Ethereum just pulled off its final test run ahead of one of the most important events in crypto – CNBC

Ethereum coin

Jakub Porzycki | NurPhoto | Getty Images

Ethereum, the second-largest cryptocurrency by market value, just ran a final dress rehearsal ahead of a years-awaited upgrade that's been billed as one of the most important events in the history of crypto.

Since its creation almost a decade ago, ethereum has been mined through a so-called proof-of-work model. It involves complex math equations that massive numbers of machines race to solve, and it requires an abundance of energy. Bitcoin mining follows a similar process.

Ethereum has been working to shift to a new model for securing the network called proof of stake. Rather than relying on energy-intensive mining, the new method requires users to leverage their existing cache of ether as a means to verify transactions and mint tokens. It uses far less power and is expected to translate into faster transactions.

The final test took place Wednesday at around 9:45 p.m. ET.

Ansgar Dietrichs, a researcher with the Ethereum Foundation,said in a tweetthat the most relevant metric for success when it comes to a dry run like this is looking at time to finalization. He called it "another successful test."

A research associate from Galaxy Digital pointed out that the participation rate after the test merge dropped, and it looked like there may have been an issue with one of the clients but overall, it worked.

"A successful Merge = chain finalizes,"Christine Kim wrote in a tweet, adding that we are likely to see similar types of issues with the upgrade on mainnet, "but the point is, the Merge worked."

The timing of the upgrade will be discussed at a meeting of ethereum core developers on Thursday. Previous guidance indicated that the merge should go into effect in mid-September.

Ethereum's transition has been repeatedly pushed back for the last several years. Core developers tell CNBC that the merge has been slow to progress, in order to allow sufficient time for research, development and implementation.

The price ofether, the token native to the ethereum blockchain,has been on an upswing the last month, rising nearly 80%, including a gain of 10% in the last 24 hours to around $1,875. However, it's still down by about half this year.

One of ethereum's test networks, or testnets, called Goerli (named for a train station in Berlin), simulated a process identical to what the main network, or mainnet, will execute in September.

Testnets allow developers to try out new things and make necessary tweaks before the updates roll out across the main blockchain. Wednesday night's exercise showed that the proof-of-stake validation process substantially reduces the energy necessary for verifying a block of transactions, and also proved that the merger process works.

"Goerli has this badge of a bottom-up testnet," said Josef Je, a developer who worked with the Ethereum Foundation and now runs a permissionless peer-to-peer lending platform called PWN.

Je added that it was the most used testnet at this point and that proof of stake on Goerli will be almost identical to how things will run on the mainnet.

The Ethereum Foundation's blog echoed that assessment, saying Goerli is "the closest to mainnet, which can be useful for testing smart contract interactions."

Tim Beiko, coordinator for ethereum's protocol developers,told CNBC that they typically know "within minutes" whether a test was successful. But they'll still be looking out for many potential configuration issues in the hours and days ahead so they can quickly fix them.

"We want to see the network finalizing and having a high participation rate amongst validators and also make sure we don't hit any unexpected bugs or issues," said Beiko.

The easiest metric to track is participation rate, meaning how many validators are online and doing their duties, Beiko said. If the numbers go down, developers will have to figure out why.

Another key issue relates to transactions. Ethereum processes transactions in groups known as blocks. Beiko said one clear indicator the test went well will be if the blocks have actual transactions in them, and aren't empty.

The last major check is whether the network is finalizing, meaning that more than two-thirds of validators are online and agree to the same view of the chain history. Beiko says it takes 15 minutes in normal network conditions.

"If those three things look good, then there's a long list of secondary stuff to check, but at that point, things are going well," said Beiko.

Since December 2020, the ethereum community has been testing out the proof-of-stake workflow on a chain called beacon, which runs alongside the existing proof-of-work chain. Beacon has solved some key problems.

Beiko said the original proposal required validators to have 1,500 ether, a stake now worth around $2.7 million, in order to use the system. The new proof-of-stake proposal lowers the bar, requiring interested users to have only 32 ether, or about $57,600.

"It's still not a trivial sum, but it's a much more accessible system," Beiko said.

There have been other key developments leading up to Wednesday's test. In June, ethereum's longest-running testnet, known as Ropsten, successfully merged its proof-of-work execution layer with the proof-of-stake beacon chain. It was the first major dry run of the process that the mainnet will undergo next month, should all go according to plan.

