Skip to content

xpool.eu

crypto news aggregator

Cryptosecurity Cyberattack Malware

New Malware Hijacks Crypto Wallets Using Captcha Deceptions

Posted on: May 30, 2025

A new type of malware called EDDIESTEALER has been discovered, posing a serious threat to cryptocurrency users’ security. Developed using the Rust programming language, this sophisticated attack leverages […]

Cryptocurrency Dero Malware

Crypto Mining Malware Exploits Docker, Attacks Privacy Coin Dero

Posted on: May 29, 2025

A new Linux malware is targeting vulnerable Docker infrastructures worldwide, turning them into decentralized mining networks for privacy coin Dero. The self-replicating malware exploits unauthenticated Docker API access […]

Cryptocurrency Malware Security

macOS Users at Risk: New Malware Steals Cryptocurrency from Ledger Live App

Posted on: May 23, 2025

A sophisticated malware campaign targeting macOS users with cryptocurrency holdings has emerged, using a fake version of the popular Ledger Live application to steal valuable cryptocurrency wallet seed […]

Cryptocurrency Cybersecurity Malware

Cybercriminals Target macOS Users With Phishing Attacks Using Fake Ledger Live Apps

Posted on: May 23, 2025

Cybercriminals are exploiting the popularity of cryptocurrency wallets, specifically those using Ledger Live on macOS devices, by creating fake applications to steal users’ sensitive data. A cybersecurity firm, […]

Cryptocurrency Cybersecurity Malware

Crypto Theft via Fake Ledger Live App On Rise

Posted on: May 23, 2025

A growing cybersecurity threat targets macOS users, with hackers increasingly leveraging fake versions of the popular Ledger Live app to steal seed phrases and drain crypto wallets. A […]

Cybersecurity Malware Microsoft

Microsoft Dismantses Major Cybercriminal Operation Targeting Lumma Malware

Posted on: May 22, 2025

Tech giant Microsoft has taken decisive action against the “Lumma Stealer,” a powerful malware tool that has silently compromised hundreds of thousands of computers worldwide. In a recent […]

Cryptosecurity Cybercrime Malware

Law Enforcement Dismantles Cybercrime Operation Targeting Crypto Users

Posted on: May 22, 2025

A significant operation involving international cybercrime units has resulted in the takedown of multiple domains associated with LUMMAc2, a sophisticated malware known for stealing cryptocurrency seed phrases from […]

Cryptocurrency Cybersecurity Malware

DOJ & Microsoft Shut Down Key Cryptocurrency Malware Network

Posted on: May 22, 2025

A joint effort by the Department of Justice (DOJ), Microsoft, and other private sector partners has taken down LummaC2, a widely-used malware service responsible for stealing sensitive information […]

Cryptocurrency Cybersecurity Malware

US DOJ Dismantles LummaC2 Malware Network, Impacting Millions in Cryptocurrency Losses

Posted on: May 22, 2025

The US Department of Justice (DOJ) has taken a significant step in combating cybercrime, seizing the infrastructure of the LummaC2 malware network responsible for stealing sensitive financial information […]

Cryptocurrency Cybersecurity Malware

Microsoft Takes Legal Action Against Lumma Stealer Malware

Posted on: May 22, 2025

Tech giant Microsoft has initiated legal action against Lumma Stealer, a highly sophisticated malware program known for stealing sensitive information like passwords, credit card details, and even crypto […]

Cryptocurrency Cybersecurity Malware

Global Action Dismantles Lumma Malware Infrastructure Targeting Cryptocurrency Wallets

Posted on: May 22, 2025

A coordinated global operation has neutralized the LummaC2 malware, which was targeting cryptocurrency wallets and causing significant disruptions in the financial sector. 2,300 malicious domains were seized as […]

Cryptocurrency Lumma Malware

Microsoft Dismantles Major Crypto Theft Operation: Lumma Malware Hit 394,000 Windows Devices

Posted on: May 21, 2025

A powerful cybercriminal tool known as Lumma Stealer has been disabled by Microsoft in a coordinated effort with international law enforcement agencies. The malware was responsible for infecting […]

Bitcoin Cryptocurrency Malware

Procolored Printer Malware Steals $100,000 in Bitcoin

Posted on: May 19, 2025

A new malware threat has emerged, with Procolored’s printer drivers being identified as responsible for stealing over $100,000 worth of Bitcoin. The malicious code used a remote access […]

Bitcoin Cryptosecurity Malware

Bitcoin Malware in Printer Drivers Leads to $950,000 Theft

Posted on: May 19, 2025

A new cybersecurity incident reveals the theft of over 9.3 Bitcoin (BTC), valued at more than $950,000, through a malware attack targeting Procolored printer drivers. This vulnerability allowed […]

Bitcoin Malware Procolored

Bitcoin Stealing Malware Found in Procolored Printer Drivers

Posted on: May 19, 2025

A Chinese printer manufacturer, Procolored, has been accused of distributing a Bitcoin-stealing malware alongside its official drivers. The company reportedly distributed the malicious software through USB drivers and […]

Posts pagination

Page 1 Page 2 Page 3 Next page

#BTC AI Altcoin Altcoins Binance Bitcoin Blockchain BlockDAG Cardano Coinbase Crypto Cryptocurrency Crypto Market Crypto Regulation DeFi Dogecoin ETF Ethereum Finance Fintech Investment MAGACOINFINANCE Market Analysis Market Trends Market Volatility Meme Coins Pi Network Presale Price Prediction Qubetics Regulation Ripple SEC Security Shiba Inu Solana Stablecoin Stablecoins SUI Tariffs Technical Analysis Trading Trump Web3 XRP

Copyright © 2025 xpool.eu
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}