101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

481
active users

#cryptomining

1 post1 participant0 posts today

Exposed JDWP Exploited in the Wild: What Happens When Debug Ports Are Left Open

A routine monitoring by researchers uncovered an exploitation attempt on a honeypot server running TeamCity, a CI/CD tool. The attack exploited an exposed Java Debug Wire Protocol (JDWP) interface, leading to remote code execution, deployment of cryptomining payload, and establishment of multiple persistence mechanisms. The attack was notable for its rapid exploitation, use of a customized XMRig payload, and stealthy crypto-mining techniques. JDWP, designed for debugging Java applications, becomes a high-risk entry point when exposed to the Internet without proper authentication. The attackers used a structured sequence to achieve remote code execution, likely using a variant of jdwp-shellifier. They deployed a dropper script that installed an XMRig miner and set up various persistence mechanisms including boot scripts, systemd services, cron jobs, and shell configuration files.

Pulse ID: 68962f0f91f8829022afff4a
Pulse Link: otx.alienvault.com/pulse/68962
Pulse Author: AlienVault
Created: 2025-08-08 17:08:31

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

LevelBlue Open Threat ExchangeLevelBlue - Open Threat ExchangeLearn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

**Derivation of paths** (path derivation) is a method by which derived keys are created from one master key (for example, in cryptography or blockchain technologies). In simple words, it is like a tree, where each branch grows from the main trunk, and the process of growing itself is a derivation.

bastyon.com/kolibristudio?s=e8

**How it works:**
**root (primary key)**:
You have one master secret key (eg seed phrase or master key).

**Formula for branching**:
A mathematical formula or algorithm (such as HMAC or hashing) is used to generate new keys based on the master key.

**The structure is tree-like**:
Each new key can "branch" into even more keys. The result is a hierarchy where each key can be unique, but they are all related to a primary key.

**Control and security**:

The master key allows you to restore all derived keys.
If someone only gets access to the derived key, they won't be able to get to the master.

**A simple example in life:**
Imagine you have a phone number (master key) and you use it to register on several sites. Each site gets its own unique number (derived key) that is linked to your primary number but not disclosed.

**Where it is used:**
**Cryptocurrencies**:
Wallets like Bitcoin or Ethereum use "hierarchical deterministic derivation" (HD wallets). This allows multiple transaction addresses to be created from a single master key.

**Passwords**:
Password managers can generate unique passwords for each site based on a single master.

**Security**:
Path derivation is often used to generate unique encryption keys in secure systems.

**The main idea:**
Instead of storing many separate keys or passwords, you have one master secret and everything else is generated automatically when needed. It's convenient, safe and effective!

Using crypto wallets from different vendors, sites, and apps requires attention to detail to ensure the security of your assets and privacy. Here's what to consider:

**1. Choosing the type of wallet**
**Hardware wallets**: The most secure option for storing large sums, for example, Ledger, Trezor.
**Software wallets**: Installed on a PC or smartphone (eg Exodus, Trust Wallet).
**Online wallets (web wallets)**: Used through a web browser, but are more vulnerable to attack.
**Paper wallets**: The private key is printed or written down on paper.
**Browser wallets**: For example, MetaMask, which work as plugins.
👉 *Choose a wallet depending on your needs: frequency of use, amount of assets and level of security.*

**2. Reputation of the manufacturer**
Check reviews and ratings.
Use only open-source wallets to ensure transparency.
Avoid unknown or new apps without a proven track record.

**3. Security**
**Saving the seed phrase**: Write it down on paper and never save it electronically (notes, photos, etc.).
**Password**: Use a strong password to access the wallet.
**Two-factor authentication (2FA)**: Enable if available.
**Renewal**: Update your app or wallet firmware regularly to fix vulnerabilities.
**Encryption**: Make sure your wallet encrypts data.

**4. Compatibility**
Make sure the wallet supports the blockchains and cryptocurrencies you want (for example, not all wallets support NFT or DeFi).
Check out the integration with popular decentralized platforms (eg Uniswap, OpenSea).

**5. Backup**
Back up the seed phrase and private keys.
Keep copies in a safe place (such as a safe).
Never entrust your keys to a third party, even if it's a support service.

