Responding to numerous 51% attacks on the Ethereum Classic blockchain, ETC Labs said that it's time to bring regulation to hashpower rental marketplaces, citing the fact that at least two of the attacks were perpetrated by renting hash power through NiceHash — a claim that has been confirmed by both NiceHash and ETC Labs. ETC Labs CEO Terry Culver also shared with Cointelegraph that according to the information that was provided by CipherTrace, which was hired to investigate the attacks, the attackers used proceeds from the first attack to rent hashpower for the second attack. The latter cost crypto exchange …
A recent 51% attack that impacted Ethereum Classic (ETC) is believed to have resulted in approximately $5.6 million worth of the cryptocurrency being double-spent. A report published by Aleksey Studnev of blockchain forensics firm Bitquery on August 5 has revealed the extent of the incident, with Bitquery estimating that the attacker made off with 807,260 ETC. The report estimates the hacker reaped more than a 2,800% return for his efforts, having spent roughly 17.5 Bitcoins (BTC) worth $192,000 on renting hash power from Nicehash to execute the attack. The report contradicts initial theories suggesting that the blockchain reorganization may not …
The hashpower rental marketplace NiceHash, which was hacked in Dec. 2017, says it may not be able to fulfill its pledge to fully reimburse affected users. In a blog post published on Dec. 18, NiceHash said its repayment program would be frozen at its current level of 82% successful reimbursement and that its promise to repay 100% of lost funds will not be realized “in the foreseeable future.” No time estimates for possible eventual repayment Established in 2014, NiceHash is a marketplace that brokers between miners and investors, allowing owners of mining hardware to rent out their hash power to …
Microsoft’s Windows Defender Antivirus has blocked an attack of more than 400,000 attempts over a span of 12 hours for trojans to infect users with a cryptocurrency miner, according to a Microsoft blog post on March 7. Windows Defender’s research showed that a little before noon (PST) on March 6, Windows Defender Antivirus began detecting these sophisticated trojans, which are new variants of an application called Dofoil (or Smoke Loader), attempting to inject cryptocurrency mining malwares through “advanced cross-process injection techniques, persistence mechanisms, and evasion methods.” The majority, or 73 percent, of these instances came from Russia, with 18 percent …