Bitcoin

AppWizard
January 27, 2026
The UK Competition Appeal Tribunal has allowed a lawsuit against Valve, alleging that the company has used its market dominance to charge inflated prices for games and downloadable content (DLC). The lawsuit, set for 2024, seeks £656 million in damages, claiming that up to 14 million UK gamers may have overpaid between £22 and £44 since June 5, 2018. Vicki Shotbolt, an advocate for children's digital rights, is the proposed class representative for the case, which is part of her campaign "Steam You Owe Us." A judgment on January 26 confirmed the case can proceed to trial, but it does not indicate the merits of the claims. The tribunal's decision suggests there may be grounds to explore allegations of unfair pricing practices by Valve. Additionally, a UK court has ruled that in-game gold can be classified as "property," making it subject to theft laws.
Winsage
December 15, 2025
A pro-Russian hacktivist group, CyberVolk, has re-emerged in 2025 with a new ransomware-as-a-service (RaaS) operation called VolkLocker, which targets both Windows and Linux systems using Golang. The group utilizes Telegram bots for command-and-control operations, allowing affiliates to manage ransomware interactions. Despite its advancements, coding errors in the ransomware enable victims to recover encrypted files without paying a ransom. VolkLocker employs AES-256 encryption but has a critical flaw where the master encryption key is hard-coded and saved in plaintext, allowing easy decryption. The ransomware also ensures persistence by replicating itself and disabling essential system tools. CyberVolk offers additional RAT and keylogger add-ons for sale, with complete RaaS packages priced between [openai_gpt model="gpt-4o-mini" prompt="Summarize the content and extract only the fact described in the text bellow. The summary shall NOT include a title, introduction and conclusion. Text: A newly rebooted pro-Russian hacktivist group, CyberVolk, has made a notable comeback in 2025, unveiling a new ransomware-as-a-service (RaaS) operation dubbed VolkLocker, as detailed in recent research by SentinelOne. After a prolonged period of dormancy following extensive bans on Telegram, this group has re-emerged with a Golang-based ransomware solution that targets both Windows and Linux systems. This latest initiative signifies CyberVolk's commitment to revitalizing its operations, showcasing what analysts refer to as the “CyberVolk 2.x” generation of tools. Despite the group's advancements, their integration of sophisticated Telegram-based automation has inadvertently led to coding errors that allow victims to recover their encrypted files without the need to pay a ransom. Telegram-Fueled Automation and Functionality VolkLocker is heavily reliant on Telegram bots for its command-and-control operations, which form the core of its new RaaS model. All interactions between operators and the ransomware's ecosystem, from onboarding new customers to managing victims, are facilitated through a Telegram bot known as CyberVolk_Kbot. This bot provides various commands such as /decrypt, /list, and /status, enabling affiliates to monitor infections and communicate with compromised systems in real time. Operators tasked with creating new ransomware payloads must input several configuration details, including a Bitcoin address, Telegram bot token ID, chat ID, encryption deadline, and file extension. Decryption triggered via backed-up key file This design approach aligns with CyberVolk’s goal of simplifying deployment for affiliates with limited technical skills. The Golang-based payloads, compiled for both Linux and Windows platforms, utilize the “ms-settings” UAC bypass technique (MITRE ATT&CK T1548.002) for privilege escalation. Once operational, VolkLocker performs system reconnaissance, checks for virtual machine environments by matching MAC address prefixes, and strategically excludes key system paths from encryption. Encryption Flaws and System Destruction Features VolkLocker employs AES-256 in Galois/Counter Mode (GCM) for file encryption; however, its encryption design reveals a significant oversight. The master encryption key is hard-coded within the binary and is also saved in a plaintext file named system_backup.key located in the %TEMP% directory. This easily accessible key allows victims to decrypt their files without paying the ransom, highlighting a critical flaw in CyberVolk’s development process. In addition to its encryption capabilities, VolkLocker ensures persistence by replicating itself across multiple directories and disabling essential tools such as Task Manager, Windows Defender, and Command Prompt through registry modifications. It also deletes Volume Shadow Copies and can trigger a Blue Screen of Death (BSOD) using the Windows NtRaiseHardError() function when the countdown timer expires or when incorrect decryption keys are repeatedly entered. Despite these coding missteps, CyberVolk is expanding its offerings, providing RAT and keylogger add-ons for 0 each, along with complete RaaS packages ranging from 0 to ,200. SentinelOne researchers caution that this resurgence underscores how politically motivated groups are increasingly leveraging Telegram infrastructure to commercialize their ransomware operations. Indicators of Compromise: Windows Sample: dcd859e5b14657b733dfb0c22272b82623466321 Linux Sample: 0948e75c94046f0893844e3b891556ea48188608 Bitcoin Wallet: bc1qujgdzl0v82gh9pvmg3ftgnknl336ku26nnp0vy Telegram Bot: 8368663132:AAHBfe3xYPtg1IMynKhQy1BRzuF5UZRZspw Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant Updates" max_tokens="3500" temperature="0.3" top_p="1.0" best_of="1" presence_penalty="0.1" frequency_penalty="frequency_penalty"] and ,200. Indicators of compromise include specific Windows and Linux sample hashes, a Bitcoin wallet address, and a Telegram bot ID.
