William K⚡Santiago🔑☢️
@William K⚡Santiago🔑☢️

CEO, C4 CCSSA at PrivKey LLC, Blockchain strategist, cybersecurity. The Mission: The Separation of Money and State.

127 following 37 followers
0
0
3

0
0
3

0
0
3

0
0
3

2
2
3

0
0
3

0
0
3

Violent Hackers Are Using U-Haul To Dox Targets https://www.404media.co/violent-hackers-are-using-u-haul-to-dox-targets/ The article from 404 Media details how members of an underground criminal network, known as the Com, are exploiting U-Haul's database to gather personal information for doxxing and hacking purposes. U-Haul, a truck and trailer rental company, holds a significant amount of non-public personal data which can be accessed through phishing tools like "Suite" that mimic U-Haul's point-of-sale (POS) login page. This allows hackers to look up customer details such as names, addresses, phone numbers, and partial billing information, which can then be used in social engineering attacks to compromise more sensitive accounts. Targeting Bitcoin and Crypto Users: - Doxxing and Social Engineering: Hackers can use the personal details harvested from U-Haul to attempt to gain access to the email or other online accounts of cryptocurrency users. This could involve phishing attempts where they pose as legitimate services or companies to trick users into revealing their private keys or other security credentials needed to access their crypto wallets. - SIM Swapping: The phone number data obtained from U-Haul can facilitate SIM swapping attacks, where hackers convince mobile carriers to switch a victim's phone number to a device they control. This method has been used to bypass two-factor authentication on crypto exchanges, leading to theft of digital assets. - Direct Threats: The personal information can also be used to identify the physical location of crypto investors or management personnel of crypto-related institutions, potentially leading to threats or physical crimes like robbery if they suspect these individuals hold significant crypto assets. Targeting Institution Upper Management: - Corporate Espionage: Personal data of high-level executives or management can be used for targeted phishing attacks, aiming to infiltrate corporate networks or gain access to confidential business information, including details about cryptocurrency holdings or blockchain-related projects. - Physical Security Threats: Knowing the home addresses or personal details of executives increases the risk of physical threats or intimidation, which can be used to coerce or blackmail for corporate or financial gain. - Reputation Damage: Doxxing can lead to public exposure of personal life aspects, potentially used to damage the reputation of company leaders, which might indirectly affect the stability or public trust in a crypto-related organization. The article underscores the vulnerability of personal data held by seemingly unrelated companies like U-Haul and how such information can be leveraged by criminals for sophisticated cybercrimes, including those targeting the cryptocurrency sector. This highlights the broader implications of data breaches beyond immediate financial loss, affecting personal safety and corporate integrity.

0
0
3

0
0
3

0
0
3

0
0
3

What is the Travel Rule regulation? The Travel Rule, established by the Financial Action Task Force (FATF), is a set of requirements for financial institutions to collect and share information about the originators (senders) and beneficiaries (recipients) of financial transfers. The Transfer of Funds Regulation (TFR) is the EU's counterpart to the FATF's Travel Rule, and is part of the Anti-Money Laundering Package as well as the MiCA Regulation. As of 2025, the Travel Rule will treat crypto-asset transfers, like Bitcoin, similarly to traditional bank transfers, requiring the sharing of sender and receiver information. The stated intention of the Travel Rule is to combat money laundering and terrorist financing. Where does the Travel Rule apply? Currently, the Travel Rule has been adopted by regulators in the EU and the UK. What does this mean? If you’re based in the EU or UK and send bitcoin (or other crypto-assets) from your account at a crypto-asset service provider, certain information such as name, address, and identification details is required to be shared. All licensed EU crypto-asset service providers are required to comply with the Travel Rule. For custodial wallet customers If you’re sending or receiving using external addresses or wallets via the Bitcoin or Lightning Networks, you’ll need to provide information about the source or destination of your funds, whether it’s your personal wallet or someone else’s. For example if you’re sending or receiving bitcoin from a custodial wallet to your cold storage wallet, you may be asked to verify that you are the owner of this custodial wallet. Similarly, if you’re sending or receiving from another crypto-asset service provider, such as a crypto-exchange, you may be asked to confirm which entity this is and whether you are the owner of the account at that entity. For custodial wallets as companies will be required to collect, verify, and securely share originator and beneficiary information with other crypto-asset service providers and regulators.

0
0
3

0
2
3

0
0
3

0
0
3

0
0
3

0
0
3

0
0
3

0
0
3

0
0
3

Showing page 1 of 45 pages