Bitcoin rebounded to over $ 6,500

Bitcoin rebounded to over $ 6,500

Following the announcement by the International Monetary Fund (IMF) that a sudden upward trend in Bitcoin and crypto currencies would affect the international financial system, Bitcoin rebounded to over $ 6,500.

IMF in World Economic Outlook: Challenges to Stead Growth, the report included the following assessments:

Cyber ​​security violations and cyber security attacks against critical financial infrastructures create an extra security threat because of harming cross-border payments systems and disrupting the flow of goods and services. Therefore, the increased growth in crypto assets may harm the international financial system.

Bitcoin, which is the determinant of the crypto-currency markets after the developments, increased by 6.33 percent in the last 24 hours to $ 6,735 and with a market volume of 116 billion 671 million dollars, it constituted 54.5 percent of the market.

Tether declined by 2.92 percent in the last 24 hours from the highest volume of 10 crypto currencies in the market, with a total of 14,604 market trading and 2,079 crypto currencies. Komodo pioneered.

Depending on the increase, the market volume has increased by 5.9 percent to 214 billion 442 million dollars in the last 24 hours. The 24-hour trading volume in the market was calculated as 16 billion 703 million dollars .

Changes to the highest volume 10 crypto currencies (sequence numbers, position of units in the rankings):

1.Bitcoin 6.33 percent

2.Ethereum 6.86 percent

3.Ripple 6.08 percent

4.Bitcoin Cash percent 4.22

5.EOS 4.54 percent

2.42 percent of Stellar

7.Litecoin 3.74 percent

8.Cardano 2.31 percent

9.Monero increased 3.99 percent

10.Tether fell 2.92 percent

Cyber ​​pirates are simulating banks like this!

Cyber ​​pirates are simulating banks like this!

Cyber ​​pirates are simulating banks like this!

Cyber ​​pirates are simulating banks like this!

Researchers have discovered a new malware that targets corporate bank customers in Brazil. According to the statement, cyber attackers firstly deceive the victims with their social engineering tactics, then take advantage of the high-level hiding capabilities of the software and the ability to simulate the online banking information of the companies. Bitdefender Antivirus, cyber fraud and advised the companies to avoid damage.

Hackers identify companies that first work with specific financial institutions. By calling the authority they believe to have the bank account information of the company, the attackers who act like a bank employee are directed to the malicious contact on the phone. The hackers who have requested to check whether the security module is up-to-date or not, says that the module needs to install software on the user’s computer for updating. Carelessly acting on the page that mimics the various features of the bank, the victim installs the software.

After the download of the software called CamuBot, which contains a highly dangerous Trojan horse virus, and the software is downloaded to the computer system, a page similar to the bank’s online banking page opens. On the phone by entering the instructions of the attacker on the phone by falling victim, the company’s banking information to hackers is given. If the captured user information is sufficient to fully capture the account, the phone call is terminated immediately. 

Authentication Methods Cannot Identify CamuBot

According to the researchers, CamuBot is able to easily escape from many powerful authentication techniques and security controls. CamuBot does not allow two-factor protection and biometric identification control systems to be able to remotely access devices and block single-use passwords.

Cyber-attackers who provide full access to their victims’ account can cause massive damage to companies through payment transactions via IP addresses, while ensuring that the payment process is legal by the bank.

What Should You Do to Protect Your Company?

The use of social engineering techniques and advanced malicious software makes it harder not to fall into the network of cyber attackers. While frightening the possibility of CamuBot software deployment to other countries, company members need to pay utmost attention to any software they need to install on their smart devices and to any environment where their login information is required. Emphasizing the need to act with skeptical consciousness to avoid damage, Bitdefender Antivirus officials offer companies various suggestions to avoid being affected by such cyber attack. 

• Keep your inventory and inventory clean of your digital assets so that cybercriminals cannot attack your system without your knowledge.

• Update all software, including your operating system and applications.

