Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop
Tag:

allegedly

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying
Product Reviews

Feds Charge 16 Russians Allegedly Tied to Botnets Used in Ransomware, Cyberattacks, and Spying

by admin May 22, 2025


The hacker ecosystem in Russia, more than perhaps anywhere else in the world, has long blurred the lines between cybercrime, state-sponsored cyberwarfare, and espionage. Now an indictment of a group of Russian nationals and the takedown of their sprawling botnet offers the clearest example in years of how a single malware operation allegedly enabled hacking operations as varied as ransomware, wartime cyberattacks in Ukraine, and spying against foreign governments.

The US Department of Justice today announced criminal charges today against 16 individuals law enforcement authorities have linked to a malware operation known as DanaBot, which according to a complaint infected at least 300,000 machines around the world. The DOJ’s announcement of the charges describes the group as “Russia-based,” and names two of the suspects, Aleksandr Stepanov and Artem Aleksandrovich Kalinkin, as living in Novosibirsk, Russia. Five other suspects are named in the indictment, while another nine are identified only by their pseudonyms. In addition to those charges, the Justice Department says the Defense Criminal Investigative Service (DCIS)—a criminal investigation arm of the Department of Defense—carried out seizures of DanaBot infrastructure around the world, including in the US.

Aside from alleging how DanaBot was used in for-profit criminal hacking, the indictment also makes a rarer claim—it describes how a second variant of the malware it says was used in espionage against military, government, and NGO targets. “Pervasive malware like DanaBot harms hundreds of thousands of victims around the world, including sensitive military, diplomatic, and government entities, and causes many millions of dollars in losses,” US attorney Bill Essayli wrote in a statement.

Since 2018, DanaBot—described in the criminal complaint as “incredibly invasive malware”—has infected millions of computers around the world, initially as a banking trojan designed to steal directly from those PCs’ owners with modular features designed for credit card and cryptocurrency theft. Because its creators allegedly sold it in an “affiliate” model that made it available to other hacker groups for $3,000 to $4,000 a month, however, it was soon used as a tool to install different forms of malware in a broad array of operations, including ransomware. Its targets, too, quickly spread from initial victims in Ukraine, Poland, Italy, Germany, Austria, and Australia to US and Canadian financial institutions, according to an analysis of the operation by cybersecurity firm Crowdstrike.

At one point in 2021, according to Crowdstrike, Danabot was used in a software supply-chain attack that hid the malware in a javascript coding tool called NPM with millions of weekly downloads. Crowdstrike found victims of that compromised tool across the financial service, transportation, technology, and media industries.

That scale and the wide variety of its criminal uses made DanaBot “a juggernaut of the e-crime landscape,” according to Selena Larson, a staff threat researcher at cybersecurity firm Proofpoint.

More uniquely, though, DanaBot has also been used at times for hacking campaigns that appear to be state-sponsored or linked to Russian government agency interests. In 2019 and 2020, it was used to target a handful of Western government officials in apparent espionage operations, according to the DOJ’s indictment. According to Proofpoint, the malware in those instances was delivered in phishing messages that impersonated the Organization for Security and Cooperation in Europe and a Kazakhstan government entity.



Source link

May 22, 2025 0 comments
0 FacebookTwitterPinterestEmail
Sui LP provider Cetus allegedly drained of $11m SUI, hack or bug?
GameFi Guides

Sui LP provider Cetus allegedly drained of $11m SUI, hack or bug?

by admin May 22, 2025



Traders descended into a panic after LP provider Cetus appeared to be drained of $11 million worth of SUI from its liquidity pool. The team claimed it was an oracle bug, not an exploit.

According to its most recent post, the Cetus team has temporarily halted their smart contracts to prevent any more losses after it detected an incident on its liquidity platform. The team claims that it is currently investigating the root cause of the alleged breach.

“A further investigation statement will be made soon. We are grateful for your patience,” said the protocol.

