Category: Cryptocurrency News

Cryptocurrency News and Public Mining Pools

James Howells Loses Appeal to Dig Up Landfill for $675 Million Bitcoin Hard Drive

submitted by /u/goldyluckinblokchain [link] [comments]

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

New MassJacker malware targets piracy users, steals crypto

A previously unknown type of cryptojacking malware called MassJacker is targeting piracy users and hijacking crypto transactions by replacing stored addresses, according to a March 10 report from CyberArk.The cryptojacking malware originates from the website pesktop[dot]com, where users seeking to download pirated software may unknowingly infect their devices with the MassJacker malware. After the malware is installed, the infection swaps out crypto addresses stored on the clipboard application for addresses controlled by the attacker.According to CyberArk, there are 778,531 unique wallets linked to the theft. However, only 423 wallets held crypto assets at any point. The total amount of crypto that had either been stored or transferred out of the wallets amounted to $336,700 as of August. However, the company noted that the true extent of the theft could be higher or lower.One wallet, in particular, seemed active. This wallet contained just over 600 Solana (SOL) at the time of analysis, worth approximately $87,000, and had a history of holding non-fungible tokens. These NFTs included Gorilla Reborn and Susanoo.Related: Hackers have started using AI to churn out malwareA look into the wallet on Solana’s blockchain explorer Solscan shows 1,184 transactions dating back to March 11, 2022. In addition to transfers, the wallet’s owner dabbled in decentralized finance in November 2024, swapping various tokens like Jupiter (JUP), Uniswap (UNI), USDC (USDC), and Raydium (RAY).Crypto malware targets array of devicesCrypto malware is not new. The first publicly available cryptojacking script was released by Coinhive in 2017, and since then, attackers have targeted an array of devices using different operating systems.In February 2025, Kaspersky Labs said that it had found crypto malware in app-making kits for Android and iOS. The malware had the ability to scan images for crypto seed phrases. In October 2024, cybersecurity firm Checkmarx revealed it had discovered crypto-stealing malware in a Python Package Index, which is a platform for developers to download and share code. Other crypto malware have targeted macOS devices.Related: Mac users warned over malware ‘Cthulhu’ that steals crypto walletsRather than having victims open a suspicious PDF file or download a contaminated attachment, attackers are getting sneakier. One new “injection method” involves the fake job scam, where an attacker will recruit their victim with the promise of a job. During the virtual interview, the attacker will ask the victim to “fix” microphone or camera access issues. That “fix” is what installs the malware, which can then drain the victim’s crypto wallet.The “clipper” attack, in which malware alters cryptocurrency addresses copied to a clipboard, is less well-known than ransomware or information-stealing malware. However, it offers advantages for attackers, as it operates discreetly and often goes undetected in sandbox environments, according to CyberArk.Magazine: Real AI use cases in crypto, No. 3: Smart contract audits & cybersecurity

Bitcoin apparent demand reaches lowest point in 2025 — CryptoQuant

Apparent demand for Bitcoin (BTC) has hit the lowest level in 2025, dropping down into negative territory, as traders and investors take a cautious approach to risk-on assets due to macroeconomic uncertainty. According to CryptoQuant’s Bitcoin Apparent Demand metric, demand for Bitcoin has dropped down to a negative 142 on March 13.Bitcoin’s apparent demand has been positive since September 2024, peaking around December 2024 before beginning the slow descent back down.However, demand levels stayed positive until the beginning of March 2025 and have continued to decline since that point.Fears of a prolonged trade war, geopolitical tensions, and stubbornly high inflation, which is cooling but is nevertheless above the Federal Reserve’s 2% target, are causing traders to take a step back from riskier assets and into safe havens such as cash and government securities.Bitcoin apparent demand. Source: CryptoQuantRelated: Worst crypto cycle ever? Community and history say otherwiseCrypto markets hemorrhage amid macroeconomic uncertaintyThe post-election hype has died down following the mixed reactions from investors to the White House Crypto Summit on March 7, as the realities of macroeconomic uncertainty and the political process set in.Despite lower-than-expected CPI inflation figures reported on March 12, the price of Bitcoin declined immediately following the news.Crypto exchange-traded funds (ETFs) experienced four consecutive weeks of outflows beginning in February and the early weeks of March as traditional financial investors sought a flight to safety.According to CoinShares, outflows from crypto ETFs totaled $4.75 billion over the past four weeks, with BTC investment vehicles recording $756 million in month-to-date outflows.Poor market sentiment and fears of a looming recession triggered a wave of panic selling that sent crypto prices tumbling.Since the Trump inauguration on Jan. 20, the Total3 Market Cap, a measure of the total crypto market capitalization excluding Ether (ETH) and BTC, plummeted by over 27% from over $1.1 trillion to approximately $795 billion.Bitcoin price action and analysis. Source: TradingViewSimilarly, the price of Bitcoin declined by over 22% from a high of over $109,000 to present levels.Bitcoin has been trading below its 200-day exponential moving average (EMA) since March 9, with occasional dips below the 200-day EMA during February.Bitcoin’s Average True Range (ATR), a measure of volatility, is currently over 5,035 — indicating significant price swings as markets grapple with macro factors.Crypto analyst Matthew Hyland recently argued that Bitcoin must secure a close of at least $89,000 on the weekly timeframe or risk a further correction to $69,000.Magazine: Bitcoiners are ‘all in’ on Trump since Bitcoin ’24, but it’s getting riskyThis article does not contain investment advice or recommendations. Every investment and trading move involves risk, and readers should conduct their own research when making a decision.