CryptoCoinsInfoClub.com

Bitcoin Wallet 12t9ydpgwuez9nymgw519p7aa8isjr6smw

Wereldwijde Ransomware-aanval: Wannacry

Wereldwijde Ransomware-aanval: Wannacry

Vrijdag zijn meer dan 150.000 computers in 99 landen getroffen door de WannaCry ransomware. Experts geven aan dat dit de grootste ransomware aanval ooit is en dat ransomware zich nog nooit zo snel heeft verspreid. Verspreiding ging zo snel omdat de ransomware zich ook als een worm gedraagd, en zichzelf daardoor snel over interne netwerken kon verspreiden. Ransomware is een verschijnsel dat al vele jaren bestaat. Het eerste geval van ransomware komt zelfs al uit 1989. Ransomware is een verzamelnaam voor computervirusen die een computer gegijzeld houden, waarbij over het algemeen sterke encryptie gebruikt word om alle bestanden van bepaalde types te versleutelen. Pas na betaling wordt een decryptiesleutel vrijgegeven. De opmars van ransomware was vorig jaar (2016) zeer sterk. Zowel in aantal infecties, aantal aanvallen als ook in het aantal nieuwe varianten van ransomware. Cryptolocker, Locky, KleptoZepto, ZCryptor, KeRanger, Petya en TeslaCrypt zijn inmiddels bekende typen ransomware. De kans dat betalen leidt tot een decryptiesleutel verschilt per variant. Over het algemeen wordt voor ieder slachtoffer een apart bitcoinadres aangemaakt, zodat de gijzelnemers kunnen monitoren welke slachtoffers hebben betaald. Wanna Decryptor 2.0 is een vrij agressieve vorm van ransomware, doordat er een exploit ( EthernalBlue ), ontworpen door de NSA en Equation Group, in verwerkt zit. Deze exploits zijn naar buiten gebracht door een hackersgroep die zichzelf "theshadowbrokers" noemt. Deze groep heeft deze exploits in eerste instantie geprobeerd te veilen voor 1000 Bitcoin, waarschijnlijk in de hoop dat de NSA / Equation Group deze terug zou kopen, en het uitlekken van de exploits zou willen voorkomen. Op het adres van TheShadowBrokers, 19BY2XCgbDe6WtTVbTyzM9eR3LYr6VitWK , is "slechts" Continue reading >>

Further Analysis Of Wannacry Ransomware

Further Analysis Of Wannacry Ransomware

Home / Other Blogs / McAfee Labs / Further Analysis of WannaCry Ransomware McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its behavior, including this post by McAfees Raj Samani and Christiaan Beek and this post by Steve Grobman. In the last 24 hours, we have learned more about this malware. These findings mainly concern the malwares network propagation, Bitcoin activity, and differences in observed variants. WannaCry uses the MS17-010 exploit to spread to other machines through NetBIOS. The malware contains exploits in its body that are used during the exploitation phase.These are related to CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147, and CVE-2017-0148, all based on the MS17-10 security bulletin. In many reports we read that the malware generates a list of internal IPs. We found that the malware generates random IP addresses, not limited to the local network. The following is an example attempt at propagation: With this, the malware can spread not only to other machines in same network, but also across the Internet if sites allow NetBIOS packets from outside networks. This could be one reason for the widespread infection seen in this outbreak and why many people are unsure about the initial infection vector of the malware. Another interesting characteristic of the malware is that once a machine with an open NetBIOS port is found, the malware will send three NetBIOS session setup packets to it. One has the proper IP of the machine being exploited, and the other two contain two IP addresses hardcoded in the malware body: The preceding packet contains the IP of the machine being exploited. It uses the test network 192.168.0.0/24. The other two packets, below, cont Continue reading >>

Waarom Is Wannacry Zo Effectief ?

Waarom Is Wannacry Zo Effectief ?

