600 Million Dollars In Crypto Currency Stolen By Black Hat Hackers.

megaphone-2

Advisory: Be careful of what you read on social media. The algorithms used by these platforms have no regard for Biblical truth. They target your emotions to keep you engaged on their site so their advertisers can drop more ads. These platforms exist to enrich their stockholders. Consider God’s promise to Believers in James 1:5, “If any of you lacks wisdom, you should ask God, who gives generously to all without finding fault, and it will be given to you.”

Featured Story

In a crime billed as “one of the biggest hacks in history,” hackers stole more than $600 million in cryptocurrency from a gaming-focused blockchain.

The hackers got off with millions of dollars in Ethereum and USD Coin from Ronin, the blockchain that underpins Sky Mavis’ popular crypto game Axie Infinity.

Axie Infinity employs “cutting edge technology called Blockchain to reward players for their engagement,” according to its website, and the totally player-owned economy allows users to “seamlessly sell and trade their game assets for digital cash.”

Axie Infinity’s Ronin network announced in a blog post on March 29 that it had lost 173,600 ethers (Ethereum tokens) worth $589 million, as well as $25.5 million in USD coin, a “stablecoin” that is pegged to the US dollar.

Ronin’s finances are being tracked by the blockchain data platform Chainalysis.

Ronin stated that it is working with law enforcement, forensic cryptographers, and investors to retrieve or compensate all of the stolen monies, and that “all of the AXS, RON, and SLP on Ronin are safe right now,” referring to the game’s other tokens.

The validator nodes for Sky Mavis, Ronin’s and Axie Infinity’s operator, and Axie DAO (a decentralized autonomous organization), according to Ronin’s March 29 blog post, were compromised on March 23.

The attacker “used compromised private keys to fabricate fake withdrawals,” according to Ronin, who detected the problem on March 29 after a user reported being unable to withdraw Ethereum coins from the bridge, which connects Axie Infinity to other blockchains like Ethereum.

The validator nodes in Sky Mavis’ Ronin chain are nine, according to Ronin.

“Five out of the nine validator signatures are required to acknowledge a deposit event or a withdrawal event.” Sky Mavis’ four Ronin validators, as well as a third-party validator run by Axie DAO, were all taken over by the attacker,” Ronin claimed.

The attacker “discovered a backdoor using our gas-free RPC node, which they leveraged to get the signature for the Axie DAO validator,” Ronin added.

As part of the ongoing inquiry, the Ronin bridge and Katana Dex, the Ronin decentralized exchange, have been disabled.

The attack was aided in part by a move taken by the company in November 2021, when “Sky Mavis requested help from the Axie DAO to distribute free transactions owing to a significant user load,” according to Ronin.

“The Axie DAO gave Sky Mavis permission to sign transactions on its behalf.” The allowlist access was not revoked when the service was stopped in December 2021, according to the firm.

Ronin is now in talks with stakeholders from Axie Infinity and Sky Mavis about the next steps and how to “guarantee no users’ monies are wasted.”

Axie Infinity co-founder Jeff Zirlin said “it is one of the bigger hacks in history” during a keynote talk at the NFT LA conference in Los Angeles on March 29, according to CNN.

The sum taken in the most recent attack is similar to that taken in August 2021 in a significant hack of decentralized finance platform Poly Network, which was one of the largest ever digital coin heists at the time. The monies stolen by the hacker were later refunded.

This is only the beginning of a tsunami of cyber infrastructure being prodded at as people inevitably test their skills behind a computer in light of global political unrest. The truth is, cyber security is a cat and mouse game. Vulnerabilities are inherent in these complex systems because they’re built for the end user, and not to prevent people from snooping around in the back end. Most of the cyber infrastructure currently in place could be considered practically naked in terms of cyber security because there are so many ways to exploit data. Why else would China go crazy for data like the leprechaun hoarding lucky charms in the old commercials? It’s valuable and its available; There’s a market for it, and you’re the product. Our complex way of life as a civilization has inadvertently created multiple back doors to be exploited by people more tech savvy than the rest of us. Technology related vulnerabilities can be expected to be magnified and exploited in the coming years for various reasons; political or criminally motivated.

Since 2017, South Korean banks have been targeted to an average of roughly 600 cyberattacks each day, with China being the primary source of attacks, according to the Financial Services Commission of South Korea (FSC).