Beiko said testing the merge has allowed developers to ensure that the software running the ethereum protocol was stable and "that everything built on top of the network was ready for the transition."

WATCH: Behind the nearly $2 trillion crypto wipeout

Read the original:
Ethereum just pulled off its final test run ahead of one of the most important events in crypto - CNBC

Interactive Brokers Expands Cryptocurrency Trading – Business Wire

GREENWICH, Conn.--(BUSINESS WIRE)--Interactive Brokers (Nasdaq: IBKR), an automated global electronic broker, today introduced the ability for customers to access 24/7 crypto trading through an enhanced web application available from Paxos Trust Company. Clients who elect to manage the funding of their crypto account themselves can pre-fund their crypto accounts at Paxos during regular US banking hours and then trade Bitcoin (BTC), Ethereum (ETH), Litecoin (LTC), and Bitcoin Cash (BCH), plus additional coins around the clock.

This gives our clients a simple and low-cost way to access crypto markets at any time, said Steve Sanders, EVP of Marketing and Product Development at Interactive Brokers. With the added ability to pre-fund accounts, our clients have greater flexibility to react to market events and manage their cryptocurrency exposure.

The new features let clients:

While other crypto exchanges and brokers charge trading fees as high as 2.00% of trade value or more, Interactive Brokers customers trading with Paxos pay low crypto commissions of just 0.12% - 0.18% of trade value, depending on monthly volume, with a USD 1.75 minimum per order. In addition, there are no added spreads, markups, or custody fees.

The new crypto features are available to US residents and clients of Interactive Brokers in over 100 countries with individual or joint accounts, as well as certain types of institutional accounts. In addition, clients of Interactive Brokers can trade crypto alongside stocks, options, futures, bonds, and funds on a single unified platform. Cryptocurrency trading is available through the companys trading platforms, including Trader Workstation, Client Portal, IBKR Mobile, and IBKR GlobalTrader, IBKRs simple new mobile app for global stock trading, as well as through the Paxos web application.

For more information, visit ibkr.com/crypto.

About Interactive Brokers Group, Inc.:Interactive Brokers Group affiliates provide automated trade execution and custody of securities, commodities and foreign exchange around the clock on over 150 markets in numerous countries and currencies, from a single unified platform to clients worldwide. We service individual investors, hedge funds, proprietary trading groups, financial advisors and introducing brokers. Our four decades of focus on technology and automation has enabled us to equip our clients with a uniquely sophisticated platform to manage their investment portfolios. We strive to provide our clients with advantageous execution prices and trading, risk and portfolio management tools, research facilities and investment products, all at low or no cost, positioning them to achieve superior returns on investments. For the fifth consecutive year, Barrons ranked Interactive Brokers #1 with 5 out of 5 stars in its March 25, 2022, Best Online Brokers Review.

See original here:
Interactive Brokers Expands Cryptocurrency Trading - Business Wire

Global Adoption Of Cryptocurrency The First Cryptocurrency Backed By A Nation – NewsBTC

Cryptocurrency adoption across the globe has been moving slower than most would like, but there is no doubt that there has been a lot being done so far. It started with El Salvadors adoption of bitcoin as a legal tender, and it has spiraled from there. One thing that is yet to be done is a cryptocurrency backed by a nation. While other countries have gone the path of the Central Bank Digital Currency (CBDC), the Central African Republic has introduced an innovative monetary system to the world.

Sango is a Layer 2 solution that is built on top of the bitcoin blockchain. When they say Sango is bitcoin-backed, it doesnt mean just backed by BTC coins, but that the entire system is built atop the largest decentralized network in the world. The Sango sidechain is also backed by the Central African Republic, making it the first and only cryptocurrency ecosystem to be backed by a nation.

The CAR, like other nations, has moved further in its drive to adopt digital assets as citizens of the world move in that direction. Sango will power a new digital monetary system that is being developed by the country by taking all of the good bits of the bitcoin network and improving on areas where the network falls short. This sort of infrastructure is only possible through using blockchain technology.

By being a sidechain, Sango can bypass the network congestion that bogs down the bitcoin network by distributing the load across a second layer. This helps Sango to improve scalability, offer more privacy, and enhance programmability using smart contracts. It will enable users to make faster payments, as well as cross-border remittances.

