security Archives - TuxCare

U.S. Seizes $30 Million Worth of Crypto from North Korean Hackers

Chainalysis, a U.S. company, said it had worked with the FBI to recover more than $30 million in cryptocurrency stolen from online video game maker Axie Infinity by North Korea-linked Lazarus Group, marking the first time digital assets seized by the malicious attacker have been recovered.

The amount recovered is just a percentage of the estimated $600 million that the FBI alleges North Korean hackers stole from the makers of a popular video game that allows users to earn digital currency.

“The seizures represent approximately 10% of the total funds stolen from Axie Infinity (accounting for price differences between time stolen and seized), and demonstrate that it is becoming more difficult for bad actors to successfully cash out their ill-gotten crypto gains,” Erin Plante, senior director of investigations at Chainalysis said.

Plante, Chainalysis’ lead investigator said the seizure, which will not be the last, is a significant development for law enforcement, and investigators are working hard to seize the remaining loot.

According to Plante, the chain analysis was involved in the seizures, using “advanced tracking techniques to track stolen funds to withdraw ATMs, and working with law enforcement and industry stakeholders to quickly freeze funds.”

The Lazarus Group had access to five of the nine private keys owned by transaction validators for Ronin Network’s cross-chain bridge. Subsequently, the group facilitated two withdrawal transactions: one for 173,600 Ether (ETH) and the other for $25.5 million Coin USDC, noting that the Lazarus group pocketed these funds using “over 12,000 different crypto addressees to date.” Chainalysis stated the stolen ETH coins were mixed in batches with the popular Tornado Cash mixed service.

The sources for this piece include an article in TheHackerNews.

Steps to Recover Lost and Deleted Data in Linux

Losing files can generally be a painful experience, especially when it comes to a lot of vital information and Linux users are not exempted. Often, when these files are deleted, they cannot be recovered because people do not have the technical know-how to deal with them.

It is however possible to recover files. To recover deleted or lost files, illustration is needed. For example, a file ‘linuxshelltips’ on removable media (/dev/sdb5) on our Linux system at (/media/dnyce/117137A85FFD287C) partition was deleted and needs to be restored.

It is possible to recover deleted files in Linux with TestDisk Data Recovery Tool. Not only is the tool effective in recovering lost data, it can also be used to restore corrupted file systems in a Linux environment.

TestDisk Data Recovery Tool can be installed on major Linux distributions. Once installed, it is important to switch to the root user account and start TestDisk and press [Enter] on the highlighted option that says “Create a new log file.”

Once the action has been taken, users will receive a list of all the hard disk devices present on their systems. They can then navigate to the device from which they want to recover their lost data.

The next action is to use the keyboard arrow keys and navigate to the [Proceed] menu option at the bottom of the drive list.

Although TestDisk tends to highlight the most practical option, users are advised to select the default option for the partition table by pressing [Enter] on the keyboard, then clicking on the [Advanced] option and pressing [Enter] on the keyboard.

After that, users can navigate to the partition option, which displays the [Undelete] option at the bottom of the terminal window, and press [Enter] on their keyboard.

After the action, the deleted linuxshelltips file is restored.

Users who wish to recover more than one file are advised to use the keyboard key [a] to select/deselect them. To copy multiple selected files, it is recommended to use the keyboard key [c].

The sources for this piece include an article in Linuxshelltips.

The Safest Browsers for Linux Users

Security remains a top priority for Linux users worldwide. Apart from security, users are interested in browsers that can guarantee privacy. especially in a world where third-party applications and social media platforms use their data secretly and without consent.

While many users want secure browsers that will keep them safe and prevent their browsers from being tampered with by third parties and cyberattacks, many are unaware of the browsers that can guarantee their security.

Linux is an operating system. An operating system is software that manages all hardware resources connected to a desktop or laptop.

Among the best browsers for Linux users that can offer maximum security are Ungoogled Chromium, GoLogin, Brave, Vivaldi, and Tor.

Ungoogled Chromium is an open source version of Google Chrome that offers Linux users independence from Google’s web services (Google Hotwording, Host Detector, URLs, tracking, Sage Browsing, etc), replaces Google’s web services with open source alternatives, blocks all pop-up windows in all tabs, and removes and replaces with custom alternatives binaries from source codes.

GoLogin is an anti-detect borrower that allows users to use multiple accounts at the same time. It offers a number of advantages, including the separation of customized profiles for each account, control of digital fingerprint, suitable for teamwork, anonymous surfing, installation on an unlimited number of devices, access to the TOR VPN network and free proxies’ inclusion.

Brave Browser provides users with a VPN to change their IP address. It also offers some other benefits, including the end of tracking and invasive advertising on every website visited, separation of incognito windows with private search, blocking cookies and reducing digital fingerprints, protecting users from malware and phishing, the anonymous browsing option on the Internet, and others.

Vivaldi can customize all settings to increase user security. Other advantages include blocking tracking, blocking all add-ons without extensions and plugins, regular updates, a user-friendly interface similar to Chromium, no recording of the user’s personal data by Vivaldi itself, end-to-end encryption for synchronized days, and others.

Tor offers remarkable benefits for all Linux distributions. Tor offers hefty benefits such as torrent prevention, user-friendly anonymous browsing, tracking protection, the ability to change geolocation and avoid censorship, and the ability to access the dark web.

The sources for this piece include an article in LINUXSTANS.

Linux Server Security Best Practices in 2020

Linux Server Security Best Practices in 2020Whether your system is running in a local office or remotely in a data center, security is vital to any environment. Unfortunately, there are often considerable security concerns associated with Linux servers. More and more systems become compromised on a daily basis. And vast amounts of users are unaware that proactive server security measures are required to thwart exposure. It is essential to comply with best practices for Linux security to protect your servers from vulnerabilities and threats.

Continue reading “Linux Server Security Best Practices in 2020”

Resources

State of Enterprise Linux Cybersecurity ... Read More State of Enterprise Linux Cybersecurity ...
Dangerous remotely exploitable vulnerability ... Read More Dangerous remotely exploitable vulnerability ...
Securing confidential research data ... Read More Securing confidential research data ...
State of Enterprise Vulnerability Detection ... Read More State of Enterprise Vulnerability Detection ...
Demand for Rapid Risk Elimination for ... Read More Demand for Rapid Risk Elimination for ...
TuxCare Free Raspberry Pi Patching Read More TuxCare Free Raspberry Pi Patching