According to Yonhap News Agency, a recent FSC report released by South Korean National Assembly member Kang Min-Kook revealed that 17 banks in South Korea were subjected to 1,091,606 cyberattacks from 2017 to 2021, averaging 598 attacks per day, with at least a third coming from China.

The FSC data, according to the report, only includes financial institutions that provide retail banking services. If savings banks, insurance firms, and other financial institutions were included, the number of cyberattacks would be far greater.

According to FSC data, foreign IP addresses were responsible for 82.2 percent of cyberattacks, with China accounting for 34.7 percent and the United States accounting for 11.2 percent. The remainder was sourced from India, France, and other nations.

The annual number of cyberattacks climbed by more than fourfold over five years, from 63,000 in 2017 to over 273,000 in 2021.

Despite the repeated cyberattacks, the banks did not experience a significant breach because their internal security measures efficiently stopped harmful code and segregated computer networks, according to the FSC report.

“Despite the fact that there has yet to be a breach,” Kang said, “cyberattacks are on the rise.” “A single breach can result in a massive loss.” The danger must not be underestimated.”

Cyberattacks from China have long been a global worry, with FBI Director Christopher Wray accusing Chinese state-backed hackers of stealing more personal and corporate data in the US than all other countries combined in late January, according to an NPR story.

The Chinese regime was criticized by NATO allies, the European Union, Australia, New Zealand, and Japan in July 2021 for a massive cyberattack on Microsoft Exchange email servers earlier that year.

The committee of MPs and senators in charge of federal security policy has discovered holes in Canada’s cyberdefenses, which might expose several government organizations to state-sponsored hackers from China and Russia.

Cyberthreats to government systems and networks, according to the National Security and Intelligence Committee of Parliamentarians, constitute a substantial concern to Canada’s security and government operations, according to a new report.

Beijing and Moscow are the most sophisticated cyberthreat actors attacking the government, according to the report, while Iran and North Korea are moderately advanced and offer less of a threat.

Although nation states are the most advanced dangers, the committee claims that any actor with harmful intent and technical capability puts the government’s data and electronic infrastructure at risk.

The federal government has established a powerful cyberdefence system to fight this threat during the last decade, according to the report.

However, it is hampered by inconsistencies in policy implementation and the utilization of cyberdefense services throughout government.

The report, which was tabled in Parliament late Monday, is a redacted version of a confidential document that Prime Minister Justin Trudeau received in August.

According to the analysis, governments are extremely appealing targets for cyberattacks.

“The federal government has vast amounts of information about Canadians, corporations, and innovative sectors like universities and research organizations. Cyber breaches of this data might expose sensitive personal information about Canadians and suffocate individual businesses and the economy.”

According to the research, the government also administers international, trade, and security ties through electronic infrastructures that, if hacked, might harm federal policies and jeopardize Canada’s important interests.

It adds to our understanding of the scope of an early attack by a Chinese state-sponsored attacker that served as a “wake-up call” for the federal government.

China attacked 31 departments between August 2010 and August 2011, with eight of them suffering serious concessions. There were significant data losses, including senior government officials’ email conversations and wholesale theft of information from multiple departments, including briefing notes, strategy documents, secret material, and password and file system data.

The study also includes new details of a crippling 2014 cyberattack on the National Research Council, claiming that a Chinese state-sponsored actor utilized its network access to steal over 40,000 files.

“Intellectual property, advanced research, and sensitive business information from NRC’s partners were among the stolen items. China also leveraged its access to the NRC network to infiltrate a number of government organizations.”

According to the report, three entities, the Treasury Board of Canada Secretariat, Shared Services Canada, and the Communications Security Establishment, collaborate closely on federal cyberdefenses, as do other government departments.

Government networks should, in theory, be contained within a single electronic perimeter, with only a few internet access points monitored by sophisticated sensors capable of detecting and blocking known threats.

Departments should update and patch their devices and systems on a regular basis, according to the paper, under the coordinated supervision, counsel, and assistance of the three organizations.

The current cyberdefense system, on the other hand, “has not yet attained this ideal.”

The following are the major flaws:

The Treasury Board’s cyberdefense measures are not enforced uniformly across departments and agencies, leaving government networks vulnerable to cyberattack.