Faustin-Archange Touadra, the President of the Central African Republic, has put forward that SANGO Coin will be the currency of the next generation. It is no surprise that the president has made such a bold statement, given the capabilities and applications of the SANGO Coin.

SANGO Coin transcends just being used as a means of payment. Yes, it can be used to carry out fast and efficient transactions, but the SANGO Coin utilities far exceed anyones expectations. Being backed by bitcoin, it already has a strong foundation coming into the cryptocurrency market.

Investing in SANGO Coin also opens the doors to the Central African Republics natural resources, which are currently valued at more than $3 trillion. Individuals can also apply for citizenship through investment by buying SANGO Coins, as well as applying for e-residency for individuals and corporations who wish to exist as digital entities in the country.

Throughout history, there have been times when something new has overthrown the existing system. This can come in the form of new ways to invest or a new currency that overtakes the existing one. Sango actually provides both.

Bitcoin is already a known and accepted store of value, so the SANGO Coin benefits from this establishment too. Since Sango will be pegged to bitcoin, users will also be able to transact with wrapped bitcoin (s-BTC) in the Sango ecosystem.

The infrastructure that makes up the Sango ecosystem has been designed to serve the needs of governmental structures in a way bitcoin was not built to do. This is why building on the bitcoin blockchain but creating a new cryptocurrency was the best path for CAR.

The utility of the SANGO Coin has already earned it accolades from prominent bitcoin evangelists such as MicroStrategy CEO Michael Saylor and Binance CEO Changing Zhao. Other African countries are now also looking to CARs system in hopes of implementing a similar one.

SANGO Coins are currently available for sale on the website at a discounted $0.10 per coin.

Read the original post:
Global Adoption Of Cryptocurrency The First Cryptocurrency Backed By A Nation - NewsBTC

Persystic Token (PSYS): The social cryptocurrency – AMBCrypto News

Persystic Token (PSYS) is the cryptocurrency used on the Persystic platform, a community-driven decentralized social media network that is the first of its type. Persystic was created to resolve the many issues affecting social media today, including unfair monetization policies, privacy and security concerns, and more. Persystic employs advanced security measures to ensure that user data remains safe from bad actors such as hackers.

Persystic Token (PSYS) vs Traditional Social Media

Social media platforms are integral to how we live our lives today, however, the existing market is dominated by a relatively small number of platforms in which the creators and owners have become very powerful.

This has led to issues such as a lack of democracy and transparency in how the platforms are run, with a disproportionate amount of benefits going to advertisers and partners rather than the community of users.

For example, social media networks like Facebook have come under fire for a lack of fairness and transparency in their monetization policies. Creators do not own their content on these platforms, and rather sign away their rights to the content in return for access to the platform and its community of users. In addition, creators cannot monetize their content on many of these platforms.

On the Persystic social media platform, creators have full ownership over their content. This includes the right to monetization, meaning that users can earn from the content they produce. This mechanism is also used to incentivize the creation and generation of authentic content with Persystic Token (PSYS) rewards.

Privacy has been a rising concern with traditional social media networks. Many argue that the measures in place for protecting the privacy of users are insufficient and that these platforms are exploitative of users data which is then sold to and shared with third parties such as advertisers. Often users accept the mandatory terms and conditions required for accessing these platforms without fully reading or understanding the policies.

There is also a lack of right to erasure mechanisms, meaning that content published on these platforms is stored on the company servers indefinitely and users have no course of action to take for removing them.

On Persystic, user privacy is of the utmost importance and the platform has been created in a way that does not steal or share user data with unwanted third parties. Additionally, users can request that their content is permanently removed from the platform in line with EU right-to-be-forgotten laws.

What is Persystic Token (PSYS) used for?

Persystic Token (PSYS) is a BEP20 cryptocurrency built on the Binance Smart Chain and it is used for utility in the Persystic ecosystem. Its primary uses include sending and receiving cryptocurrency transactions between users, trading with users for other cryptocurrencies and fiat currencies, as part of the rewards mechanism for incentivizing content creators, and purchasing content licenses.

In total, 3 billion Persystic Token (PSYS) will be minted.

Token distribution model:

Disclaimer: This is a paid post and should not be treated as news/advice.

Go here to read the rest:
Persystic Token (PSYS): The social cryptocurrency - AMBCrypto News

Cryptocurrency Monero Decreases More Than 3% Within 24 hours – Benzinga

Over the past 24 hours, Monero's XMR/USD price has fallen 3.68% to $161.5. This is opposite to its positive trend over the past week where it has experienced a 3.0% gain, moving from $157.87 to its current price.

The chart below compares the price movement and volatility for Monero over the past 24 hours (left) to its price movement over the past week (right). The gray bands are Bollinger Bands, measuring the volatility for both the daily and weekly price movements. The wider the bands are, or the larger the gray area is at any given moment, the larger the volatility.

Monero's trading volume has climbed 54.0% over the past week, moving in tandem, directionally, with the overall circulating supply of the coin, which has increased 0.01%. This brings the circulating supply to 18.15 million. According to our data, the current market cap ranking for XMR is #31 at $2.94 billion.

Powered by CoinGecko API

This article was generated by Benzinga's automated content engine and reviewed by an editor.

Follow this link:
Cryptocurrency Monero Decreases More Than 3% Within 24 hours - Benzinga

Muslim-Muslim Ticket Narrative: The Republic in Peril – The News

The Muslim-Muslim ticket which the APC under the otherwise shrewd and perspicacious Senator Bola Ahmed Tinubu has adopted promotes and reinforces a dangerous narrative which the seven years of the Buhari administration have negatively entrenched in the minds of Nigerians. For, before Buhari, it was largely in somewhat hushed tones that the mythical Fulani ownership of geographical Nigeria was discussed. Not supported by any instruments of pre- or postcolonial relations, that dangerous supposition was essentially in the minds of a few and believed by fewer persons. For most southerners, it was a joke, an infantile joke to claim that the rich waters and oil of the Niger Delta belong to some fellows who live one thousand miles away.It is like the Israelis claiming that the oil fields in the Arab states belong to them because God had promised them the land flowing with milk and honey!

With the style and composition of the Buhari government, the irredentist President made his plans clear to all government was by a section of the country, for a section of the country and for a particular religion! To boot, Fulani from some countries in Africa have started assembling in the country to make Nigeria their home. The hostile scoundrels who kidnap. Maim or kill are not indigenous to Nigeria, I dare say. The baffling thing is that southern leaders could not effectively challenge the gradual dismantling of a national consensus that had governed interethnic relations since 1960. Most of them in mainstream politics simply latch on to the received wisdom that to gain power in the centre you must suck it up to the holders of power from the north. So, they sacrifice their people on the altar of greed for power!

In 2003, before the grand alliance of unlikely forces that finally gave Buhari access to federal power, Bola Tinubu was reported by Wikileaks to have said that Muhammadu Buhari is an agent of destabilization, ethnic bigot, and religious fanatic who if given the chance would ensure the disintegration of the country. His ethnocentrism would jeopardize Nigerias national unity. It is true that the Tinubu camp has vigorously argued that their principal never said any such stuff. But Farooq Kperogi in Notes from Atlanta (December 4, 2021) has laid the authenticity of the statement to rest by asserting that I took up Tunde Rahmans challenge and showed that Tinubu indeed said what he was quoted to have said and worse, citing diplomatic cables wrenched from Wikileaks trove.

In skewed appointments both to cabinet and non-cabinet positions, Buhari made no bones about telling Nigerians that he meant to govern Nigeria as a colony of Fulani hegemony. Nowhere is this hegemony so evident than in the security architecture of the country. Also, the marauding herdsmen in the country never fail to remind abductees that Nigeria is their patrimony and that accounts for the soft approach of the incumbent government in dealing with the menace posed by terrorists and bandits. Nigerians have cried aloud about the skewed appointments in favour of one section of the country. Nothing has entered the ears of the Commander-in-Chief! Suddenly, the successor administration if the APC wins is a Muslim-Muslim band. Not good for the sight. Not healthy for perception. Not healthy for inter-religious harmony.

Nations build institutions which sustain and protect the core values of the country. In a country as multiethnic and multireligious as ours, no individual or administration should violate those core values. It is possible to argue that the fundamental principles for national unity have not been defined and nationally accepted. For example, power rotation, the place of religion and ethnicity must be worked into the Constitution. Nothing must be taken for granted. No section or religion must claim or preach superiority. It has the capacity to implode the country, either now or in the future.