**6. Confidentiality**
**VPN**: Use a VPN to access your wallet, especially on public networks.
**Anonymity**: Choose wallets that do not collect personal data.
**Beware of phishing**: Always check the website or app address.

**7. Costs and commissions**
Check transaction fees.
Some wallets automatically set high fees to speed up transactions - check this manually.

**8. Technical support**
Research whether the wallet has a reliable support service.
Avoid apps that don't have a clear way of communicating to solve problems.

**9. Verification of counterfeits**
Download applications only from official sites or stores (Google Play, App Store).
Check that the hardware wallet is properly packaged and has no signs of opening.

**10. Work on decentralized platforms**
Always use keys only in trusted decentralized applications.
Avoid connecting your wallet to sites with a dubious reputation.

**Recommendation in practice**
Keep the main part of funds in a hardware wallet.
Use software or browser wallets for daily transactions.
Keep your security knowledge up to date as fraud techniques evolve.

The security of cryptocurrency assets depends only on you, so be careful and careful!
**The importance of testing software on your own PC or device and third-party services**
Testing software, sites and extensions before use is a critical step for security **security**, **stability** and **convenience of work**. It helps to avoid risks that could lead to the loss of data, finances or confidential information.

**1. Data security**
**Detection of malicious software**: Some software or extensions may contain viruses, trojans or backdoors that open access to your system to attackers.
**Avoiding phishing**: Third-party services can copy famous brands to steal your passwords, keys, or other sensitive information.
**Recommendations:**
Use antivirus programs and utilities to analyze malicious code.
Download programs only from official sources.

**2. Compatibility**
Some software may conflict with pre-installed programs or your operating system.
Improper operation can lead to crashes, "blue screen" or freezes.
**Recommendations:**
Test new software in a secure environment (for example, in a virtual machine or an isolated session).
Check the software system requirements before installing.

**3. Functionality check**
Not all programs or extensions work as promised by the manufacturer.
Incorrect work can lead to loss of important data or failure to perform necessary tasks.
**Recommendations:**
Test key features in test mode.
Read user reviews to learn about possible problems.

**4. Confidentiality**
Some apps may collect your data without your knowledge.
This is especially dangerous for crypto wallets, where even a minimal vulnerability can lead to asset theft.
**Recommendations:**
Analyze what permissions the software requires (for example, access to the camera, microphone or contacts).
Use network activity monitoring to detect suspicious connections.

**5. Reliability of third-party services (sites, API)**
Accessing an untrusted service can end up with your credentials being stolen or your system infected.
Sites with a dubious reputation often become a source of attacks, such as mining scripts or resource theft.
**Recommendations:**
Use it **VPN** to protect your IP address from being tracked.
Transfer confidential data only through services with HTTPS.

**6. Saving resources and time**
Inappropriate software or plugins can use too many system resources, which slows down your device.
This also applies to third-party services that may create "extra" requests or cause disruptions in your network.
**Recommendations:**
Measure resource consumption during testing (CPU, RAM, Internet).
Avoid installing a lot of untested software.

**7. Ease of recovery in case of failure**
New software may corrupt your settings or important data.
Third-party services may change the format of your files or their structure.
**Recommendations:**
Make backup copies before installing or using new software.
Create system restore checkpoints.

**Practical tips for testing**
**Testing environment:
** Use a separate device, virtual machine or sandbox to test new software.

**Monitoring:

**
Analyze application network activity through tools such as Wireshark or GlassWire.
Install a program that monitors changes in the registry or system files.
**Browser extensions:

**
Install extensions only from official stores (Chrome Web Store, Mozilla Add-ons).
Check the extension regularly for updates and changes to the privacy policy.
**Regular checks:
** Use utilities such as Malwarebytes, Norton or Kaspersky to check the system for vulnerabilities.

Testing all software and services allows you to avoid most problems and ensures maximum efficiency of your equipment.

This is a really important point: not all tools, even those considered "core" (Core tools, nodes or built-in wallets), have the functionality you can expect by default. Here is what should be understood and taken into account:

**1. Limitation of the Core toolkit**
**Not all features are available out of the box**: For example, Bitcoin Core allows full synchronization with the network, but does not have a convenient interface for integration with other services.
**Specific needs**: Core nodes can be focused on narrow tasks (for example, block verification only), without additional features such as multi-signature support or DeFi.
**Example**:
An Ethereum Geth node may not support functionality that modern dApps require (for example, optimized requests to the blockchain via RPC).

