XRP Plus becomes the latest XRP related scam as community blasts impersonators

XRP’s developments in the cryptocurrency industry have been something to stand up and take notice with multiple partnerships with institutional investors being the main highlight. Along with the tie-ups, scams and frauds, XRP has also grabbed the headlines with impersonators being a key point of focus. The latest fraud related to XRP is called XRP Plus, a cryptocurrency that was called out due to the presence of David Schwartz’s photo on the XRP Plus website. David Schwartz is the Chief Technology Officer of Ripple, the parent company of the second largest cryptocurrency on the planet, XRP. The fake news about XRP Plus was actually circulated via Weibo, a popular Chinese social media platform.

Ethereum Classic blockchain successfully attacked, over $500,000 stolen

The Ethereum Classic (ETC) blockchain was recently compromised by a hacker who spent 88,500 tokens (worth $500,000) then used a lot of computing power to roll back the blockchain so they could get the tokens back. The original tokens are now worthless because they belong to blocks that aren’t part of the chain. Major cryptocurrency exchanges have halted trading of (ETC).
Rollback attacks require control of a substantial fraction of the total hashpower devoted to generating the coin’s blockchain for a period long enough to pull off the attack. Bitcoin creator Satoshi Nakamoto warned of the key limitation in his white paper introducing the digital coin.

Bitcoin Scam Alert: Criminals Demand BTC Payment to Call Off Hit Man

Scam artists have tried just about every trick in the book to relieve people of their Bitcoin in recent years. The latest effort is rather lacking in the sophistication department, The emails state that someone has hired a hit man to murder the receiver. Fortunately, the site owner is willing to call the hired gun off – if the receiver pays up first.

However, it appears that the sender would rather take a fee without having to get their hands dirty. They are therefore offering the receiver the opportunity to pay for the hit to be called off. In the report in Bleeping Computer, the author seems to suggest that the price demanded is $4,000. Despite the poorly worded email, the fee for its cancellation is actually $1,200. Here is the text itself:


US Government Tells Bitcoin Bomb Scam Victims to Inform FBI, Not Pay Ransom Money

The scam, which centers on anonymous emails demanding payment of $20,000 in Bitcoin or face a “mercenary” detonating a device in “your building,” has appeared throughout the world.

Now, the U.S. National Cybersecurity and Communications Integration Center (NCCIC) opted to release dedicated advice to victims, advising the only action necessary on receipt of an email was to inform the FBI.

The NCCIC is “aware of a worldwide email campaign targeting businesses and organizations with bomb threats,” it said.

Prior to the government acknowledgment, media sources had reported on the scheme, including cybersecurity publication and research outlet Krebs On Security, which published the full text of the email.

Multiple campaigns continue to target unwitting internet users both within and outside the cryptocurrency community.

Cryptocurrency scammers target schools, hospitals, government offices with bomb threats

A dangerous email scam appears to be targeting businesses, schools, hospitals, and government buildings across the US in an attempt to extort bitcoin (BTC) with a bomb threat.

We weren’t able to connect the cryptocurrency wallet address in the above email to any transactions, and law enforcement agents searching buildings where threats have been reported have so far found no explosives.

However, as the FBI warns, it’s still important to take any bomb threat seriously and to report suspicious activity or emails to the authorities immediately. Authorities are unsure if this threat was related to ongoing extortion scams, but the threat was later declared false.


U.S. SEC fines an asset fund

Delaware-registered CoinAlpha Advisors LLC was reportedly established in July 2017 to act as the managing member of and manager to fund CoinAlpha Falcon LP, which was formed in October 2017. By May 2018, the fund had allegedly raised over $600,000 from 22 investors from at least five states, which purchased limited partnership interests in the fund in exchange for a proportional share of any profits derived from the fund’s investment in digital assets. The file further reads: “In October 2018, after being contacted by the Commission staff concerning the issues herein, CoinAlpha unwound the Fund, pursuant to the authority granted in the Fund’s Limited Partnership Agreement.”

Malta’s much appreciated warning

Malta has warned citizens about an unlicensed cryptocurrency exchange serving its domestic market.  OriginalCrypto is the offending platform. It had first come to the attention of Italian officials concerned. It may not have the required license to offer authorized “investment services and activities.” SolutionsCM Ltd.owns that platform. Malta has sought to become one of the world’s most permissive jurisdictions regarding both cryptocurrencies and blockchain technology. OriginalCrypto remains far from those legitimate activities.  OriginalCrypto had made dubious claims about its setup, including being operated by a Bulgarian-based parent company Bali Limited Ltd.

Routers have a deranged fate due to a crypto malware

The number of MikroTik routers influenced  by cryptojacking malware has repotedly been doublefold since summer 2018, reaching 415,000, security researcher VriesHd tweeted Sunday, Dec. 2. Since August, VriesHd has been reporting on crypto malware that affects routers and literally makes them to mine cryptocurrencies along with the researchers from Bad Packets Report. They revealed that routers by Mikrotik, a Latvian manufacturer of network equipment, were affected by at least 16 different and dangerous types of malware including Coinhive, a cryptojacking software mining privacy-oriented cryptocurrency Monero (XMR).

Crypto Investors must fear Pewdiepie printer hack?

A bored hacker known as TheHackerGiraffe exploited vulnerabilities in security protocols for internet-connected devices and thus hacking into 50,000 exposed printers as part of the “Save PewDiePie” campaign. TheHackerGiraffe explained that while looking at ways to gain more support for PewDiePie, he decided to carry out a printing campaign using vulnerable internet-connected printers. Printing bitcoin wallet recovery seeds from a networked printer may be an incredibly risky activity. The printer’s internal memory may include past or pending print jobs. This could give a hacker access to a user’s bitcoin wallet if the recovery seed print file was present on the device’s memory.

Individuals in more threat than exchanges

Cybersecurity firm Cuvepia has revealed that it’s uncovered individual attacks now taking place in cryptocurrency investors. That rather than aiming at exchanges and crypto companies, hackers are now aiming their skills at individuals. North Korean hackers are changing their tactics when it comes to cryptocurrencies. Cuvepia CEO Kwon Seok-Chul said that this may yet be the tip of the proverbial iceberg, and that there may be more attacks waiting to be uncovered. There are advantages for the hackers too, with exchanges becoming harder and harder to crack. The preferred method of hackers, to be vigilant against, is an email that has a text file attached. Opening that text file activates the malware.