Afgelopen weekend van 12-13-14 mei, haalde de WannaCry ransomware variant het internationale en nationale nieuws. De vraag die ik in dit artikel wil beantwoorden is waarom juist deze variant van ransomware het nieuws haalt , terwijl ransomware al diverse jaren in diverse varianten actief is. De WannaCry ransomware variant heeft twee nieuwe eigenschappen in vergelijking met bestaande bekende varianten zoals Locky, TorrentLocker en CryptoLocker. Allereerst versleuteld de WannaCry ransomware ook bestanden als er geen internetverbinding actief is. Echter de belangrijkste nieuwe eigenschap is dat de WannaCry ransomware zichzelf verspreid over het netwerk door gebruik te maken van een onlangs bekend geworden lek in windows. Voorheen werd alleen de computer van het slachtoffer en verbonden netwerkschijven versleuteld, de WannaCry variant gaat actief op zoek naar andere computers in het netwerk en versleuteld deze ook, alsof de persoon achter deze computer op de verdachte mail heeft geklikt. Daarnaast heeft de WannaCry variant meer rechten op een ander systeem door het gebruik van het Windows lek. Hierdoor worden er dan ook meer bestanden genfecteerd en meer computersystemen plat gelegd (bij vorige varianten waren normaal alleen de fileserver en computer van degene die het bestand had geopend). Hoe ziet dit er dan uit ? Zie hieronder een opname van een systeem die de WannaCry ransomware activeert en een tweede computer in hetzelfde bedrijfsnetwerk die zonder enige interactie wordt genfecteerd. Continue reading >>

Wannacry Hackers Empty Their Wallets Post Bitcoin Split, May Get Same Amount Of Bitcoin Cash

Wannacry Hackers Empty Their Wallets Post Bitcoin Split, May Get Same Amount Of Bitcoin Cash

Aug 03, 2017 11:08 PM IST | Source: Moneycontrol.com WannaCry hackers empty their wallets post bitcoin split, may get same amount of Bitcoin Cash Given the recent birth of Bitcoin Cash, the move by the hackers seems to be quite calculated. The three bitcoin wallets used to receive ransom from WannaCry victims have been emptied as of Thursday. Elliptic , a company which identifies illicit activity on the bitcoin blockchain, reported earlier in the day that the hackers have withdrawn the bitcoins they had received. The firm was tracking the balance of the three bitcoin addresses known to be associated with the WannaCry ransomware. Air India divestment: Govt plans to create ESOP from its own stake, says Jayant Sinha The WannaCry attack had infected hospitals, schools, private enterprises and the general public in more than 150 countries in May. The hackers used 28 languages including several European and Asian dialects to release ransom messages across the globe on May 15. The cyber criminals had asked for a ransom of USD 300 per computer to send the decryption key, which was later raised to USD 600. As around 200,000 systems are being held hostage, the perpetrators could have garnered approximately USD 60 million. However, they eventually receivedUSD 144,371 in ransom as per Elliptic's tracker. As per blockchain.info, the three bitcoin addresses in total received around 52 bitcoins (BTC). Transactions over the bitcoin network hide the user's identity. But sincethe blockchain is public, it is very easy to track the flow of the currency from any known public key. In order to launder the ransom received, the hackers will most probably try to transfer the coins to another cryptocurrency like Monero. Monero is an altcoin which provides more privacy to its users as compared to Continue reading >>

Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; Crowdstrike Falcon Prevents The Attack

Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; Crowdstrike Falcon Prevents The Attack

Falcon Intelligence Report: Wanna Ransomware Spreads Rapidly; CrowdStrike Falcon Prevents the Attack Wanna (also known as WannaCry, WCry, WanaCrypt and WanaCrypt0r) ransomware exploded onto the ransomware scene on May 12, 2017, with a mass campaign impacting organizations in many countries. This second variant of the ransomware has been leveraging the EternalBlue (MS-17010) vulnerability, released by the Shadow Brokers actors, in order to spread over victim networks via the Windows file sharing protocol, Server Message Block (SMB), following an initial infection. CrowdStrike Falcon Prevent offers protection for this variant through two types of coverage. Falcon Prevent has a Machine Learning layer (at the Moderate Level) and a Behavioral IOA layer (Suspicious Process). To ensure this ransomware is prevented, the Prevention Policies must be enabled.For additional details on how to configure CrowdStrike Falcon Prevent to stop Wanna ransomware and its variants, please visit the blog, CrowdStrike Falcon Prevents WannaCry Ransomware. Wanna ransomware targets 177 file types for encryption. Victim files are appended with .wncry. Unlike other ransomware families, Wanna continues to encrypt victim files following any name changes, and any new files created following infection. A ransom note is displayed on the victim machine, which is completed using text from a library of Rich Text Format (RTF) files, in multiple languages and chosen based on machine location. A similar text based ransom note named @[email protected] is added to each folder containing encrypted victim files. Observed ransom demands have been either $300 or $600 USD worth of Bitcoin (BTC) and the decryption software shows one of the following three possible Bitcoin wallet addresses: Wanna contains a resource Continue reading >>