It is against this background that the APC Muslim-Muslim ticket must be resisted by pressure groups, ethnic and religious associations. The issue must be on the ballot box on election day. A northern Christian who was Legal Adviser to APC resigned his position because of his objection to the Muslim-Muslim ticket. Ironically, Senator Tinubu and the APC had expressed reservations about the same-religion ticket in 2015. It was for this reason Professor Yemi Osinbajo was drafted in with his impeccable Christian credentials as a pastor in RCCG. What changed in 2022 or 2023?

The ethnic tension in the country that has reached a crescendo is alarming. Whether by design or default, the Tinubu and Shettima ticket is an attempt to further increase the tension and permanently destroy the fragile attempts at inter-religious harmony. It promotes the inane idea that one ethnic group or religion to superior to others in the federation. It is foolish to believe this nonsense, even if the ethnic group is numerically stronger. The point must be made that this rejection would not have mattered if the operating conditions in the country were settled or acceptable. For as we know, a Muslim could be as bad as a Christian in governance and vice versa. In other words, promotion of a religious faith does not bestow administrative or governing competence on anybody. The list of those who have misgoverned the country includes Muslims and Christians, with religion playing no moderating role in attitudes to the Commonwealth.The ruling APC which has mismanaged Nigeria into a freefall is slapping Nigeria further in the face by trying to force an anomaly on the nation.

The APC has attempted to make things look good by appointing spokesmen who are Christians. This is after suggesting that a Christian from the north as a running mate to a Muslim from the south is not good enough to attract votes from the north. What a slap to northern Christians. This accounts for the bold and resolute reaction of the Dogaras and Babachirs, something we must take seriously.

All Nigerians must queue up to vote for their candidates in 2023. Hopefully, votes will count this time around. If they do, the Nigerian people will speak on who they want to govern the country. Sadly, the PDP ticket is also guilty of negating one of the assumptions that had governed the country power rotation. We are therefore in a fix with the two old political parties. What will the end be?

*

Professor Hope O. Eghagha (BA,Jos; MA; PhD,Lagos) MNAL

Department of English

Faculty of Arts

University of Lagos

Akoka Lagos

NIGERIA

Originally posted here:

Muslim-Muslim Ticket Narrative: The Republic in Peril - The News

Facebook begins testing default end-to-end encryption on Messenger – The Verge

Facebook has shared an update on its long-awaited plans to turn on end-to-end encryption (E2EE) by default in its Messenger chat platform, saying it has begun testing the feature for chats between some people this week.

Facebook currently offers Messenger users the option to turn on E2EE on a per-chat basis, but such opt-in schemes are generally only embraced by a security-conscious minority. Making end-to-end encryption the default will be a big step: adding a substantial layer of security to a chat platform used by more than a billion people worldwide. Its also likely to trigger arguments with governments who say E2EE hinders their ability to fight crime.

End-to-end encryption means that Facebook cannot view the content of its users messages only participants can. This makes it much harder (though not impossible) for third parties like hackers or law enforcement to snoop on digital conversations.

In recent years, Facebook parent Meta has been slowly adding more layers of encryption to its various chat platforms, but these efforts have not yet been unified. Chats on WhatsApp are encrypted by default using the same protocol offered by industry standard secure messenger Signal; opt-in encryption for Instagram DMs is currently being tested; and Messenger offers E2EE via its disappearing messages feature. (The app previously also offered a similar vanish mode, but this is being removed, as per Facebooks update today.)

Facebook has been criticized for not making E2EE default on Messenger, especially in the wake of the reversal of Roe v. Wade in the United States, where digital footprints like app chats will be used as evidence in prosecuting newly criminalized abortions. This was highlighted in a case this week, where Facebook complied with a police search warrant to hand over the Messenger chat history of a Nebraskan teen and her mother, leading to the pairs prosecution for charges related to the states preexisting abortion laws.

Facebook previously said its been slow to make E2EE default on all its chat platforms because of the difficulty of integrating such technology into apps used by billions and the need to balance user privacy with safety. In its update today, the company reiterated that its on track to make E2EE the default for all chats and calls on Messenger in 2023.

In addition to the new test of default E2EE, the company also announced a feature named secure storage that will encrypt cloud backups of users chat history on Messenger.

[W]ere testing secure storage to back up those messages in case you lose your phone or want to restore your message history on a new, supported device, said the company. As with end-to-end encrypted chats, secure storage means that we wont have access to your messages, unless you choose to report them to us.

