Scammers to Replace MEGA Extension to Steal Crypto

MEGA is a popular file exchange service; scammers were able to replace its official Google Chrom extension
05 September 2018   2160

The popular file-sharing service MEGA reported a hacker attack. Attackers managed to replace the official Chromme extension of the service and to collect data on users' crypto-currency wallets.

On 4 September 2018 at 14:30 UTC, an unknown attacker uploaded a trojaned version of MEGA's Chrome extension, version 3.39.4, to the Google Chrome webstore. Upon installation or autoupdate, it would ask for elevated permissions (Read and change all your data on the websites you visit) that MEGA's real extension does not require and would (if permissions were granted) exfiltrate credentials for sites including amazon.com, live.com, github.com, google.com (for webstore login), myetherwallet.com, mymonero.com, idex.market and HTTP POST requests to other sites, to a server located in Ukraine. Note that mega.nz credentials were not being exfiltrated.

MEGA Blog

Thus, attackers could get access to the popular cryptocurrency wallets MyEtherWallet and MyMonero. Also, users' funds on the decentralized IDEX exchange are under the thread too.

Representatives of the file sharing company stressed that the fake extension was replaced by a genuine one four hours after the substitution. And an hour later, Google reacted and removed the extension from the Chrome store. Note that at the time of publication, the MEGA extension for Chrome in the official store is still not available.

Earlier it was reported that users of MyEtherWallet, using the free VPN-plugin Hola, could become victims of a hacker attack.

Buterin to Propose Way to Speed Up ETH 2.0 Migration

Vitalik Buterin,creator of Ethereum, believes the eth1 system can exist as a zero shard in eth2 
25 December 2019   206

Ethereum founder Vitalik Buterin proposed a solution that allows you to quickly get rid of the Proof-of-Work (PoW) algorithm chain and move everything in Ethereum 2.0 to Proof-of-Stake (PoS).

According to him, the eth1 system can exist as a zero shard in eth2.

Validators who choose to participate in eth1 will be able to register as friendly. They are expected to support the full eth1 node in addition to the eth2 node.

A full eth1 node will load all blocks of the zero shard and maintain the updated state of the old circuit.

Buterin believes that his proposal does not make any changes to the planned procedure for the transition from eth1 to eth2. Only software for stateless clients and witness size changes in the eth1 protocol are required.