Ransomware Wannacry Cyberattack Demands Bitcoin Wallet Payments

Ransomware Wannacry Cyberattack Demands Bitcoin Wallet Payments

Ransomware WannaCry Cyberattack Demands Bitcoin Wallet Payments Ransomware WannaCry Cyberattack Demands Bitcoin Wallet Payments New Wanna Decryptor Ransomware Locks Your Files in Exchange for Bitcoins A new ransomware made headlines around the world on Friday. The Wanna Decryptor ransomware has spread to more than 74 countries. In the UK, the ransomware wreaked havoc on the national medical system, locking doctors out of patient records and closing emergency rooms across the country. Like most ransomware on the internet today, Wanna Decryptor demands you send Bitcoins to an address in order to unlock your computer. After locking your files, the ransomware demands you send the equivalent of $300 or $600 USD to a Bitcoin address. The Wanna Decryptor malware exploits a known vulnerability discovered last month in Windows. That vulnerability was leaked onto the internet by a hacking group called Shadow Brokers, which claimed it had stolen the exploits from the USs National Security Agency (NSA). You Can Watch the Ransomwares Bitcoin Wallets Receive Money in Real-Time One of the coolest things about Bitcoin is the transparency of the payment platform. The platform is so transparent that you can watch the addresses associated with Wanna Decryptor receive their Bitcoin ransoms in real time. At last count, the ransomware had infected 45,000 systems over a 24 hour period, which means payments are pouring into the address. Security firm Quartz found the addresses and photos of the Bitcoin accounts on social media and tracked how much money each account had received. You can see this tweet, for example , where the airport in Frankfurt got hit with the ransomware. The address in that post is clearly visible as 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw. So far, that account has received 8 Continue reading >>

Wannacry Ransomware Technical Analysis

Wannacry Ransomware Technical Analysis

This article is in continuation with the previous post , Some more deep investigation has been done which is reported in this article. Sample : 593bbcc8f34047da9960b8456094c0eaf69caaf16f1626b813484207df8bd8af The sample has all the 3 bitcoin addresses hard-coded in the malware. The reason why all the three bitcoin wallet addresses are embedded is to ensure that incase one address cannot proceed the payment the other wallet addresses will be used. The Bitcoin Wallet address found are as follows: The malware modifies permission so that all the users on the infected machine,have elevated privileges. By doing so, the malware can execute other functions such as erasing the the Shadow Copies which we discussed earlier. Image: Command to elevate the permissions for Everyone Image: Encryption call with corresponding file extension that are targeted. The malware starts its encryption process and only after successfully completing the encryption procedure it deletes the Encryption Key. The CryptAcquireco call is called upon so that the malware will encrypt those files only whose extension is present in the malware. The ransomware needs to verify the payment from the victim and get the key for decryption of the files once the payment is verified. For these communications the ransomware makes use of TOR service. The tor.exe is accessed in the manner as given in the image in the format as: The path hence where the tor.exe is /TaskData/Tor/tor.exe. Continue reading >>

Csn11117/csn11102: Cryptocurrencies And Blockchain

Csn11117/csn11102: Cryptocurrencies And Blockchain

How distributed ledger technology differs from a traditional financial transaction. Understand the usage of the private key to sign Bitcoin transactions. Understands how the private and public key are created for a Bitcoin wallet. Able to identify the important elements of a Bitcoin transaction on blockchain.info . Define the process of a Bitcoin transaction. Define the proof of work process for Bitcoin and the rewards for miners. Understands the motivations behind the usage of gas in Ethereum. Week 4 Presentation (PDF) - Cryptocurrencies and Blockchain: here Week 4 Presentation (video) - Cryptocurrencies and Blockchain: here Week 4 Lab (PDF): here . Demo: [ here ][ text ] Bitcoin technology has a major problem with its proof-of-work method of gaining a consensus. What are the current drawbacks? How does Ethereum overcome the problems of the proof-of-work method? How does the payment of gas focus developers to create efficient coding? Alice says that her Bitcoin ID address uses Base-64. Is this the case? If not, what format does it use? Trent says that no way that anyone can track his transactions on Bitcoin. Is this true? If not, explain your argument. What evidence does a miner have to give to show it has found the required hash for a block? How many bits does a Bitcoin ID have? Outline the process of generating the ID. Many ransomware systems use bitcoins for payments. You have been asked by an incident response team to report on the payments that resulted from the Wannacry ransomware infection. For the first part of your investigation, report on the activity on the Bitcoin addresses of 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94, 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw and 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn. Estimate the income from the infection (based on current Bitcoin prices Continue reading >>