Other new features being tested on Messenger include syncing deleted messages across devices; testing the ability to unsend messages; and adding encryption to hands-free messages sent on Messenger using the companys Ray-Ban Stories smart glasses.

Read this article:
Facebook begins testing default end-to-end encryption on Messenger - The Verge

WhatsApp Again Affirms It Will Not Break Encryption To Appease Government Entities – Techdirt

from the governments-invited-to-go-fuck-themselves dept

The debate over end-to-end encryption continues in the UK. Its really not much of a debate, though. government officials continue to claim the only way to prevent the spread of child sexual abuse material (CSAM) is by breaking or removing encryption. Companies providing encrypted communications have repeatedly pointed out the obvious: encryption protects all users, even if it makes it more difficult to detect illicit activity by certain users. Its impossible to break encryption to detect criminal activity without breaking it for every innocent user as well.

Sometimes the UK government argues with itself. The Information Commissioners Office put out a report earlier this year that stated encryption was essential to childrens online safety, directly contradicting assertions by other UK government entities which claimed breaking encryption was the only way to protect children.

At the center of this debate is WhatsApp, the popular messaging service that has provided end-to-end encrypted messaging since early 2016. And since that point, multiple governments have tried to get WhatsApp to ditch encryption or, at the very least, provide them with backdoors. That includes the UK government, which made its request only a few months after WhatsApp finished rolling out its end-to-end encryption.

WhatApp rejected the UK governments request in 2017. That hasnt stopped the UK government from repeatedly approaching the company in hopes of talking it out of its encryption. And nothing has changed for WhatsApp, which has again made it clear its not interested in compromising user security on a country-by-country basis.

Will Cathcart, who has been at parent company Meta for more than 12 years and head of WhatsApp since 2019, told the BBC that the popular communications service wouldnt downgrade or bypass its end-to-end encryption (EE2E) just for British snoops, saying it would be foolish to do so and that WhatsApp needs to offer a consistent set of standards around the globe.

If we had to lower security for the world, to accommodate the requirement in one country, that would be very foolish for us to accept, making our product less desirable to 98 percent of our users because of the requirements from 2 percent, Cathcarttoldthe broadcaster. Whats being proposed is that we either directly or indirectly through software read everyones messages. I dont think people want that.

Its good to see WhatsApp take this stand (again), even as the voices clamoring for the end of encryption are now claiming its primary purpose is to allow distributors of CSAM to escape justice. Its pretty tough to take a principled stand when opponents are accusing you of siding with child molesters.

And the pressure isnt going to let up. The UK government still believes it is entitled to encryption backdoors. The European Union, which the UK recently exited, has expressed the same desire for broken encryption, using the same disingenuous phrase trotted out so often by the likes of FBI Director Chris Wray: lawful access.

But simple refusals like these allow companies to call governments bluffs. If governments cant get the backdoors they want, theyll have to decide whether they want their citizens to have access to encrypted communications. And while it may seem some governments dont want their citizens to enjoy this protection, very few have been willing to eject popular services that wont comply with their demands.

Filed Under: csam, encryption, surveillance, ukCompanies: meta, whatsapp

Continue reading here:
WhatsApp Again Affirms It Will Not Break Encryption To Appease Government Entities - Techdirt

Millions recover for free and extortion surpasses encryption: This Week in Ransomware – Sunday, August 7, 2022 – IT World Canada

As ransomware continues to grow as a threat, the continuing question is should companies pay the ransom? One group has been actively trying to convince companies not to pay.

Ransomware recovery for free

Millions of ransomware victims have been able to recover their files for free thanks to a project called No More Ransom.

The project is an online portal created in 2016 by a public-private partnership between Europol, the Dutch National Police and IT security companies Kaspersky and McAfee.

It is in its sixth year of operation, and now has 188 partners around the world. It offers over 100 free decryption tools, and the project website states that over 10 million people have downloaded their decryption tools over the past 6 years.

The site features a number of tools, some Q&A help with ransomware, and a tool called Crypto Sheriff which allows you to post a copy of an encrypted file or some information about the hackers. Crypto Sheriff will try to identify a solution or decryptor for you as well as providing you with instructions on how to restore your files.

Even if no decryptor is available, it is advised to keep checking back as new decryptors are always being added to the site.

