Paraguay President Says Ignore Fake Bitcoin Is Legal Tender Post


Join Our Telegram channel to stay up to date on breaking news coverage

Paraguay President Santiago Peña has disowned a post from his official X account that falsely claimed the country had adopted Bitcoin as legal tender.

His office said the official X account had ”presented irregular activity that suggests possible unauthorized access” and asked the public to ignore its content.

Paraguayan Bitcoin

Paraguay President X Account Said Bitcoin Is Legal Tender

The unauthorized post had said in English that Paraguay has made Bitcoin legal tender in the country. The now-deleted post added that Paraguay has established a BTC reserve with $5 million, and also provided a wallet address for investors to “secure [their] stake.” 

The address shared in the post had barely been used, and only had around $4 worth of BTC. Peña’s post yesterday was also the first one that had been written in English, adding to concerns that his account may have been hacked.

Paraguay’s national cybersecurity team is currently working with X to investigate the situation. 

Growing Trend Of X Hacks To Promote Crypto Scams

X has been a playground for cybercriminals over the years. Yesterday’s apparent scam post is the latest in a growing trend of compromised accounts of influential figures promoting sham tokens and schemes.

In 2020, for example, hackers were able to gain access to dozens of high-profile accounts, including those belonging to Elon Musk, Barack Obama, Joe Biden, Bill Gates, Kanye West as well as companies like Apple, Uber, McDonald’s and others. 

Peña’s post yesterday also comes amid reports that some countries in Central and South America are considering following in El Salvador’s lead and looking into making Bitcoin legal tender.

In Paraguay, politicians are still trying to structure a regulatory framework to supervise and support the growing crypto industry.

Related Articles:

Best Wallet – Diversify Your Crypto Portfolio

Best Wallet
  • Easy to Use, Feature-Driven Crypto Wallet
  • Get Early Access to Upcoming Token ICOs
  • Multi-Chain, Multi-Wallet, Non-Custodial
  • Now On App Store, Google Play
  • Stake To Earn Native Token $BEST
  • 250,000+ Monthly Active Users

Best Wallet


Join Our Telegram channel to stay up to date on breaking news coverage





Source link

Leave a Reply

Subscribe to Our Newsletter

Get our latest articles delivered straight to your inbox. No spam, we promise.

Recent Reviews


Researchers found one-click RCE in ASUS’s pre-installed software DriverHub

Pierluigi Paganini
May 12, 2025

Expert found two flaws in DriverHub, pre-installed on Asus motherboards, which allows remote code execution via crafted HTTP requests.

Security researcher ‘MrBruh’ discovered two vulnerabilities, tracked as CVE-2025-3462 (CVSS score of 8.4) and CVE-2025-3463 (CVSS score of 9.4), in DriverHub, a driver that is pre-installed on Asus motherboards. A remote attacker can exploit the flaws to gain arbitrary code execution.

Both flaws stem from insufficient validation, allowing misuse of DriverHub features. The company pointed out that the flaws don’t impact laptops and desktops.

DriverHub, a driver updater with no GUI, runs a background process that talks to driverhub.asus.com via RPC on localhost port 53000. Researcher MrBruh found that while it only accepts requests with an origin header set to “driverhub.asus.com,” a flawed wildcard match allowed requests from domains like “driverhub.asus.com.mrbruh.com.” An attacker can exploit this vulnerability to install malicious software.

Researcher MrBruh discovered that Asus DriverHub exposes several local RPC endpoints, including dangerous ones like UpdateApp, which downloads and installs executables with admin rights if signed by Asus. By analyzing JavaScript and decompiled code, he found that a zip file used in driver installs includes an INI setting (SilentInstallRun) that can execute arbitrary commands during silent installs. This opens a path to remote code execution (RCE).

“The files of importance here are the AsusSetup.exeAsusSetup.ini and SilentInstall.cmd. When executing AsusSetup.exe it first reads from AsusSetup.ini, which contains metadata about the driver. I took interest in a property in the file: SilentInstallRun.” reads the report published by MrBrush. “When you double-click AsusSetup.exe it launches a simple gui installer thingy. But if you run AsusSetup.exe with the -s flag (DriverHub calls it using this to do a silent install), it will execute whatever’s specified in SilentInstallRun. In this case the ini file specifies a cmd script that performs an automated headless install of the driver, but it could run anything.”

The exploit chain abuses Asus DriverHub’s update mechanism: a malicious site on a spoofed subdomain sends requests to download a benign-sounding executable and a crafted AsusSetup.ini. Then, it downloads a legitimate, signed AsusSetup.exe, which runs silently with admin rights and executes the attacker’s payload (calc.exe) as specified in the .ini file.

MrBruh discovered the flaw on April 7 and reported the vulnerabilities on April 8. Asus released security updates on May 9.

MrBruh asked Asus if they offered bug bounties. The company said they don’t offer bug bounties but would add the researcher’s name to their “hall of fame.”

“I asked ASUS if they offered bug bounties. They responded saying they do not, but they would instead put my name in their “hall of fame”. This is understandable since ASUS is just a small startup and likely does not have the capital to pay a bounty.” concludes MrBruh.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ASUS)







Source link