Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
UtiliaCS 320x100
970x20 Itcentric

Author: Redazione RHC

$14.5 billion stolen from LuBian! It’s the largest cryptocurrency theft in history.

In December 2020, the Chinese mining pool LuBian, which at the time occupied nearly 6% of the total Bitcoin network capacity, was the victim of an attack whose full extent has only now been revealed. The Arkham Intelligence team discovered that 127,426 BTC were withdrawn from the pool’s wallets: at the time, the amount was $3.5 billion, while its value is now estimated at $14.5 billion. This makes the incident the largest cryptocurrency theft in history, even before the infamous Mt. Gox hack. There have been no official statements from LuBian or the attackers in the past four years. Only by analyzing

Companies Go Bankrupt Due to Ransomware! Einhaus Group Shuts Down, Serving as a Warning to Everyone

We discussed this in an article on the topic some time ago written by Massimiliano Brolli. Today, cybersecurity is no longer an option or an ancillary value: it is a true business enabler. We live in a context in which a ransomware attack can completely paralyze a company, compromise its reputation, and, in the most serious cases, lead to bankruptcy. Today we’ll talk about another story, another company that didn’t make it and went bankrupt after fighting a devastating cyber attack to the last. The large German company Einhaus Group, specializing in insurance and mobile phone services, has announced the initiation of

The Ransomware Nightmare Gets Worse: “We Know Where Your Kids Live.” The New Frontier of Cybercrime

A ransomware expert has revealed that criminal hackers are increasingly threatening physical violence against targeted company employees and their families, to force victim organizations to pay ransoms. According to a survey conducted by Censuswide on behalf of Semperis of 1,500 cybersecurity and IT professionals, the most common methods of applying pressure by attackers are still traditional ones, including locking down systems (52%) and destroying data (63%). Nearly half of the professionals surveyed (47%) from across several countries reported that attackers also threatened to file a complaint against them with regulators and inform them that the company was trying to hide information about

Chinese-Made Digital Espionage: APT41 Uses SharePoint to Infiltrate African Governments

The Chinese-linked cyber group APT41 has launched a new espionage operation targeting government IT services in Africa, an unexpected turn of events for a region previously considered an unlikely target. Kaspersky Lab specialists identified the attack after detecting suspicious activity on workstations of an unidentified organization. The attackers used remote administration tools and executed commands to ensure the availability of their control servers within the compromised network. It was later revealed that the entry point was an untraceable host, where the Impacket framework, including the Atexec and WmiExec modules, was launched under a service account. After execution, the attackers temporarily halted their

Cyborg Cockroaches: Singapore hosts the world’s first mass-produced cyborg cockroach.

Scientists from Nanyang Technological University, together with Japanese colleagues, have created the world’s first robotic line for the mass production of cyborg cockroaches. This has made it possible to abandon the complex manual production of miniature cybernetic organisms and move towards standardized products with more stable characteristics. These advantages bring the use of swarms of cyborg insects closer to the field for inspection, reconnaissance, and disaster relief. One of the main factors of interest in cyborg insects is their high autonomy: modern batteries do not yet offer sufficient capacity in a compact size. A well-fed cockroach can travel greater distances and for

AI is hungry for energy! HyperGrid, the largest private nuclear complex, is underway.

Fermi America has signed a memorandum of understanding with Hyundai Engineering & Construction (Hyundai E&C) to design and build the nuclear portion of a large-scale private energy infrastructure project aimed at powering next-generation artificial intelligence in Texas. The facility, called HyperGrid, will be built near Amarillo and developed in collaboration with the Texas Tech University system. According to the plan, HyperGrid will be the first private campus in the United States to combine multiple energy sources simultaneously: the largest private nuclear complex in the country, the most powerful combined-cycle gas turbine power plant, plus solar panels, batteries, and an external power grid.

“Vibe Coding” for Malware! A Malicious AI-Created Package Appears on NPM

Researchers have identified a new threat in the npm ecosystem: a malicious AI-generated package called @kodane/patch-manager, designed to steal cryptocurrency. Presented as a library for “advanced license control and registry optimization for high-performance Node.js applications,” it was uploaded by a user named Kodane on July 28, 2025, and downloaded more than 1,500 times before being removed from the public registry. According to Safety, a company specializing in software supply chain protection, the malicious activity is embedded directly in the source code and disguises itself as “advanced stealth wallet emptying.” The infection occurs in the postinstall phase, where the script automatically executes immediately

What is spyware: how it works and how it affects. The complete guide.

Spyware is malware (malicious programs) designed to infiltrate users’ computer systems to monitor their activities and collect personal information. These programs can be installed on devices without the user’s consent and can cause serious damage to privacy and security. In this article, we’ll explain how spyware can infiltrate our devices and what the signs are that indicate its presence. Next, we’ll provide some tips on how to protect our devices from spyware and understand the most common types of spyware, as well as government spyware. By reading this article, readers will gain a greater understanding of the risks of spyware and the

Discovering Wipers: The Silent Threat That Ruthlessly Destroys Data

Wider malware (in Italian “eliminator” or “deleter”) is a type of malicious software designed to destroy or “erase” data and files on the computer systems it infects. Unlike other types of malware such as viruses or Trojans, wipers do not seek to infect as many computers as possible or steal sensitive data; their primary goal is data destruction. Widers can act in various ways: for example, they can overwrite data on hard drives or storage devices, preventing access to the original files; they can delete system files or critical parts of the operating system, rendering the system unusable; They can completely erase

What are Remote Access Trojans (RATs): The menacing shadow behind spam emails

Remote Access Trojans (RATs), or Remote Access Trojans, are a category of malware. They are designed to allow attackers to remotely control an infected device. This malware is particularly dangerous because it gives attackers complete access to the compromised system. It allows them to perform a wide range of malicious activities without the user’s consent or knowledge. In this article, we’ll learn how this powerful malware is often used as a landing point for an infection. Next, we’ll understand how this tool is used to distribute further malware. What are Remote Access Trojans (RATs) RATs are a category of malware designed to