Tech Optimizer
December 7, 2025
John McAfee's antivirus software struggles with poor performance and questionable business practices, relying on financial arrangements with manufacturers for its prevalence. Users often face persistent pop-ups for additional services, leading to high subscription costs without significant value. Norton, another antivirus solution, is criticized for slowing down system performance and not providing better protection than Windows Defender. ExpressVPN has shifted focus from privacy to marketing after its acquisition, raising concerns about user data security. Honey, a shopping extension, tracks personal data and may mislead users with affiliate links. CCleaner has become bloated since its acquisition by Avast and is no longer effective on Windows 11. WiFi speed booster software often fails to improve performance and may collect user data. Crypto mining software poses risks as many applications are malware. Razer Synapse often causes performance issues for gamers, while NVIDIA's application can negatively impact system performance and is not as beneficial as alternatives.
Tech Optimizer
November 14, 2025
A recent malware campaign has seen attackers disguising the DarkComet remote access trojan as Bitcoin-related applications to target cryptocurrency users. DarkComet RAT allows attackers to gain extensive control over compromised systems, despite its original creator discontinuing it years ago. The malware features capabilities such as keystroke logging, file theft, webcam surveillance, and remote desktop control, posing significant risks to users. The malicious file was distributed as a compressed RAR archive named “94k BTC wallet.exe,” which helps evade email filters. Security analysts at Point Wild discovered that the malware ensures persistence by copying itself to %AppData%RoamingMSDCSCexplorer.exe and creating a registry key for automatic execution at system startup. It attempts to connect to a command-and-control server at kvejo991.ddns.net over TCP port 1604. The malware injects its payload into legitimate Windows processes to perform keylogging and screen capture while remaining undetected. Captured keystrokes are stored in log files and exfiltrated through the command-and-control channel. Users are advised to avoid downloading cryptocurrency tools from untrusted sources and to keep security software updated.
AppWizard
November 3, 2025
Elon Musk has announced a new messaging platform called X Chat, which prioritizes user privacy and security by utilizing a peer-to-peer encryption system similar to Bitcoin's technology. The app is currently being tested and is expected to launch in the coming months. X Chat will not include advertising hooks or collect user data for targeted advertising, aiming to eliminate privacy risks associated with such practices. It is designed to allow users to send text messages, share files, and conduct audio and video calls. Musk claims it will be more secure than existing messaging platforms like WhatsApp.
AppWizard
November 3, 2025
Elon Musk announced the upcoming feature "X Chat" for his social media platform, X, during his appearance on the "Joe Rogan Experience." This new messaging service will utilize a peer-to-peer encryption model similar to Bitcoin and is designed to enhance security by minimizing vulnerabilities compared to other messaging applications. X Chat will not include advertising hooks, focusing instead on user privacy and security. A standalone app is also planned for release in a few months, allowing users to send messages, share files, and make audio or video calls. The in-app chat will support various media linked to X handles rather than phone numbers.
AppWizard
November 1, 2025
Elon Musk is set to launch X Chat, a new messaging app designed to compete with WhatsApp and Telegram, featuring Bitcoin-inspired encryption and a commitment not to sell user data to advertisers. He revealed the project on The Joe Rogan Experience, explaining that his team has revamped the messaging infrastructure of the X platform to create this distinct app. The launch is expected in the coming months, and Musk emphasized that X Chat will operate without advertising hooks. Musk criticized WhatsApp for its data practices, asserting that it allows for potential privacy breaches. In contrast, he aims for X Chat to be a secure platform for sending text, files, and making audio and video calls, available both within the X platform and as a standalone app.
Search