Hegnaronline - Debattforum

Hegnaronline - Debattforum

Knallet akkurat gjennom US $1 700 hos Bitstamp, da skal den kanskje opp mot 2000, eller over da ... ? Kommer nok korreksjon i BTC etterhvert. Og n som det er s bratt oppoverbakke, blir det en nedoverbakke igjen. Skal man kjpe er det bare legge til side litt ammo og vente p at det skjer. Men da br en ha ordnet med verifisering p forhnd hvis man skal kjpe over krypto-brs. Den tekniske formasjonen Cup w/handel tilsier faktisk rundt 2200 fr det knekker ... The Cryptocurrency Race Heats up as Bitcoin Dominance Drops 30% Det gr i blger mellom BTC og ALTCs, og har gjort det hele tiden. Kurskningen i BTC drar med seg et knippe ALTCs og ker verdien p dem ogs, men ikke ndvendigvis p akkurat samme tid. Adopsjonen av BTC fortsetter, det er hva som ker kursen. Deretter lftes ALTCs, som tar andeler i forhold til Mcap nr BTC korrigerer og flater ut. Dette vil bare fortsette og massene kommer antakeligvis ikke strmmende til fr BTC bikker US $10 000. Sprsmlet er om vi da vil se en strre migrasjon over i de mest populre ALTCs og om disse fr kt bruk som betaling for varer og tjenester. Jeg tror det. Men ting tar tid, selv om det egentlig gr i forrykende fart historisk sett ... Virtual Currencies Now Permissible Investments in Vermont Det er ingen problem lne ut bitcoin p poloniex, der bestemmer du renta selv og slipper lse pengene for et visst antall dager. Daglig kapitalisering. Man lner alts ut til shorting, akkurat n fr en daglig rente p ca 0,1% men det gr bde opp og ned, er det hy volatilitet kan renta komme opp i 1 % om dagen. Poloniex tar 15% av renteinntektene som gebyr. Det er helt klart en risiko med ha pengene sine inne p poloniex, med tanke p mulige hackerangrep, men tviler p at de gr konkurs for de har vel tjent en million dollar om dagen de siste mnedene. Ok, men jeg vil fra Continue reading >>

Monitoring Wannacry Hackers' Bitcoin Addresses In Real Time

Monitoring Wannacry Hackers' Bitcoin Addresses In Real Time

Monitoring WannaCry hackers' bitcoin addresses in real time For a global attack they have not collected a lot of bitcoin yet. Results as of 16:00 GMT Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw ~ 14.28 BTC x $1735.35 per BTC = $24,781 ransom paid thus far. Jump you fuckers! | The thing about smart motherfuckers is they sound like crazy motherfuckers to dumb motherfuckers. | My sig space for rent for 25 btc per week. For a global attack they have not collected a lot of bitcoin yet. Results as of 16:00 GMT Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw ~ 14.28 BTC x $1735.35 per BTC = $24,781 ransom paid thus far. As compare to a massive world wide attack, the amount collected so far is not as much as it should be. I also wonder if the people after paying the ransom, were there computer back to normal or still they remain affected by virus ? For a global attack they have not collected a lot of bitcoin yet. Results as of 16:00 GMT Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw ~ 14.28 BTC x $1735.35 per BTC = $24,781 ransom paid thus far. As compare to a massive world wide attack, the amount collected so far is not as much as it should be. I also wonder if the people after paying the ransom, were there computer back to normal or still they remain affected by virus ? - that some institutions reverted to clean backups - spread was stopped by a blogger who discovered a kill switch in the virus (this has been verified) - Jump you fuckers! | The thing about smart motherfuckers is they sound like crazy motherfuckers to dumb motherfuckers. | My sig space for rent for 25 btc per week. Do people really not back up their files regularly? I would assume that a huge part of the reason the thieves aren't getting as much money as we'd expect is because most people back up their files a Continue reading >>