Crown corporations are known targets of state actors, but they are not subject to Treasury Board cyber-related directives or policies, and they are not obligated to obtain cyberdefence services from the government, putting their data at risk; and Cyberdefence services are provided inconsistently, with many agencies not benefiting from Shared Services Canada’s full complement of assistance, for example.

According to the research, “the harm posed by these inadequacies is clear.” “Organizations whose data isn’t safeguarded by the government’s cyber defense system are at serious risk.”

Furthermore, by preserving electronic connectivity to organizations within the cyberdefence framework, unprotected organizations may operate as a “weak link” in the government’s defenses, posing threats to the government as a whole.

The government agreed with the committee’s several suggestions to rectify the flaws in replies provided in the report.

The truth is, nothing is truly secure in terms of cyber security, an old cyber security article from 2009 from NBC details the focal point at which society realized that data and sensitive information will never be safe from hackers with malicious intent.

You can install all the computer virus protection software you want, but if someone is determined to find out who you’re e-mailing, technically they can, security experts say.

And that may be particularly true if that someone — or something — is the federal government.

“There’s a lot you can do to make it hard,” said Charles Miller, the principal security analyst at Independent Security Evaluators, a Maryland-based firm that successfully took over the iPhone a few weeks ago, prompting Apple to release a security patch last week. “If they have the resources of the federal government, they’re going to be able to see what you do no matter what you do.”


President Bush signed into law an expansion of the Foreign Intelligence Surveillance Act, or FISA, which gives the government expanded rights to intercept phone calls and e-mails without warrants as long as the information being intercepted relates to foreign terror intelligence. Democrats and some civil liberties groups have said that the law goes too far.

“You cannot keep things absolutely safe,” Pradeep Khosla, dean of Carnegie Mellon’s college of engineering, told ABCNEWS.com. “The lesson to be learned here is everything can be hacked into — it’s just a matter of time.”

No one man can make sense of this elaborate illusion cast over the common man of society, but collectively we can point out each limitation forced upon us and bring it forward as an injustice to the public. In Matthew 10:34 Jesus says: “Do not think that I have come to bring peace to the earth. I have not come to bring peace, but a sword.” We’re meant to go down preaching the gospel and guiding others to salvation. This could be considered the bravest task a man or woman of faith could undertake, but make no mistake it will bear fruit in the kingdom of heaven. Stay inquisitive in the word of God, and the world around you.

watchman-on-wall

Tagged In

Newsletter

Must Read

Long-Journey-Home-1
One-Thing
Mark-Cahill-Ministries-1
One-Blinding-Vision

Other Sources

USSANews

Latest News

Incredibly Sick, Federally-Funded Experiments Happening Behind Closed Doors in Secret Labs Across America

By StevieRay Hansen | August 22, 2019

Habakkuk asks God how long He is going to allow the wickedness in Judah to go unpunished (1:2-4). Living in the USA, I sometimes feel…

Read More

Paula White Installs Son as Pastor of Her Church; Plans to Plant 3,000 Churches, Start University, For The UN-Godly

By StevieRay Hansen | August 22, 2019

Paula White Should Read The Bible: An obedient woman will not seek to rise up to a position in the Church that God has forbidden.…

Read More

Ex-Google Employee Alleges Hundreds of Conservative Sites Blacklisted, Delivers Evidence to DOJ

By StevieRay Hansen | August 21, 2019

First, a point of clarification: this post is about theological, not political, liberalism. While the two often go hand-in-hand, that is not always the case.…

Read More

Apostasy threatens the Body of Christ today.

By StevieRay Hansen | August 21, 2019

Apostasy, from the Greek word apostasia, means “defiance of an established system or authority; a rebellion; an abandonment or breach of faith.” In the first-century world,…

Read More

A House Divided Cannot Stand, Miss Nevada, Banned from Entering Miss America over Her Support for Trump

By StevieRay Hansen | August 20, 2019

Jesus’ argument to the Pharisees was logical: a kingdom that is at cross-purposes with itself will fall. Any household riven by infighting will tear itself…

Read More
Focused-Protection-1
Place Your Ad Here

We make every effort to acknowledge sources used in our news articles. In a few cases, the sources were lost due to a technological glitch. If you believe we have not given sufficient credit for your source material, please contact us, and we will be more than happy to link to your article.

Bryce Abbott

Leave a Comment