HomeTechnologyWhy hackers like cryptocurrency, understand step by step process from AIIMS incident

Why hackers like cryptocurrency, understand step by step process from AIIMS incident


In fact, after the cyber attack, those who hacked it have demanded 200 crores of cryptocurrency. Now the question arises that why the hackers have demanded cryptocurrency. Why do hackers love cryptocurrency?

Why hackers like cryptocurrency, understand step by step process from AIIMS incident

Crypto game reaches AIIMS

AIIMS Delhi (AIIMS) The server is down since last 6 days. e-hospital server down (E-Hospital Server) Due to this, many services including OPD have been badly affected. About 2 to 3 crore patients are facing problems due to this attack, as well as the data of many VVIPs is also at stake.

In fact, after the cyber attack, those who hacked it have demanded 200 crores of cryptocurrency. Now the question arises that why the hackers have demanded cryptocurrency. Why do hackers love cryptocurrency?

Why do hackers love cryptocurrencies?

  • Cryptocurrency or rather bitcoin was started in the year 2009. After which the hackers made it a big weapon for themselves.
  • There are two biggest advantages of cryptocurrency for hackers or cybercriminals.
  • The first advantage is that it works like a decentralized currency and no institution like bank works in it. Because of which the user of this currency is completely anonymous or hidden.
  • Another advantage of this is that bitcoin and other currencies like it can be kept in virtual wallets. Which is identified only by the number.

This is how cryptocurrency works

Cryptocurrency or virtual currency is also called digital currency, which is generated with the help of encryption technology and then regulated. This type of currency has not been recognized by any central bank of the world, nor is it regulated by any central bank. There is no stamp of any country on this type of currency.

read this also



English News Headline: why hackers like cryptocurrency understand step by step process from aiims incident



Source link

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular

Recent Comments