The site encourages companies to not pay ransoms, stating that By sending your money to cybercriminals youll only confirm that ransomware works, and theres no guarantee youll get the decryption key you need in return.

30 terabytes of data stolen in ransomware attacks in first half of 2022

According to a report from the European Agency for Cybersecurity (ENISA) Threat Landscape for Ransomware Attacks, ransomware attackers stole of 30 terabytes of data in the first half of 2022.

The amount of data seems to be accelerating. In each of May and June, the agency reports that 10 terabytes of data were stolen. Fifty-eight per cent of the data stolen included employees personal data.

The report estimates that about 38 per cent of companies do not pay the ransom, while 62 per cent either came to an agreement with the attackers or found another solution.

The research covered over 600 ransomware incidents in Europe, the UK, and the United States.

Extortion bigger threat than encryption?

Data theft has become the predominant strategy for ransomware attacks, according to security company BlackFog. They reported that exfiltration or data theft was part of 88 per cent of ransomware attacks analyzed in their State of Ransomware July report.

The report also notes that education and government are still the prime areas for attacks, but the study notes that, for the first time, the technology sector has overtaken the manufacturing sector in terms of number of attacks. It notes that attackers are still focused on sectors with the weakest protection and lowest investment in cybersecurity and aging infrastructure.

Read this article:
Millions recover for free and extortion surpasses encryption: This Week in Ransomware - Sunday, August 7, 2022 - IT World Canada

SCOOP: ista International takes systems offline in wake of ransomware attack; Daixin Team claims thousands of servers encrypted – DataBreaches.net

ista International GmbH is a multinational company that manages data and processes that make buildings climate-friendly, safe and comfortable. As they describe themselves:

We see the future of our success in the Internet of Things (IoT). Very soon billions of devices will talk directly to each other. This communication will largely take place in and around buildings. With our digital infrastructure, we are in an excellent position to support property owners and residents with smart and intelligent solutions. Today, we already have 400,000 gateways in use for our customers that link over 25 million connected devices to each other.

Recently, though, ista fell prey to an attack by Daixin Team. A notice now appears on their homepage:

A detailed message and FAQ appear on their website. The notice begins:

Dear ista customers, currently, istas IT-System have been the victim of an external cyber-attack. As an immediate measure and to help prevent damage to our IT infrastructure, all potentially affected IT systems of the company have been taken offline. As a result, you will temporarily be limited or unable to use certain functions and services. We are very sorry for the inconvenience that this may cause you and ask for your continued patience as we try to resolve the issue.

We have informed the State Data Protection Authority and filed a report with the police. A specialist team of internal and external experts is currently conducting a thorough investigation of the incident and is working at full speed to remedy the disruption as quickly as possible. However, this may take some time.

You can access their full update and FAQ on their site.

Yesterday, Daixin added istas name to their dark web leak site with three file lists. Today, they started leaking some of the data.

In communications with DataBreaches, a spokesperson for Daixin wrote that in a matter of days, and from one unprivileged user access, Daixin easily obtained all the rights in the following domains: ROOT, DS, IT, PL, AT, ES, NL, BE, DE

In describing its company, ista writes, in part:

With our digital infrastructure, we are in an excellent position to support property owners and residents with smart and intelligent solutions. Today, we already have 400,000 gateways in use for our customers that link over 25 million connected devices to each other.

According to Daixin, they went through one of those gateways and took control of the entire system in two days.

We were not interested in users we encrypted all servers, their spokesperson wrote to DataBreaches, adding, Encryption was a long process. We encrypted petabytes of data. (Servers and backups)

We saw the panic of the administrators.

They couldnt log in and do something about it.

All security features have been disabled, administrator accounts have been blocked.

When asked, Daixins spokesperson estimated that more than three thousand of istas servers have been fully encrypted.

Maybe more, we went offline but the encryption continued, they added.

DataBreaches also inquired whether ista had attempted to negotiate any ransom at all. It seems they had, but their offer was unacceptable to Daixin, who provided DataBreaches with a snippet from their chat on August 8:

At this point, Daixin will continue to release more data, it seems.

DataBreaches sent an inquiry to istas media relations email address, but no reply was immediately received.

Go here to read the rest:
SCOOP: ista International takes systems offline in wake of ransomware attack; Daixin Team claims thousands of servers encrypted - DataBreaches.net