Connect with us
AlphaBay administrator spoke about the changes in the new underground AlphaBay administrator spoke about the changes in the new underground

Security

AlphaBay administrator spoke about the changes in the new underground site

Published

on

The revived version of AlphaBay requires users to pay only in Monero cryptocurrency and is available through I2P.

The administrator of the underground marketplace AlphaBay, using the pseudonym DeSnake, is back to work. More than four years ago, the US Department of Justice announced the closure of AlphaBay. Thai police have arrested 26-year-old website administrator Alexander Cazes in Bangkok, and the FBI has seized control of AlphaBay’s central server in Lithuania, neutralizing the underground market. But the fate of one key black market player was never resolved – the second AlphaBay administrator, alias DeSnake.

DeSnake has now relaunched AlphaBay under its leadership. According to the administrator in an interview with WIRED, he left unscathed after the collapse of AlphaBay and intends to revive the former glory of the underground market.

The revived version of AlphaBay requires users to buy and sell goods only with the Monero cryptocurrency, which is much more difficult to trace than Bitcoin. AlphaBay’s dark web site is now accessible not only through Tor, as it used to be, but also through the less popular I2P anonymity system.

DeSnake said his work computers run an “amnesiac” operating system, such as the security-focused Linux distribution Tails, which is not designed for storage. According to the administrator, it does not store any compromising data on hard drives or USB drives, either encrypted or unencrypted. DeSnake has also prepared a USB-based “emergency shutdown” device designed to wipe the memory of his computers and shut them down in seconds if they ever get out of his control.

But all of these technical and operational defenses may be of less importance than geographic. According to DeSnake, he is in a non-extradited country, out of the reach of US law enforcement.

DeSnake wants to attract users with the promise of an as yet untested system, which it calls AlphaGuard. The system allows users to withdraw their funds even if the authorities seize control of AlphaBay’s servers again.

As DeSnake describes, AlphaGuard automatically leases and configures new servers if it detects that AlphaBay is shutting down. The administrator claims that AlphaGuard will automatically hack into other websites and host data on their servers, providing users with “exit codes” that they can use to save the cryptocurrency stored on AlphaBay.

DeSnake is also in the early stages of implementing a fully decentralized market system. In this scheme, programmers and server operators will receive a portion of the profits from the hosting markets, which form a vast dark web without a single point of failure.

Click to comment

Leave a Reply

Your email address will not be published.

Security

Cryptocurrency exchange Binance was robbed of $570 million. Hacker withdrew BNB tokens

Published

on

Cryptocurrency exchange Binance was robbed of 570 million Hacker withdrew

Cryptocurrency exchange Binance has undergone another hacker attack. The attackers managed to withdraw BNB tokens worth about $570 million.

Cryptocurrency exchange Binance was robbed of $570 million.  Hacker withdrew BNB tokens

Somewhat earlier it was reported that the attack allowed the hackers to steal about $110 million, but now it turned out that everything is much worse. At the same time, the specialists of the exchange managed to freeze part of the funds, but we are talking about only 7 million dollars, which is clearly insignificant against the background of 570 million.

The exchange revealed that a cross-chain bridge connected to its BNB chain was attacked, allowing hackers to move BNB tokens off the network. Now the network has been restored, and the clients’ funds, according to Binance, are safe.

The fact of the theft of funds contributed to a sharp drop in the BNB rate by almost 5%, but after a few hours, almost half of the fall was redeemed.

Continue Reading

Security

Hacker who earned $27 million in cyberattacks will spend 20 years in prison and pay $21 million in fines

Published

on

Hacker who earned 27 million in cyberattacks will spend 20

A Florida district court has sentenced 34-year-old IT engineer Sebastien Vashon-Desjardins to 20 years in prison for carrying out at least 90 cyberattacks.

Hacker who earned $27 million in cyberattacks will spend 20 years in prison and pay $21 million in fines

It is noted that for several years of his activity, the hacker, using the NetWalker encryption virus, earned about $ 27 million. A search of Vashon-Desjardins revealed a crypto wallet containing 719 bitcoins, which was about $22 million at the time of the cybercriminal’s arrest in January 2022.

According to investigators, the 34-year-old cybercriminal acted in collusion with other hackers. Vashon-Desjardins himself played the role of an attacker: he infected the corporate networks of various companies with a virus and then demanded a ransom from them. Organizations from the USA, Canada and a number of European countries suffered from the activities of the criminal.

It is noted that, in addition to the prison term, the court also imposed a fine on Vashon-Desjardins in the amount of $ 21 million. Also, the criminal will have to pay compensation to the companies affected by his actions. The amount of damages has not yet been established.

Continue Reading

Components

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

Published

on

Unique behavior of Ryzen 7000 processors The notorious patches from

Recently, various vulnerabilities in processors have been talked about much less often, and users no longer worry about performance degradation due to patches. As it turns out, Ryzen 7000 processors generally benefit from such patches!

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

At least this is true for Linux, since it was in this OS that the author tested the Ryzen 9 7950X and Ryzen 5 7600X. It turned out that when working out of the box, the CPUs show better performance than when loading a special version of Linux with a deactivated patch from the Specter V2 vulnerability.

Unique behavior of Ryzen 7000 processors. The notorious patches from the Specter vulnerability improve the performance of new CPUs

Of course, such results do not appear everywhere, and during normal work they are unlikely to be critical. In particular, in total, according to the results of 190 tests, the difference was only 3%.

Continue Reading

Most Popular