**2. Wallets with built-in functionality, but with limitations**
**Limited access to assets**: For example, some wallets only support standard tokens (ERC-20, BEP-20) but cannot work with NFT or L2 solutions.
**Incomplete integration**: Wallets built into nodes may not have a user-friendly GUI or backup capabilities.
**Example**:
The Bitcoin Core wallet supports only basic transactions and does not provide convenient means for managing complex functions such as multi-signatures or managing multiple addresses.

**3. Lack of automation and convenience**
**Manual setting**: Core tools often require manual configuration (eg configuration file, startup options).
**Basic UX/UI**: GUIs are usually not a priority for developers of Core solutions, which makes them difficult to use for average users.

**4. Lack of integration with other tools**
Most Core solutions do not have built-in tools for integration with dApps, analytics services or APIs for third-party applications.
Some wallets or nodes do not support modern standards (such as SegWit or Taproot for Bitcoin).

**5. High requirements for resources**
**Data size**: A full node can require hundreds of gigabytes of disk space (like Bitcoin Core or Ethereum).
**System resources**: Node operation may be too heavy for devices with limited power.

**How to choose the optimal tool?**
**Functional research:

**
Study the documentation and the tool's capabilities before using it.
Understand what features you really need (like L2, token or DeFi support).
**Expansion of possibilities:

**
Use additional tools on top of Core solutions (e.g. Lightning Network for Bitcoin, Infura for Ethereum).
Integrate third-party wallets or services to expand functionality.
**Automation:

**
Add scripts or automation to simplify routine tasks.
**Compatibility check:

**
Make sure the tool supports your tasks (tokens, addresses, standards).
Update your nodes or wallets regularly to get new features and bug fixes.

**Recommendations for users**
If you only need basic features, use proven wallets with easy access (eg Exodus, Trust Wallet).
For professional blockchain work, choose Core nodes, but be prepared for a more complex setup.
For a hybrid approach (partial control and API integration), use services like Alchemy or Infura.
Core tools provide fundamental capabilities, but require additional work to meet modern user needs.

Here is a link to support the project for donors and philanthropists:
🌍** Support the project:**
Kolibri Studio Donate Page
📥** Contact for philanthropists:**
Telegram of the editorial team
Matrix: Future-Tech Community
Your contributions help develop the project, support its initiatives and create new solutions for the community. Thank you for your support! 🌟

**List of literature and resources for independent study**
**Books:

**
"Blockchain Basics: A Non-Technical Introduction in 25 Steps" by Daniel Dressler
"Mastering Bitcoin" - Andreas M. Antonopoulos
"Mastering Ethereum" - Andreas M. Antonopoulos, Gavin Wood
"The Internet of Money" - Andreas M. Antonopoulos
**Scientific articles and materials:

**
Nakamoto S. (2008).*Bitcoin: A Peer-to-Peer Electronic Cash System*.
Wood G. (2014). *Ethereum: A Secure Decentralised Generalised Transaction Ledger*.
Vitalik Buterin (2021). *Ethereum Whitepaper*.
**Online resources:

**
Bitcoin.org — The official Bitcoin resource
Ethereum.org — Ethereum documentation
CoinMarketCap — Analytics of cryptocurrencies
Binance Academy — Educational materials
**Forums and communities:

**
Bitcointalk — Forum about cryptocurrencies
Reddit (r/cryptocurrency) — Discussions about the crypto world
Ethereum StackExchange — Answers to technical questions
**Tools and services:

**
Etherscan — Ethereum Blockchain Scanner
Blockchain.com Explorer — Scanner for Bitcoin and other blockchains
MyCrypto — Wallet for Ethereum
Fat — Infrastructure for working with blockchains

**Hashtags for promotion in social networks**
#Blockchain #Cryptocurrency #Bitcoin #Ethereum #Decentralisation #CryptoEducation #BigData #Web3 #OpenSource #CryptoMining #FutureTech #FinTech #CryptoSecurity #SmartContracts #DigitalTransformation
This list will help you navigate the topic of blockchains, cryptocurrencies and decentralized technologies.

kolibristudiopro.blogspot.com/

Donate Page List Wallet Address
kolibristudiopro.blogspot.com/

Illustration: Біткоїн Ренесанс: Як Layer 2 Біткоїна Можуть Відродити Біткоїн - Bitcoin News
news.bitcoin.com/uk/bitkoin-re

**Verthash One Click Miner: Поддержка Украины и Криптовалютный Майнинг**
**Обзор проекта**
Verthash One Click Miner — это программное обеспечение с открытым исходным кодом, разработанное для упрощения процесса майнинга криптовалюты Vertcoin. Основная цель проекта — сделать майнинг доступным для широкого круга пользователей. Программа автоматически создает Dogecoin-кошелек и позволяет получать выплаты в этой криптовалюте после успешного майнинга Vertcoin.
Заметной особенностью в недавней версии Verthash One Click Miner стала возможность делать пожертвования в поддержку Украины через Dogecoin. Эта функция выделена сообщением **Stand With Ukraine**, что делает её важной частью обновления программного обеспечения.
### Ключевые особенности проекта:
1. **Verthash One Click Miner**:
- Программное обеспечение разработано для майнинга Vertcoin с минимальными техническими знаниями.
- Интеграция с Dogecoin позволяет получать выплаты в этой криптовалюте.
2. **Механизм пожертвований**:
- В версии с функцией **Stand With Ukraine** пользователям предоставляется возможность поддержать Украину, делая пожертвования через Dogecoin. Это придает процессу майнинга социальную значимость и побуждает пользователей направлять свои заработки на гуманитарные цели или поддержку армии Украины.
3. **Дополнительные функции**:
- Поддержка других криптовалют через сервисы Zergpool и zpool.
- Сниженные комиссии в сети Dogecoin (менее 0.001 DOGE).
- В обновленной версии добавлено исправление для более точного расчета ожидаемой прибыли после сокращения эмиссии VTC.
### Разработчики и мейнтейнеры
Главным разработчиком и мейнтейнером Verthash One Click Miner является пользователь GitHub под псевдонимом **vertiond**. Он отвечает за поддержку и обновление проекта, добавление новых функций и исправление ошибок. Также другие участники сообщества активно вносят свой вклад, предлагая улучшения и исправления через pull-запросы на GitHub.
### Хэштеги для социальных сетей:
- #Vertcoin
- #Verthash
- #OneClickMiner
- #CryptoMining
- #OpenSource
- #StandWithUkraine
### Официальные ресурсы:
- **Официальный сайт Vertcoin**: [vertcoin.org](vertcoin.org/)
- **Скачивание Verthash One Click Miner**: [vertcoin.org/download-miner](https://vertcoin.org/download-miner)
- **Репозиторий на GitHub**: [github.com/vertiond/verthash-one-click-miner](https://github.com/vertiond/verthash-one-click-miner)
- **Сообщество Vertcoin в Discord**: [Vertcoin Discord](discord.gg/vertcoin)
Verthash One Click Miner — это яркий пример того, как криптовалютные проекты могут быть адаптированы для поддержки глобальных социальных инициатив, таких как помощь Украине во время войны. Это программное обеспечение объединяет мир технологий с социальной ответственностью, давая пользователям возможность не только зарабатывать, но и вносить вклад в важное дело.

**Verthash One Click Miner: Support for Ukraine and Cryptocurrency Mining** - lemm.ee
lemm.ee/post/46969758

VertcoinVertcoin

North Texas community says crypto-mining facility brings never-ending noise, declining health - CBS Texas

cbsnews.com/texas/news/north-t

A rural Hood County community claims a crypto-mining facility replaced the peaceful quiet with constant noise.

#Crypto #Cryptocurrencies #Bitcoin #Cryptomining: "Bitcoin mining earns you half as many bitcoins every four years. The reward for mining a block of transactions started at 50 bitcoins in 2009. It dropped to 25 bitcoins in 2012, 12.5 in 2016, and 6.25 in 2020. Sometime in May 2024, the block reward will drop to 3.125 BTC.

“Halvening” is a silly bitcoin neologism for when the block reward — the amount of newly minted bitcoin a miner receives every time they mine a new block — halves.

