Market source has disclosed that $63.92m worth of Bitcoin has been stolen from the NiceHash, a cryptocurrency marketplace based in Slovenia.
Explaining the incident on its official website, the company stated “our payment system was compromised and the contents of the NiceHash Bitcoin wallet have been stolen. We are working to verify the precise number of BTC taken”. Sources has however gathered from NiceHash’s Head of Marketing Andrej P Škraba, the hack was “a highly professional attack with sophisticated social engineering”.
Bitcoin value has soared over the last couple of weeks making cryptocurrency market, viable target for Hackers.
“While the full scope of what happened is not yet known, we recommend, as a precaution, that you change your online passwords,” NiceHash has warned his platform users.
The Central Bank of Nigeria has disclosed Biometric authentication will soon be introduced as authentication for Automatic Teller Machine (ATM) transaction across Nigeria.
Making a presentation at a National retreat held in south west Nigeria, the Director in Charge of Banking Payment Systems, CBN Mr. Dipo Fatokun, disclosed Biometric authentication will help in the fight against electronic fraud.
The move towards Biometric authentication on ATM nationwide will be facilitated by the Bank Verification Number (BVN) which has biometric information of Millions of Nigeria already stored.
The Deputy-Director of Department of State Service (DSS) Mr. Yekini Ishola has warned Internet fraud in Nigeria is more prevalent in the south west, especially Lagos, Ogun and Oyo.
Mr.Yekini Ishola made this disclosure while presenting a paper on cybercrimes and the way out at a two-day annual security seminar organised by the Security Department of Nnamdi Azikiwe University Awka.
Decrying the spate of cybercrime among Nigerian youth, particularly in the Tertiary Institutions, the DSS Chief subsequently submitted that Ladoke Akinola University is presently considered has having the highest concentration of cyber criminals.
Cybercrimes are not committed by an individual, but by a network of criminals. Mr. Yekini reiterated. He later warned that activities perpetrated by these syndicates include using identity theft, hacking, malicious software and other fraudulent methods to gain access into personal information and account details of unsuspecting owners.
Interswitch a leading integrated payment and switching company with offices in Lagos, Nigeria and other part of Africa has named Kenneth Olisa as its new Chairman.
Olisa’s appointment followed investment by TA Associates in Interswitch in March, the management business expansion drive, and plan for $1Billion IPO scheduled 2018.
Olisa brings on board the wealth of experience as a British Business man with a career in technology spanning over 40 years.
With increased adoption of the mobile phone as the preferred medium for conducting retail banking transaction is the increase sophistication of illicit appli
cation targeted at defrauding unsuspecting customers. Called Trojans, these illicit apps can be used to harvest customer data, and ultimately takeover the customer account.
Latest in trail of Trojan targeted at Mobile Banking community is the malware code names Red Alert 2.0 banking Trojan. Feeds from the threat community reveals this new Android Trojan is potently dangerous as it is able harvest both mobile bank authentication as well Second Factor (2FA) credentials.
Besides credential harvest, Red Alert Trojan have consistently upgraded its functionality to be able to block and log all incoming calls from the customer banks. As such the Trojan can intercept calls from fraud unit of financial institutions aimed alerting the customer of suspicious activity.
Unsuspecting users could have their phones infected with Red Alert Trojan by downloading apps via third-party app stores or links sent via SMS messages, WhatsApp or emails.
Once installed, the malware waits for the victim to perform some Mobile Banking Transaction in a bid to simulate the victim’s Mobile Banking app interface. Once the Banking app interface has been mimicked the Trojan could potentially overlays the original app with a fake user interface. This fake user interface could be used to harvest user credential and forward the Red Alert Trojan service on the World Wide Web. The customer 2FA is also at jeopardy as the Trojan could intercept SMS messages sent to the customers.
In summary if a customer phone is hijacked by the Red Alert Trojan, hackers can covertly takeover account to make illicit purchases, transfer funds, and profile the Banking history of the customer!
The Red Alert 2.0 work on Android phones running version 6.0 (Marshmallow) and earlier. In a bid to avoid this Trojan and other associated threat, retail banking mobile app users are strongly advised to download app from approved download store.
As the world dabbles into religious science, here’s a lesson or two for Cyber Security risk managers. This image showing Russian Ministry of Internal Affairs and a top official of Russian’s Orthodox church went viral across social media sites recently.
Read full story here
In the wake of Wannacry Ransomware that infected 50,000+ systems globally, it is becoming important users take extra caution of app download particularly for Android users.
In a recent, massive incident, more than 400 apps on Google Play (and nearly 3,000 in other app stores) turned out to be plagued with the DressCode Trojan.
Read more: https://blog.kaspersky.com/dresscode-android-trojan/13219/