• Back up all data every day, including information on personnel devices. Thus, if you are attacked, you can restore the encrypted data. Always back up important data in a secure environment that does not have a connection to your computer or network.

• Do not put all data into your company’s public file sharing network. Partition your sharing network.

• Inform company employees about cyber security. Warn them not to open email attachments and links from unknown sources. Please note that a company is only as secure as its weakest link.

• If a virus reaches the corporate network, develop a communication strategy to inform employees.

• Decide what to do with the board before any attacks.

• Communicate with specific vendors or vendors, review their cyber security in their life cycle, and perform threat analysis.

• Instruct the information security team to perform penetration testing and if there is a security vulnerability.

• Get an intelligent security solution to detect and block malware, phishing and attack attempts for all your devices.

Virtual counterfeit now after virtual money

Virtual counterfeit now after virtual money

Virtual counterfeit now after virtual money
WannaCryptor, while performing destructive cyber attacks, on the other hand began using virtual software to create virtual coins like Feathercoin, Litecoin and Monero

Cybercriminals carry out devastating cyber attacks such as WannaCryptor, which affect the masses on the one hand; One of them is using malware; Produce virtual coins like Feathercoin, Litecoin and Monero. In this phenomenon, which is defined as crypto money mining, ESET, an antivirus software company, found that old and outdated Windows web servers were used to produce Monero currency.

According to the information about Monero (XMR) mining, which is one of the new Bitcoin-like new crypto currencies, cyber attackers produce Monero by infecting malicious software on their servers, which is defined as miner.


Monero is an attractive crypto currency to be produced by malware even though it is so far behind the Bitcoin as its market value. Money transfers cannot be monitored, and unlike other mining activities, there is an algorithm called CryptoNight which does not exhaust server processors and graphical processors.

Crypto Coins in 10 Questions

Crypto Coins in 10 Questions

Crypto coins in 10 questions

Crypto coins in 10 questions

I have compiled what you need to know from A to Z about crypto coins, which are the recent economic trend.

With the increase in value gained in 2017, crypto coins, which broke the memorization in the economy markets and became a new area, have been the dream of those who want to be rich in the recent times. Therefore, the number of questions about crypto coins also increased. All you need to know from A to Z about crypto coins.

What Does Crypto Money Mean?

Crypto and currency (currency) words created by the combination of this term, encrypted money. There is no centralized institution where these funds are produced or controlled, and the money is generated over the internet. Digitally encoded and coded coins are recorded by blockchain method.

How and How to Produce?

The mechanism that determines the amount of production of crypto coins is the consumer. These funds are produced and sold according to demand and balance. Firstly, these coins started to be produced in 2008 and they are produced by the algorithms of the software. The money produced is stored in electronic wallets.

How are the transactions recorded?

The head of the software that manages this currency comes from the blockchain. This software, which means block chain, performs many basic operations such as production, sale and operation of crypto coins. The network security is also provided by this blocking system for the money received and sold anonymously.

Who Can Produce Crypto Money?

In theory it can be said that everyone can generate crypto money on everyone’s computer, but it is necessary to apply “mining” technique very quickly. The production mechanism of these coins is in the hands of Chinese companies. The software in the hands of these companies, the individual does not be able to do more and quick mining. It is more preferable to get ready for personal production.

Where are Crypto Coins Stored?

Coins stored in the Blockchain network can be controlled via personal digital wallets. Wallet information is written to the network called public key. You can manage your wallets with software like Exodus. If you want to keep your money in a safe way, you need to keep your private key information, not share it with anyone, and get your money from reliable sources.

Is There Physical Reserve?

It is not possible to use crypto coins as concrete or banknotes. But this money has a currency like euro or dollar and you can cash your crypto money at any time.

How Many Pieces Has Crypto Currency?

New crypto currencies appear almost every day . In addition to brands such as Bitcoin , Ethereum, Ripple, Litecoin, there are more than 1500 crypto currencies.