To understand the “halvening,” you need to know about two things:

- The practical problems for bitcoin miners when half their income suddenly vanishes;
- A whole mythology of inane gibberish."

amycastor.com/2024/02/21/the-h

Amy Castor · The ‘halvening’ is coming — what this means for bitcoinThere can only ever be 21 million bitcoin memes.

For the past year, previously unknown self-replicating malware has been compromising Linux devices around the world and installing cryptomining malware that takes unusual steps to conceal its inner workings

#linux #malware #cryptomining #mirai
tchlp.com/3SdrO5k

Ars Technica · Linux devices are under attack by a never-before-seen wormBased on Mirai malware, self-replicating NoaBot installs cryptomining app on infected devices.

World media write about our Polish Supreme Administrative Court, specifically about a cryptocurrency mine hidden in its ventilation channel 😂 Funny thing is that shortcut of the polish name of this court is NSA, so the title of this article could be „Illegal cryptomining hardware found in NSA” 😂
———
Massive #cryptomining rig discovered under #Polish court’s floor, stealing power #TDBNews
arstechnica.com/tech-policy/20

Ars Technica · Massive cryptomining rig discovered under Polish court’s floor, stealing powerTop law enforcement agency taps IT experts to calculate stolen energy costs.

📨 Latest issue of my curated #cybersecurity and #infosec list of resources for week #45/2023 is out! It includes the following and much more:

🔓 ✈️ #Boeing breach: LockBit leaks 50 GB of data
🇨🇳 World’s largest commercial bank #ICBC confirms #ransomware attack
🔓 ☁️ Sumo Logic alerts customers about #securityincident; advises rotate Sumo Logic API access keys
🔓 🇮🇪 Electric Ireland admits data breach that could see customer financial data compromised
🔓 🇨🇦 #TransForm says ransomware data breach affects 267,000 patients
🔓 🇸🇬 #Singapore Marina Bay Sands reward members data breached, over 650k people exposed
🇮🇱 🇵🇸 🇮🇷 Cyber ops linked to #Israel-#Hamas conflict largely improvised, researchers say
🧨 🤖 #OpenAI confirms #DDoS attacks behind ongoing #ChatGPT outages
🛍️ 💸 Fake Ledger Live app in #Microsoft Store steals $768,000 in #crypto
🔓 🐰 ‘Looney Tunables’ #Glibc Vulnerability Exploited in #Cloud Attacks
🇺🇸 🇷🇺 US Sanctions Russian National for Helping Ransomware Groups Launder Money
🇮🇷 🇮🇱 Iranian Hackers Launch Destructive Cyber Attacks on Israeli #Tech and #Education Sectors
🇫🇷 🇬🇧 #France, #UK Seek Greater Regulation of Commercial #Spyware
🇪🇺 🤐 #Europe is trading security for digital #sovereignty
🇷🇺 🇺🇦 Russian Hackers Used #OT Attack to Disrupt Power in #Ukraine Amid Mass Missile Strikes
🦠 🚪 Highly invasive #backdoor snuck into #opensource packages targets developers
🦠 🇰🇵 N. Korea's #BlueNoroff Blamed for Hacking #macOS Machines with ObjCShellz #Malware
🫣 #Signal tests usernames that keep your phone number private
🔐 Microsoft Authenticator now blocks suspicious #MFA alerts by default
☁️ 💰 Researchers Uncover Undetectable #CryptoMining Technique on #Azure Automation
👥 💰 Data Brokers Expose Sensitive US Military Member Info to Foreign Threat Actors: Study
🩹 Microsoft Says Exchange ‘Zero Days’ Disclosed by #ZDI Already Patched or Not Urgent
🐛 Veeam warns of critical bugs in #Veeam ONE monitoring platform

📚 This week's recommended reading is: "How the F*ck Did This Happen?: A guide for executives who need to understand Cyber Security in plain, actionable language" by Dr Darryl Carlton

Subscribe to the #infosecMASHUP newsletter to have it piping hot in your inbox every week-end ⬇️

infosec-mashup.santolaria.net/

X’s Infosec Newsletter · InfoSec MASHUP - Week 45/2023By Xavier «X» Santolaria