How To Remove Wcry Ransomware - Virus Removal Steps

How To Remove Wcry Ransomware - Virus Removal Steps

REMOVE IT NOW Get free scanner and check if your computer is infected. To remove malware, you have to purchase the full version of Reimage. Wcry (also known as WannaCry, Wana Decrypt0r 2.0,WanaDecryptor or WNCRY virus) is a ransomware-type virus discovered by security reasearcher S!Ri . Once infiltrated, Wcry encrypts files using AES-128 cryptography . During encryption, this malware appends filenames with the ".wcry" extension (for example, "sample.jpg" is renamed to "sample.jpg.wcry"). Updated variants of this ransomware use.wncry extension for encrypted files (encrypted .bmp files receive .WNCRYT extension). Following successful encryption, Wcry opens a pop-up window with a ransom-demand message. The message states that files are encrypted and can only be restored using a unique key. AES is a symmetric encryption algorithm and, therefore, a unique key is generated during encryption. This key is used to encrypt and decrypt files, and restoring files without it is impossible. Unfortunately, the key is stored on a remote server controlled by Wcry's developers. Victims are encouraged to pay a ransom of .1 Bitcoin (approximately, $100) to receive it within a given time frame (specified in the pop-up window), otherwise the cost doubles. Despite these demands, cyber criminals should never be trusted. Research shows that these people often ignore victims once the ransom is paid. Therefore, if you pay, you will probably be scammed. Never attempt to contact these people or pay any ransom. Unfortunately, there are no tools capable of restoring files encrypted by Wcry. This problem can only be solved by restoring files/system from a backup. Screenshot of a pop-up message encouraging users to pay a ransom to decrypt their compromised data: There are dozens of ransomware-type vir Continue reading >>

Wanacry Wallets Are Growing

Wanacry Wallets Are Growing

Prorootect posted Mar 28, 2018 at 5:26 PM As it was said, on Monday many workers will come to work and find their computers encrypted. I wanted to check if they will pay hackers. I had a look on three Bitcoin wallets of WanaCry and noticed that during Monday the amount of money significantly increased. One of the wallets even increased by almost a half before the noon. Well, this mainly means one thing: people do not have a working backup plan, in short It's really saddening to know that people and institutes have no other option (hinted in the above post) than to pay'em. @konkisko did you manually verify this from alert screen addresses or this is from an external source? Can you share the source then? Hacking is becoming a pretty profitable business It's really saddening to know that people and institutes have no other option (hinted in the above post) than to pay'em. @konkisko did you manually verify this from alert screen addresses or this is from an external source? Can you share the source then? Hi! As all Bitcoin transactions are open, we can see how much bitcoins received each wallet. So data for the WanaCry wallets can be found here: At this moment they got in total 30.14 BTC, which is 50,233 USD. My opinion is that for such a big ransomware it is not a big amount, although, as @Winter Soldier said, many people do not really care about their security and their backups. Hi! As all Bitcoin transactions are open, we can see how much bitcoins received each wallet. So data for the WanaCry wallets can be found here: Bitcoin Address 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94 Yeah, I know about that. I just wanted to confirm whether the data you shared is a part of some article/blog/report or you've extracted the addresses from those nasty WannaCry popups and tried yourself.. Continue reading >>

Watch As These Bitcoin Wallets Receive Ransomware Payments From The Ongoing Global Cyberattack

Watch As These Bitcoin Wallets Receive Ransomware Payments From The Ongoing Global Cyberattack

