extradited from Georgia to South Korea following a related request under Interpol’s coordination.

According to the Korean National Police Agency, the suspect used KMSAuto to lure victims into downloading a malicious executable that scanned the clipboard for cryptocurrency addresses and replaced them with ones controlled by the attacker — known as ‘clipper malware’

When will The Singularity happen? 🦾 Dr. Ben Goertzel

🏦 Invest In Luxury Dubai Property https://londonreal.tv/dubai-ytd.
🔥 Join my Crypto & DeFi Academy: https://londonreal.tv/defi-ytd.
🍿 Watch the full Ben Goertzel interview for free: https://londonreal.tv/dr-ben-goertzel-will-artificial-intelligence-kill-us/

🔔 SUBSCRIBE ON YOUTUBE: http://bit.ly/SubscribeToLondonReal.
▶️ FREE FULL EPISODES: https://londonreal.tv/episodes.

#BenGoertzel #AI #artificialintelligence #AGI #DeFi #Crypto #LondonReal #BrianRose #Cryptocurrency #Bitcoin #Ethereum #singularity #singularitynet #thesingularity.

LATEST EPISODE: https://londonreal.link/latest.

DISCLAIMER: Content on this channel references an opinion and is for information purposes only. It is not intended to be investment advice. Seek a duly licensed professional for investment advice.

WebRAT malware spread via fake vulnerability exploits on GitHub

The WebRAT malware is now being distributed through GitHub repositories that claim to host proof-of-concept exploits for recently disclosed vulnerabilities.

Previously spread through pirated software and cheats for games like Roblox, Counter Strike, and Rust, WebRAT is a backdoor with info-stealing capabilities that emerged at the beginning of the year.

According to a report from Solar 4RAYS in May, WebRAT can steal credentials for Steam, Discord, and Telegram accounts, as well as cryptocurrency wallet data. It can also spy on victims through webcams and capture screenshots.

Nigeria Arrests RaccoonO365 Phishing Developer Linked to Microsoft 365 Attacks

Authorities in Nigeria have announced the arrest of three “high-profile internet fraud suspects” who are alleged to have been involved in phishing attacks targeting major corporations, including the main developer behind the RaccoonO365 phishing-as-a-service (PhaaS) scheme.

The Nigeria Police Force National Cybercrime Centre (NPF–NCCC) said investigations conducted in collaboration with Microsoft and the Federal Bureau of Investigation (FBI) led to the identification of Okitipi Samuel, also known as Moses Felix, as the principal suspect and developer of the phishing infrastructure.

“Investigations reveal that he operated a Telegram channel through which phishing links were sold in exchange for cryptocurrency and hosted fraudulent login portals on Cloudflare using stolen or fraudulently obtained email credentials,” the NPF said in a post shared on social media.

Matrix Push C2 Uses Browser Notifications for Fileless, Cross-Platform Phishing Attacks

That’s not all. Since the attack plays out via the web browser, it’s also a cross-platform threat. This essentially turns any browser application on any platform that subscribes to the malicious notifications to be enlisted to the pool of clients, giving adversaries a persistent communication channel.

Matrix Push C2 is offered as a malware-as-a-service (MaaS) kit to other threat actors. It’s sold directly through crimeware channels, typically via Telegram and cybercrime forums, under a tiered subscription model: about $150 for one month, $405 for three months, $765 for six months, and $1,500 for a full year.

“Payments are accepted in cryptocurrency, and buyers communicate directly with the operator for access,” Dr. Darren Williams, founder and CEO of BlackFog, told The Hacker News. “Matrix Push was first observed at the beginning of October and has been active since then. There’s no evidence of older versions, earlier branding, or long-standing infrastructure. Everything indicates this is a newly launched kit.”

First Ever Programmable DNA Circuit Is a Breakthrough In Biocomputing

Get a Wonderful Person Tee: https://teespring.com/stores/whatdamath.
More cool designs are on Amazon: https://amzn.to/3wDGy2i.
Alternatively, PayPal donations can be sent here: http://paypal.me/whatdamath.

Hello and welcome! My name is Anton and in this video, we will talk about an invention of a DNA bio computer.
Links:
https://www.nature.com/articles/s41586-023-06484-9
https://www.washington.edu/news/2016/04/07/uw-team-stores-di…perfectly/
Other videos:
https://youtu.be/x3jiY8rZAZs.
https://youtu.be/JGWbVENukKc.

#dna #biocomputer #genetics.

0:00 Quantum computer hype.
0:50 Biocomputers?
1:55 Original DNA computers from decades ago.
3:10 Problems with this idea.
3:50 New advances.
5:35 First breakthrough — DNA circuit.
7:30 Huge potential…maybe.

Support this channel on Patreon to help me make this a full time job:
https://www.patreon.com/whatdamath.

Bitcoin/Ethereum to spare? Donate them here to help this channel grow!
bc1qnkl3nk0zt7w0xzrgur9pnkcduj7a3xxllcn7d4
or ETH: 0x60f088B10b03115405d313f964BeA93eF0Bd3DbF

Space Engine is available for free here: http://spaceengine.org.

Leap Therapeutics jumps from bio to crypto after winding down cancer program

Who would have predicted that one of the hottest trends for beleaguered biotechs in 2025 would be to rebrand as a crypto company?

Leap Therapeutics has became the latest drug developer to make the move, transforming this morning into Cypherpunk Technologies and focusing on its hoard of $50 million worth of a digital currency called ZEC.

/* */