Binance Square

BlockchainSecurity

390,299 views
256 Discussing
Juragan Mengkudu
--
šŸš€ Speed and privacy don’t have to trade off. INIChain uses breakthrough cryptography to keep your data and transactions secure against cyber attacks — all with ultra-low fees. In crypto, security is value. Lock it down with INIChain. šŸ” #CryptoSafety #Initverse #INIChain #BlockchainSecurity
šŸš€ Speed and privacy don’t have to trade off. INIChain uses breakthrough cryptography to keep your data and transactions secure against cyber attacks — all with ultra-low fees. In crypto, security is value. Lock it down with INIChain. šŸ”

#CryptoSafety #Initverse #INIChain #BlockchainSecurity
Hackers Breach Nervos Network, Steal $3 Million in Crypto AssetsAnother serious security breach has shaken the crypto world. The Nervos Network has fallen victim to an exploit after attackers took control of its cross-chain bridge Force Bridge, leading to the theft of approximately $3 million in digital assets. Attackers Took Over Force Bridge and Laundered the Funds According to initial reports, an unknown attacker managed to seize control of the Force Bridge—used to connect different blockchains within the Nervos ecosystem. After gaining access, they moved the assets to Ethereum and laundered them through the privacy tool Tornado Cash. This tactic made it nearly impossible to trace or recover the stolen funds—Tornado Cash is specifically designed to obfuscate transaction trails. Magickbase and Cyvers Sound the Alarm The first warning came from Magickbase, a developer of desktop wallets integrated with Nervos. In a post on X (formerly Twitter), the team reported suspicious activity on Force Bridge and immediately shut down related services as a precaution: ā€œWe detected abnormal activity on #ForceBridge and proactively paused the service. Our team is investigating the situation.ā€ Blockchain security firm Cyvers Alerts followed up with a detailed analysis, confirming that a suspicious address had taken over the bridge and initiated unauthorized transfers from the Nervos network. Tornado Cash Used as a Laundering Tool The attacker moved the stolen assets to Ethereum and began funneling the funds through Tornado Cash—a crypto ā€œmixerā€ that hides transaction origins and destinations. This method of money laundering has become increasingly common among cybercriminals, and once the funds enter Tornado, recovery becomes nearly impossible. A Growing Threat Across the Blockchain Space Unfortunately, this isn’t an isolated case. Cross-chain bridges—technologies meant to connect different blockchain ecosystems—have become one of the most targeted components in crypto infrastructure. Just in the past year, we've seen similar exploits affect the Ronin Bridge, Binance Bridge, Orbit Chain, Socket, and more, costing users millions of dollars. The Force Bridge was part of Nervos Network’s broader vision of secure and scalable blockchain interoperability. The network has long been praised for its hybrid model that combines Bitcoin’s UTXO system with smart contract functionality. In a 2024 report, Messari even named Nervos CKB a potential breakthrough platform in blockchain programmability. However, this breach highlights the harsh truth: even technically advanced networks are only as secure as their weakest component. Tornado Cash: Privacy Protector or Criminal Gateway? This incident also reignites the ongoing debate around tools like Tornado Cash. While proponents argue it provides privacy benefits to regular users, criminals continue to exploit it to clean massive amounts of stolen funds. Given the increasing frequency of such events, it's likely that regulatory pressure on privacy-focused tools will continue to intensify. #Cryptoscam , #CyberSecurity , #NervosNetwork , #BlockchainSecurity , #TornadoCash Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Hackers Breach Nervos Network, Steal $3 Million in Crypto Assets

Another serious security breach has shaken the crypto world. The Nervos Network has fallen victim to an exploit after attackers took control of its cross-chain bridge Force Bridge, leading to the theft of approximately $3 million in digital assets.

Attackers Took Over Force Bridge and Laundered the Funds
According to initial reports, an unknown attacker managed to seize control of the Force Bridge—used to connect different blockchains within the Nervos ecosystem. After gaining access, they moved the assets to Ethereum and laundered them through the privacy tool Tornado Cash.
This tactic made it nearly impossible to trace or recover the stolen funds—Tornado Cash is specifically designed to obfuscate transaction trails.

Magickbase and Cyvers Sound the Alarm
The first warning came from Magickbase, a developer of desktop wallets integrated with Nervos. In a post on X (formerly Twitter), the team reported suspicious activity on Force Bridge and immediately shut down related services as a precaution:
ā€œWe detected abnormal activity on #ForceBridge and proactively paused the service. Our team is investigating the situation.ā€

Blockchain security firm Cyvers Alerts followed up with a detailed analysis, confirming that a suspicious address had taken over the bridge and initiated unauthorized transfers from the Nervos network.

Tornado Cash Used as a Laundering Tool
The attacker moved the stolen assets to Ethereum and began funneling the funds through Tornado Cash—a crypto ā€œmixerā€ that hides transaction origins and destinations. This method of money laundering has become increasingly common among cybercriminals, and once the funds enter Tornado, recovery becomes nearly impossible.

A Growing Threat Across the Blockchain Space
Unfortunately, this isn’t an isolated case. Cross-chain bridges—technologies meant to connect different blockchain ecosystems—have become one of the most targeted components in crypto infrastructure.
Just in the past year, we've seen similar exploits affect the Ronin Bridge, Binance Bridge, Orbit Chain, Socket, and more, costing users millions of dollars.
The Force Bridge was part of Nervos Network’s broader vision of secure and scalable blockchain interoperability. The network has long been praised for its hybrid model that combines Bitcoin’s UTXO system with smart contract functionality. In a 2024 report, Messari even named Nervos CKB a potential breakthrough platform in blockchain programmability.
However, this breach highlights the harsh truth: even technically advanced networks are only as secure as their weakest component.

Tornado Cash: Privacy Protector or Criminal Gateway?
This incident also reignites the ongoing debate around tools like Tornado Cash. While proponents argue it provides privacy benefits to regular users, criminals continue to exploit it to clean massive amounts of stolen funds.
Given the increasing frequency of such events, it's likely that regulatory pressure on privacy-focused tools will continue to intensify.

#Cryptoscam , #CyberSecurity , #NervosNetwork , #BlockchainSecurity , #TornadoCash

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
Pt.3: How to Prepare? Quantum-Resistant Cryptography and AdaptationTo defend against these threats, researchers and industry leaders are working on post-quantum cryptography (PQC). These are algorithms designed to withstand attacks from quantum computers while remaining secure and efficient for classical computers. Some of the most promising post-quantum algorithms include: CRYSTALS-Dilithium – a lattice-based digital signature algorithm.XMSS – a hash-based signature scheme.Lattice-based cryptography in general, which relies on mathematical structures believed to be resistant to quantum attacks. Implementing these quantum-resistant algorithms will likely require hard forks in blockchain networks, as well as consensus within the crypto community to ensure seamless transitions. What can crypto asset holders do today? Stay informed about quantum computing developments.Look for projects that are actively researching or adopting PQC solutions.Diversify your assets and consider using multi-signature or hardware wallets.Support community efforts to test and integrate PQC into existing blockchains. A particularly fascinating scenario is the future of Satoshi’s wallet and early Bitcoin addresses, which rely on older cryptographic schemes that would be among the first to be cracked if a powerful enough quantum computer becomes available. Looking Ahead While quantum computing is not an immediate threat, its rapid progress means that proactive measures are crucial to safeguard the crypto ecosystem. Collaboration between researchers, blockchain developers, and asset holders will be essential to ensure a smooth transition to a quantum-secure future. Whether Q Day is five, ten, or twenty years away, the time to prepare is now. If you missed the previous part, you can find it [here](https://www.binance.com/en/square/post/25032057750642). #CryptoSecurity #quantumcomputing #BlockchainSecurity #Hardfork #satoshiNakamato $BTC

Pt.3: How to Prepare? Quantum-Resistant Cryptography and Adaptation

To defend against these threats, researchers and industry leaders are working on post-quantum cryptography (PQC). These are algorithms designed to withstand attacks from quantum computers while remaining secure and efficient for classical computers.

Some of the most promising post-quantum algorithms include:
CRYSTALS-Dilithium – a lattice-based digital signature algorithm.XMSS – a hash-based signature scheme.Lattice-based cryptography in general, which relies on mathematical structures believed to be resistant to quantum attacks.

Implementing these quantum-resistant algorithms will likely require hard forks in blockchain networks, as well as consensus within the crypto community to ensure seamless transitions.

What can crypto asset holders do today?
Stay informed about quantum computing developments.Look for projects that are actively researching or adopting PQC solutions.Diversify your assets and consider using multi-signature or hardware wallets.Support community efforts to test and integrate PQC into existing blockchains.

A particularly fascinating scenario is the future of Satoshi’s wallet and early Bitcoin addresses, which rely on older cryptographic schemes that would be among the first to be cracked if a powerful enough quantum computer becomes available.

Looking Ahead
While quantum computing is not an immediate threat, its rapid progress means that proactive measures are crucial to safeguard the crypto ecosystem. Collaboration between researchers, blockchain developers, and asset holders will be essential to ensure a smooth transition to a quantum-secure future.
Whether Q Day is five, ten, or twenty years away, the time to prepare is now.

If you missed the previous part, you can find it here.

