Sunday, May 5, 2024
Home Cyber Security CryptoCore Hacker Makes the Big Bucks

CryptoCore Hacker Makes the Big Bucks

Made the Big Bucks by the CryptoCore Hacker.The CryptoCore Group which made away with the millions from online cryptocurrency exchanges. 

Scenario : 

CryptoCore is the organized hacking group that pulled off cryptocurrency heists which amount to $70 million. The research which clears suggests which has the total value may be worth around $200 million, Since 2018. The group is known as “Leery Turtle “ and  “ Dangerous Password”.

Modus :

Group basically has been following the same mode of operation which has little to no variations in the attacks.

  • Begins its activities with an expansive reconnaissance phase against an organization and its components.
  • The attacks which are included for the first phishing are against the personal email accounts which they are less likely to be secured as compared to the corporate email accounts.
  • The Spear-phishing email which they sent to a corporate email account within a few hours or weeks.
  • The death blow is delivered by planting the malware on a manager or employee’s system and gaining access to the password manager account.
  • The IOCs can be found here.

 

The Basic Facts about CryptoCore

  • The CryptoCore which is currently the second-largest organized group that repeatedly targets cryptocurrency exchanges.
  • The group allegedly is based in the eastern European region which targets cryptocurrency exchange in the US, the Middle East, and Japan.
  • Although the Group is the not more extremely technically sound which makes yo for it with efficacy and speed.

 

Found this article informative? Follow Vednam on Facebook, Twitter, Mix, Tumbler, and Linkedin to know more exclusive content we post.

You can Also read Articles :

Lucifer Malware: Windows Vulnerabilities for Cryptomining

Wikileaks Owner charged for the involvement in the conspiracy

 

Bipin Choudharyhttps://vednam.com
Bipin has been a passionate blogger for several years. He is a Cyber Security Enthusiast, Security Blogger, Technical Writer. He is always eager to know everything about the latest technology development and advancement. Author @ Vednam

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

7 Best Free Ethical Hacking Courses Online

  Ethical hacking is the practice of identifying vulnerabilities in computer systems and networks, using the same techniques and tools as malicious hackers. Ethical hackers,...

How does AuKill malware work?

AuKill Malware Actively Used to Disable EDR in Ongoing Attacks The cybersecurity landscape is constantly evolving, and attackers are always finding new ways to breach...

What is Black box hacking ? How Does it works ?

  Black box hacking refers to the process of testing a system, network or application for vulnerabilities without having any prior knowledge of its internal...

What is Penetration testing ? How does it works ?

  Penetration testing, or PenTesting for short, is a critical part of any comprehensive cybersecurity program. It involves testing the security of computer systems, networks,...

Recent Comments