How Reliable?

While the crypto currency has a solid firewall, some errors can occur due to its anonymous feature and human factor.

Is it Legal or Illegal?

Although crypto coins are banned by some countries, they are free to use in countries such as the USA, China, Japan. But it can also be used illegally because of money laundering and illegal transfer.

How Much is a Crypto Money Buying Value?

The value of crypto coins can undergo rapid changes depending on different elements. 

What is Ripple? How to buy? Will it be $ 1?

What is Ripple? How to buy? Will it be $ 1?

What is Ripple? How to buy? Will it be $ 1?
Ripple is the third biggest crypto currency in the world. What is Ripple, which makes the highest output of recent times? Will Ripple, a global payment network, overthrow the Bitcoin? What is the value of Ripple? Where and how to get Ripple?


In 2012 Ripple was developed by Arthur Britto, David Scwartz and Ryan Fugger; a crypto currency that is not earned by mining can also be defined as the international money transfer network, which enables money transfers to be made quickly and cheaply. Ripple; distributed financial technology enables banks to send real-time international payments between networks. Ripple, traded on the market with the abbreviation XPR; It is the third largest crypto currency following Ethereum.

In 2012, the United States first appeared ripple, blockhain-based work. In the ripple network running with the ECDSA and ED25519 algorithm, 17 banks are involved in the transaction and 20 banks are in agreement and testing phase. With an investment of $ 90 million, it has succeeded to be one of the 4 largest companies.

What is the purpose of Ripple?

Head of cryptography expert David Schwartz on Ripple; Today’s payment systems are like e-mails in the early 80s. Each provider established their own system for their customers and if people were using different systems, they could not interact with each other easily. The system is designed to connect different payment systems. ”Made the description.

Ripple; It was launched to prevent transaction delays, eliminate transaction fees, facilitate international money transfer transactions and provide services to the financial market. Ripple aims to shake the throne of payment systems.

The Ripple network is designed to allow uninterrupted transfer of any currency, regardless of whether it is a dollar, euro, pound, yen or Bitcoin currency.

What are the features of Ripple?

Ripple has a centralized network that contains a single source of accuracy and cannot be exchanged. This makes operations more secure. PII data allows you to protect your transaction privacy and identity confidentiality only while remaining in your bank.
For banks that operate in different networks, they have the ability to link financial networks while providing the opportunity to process without requiring a third party. It is also very easy to integrate into existing systems.
The banks included in the Ripple network are able to transfer money at very low costs. An average transaction fee of $ 0.0011 is paid per ripple network. This value is approximately 0.0015 BTC for bitcoin; that is, its current value is about 3.5 dollars. In other words, a bitcoin process is 3000 times more expensive than a ripple process.
The funds transferred in Ripple are transferred to the other party’s account within 5-10 seconds.


Complete transaction confidentiality for each financial institution
PII data is behind your bank’s firewall
Transactions signed by using ECDSA and ED25519 algorithms


Capacity of the world to process the volume of cross-border payments
Unlimited processing possibilities
Option to access liquidity in a competitive FX market

Can work together;

Ability to trade directly for banks operating in different networks
Integration with existing systems and standards
Ability to link traditional and emerging financial networks

What is the difference between ripple and bitcoin?

Ripple is like bitcoin in many ways. Like Bitcoin, Ripple’s XRP unit is in the form of a numerical currency based on mathematical formulas and contains a limited number of units that can be ultimately removed. Both currencies can be transferred from account to account (peer-to-peer or P2P) without the need for an intervening third party. And they both provide digital security against the possibility of imitation coins.

Is Ripple competing with Bitcoin?

It positions Bitcoin as a complement to its own rather than as a competitor. In fact, there is even a page dedicated to the Bitcoinists.

Stephen Thomas, a senior developer of the protocol, said,Ripple is going to open many more gateways for bitcoin users and easier ways to connect bitcoin to the mainstream financial world.

How many Ripple will it be?

The company is finally planning to create 100 billion Ripple. The company plans to keep half of this amount in the hands of the other half is planning to release for circulation.

Where and how to get Ripple?

Some people get bitcoins and turn it into XRP. Some of them are traded on foreign stock exchanges, so we are experiencing less problems.

Bittrex, Poloniex, Bitstamp, Shapeshift is known to be the most preferred in the purchase of foreign exchanges. You can also buy from Ripple’s own site.

Will Ripple Be $ 1 At The End Of The Year?

Ripple is popular in both crypto money markets and Google trend words. I Will Ripple be worth $ 1 at the end of the year? Ti Nigeri Gren replied. Let’s not extend this, the answer is ”yes.The potential of the XRP to take this wind behind and continue is quite high.

7 methods in which cyber security block chain technology can be used

7 methods in which cyber security block chain technology can be used

7 methods in which cyber security block chain technology can be used

The security provided by block chain technology is increasingly attracting the attention of the security sector, which is looking for effective ways of protecting, storing and changing data. Komtera Technology’s security experts, who are the market leaders with their distribution and solutions in the field of information security, underline that the block chain is now being used as a security tool in its own right.

1. Distributed Identity

There are two types of identity in the networks, one for the user and the other for the device. Authentication of devices connected to the network is a very serious issue. The block chain has been used for a long time, since it is easy to create and verify the identity of these devices. The chains meet the needs of IoT devices with the infrastructure they offer, making them part of a chain that has been completely verified and secured.

2. Distributed Storage

Cyber ​​attackers are always fond of huge databases, and a violation of a single data with terabyte-size information can cause millions of or tens of millions of records to be exposed. In the block chain, while the data is stored in a wide range of systems, both the information contained in each node in the chain and the entire database are guaranteed by the storage feature of the ledger. In addition, it is easy to manage storage security as it is difficult to modify data.

3. Mandatory Liability

Although a pseudo-commitment to safety requirements is shown, investors and regulatory regulators want verifiable records that require more than just artificial commitment to take the right steps. The block chain allows you to check and record every change, or to initiate a judicial action in case of a problem.

4. Data Integrity

The block chain reflects a complexity that is very difficult to break down with a decentralized structure that stores all the information required for systems to function from passwords to rules. In this whole, no one can access and modify all the information. It makes a very natural solution to maintain the integrity of a data set, by making it possible to verify the changes that are required in the data, and in a way that records everything.

5. Critical Infrastructure Protection

Both energy transport systems and networks bring various security problems. Some time ago, Russian troops deployed a special Trojan horse virus to a power grid to provide remote access, posing a danger to this issue and posing a problem that sector workers should surely have to deal with.

The advantages of the block chain in terms of protection of critical infrastructures come from change verification and transparency of payments. It is almost impossible to store malicious software or make illegal changes within this system that records every change.

6. Distributed Encryption

The most sensitive part of an encryption system is where the encryption keys are stored. If a cyber attacker can access this keystore, he can make sense of all the encrypted messages in the system. It also has access to the login information for all users at various levels.

The security of the information in the block chain is based on the diffusion of the used and used algorithms instead of trying to keep these keystores hidden in different locations. The chain, which keeps users’ information secure in this way, makes the tools that most cyber-attackers use to seize the password useless.

7. A Special Case: Health Services

The health records of patients come early in the most sensitive data in terms of the quality and quantity of the data. Block chain technology is seen as a way to keep medical records of medical services and medical information kept safe.

Some companies are starting to use block chains to store these records. In such a model, once the patient records are entered, all the doctors of the patient can easily access them and a new node can be added to the chain. Companies using block chain technology to secure electronic records are expected to increase over time.

Cyber ​​security rules do not comply with 1 million pounds of punishment

Cyber ​​security rules do not comply with 1 million pounds of punishment

Cyber ​​security rules do not comply with 1 million pounds of punishment

Those who do not fulfill the obligations of national cyber security, cyber attacks against cyber-attacks and deterrent, or those who do not implement the measures will be fined up to one million dollars.

The Regulation on the Amendment of the Regulation on Administrative Sanctions of the Information Technologies and Communication Authority (ICTA), Information Technologies and Communication Authority was published in the Official Gazette and entered into force. 

Accordingly, if the operator violates his obligations under the legislation of Caller Line Information (CLI) and related legislation related to the numbering, an administrative fine shall be imposed up to 3 percent of the net sales in the previous calendar year. In cases where the violation constitutes a severe defect, the authorization of the operator will be terminated.

If the consumer does not fulfill the obligations related to value-added electronic communication services, except in cases where the consumer is deceived or misled, an administrative fine of up to 1 percent of the net sales of the operator in the previous calendar year shall be deducted. In the event that the operator violates the consumer rights legislation in the value-added electronic communication services, by determining that the consumer is deceived or misled, an administrative fine of up to 3 percent of the net sales of the operator in the previous calendar year will be imposed. If the violation is found to be a serious flaw, the authorization of the operator will be canceled.

Violations related to network and information security and violations related to cyber security are provided to private law legal entities (associations, , union, company) thousand liras to 1 million pounds administrative fines will be applied. 

Crypto money mining continues to grow rapidly

Crypto money mining continues to grow rapidly

Crypto money mining continues to grow rapidly!

McAfee researchers; he analyzed the trend of malicious crypto mining software, Windows 10 Cortana vulnerabilities, blockchain attack vectors, mobile billing fraud practices and exploitability features.

McAfee , a cyber security company that offers a wide range of services, from devices to cloud computing , today released the McAfee Labs Threat Report: September 2018. The report examines the trends and trends in new cyber threats in the second quarter of 2018.

McAfee Labs found that crypto mining software, which started to grow in the fourth quarter of 2017, continued to grow during the first half of 2018. McAfee also found that the vulnerabilities used in the 2017 WannaCry and NotPetya attacks continued to be evaluated with new malware versions. 

Although it is more rare than ransomware, malicious crypto mining software has quickly become known in the threat field. With about 400,000 increase in the fourth quarter of 2017, examples of new malicious crypto mining software increased by 629% to 2.9 million units in the first quarter of 2018. This trend continued in the second quarter. The total number of samples increased by 86% with more than 2.5 million new samples. McAfee Labs has detected that mining features have been added to legacy malware, such as ransomware. 

In some cases, crypto mining has been targeted to target specific groups rather than a broader range of potential victims. A harmful group of crypto mining software targeted players on a Russian forum, appearing as a eden mod ğ claiming to have improved popular games. Players are tricked into downloading malware that uses their computer resources for their own profit. 

Although harmful crypto mining software primarily targets computers, there are other devices among victims. For example, Android phones with malware named ADB.Miner in China and Korea were used in Monero crypto currency production for criminals. 

Dik A few years ago , we didn’t think that Internet routers, video recorders, and other Internet of Things tools would be used for crypto mining. The processors of these devices were inadequate for this kind of production, sözler said Christiaan Beek, Senior Chief Engineer and Senior Chief Engineer at McAfee Advanced Threat Research. If I were a cyber criminal with 100,000 botnet of this type of IoT devices, I would be able to generate enough crypto money to provide a new and profitable revenue stream. 

Malicious Software

One year after the WannaCry and NotPetya attacks, the number of new malware samples specifically designed to take advantage of software vulnerabilities increased by 151% in the second quarter. McAfee found that the methods used by these two high-profile threats were used in new malware groups for different purposes. Similarly, new exploits are exploited to reveal completely new threats. 

