SgxSpectre Attack Can Extract Data from Intel SGX Enclaves Banking Trojan Found in Over 40 Models of Low-Cost Android Smartphones New DDoS Record Set at 1.3 Tbps Thanks to Memcached Servers The Week in Ransomware – March 2nd 2018 – GandCrab Decrypted, RaaS, and More Researchers Find 34,200 Vulnerable Ethereum Smart Contracts Some Memcached DDoS Attackers Are Asking for a Ransom Demand in Monero Virus Knocks Out Cash Registers at Tim Hortons Franchisees InsaneCrypt (desuCrypt) Decrypter Remove the Page Timer Search Hijacking Chrome Extension Remove the Safestsearches.com Search Redirect How to Remove Kotcatk.com Advertisements Remove the Kotcatkcomksz Adware Remove Security Tool and SecurityTool (Uninstall Guide) How to remove Antivirus 2009 (Uninstall Instructions) How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller Locky Ransomware Information, Help Guide, and FAQ CryptoLocker Ransomware Information Guide and FAQ CryptorBit and HowDecrypt Information Guide and FAQ CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ How to Rename a Hyper-V Virtual Machine using PowerShell & Hyper-V Manager How to Install Hyper-V in Windows 10 How to Enable CPU Virtualization in Your Computer’s BIOS How to open a Windows 10 Elevated Command Prompt How to start Windows in Safe Mode How to remove a Trojan, Virus, Worm, or other Malware How to show hidden files in Windows 7 How to see hidden files in Windows A scan of nearly one million Ethereum smart contracts has identified 34,200 vulnerable contracts that can be exploited to steal Ether, and even freeze or delete assets in contracts the attackers don’t own. For the average user not familiar with the world of cryptocurrencies, smart contracts are a set of coded operations that get executed automatically when someone sends an input to the contract.

Here’s a basic example of how a smart contract can look like: Smart contracts are one of the reasons why the Ethereum network and its cryptocurerncy —Ether— are so popular. Smart contracts is what powers most of today’s ICOs, but they also run various other Ethereum-based services and tools.

But smart contracts and are just like any other piece of code, and may sometimes contain vulnerabilities and bugs that can be exploited. A hacker exploited one such bug in the summer of 2016 to steal over $50 million worth of Ether from TheDAO organization.

That bug prompted researchers from National University of Singapore (NUS) to start looking for bugs in Ethereum smart contracts. In 2016, they created a tool named Oyente that could scan Ethereum smart contracts for bugs. They initially used Oyente to analyze 19,366 Ethereum smart contracts, discovering that 8,833 were vulnerable.

That research didn’t get too much media attention at the time, and the research team’s warning regarding the manner in which most smart contracts were being coded landed on deaf ears. However, the research team turned its attention back to scanning vulnerable Ethereum smart contracts last fall when, yet again, someone exploited a smart contract bug to mess with users’ Ether funds. Read more from bleepingcomputer.com…

thumbnail courtesy of bleepingcomputer.com