Advertisement
AD

Main navigation

Advertisement
AD

Error message

Warning: Undefined array key 0 in amp_entity_view_alter() (line 156 of modules/contrib/amp/amp.module).
amp_entity_view_alter(Array, Object, Object) (Line: 545)
Drupal\Core\Extension\ModuleHandler->alter('node_view', Array, Object, Object) (Line: 304)
Drupal\Core\Entity\EntityViewBuilder->buildMultiple(Array) (Line: 238)
Drupal\Core\Entity\EntityViewBuilder->build(Array)
call_user_func_array(Array, Array) (Line: 111)
Drupal\Core\Render\Renderer->doTrustedCallback(Array, Array, 'Render #pre_render callbacks must be methods of a class that implements \Drupal\Core\Security\TrustedCallbackInterface or be an anonymous function. The callback was %s. See https://www.drupal.org/node/2966725', 'exception', 'Drupal\Core\Render\Element\RenderCallbackInterface') (Line: 788)
Drupal\Core\Render\Renderer->doCallback('#pre_render', Array, Array) (Line: 377)
Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
Drupal\Core\DrupalKernel->handle(Object) (Line: 18)
Advertisement

MyEtherWallet.com Hijacked, Hackers Steal $152,000

Advertisement
Wed, 25/04/2018 - 1:43
MyEtherWallet.com Hijacked, Hackers Steal $152,000
Cover image via U.Today
Read U.TODAY on
Google News

After denying earlier hijacking incidents, MyEtherWallet.com (MEW) admitted that its DNS servers were hijacked earlier today.

Advertisement

The attackers stole 215 Ethereum coins valued at approximately $152,000 which were deposited into a digital wallet with nearly $30 mln in currency, according to sources.

MEW users were redirected to a server hosted in Russia, which served a website using a fake certificate for nearly two hours between 11AM to 1 PM UTC.

The attackers used a BGP - a key protocol used for routing internet traffic around the world - to redirect traffic to Amazon’s Route 53 service.  

MEW issued a statement acknowledging the breach earlier today, but sources say the company knew there were issues months ago.

Uni Banker, CEO of Blue Protocol (BLUE) says:

“We detected this exact problem in January.  We saw these momentary blips and shared that information with MEW.  They ignored it.”

Banker told CryptoComes in an interview that he checked the issue himself after learning from a co-worker that something was not right and notified MEW within hours.

After being ignored, Banker decided it was necessary to notify the public, and a series of tweets were posted Jan 8 to the company’s twitter handle @EthereumBlue, which has since been changed to @Blue_Protocol.

card

MEW claimed the attack was nothing more than malicious rumors, and that BLUE was trying to boost its coins.

MEW told Cointelegraph:

“MEW is not compromised. They [BLUE] are either maliciously spreading FUD to harm others, maliciously spreading FUD to boost their own coin’s price or just so incompetent and were confused. Regardless, its a stupid lie.”

BLUE says it has always tried to prevent security attacks and notified other companies about security issues.

Banker added:

“We found some security issues with Jaxx, another digital wallet site, and they immediately did a voice-chat with us and patched the problem shortly after and credited us in a tweet. MEW did not give us the opportunity.”

A
A
A

Related articles

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement
Advertisement

Recommended articles

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD