Bitcoin (BTC) Price Analysis – January 2

  • If the crypto's price falls below the $3,700 price level, the downtrend is likely to resume.
  • The BTC price is likely to rise if the $4,000 price level is broken and the price is sustained.

Bitcoin, BTCUSD, CryptoCompare chartBitcoin Chart by Trading View

BTCUSD Medium-term Trend: Ranging

  • Resistance levels: $7,000, $7,200, $7,400
  • Support levels: $3,800, $3,300, $3,100 

In the last five days, the price of Bitcoin had been fluctuating between the $3,800  and $3,900 price levels. The 12-day EMA and the 26-day EMA  are horizontally flat indicating that price is in a sideways trend. The crypto's price is neither below nor above the EMAs indicating that price is also ranging.

Meanwhile, the two critical levels to watch out for are the $3,700 and $3,900 price levels. If the crypto's price falls and breaks the $3,700 price level, the downtrend is likely to resume. Similarly, if the bulls break the $4,000 price level, the crypto will reach the previous highs of $4,200 and $4,400 price levels.

BTCUSD Short-term Trend: Ranging   

Bitcoin, BTCUSD, CryptoCompare chartBitcoin Chart by Trading View   

On the 4-hour chart, the crypto's price is in a sideways trend. In the last week, the crypto's price fluctuated above and below the 12-day EMA and the 26-day EMA. Yesterday, the BTC price fluctuated above the  EMAs to reach the high of $3,956.30. Today, the BTC price is retracing to the 26-day EMA. 

Meanwhile, the Stochastic indicator is approaching the overbought region but below the 80% range. This indicates that Bitcoin is in a bullish momentum and has a buy signal.

 

The views and opinions expressed here do not reflect that of CryptoGlobe.com and do not constitute financial advice. Always do your own research.   

Bitcoin ‘Sextortion’ Scheme Netted Cybercriminals Over $330,000

Blackmailers have reportedly managed to rake in over $330,000 worth of bitcoin, the flagship cryptocurrency, through an email-based ‘sextortion’ campaign that has been ongoing since at least 2017, and saw its activity surge last year.

According to a report published by UK firm Digital Shadows, the cybercriminals received said amount from over 3,100 unique BTC addresses. The funds ended up in 92 different bitcoin addresses believe to belong to the same organization, that could reportedly be making an average of $540 per victim.

The firm’s report, first spotted by The Next Web, tracked a sample of 792,000 emails sent to victims. The ‘sextortionists’ reportedly sent them an email that would include a known password as “proof” they hacked them, and claimed to have video evidence of them seeing adult content online.

The threat was that the video would be published online, if a ransom in BTC wasn’t paid. Last year, Cornell University computer science professor Emin Gün Sirer warned potential victims to “never pay, never negotiate” with cybercriminals trying to extort them.

Per Sirer, the emails were being sent to every email account on the popular website haveibeenpwned, which shows whether emails addresses had their data leaked on well-known online security incidents.

A Sophisticated Operation

The UK firm’s report seems to show the ‘sextortion’ operation was a sophisticated one, as scammers were seemingly trying to hire more people to help them target high-net-work individuals.

These hires could be getting high salaries, up to $768,000 a year, if they had experience in network management, penetration testing, and programming. The cybercriminals have notably also been using social media to target their victims.

The scammers’ capabilities are said to have varied in skill, as while some struggled to distribute a large amount of emails that could get past email server or spam filters, others managed to show high levels of sophistication, with emails sent from accounts specifically created for the campaigns.

Moreover, these campaigns were launched on a global scale, as the servers the emails came from were in five different continents. The highest amount of emails came from Vietnam, Brazil, and India. These servers could, however, have been compromised by the scammers as well.