🚨Alert Announcement 🚨

There was an incident detected on our protocol and our smart contract has been paused temporarily for safety. The team is investigating the incident at the moment. A further investigation statement will be made soon. We are grateful for your patience.

— Cetus🐳 (@CetusProtocol) May 22, 2025

At around 11:00 UTC, traders noticed that the liquidity pool for the liquidity provider Cetus was being drained of tokens, bringing the token supply count to zero. Based on the screenshot circulating online, tokens on the protocol’s leaderboard, including AXOL, SUIRI, HIPPO, among others, plummeted as low as 92% to at least 75% below the initial prices.

At the moment, the platform remains dormant after smart contracts were paused, with all liquidity pools showing no numbers for its trading pairs.

The Cetus team has halted SUI smart contracts temporarily following an incident, May 22, 2025 | Source: app.cetus.zone

Despite news of the liquidity drain and the panic related to it circulating online, the SUI (SUI) token still saw modest gains. In the past 24 hours, it has gone up by 3.15%, reaching $4 per token. Its daily trading volume has increased by 112% compared to the previous trading day, reaching nearly $2.5 billion.

In the past month, the token has been on an ongoing rally, going up by nearly 75%.

Some traders who are members of the Discord server for Cetus have shared screenshots of messages from Cetus admins and developers. One of the members, Figure.Cetus, told traders to remain calm and that the team will publish an announcement soon.

Figure.Cetus claimed that the liquidity provider was not hacked, instead the liquidity drain was due to a bug within the liquidity provider’s oracle.

In crypto liquidity pools, oracles serve to connect the pool’s smart contracts to external data sources, such as real-world asset prices or market conditions. This allows the pool to provide accurate pricing, trade execution, and other features based on the external information it receives.

At press time, the Cetus protocol team has yet to publish an official statement regarding its investigations. In addition, smart contracts are still temporarily paused.





Source link

May 22, 2025 0 comments
0 FacebookTwitterPinterestEmail

Categories

  • Crypto Trends (99)
  • Esports (77)
  • Game Reviews (82)
  • Game Updates (89)
  • GameFi Guides (96)
  • Gaming Gear (97)
  • NFT Gaming (91)
  • Product Reviews (98)
  • Uncategorized (1)

Recent Posts

  • Bitcoin’s Current Trend Echoing Past Cycle Moves After Making History – Here’s How
  • BTC Market Cap Tops $2.2T as Derivatives, Sentiment Signal Pricing Upside
  • Pocket alternatives for bookmarking your content
  • Slumping Athletics shake up roster, call up five players
  • Tolkien Collectible Book Sets Are Up For Preorder – Myths, Legends, Tales Of Middle-earth

Recent Posts

  • Bitcoin’s Current Trend Echoing Past Cycle Moves After Making History – Here’s How

    May 24, 2025
  • BTC Market Cap Tops $2.2T as Derivatives, Sentiment Signal Pricing Upside

    May 24, 2025
  • Pocket alternatives for bookmarking your content

    May 24, 2025
  • Slumping Athletics shake up roster, call up five players

    May 24, 2025
  • Tolkien Collectible Book Sets Are Up For Preorder – Myths, Legends, Tales Of Middle-earth

    May 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

About me

Welcome to Laughinghyena.io, your ultimate destination for the latest in blockchain gaming and gaming products. We’re passionate about the future of gaming, where decentralized technology empowers players to own, trade, and thrive in virtual worlds.

Recent Posts

  • Bitcoin’s Current Trend Echoing Past Cycle Moves After Making History – Here’s How

    May 24, 2025
  • BTC Market Cap Tops $2.2T as Derivatives, Sentiment Signal Pricing Upside

    May 24, 2025

Newsletter

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

@2025 laughinghyena- All Right Reserved. Designed and Developed by Pro


Back To Top
Laughing Hyena
  • Home
  • Hyena Games
  • Esports
  • NFT Gaming
  • Crypto Trends
  • Game Reviews
  • Game Updates
  • GameFi Guides
  • Shop

Shopping Cart

Close

No products in the cart.

Close