E WannaCry and NotPetya are a powerful example of how cybercriminals can use malicious software to exploit vulnerabilities and quickly spread across networks, amacıyla said Beek. It is surprising to see that many vulnerabilities are used. This situation unfortunately shows that both users and organizations need to do a better job of closing the patches as soon as they come out. birçok 

Windows 10 Cortana Vulnerabilities

The research team discovered an open voice in Cortana, Windows 10’s audible assistant. When Microsoft released a patch in June to shut down, it could allow attackers to run code from a lock screen on a completely up-to-date machine (RS3 and RS4 before June patch) using Windows 10. McAfee was merged by Microsoft and focused on three research vectors represented as CVE-2018-8140. McAfee reported this vulnerability to Microsoft in April as part of its responsible disclosure policy. 

Billing Scams on Google Play 

The research team identified a new billing scam in at least 15 applications on Google Play. This new fraudulent activity shows that cybercriminals continue to find new ways to steal money from victims using applications in legitimate stores such as Google Play. AsiaHitGroup Gang behind fraudulent activities has been actively working since the end of 2016, when they spread Sonvpay.A, a fake installation application that tried to get paid for downloading copies of popular applications from at least 20,000 victims in most of Thailand and Malaysia. then, in November 2017, Sonvpay.B attack on Google Play was detected. Sonvpay.B, determine the country in which the victim is located from the IP address, 

Threats to Blockchain Security 

The research team identified the biggest security threats to users and those implementing blockchain technologies. Researchers in the analysis of phishing, malware and application deficits were identified as the leading attack vectors. 

2018 2nd Quarter Threat Activities

In the second quarter of 2018, McAfee Labs identified five new threats per second. These included new threats to the most recent successful technologies and tactics, using remarkable technical features that further enhance the defense of goals. 

The total number of ransomware samples continues to increase. This number grew 57% in the last four quarters. Although families of new ransomware were less likely than the previous quarters, the company said new versions of existing ransomware families were seen. For example, in the second quarter, the company identified a dozen new versions of the Scarab family of ransomware. These new releases account for more than half of the total number of edited versions of the family since it first appeared in mid-2017. 

Mobile malware. The number of new mobile malware samples increased by 27% in the second quarter. This was the second quarter of the quarter, with an upturn. 

JavaScript malware. An increase of 204% in new cases indicates that cybercriminals are transitioning to next-generation JavaScript malware. JavaScript malware, which declined significantly in the last three quarters, broke the record with 7 million new samples. In the first quarter, the number of these software was about 2 million. 

LNK malware. Although PowerShell was effective among malware developers in the past quarters, the growth rate of new samples dropped to 15%. However, new LNK malicious software continues to grow. Cybercriminals have started to use .lnk shortcuts more often to distribute malicious PowerShell command directories and other malicious software. The total number of samples in this category increased by 489% in the last four quarters.

Spam botnets. Gamut’s spam botnet left behind all others in the second quarter. In the phishing attacks for the Canadian Revenue Administration, this botnet was widely used. Recent attacks have been related to counterfeit job offers, which are frequently used for money leasing methods.

8 viruses that secretly generate crypto coins on your computer

8 viruses that secretly generate crypto coins on your computer

8 viruses that secretly generate crypto coins on your computer

Secret crypto-money mining, called Cryptojacking, remains one of the most critical attack methods of 2018. The malicious miners who process the crypto-money with the processing power and electrical energy of the devices they take over, disables company devices. Network security is a leader in solutions for WatchGuard Turkey and Greece Country Manager Joseph is not home, the world underlines that most effects of a 8 cryptojacking method to take measures companies against explaining stronger cryptojacking attack.

Evmez warns companies and individual users by sorting out the most common cryptojacking viruses discovered recently and causing great damage to thousands of systems. 

coinhiv to

CoinHive virus, which we hear first when Cryptojacking is mentioned, is a mining script that generates attacks inside the servers. CoinHive is remembered for an attack campaign targeting hundreds of thousands of internet service providers and large networks that prefer the most MicroTic brand routers. In this large-scale attack, all webpages entered through the virus-infected dispensers were infected with the CoinHive virus. 