An ongoing ransomware attack that affected more than 45,000 systems on Friday has spread to 74 countries , locking doctors in the U.K. out of patient records and reportedly forcing emergency rooms to send patients to other hospitals. The attack has also hit a Spanish telecommunications company and a Russian cellphone operator . Security experts say the strain of ransomware being used, called the Wanna Decryptor, is exploiting a vulnerability in Microsoft Windows that was leaked last month by an anonymous hacker group calling itself the Shadow Brokers. The group claimed it had stolen the exploits it released from the US National Security Agency. Ransomware is a form of malware that encrypts a computers files and displays a message to the user, saying it will decrypt the files for a payment, typically via bitcoin. The messages displaying on NHS computers and others have been circulated in photos on social media, and include instructions to send $300 or $600 to one of three bitcoin addresses. Those three address, experts have discovered , were hard-coded into the malware. And like all bitcoin addresses, theyre tied to publicly-accessible accounts, typically called wallets. The wallets show each payment victims have sent in hopes of regaining access to their files. Weve setup a Twitter bot to watch each of the three wallets and tweet every time they receive new payments. It will also tweet the total amount the wallets have received every couple of hours. You can follow it at @actual_ransom . I'm watching 3 #ransomware -associated wallets that have received 92 bitcoin payments totaling $26,407.85 USD. #wcrypt #wannacrypt Continue reading >>

What Happened To The World's Most Famous Bitcoin Wallets?

What Happened To The World's Most Famous Bitcoin Wallets?

VSEC Blog: IT Security Channel News brought to you by Infinigate UK What Happened to the World's Most Famous Bitcoin Wallets? 2017 may be remembered as the year of the botched cyber heist, when mass infections of ransomware variants embarrassed some of the world's largest and most famous organisations but earned their creators little more than notoriety. With mystery surrounding identity and motive, we may never get to the bottom of the full story but we may be able to draw some conclusions by following the money. In May 2017, anyone who hadn't already heard of ransomware was instantly enlightened by news of a global outbreak, involving household names such as the NHS, car manufacturer Nissan and telecoms giant Telefonica. Exploiting a previously disclosed vulnerability in Microsoft Windows operating systems, the ransomware strain known as WannaCry was able to spread to over 230,000 machines worldwide with little resistance . This resulted in the typical encrypted file system and a demand for payment in exchange for a decryption key. In total, there were three bitcoin wallets used in the attack: At the time of writing, these wallets contained a total of 104,803, with unsurprisingly the greatest increase in deposits taking place in the first few days after the attack. The income from this incident of cybercrime would usually be viewed as motive enough if it were not for the fact that there has been no withdrawal of funds since the attack. There are two possible things we could deduce from this,that the scale of WannaCry and the lime-light it attracted was far greater than intended, resulting in the wallet becoming a poisoned chalice watched by law enforcement in multiple countries; orthat monetary gain was never the true purpose of WannaCry and that instead it was desig Continue reading >>

R Tracking Wannacry Bitcoin Wallet Payments With R

R Tracking Wannacry Bitcoin Wallet Payments With R

R Tracking WannaCry Bitcoin Wallet Payments with R (This article was first published on R rud.is , and kindly contributed to R-bloggers) If you follow me on Twitter or monitor @Rapid7 s Community Blog you know Ive been involved a bit in the WannaCry ransomworm triage. One thing Ive been doing is making charts of the hourly contribution to the Bitcoin addresses that the current/main attackers are using to accept ransom payments (which you really shouldnt pay, now, even if you are impacted as its unlikely theyre actually giving up keys anymore because the likelihood of them getting cash out of the wallets without getting caught is pretty slim). Theres a full-on CRAN-ified Rbitcoin package but I didnt need the functionality in it (yet) to do the monitoring. I posted a hastily-crafted gist on Friday so folks could play along at home, but the code here is a bit more nuanced (and does more). In the spirit of these R posts, the following is presented without further commentary apart from the interwoven comments. library(jsonlite)library(hrbrthemes)library(tidyverse)# the wallets accepting ransom paymentswallets <- c( "115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn", "12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw", "13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94")# easy way to get each wallet info vs bringing in the Rbitcoin packagesprintf("wallets) %>% map(jsonlite::fromJSON) -> chains# get the current USD conversion (tho the above has this, too)curr_price <- jsonlite::fromJSON("calculate some basic statstot_bc <- sum(map_dbl(chains, "total_received")) / 10e7tot_usd <- tot_bc * curr_price$USD$lasttot_xts <- sum(map_dbl(chains, "n_tx"))# This needs to be modified once the counters go above 100 and also needs to# account for rate limits in the blockchain.info APIpaged <- which(map_dbl(chains, "n_tx") > 50)if (le Continue reading >>

More in bitcoin