XMRig, another known cryptojacking application, continues to make its reputation as an open source and highly capable malicious software. XMRig is also used as a more and more frequently used software to generate attack types that easily trick users, but is also used to strengthen trojan horses. Due to the high probability of attack that it can create, this software is a Swiss army knife for malicious cryptomineraries. 


In fact, CroniX, a type of XMRig software, draws more attention than its counterparts because of a new security vulnerability that has recently arisen, causing serious damage and high privacy. CroniX comes up with the use of Apache Struts 2, the latest version of the vulnerability, which helps with the development of web applications. The researchers remember that the software is called CroniX because it assigns scheduled tasks called cron to the server to provide defense against defenses and executes command processes with fake transaction names. 


This crypto money worm, discovered by an independent researcher last summer and thought to have emerged in China, is called ZombieBoy. ZombieBoy targets corporate networks and seeks multiple attacks from multiple vulnerabilities. Using the EternalBlue vulnerability, ZombieBoy can log on to systems without a password, due to the weakness called DoublePulsar and EternalBlue. It makes it difficult to notice ZombieBoy, which installs fixing features to the system it infects during these operations. 


The devices of companies that are considered as attractive data centers by malicious crypto money miners are being tried to be captured by PowerGhost, a non-file-related software. PowerGhost not only creates a sneak attack on its own, but it also points out that PowerGhost can increase the power of DDoS attacks.

rediswannam to

The RedisWannaMine attack, discovered in early 2018, is adding various software to these servers by targeting Redis, Windows Server, and APACHE SOLR servers, which have not been alleviated by updating their updates. Similar to the Zombie Boy attack, RedisWannaMine also takes advantage of the EternalBlue vulnerability and moves by generating a series of chain attacks.

Underminer is

Underminer exploit, which usually selects users in Asian countries as victims, is increasing its threatening area with advanced cloaking techniques. With this exploit, it is known that Hidden Mellifera, which is installed on systems, has affected nearly half a million systems even before it started to be served with Underminer. 

massmin is

MassMiner, an advanced mining worm, brings together various exploits and hacking techniques to infiltrate the system it targets. The MassScan scan tool used to find the servers that MassMiner will target will cause the Internet to be scanned in less than six minutes. MassMiner designs a command and control system that communicates between cyber attackers and the system through a technique called Gh0st, which is a method for overcoming passwords.

Three of the 10 largest regressed

Three of the 10 largest regressed

Three of the 10 largest regressed

Following the various restrictions and prohibition reports on the crypto-currency markets, the rise in the market was replaced by a fluctuating trend, while three of the highest volume 10 crypto currencies dropped in the last 24 hours.

The French Financial Markets Authority (AMF) added 21 jobs to its blacklist associated with crypto currencyfraud actions. The ICO (Initiative Coin Offering – Crypto Currency Initial Public Offering) is the website that provides services related to crypto currency trading and mining, while the AMF stated that the list has been updated regularly and that it is necessary to be careful about the new entrances to the list. Bitcoin , with its market volume of 112 billion 267 million dollars as a result of the developments, increased 0.68 percent in the last 24 hours to $ 6,492 and accounted for 52.3 percent of the market.

The highest volume of 10 crypto currencies in the market, which consists of 2,003 crypto currencies, traded in 14,246 units, increased by 0.45 percent, 0.22 percent and 0.20 percent, respectively. . Among the highest volume 100 crypto currencies, 33 fell, and the downtrend was paved by 25.55 percent and HyperCash was the 65th. Ripple increased to $ 1 after the end of the year until the end of the year to come to the second place in the evening after the rush, the value of the value of the loss, then fell back to the third row. 

Due to the fluctuations in the market, the market volume was 214 billion 817 million dollars and the 24-hour trading volume in the market was calculated as 14 billion 854 million dollars.