#CryptoSecurity #quantumcomputing #BlockchainSecurity #Hardfork #satoshiNakamato

$BTC
New Altcoin Feature Raises Security Concerns: Experts Warn of Potential Asset TheftA recent update in one of the leading altcoins — specifically Ethereum — has introduced an advanced yet potentially dangerous feature that has quickly become a tool for exploitation. Crypto trading firm Wintermute has issued a serious security alert regarding the misuse of EIP-7702, a new feature launched as part of the Pectra hard fork. šŸ”¹ EIP-7702: Innovation or Exploitation Risk? The feature EIP-7702 introduces a concept called account abstraction, which allows regular wallets to temporarily function as smart contracts. Promoted by Ethereum co-founder Vitalik Buterin, the function is designed to enable users to: šŸ”¹ batch multiple transactions, šŸ”¹ let someone else pay for gas fees, šŸ”¹ and use social authentication within a single transaction. However, this innovation has quickly turned into a security threat in the wrong hands. Wintermute: Over 80% of EIP-7702 Usage Is Malicious According to data analyzed via Dune Analytics, Wintermute revealed a troubling trend: More than 80% of EIP-7702 delegations are being exploited in ā€œCrimeEnjoyorā€ attacks. The method is simple — a short, copy-pasted smart contract code is repeatedly deployed across different addresses. The contract automatically transfers assets from wallets (whose private keys have been leaked) to addresses controlled by the attacker. ā€œThe CrimeEnjoyor contract is short, simple, and widely used,ā€ Wintermute reported. ā€œThis replicated bytecode now dominates EIP-7702 delegations. It’s darkly ironic.ā€ Scam Sniffer and SlowMist Also Issue Warnings Other security firms have echoed Wintermute's concerns: šŸ”¹ Scam Sniffer reported a malicious transaction linked to the notorious Inferno Drainer scam network, which led to losses of approximately $150,000. šŸ”¹ SlowMist emphasized that wallet providers must support clear identification of destination addresses in smart contracts that users are prompted to sign. Experts are urging increased transparency and user education to prevent unsuspecting users from authorizing harmful transactions. ā— Recommendations for Users šŸ”¹ Carefully review smart contract content before signing šŸ”¹ Avoid unverified or suspicious apps utilizing EIP-7702 šŸ”¹ Use wallets with enhanced security features and alerts šŸ”¹ Follow tools like Scam Sniffer to detect threats early šŸ’¬ Question for readers: Do you believe features like EIP-7702 are the future of crypto wallets—or too risky for widespread adoption? #EthereumUpdate , #CyberSecurity , #CryptoScamAlert , #BlockchainSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

New Altcoin Feature Raises Security Concerns: Experts Warn of Potential Asset Theft

A recent update in one of the leading altcoins — specifically Ethereum — has introduced an advanced yet potentially dangerous feature that has quickly become a tool for exploitation. Crypto trading firm Wintermute has issued a serious security alert regarding the misuse of EIP-7702, a new feature launched as part of the Pectra hard fork.

šŸ”¹ EIP-7702: Innovation or Exploitation Risk?

The feature EIP-7702 introduces a concept called account abstraction, which allows regular wallets to temporarily function as smart contracts. Promoted by Ethereum co-founder Vitalik Buterin, the function is designed to enable users to:

šŸ”¹ batch multiple transactions,

šŸ”¹ let someone else pay for gas fees,

šŸ”¹ and use social authentication within a single transaction.
However, this innovation has quickly turned into a security threat in the wrong hands.

Wintermute: Over 80% of EIP-7702 Usage Is Malicious
According to data analyzed via Dune Analytics, Wintermute revealed a troubling trend:
More than 80% of EIP-7702 delegations are being exploited in ā€œCrimeEnjoyorā€ attacks.
The method is simple — a short, copy-pasted smart contract code is repeatedly deployed across different addresses. The contract automatically transfers assets from wallets (whose private keys have been leaked) to addresses controlled by the attacker.
ā€œThe CrimeEnjoyor contract is short, simple, and widely used,ā€ Wintermute reported. ā€œThis replicated bytecode now dominates EIP-7702 delegations. It’s darkly ironic.ā€

Scam Sniffer and SlowMist Also Issue Warnings
Other security firms have echoed Wintermute's concerns:
šŸ”¹ Scam Sniffer reported a malicious transaction linked to the notorious Inferno Drainer scam network, which led to losses of approximately $150,000.

šŸ”¹ SlowMist emphasized that wallet providers must support clear identification of destination addresses in smart contracts that users are prompted to sign.
Experts are urging increased transparency and user education to prevent unsuspecting users from authorizing harmful transactions.

ā— Recommendations for Users
šŸ”¹ Carefully review smart contract content before signing

šŸ”¹ Avoid unverified or suspicious apps utilizing EIP-7702

šŸ”¹ Use wallets with enhanced security features and alerts

šŸ”¹ Follow tools like Scam Sniffer to detect threats early

šŸ’¬ Question for readers: Do you believe features like EIP-7702 are the future of crypto wallets—or too risky for widespread adoption?

#EthereumUpdate , #CyberSecurity , #CryptoScamAlert , #BlockchainSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
🚨 Exchange Hack Alert! Millions Vanish! 🚨 A crypto exchange called BitoPro got hit with a security breach šŸ’„losing over $11.5 million in digital assets. The hack happened on May 8, but wasn't disclosed until recently. On-chain data sleuths noticed funds moving to decentralized exchanges (DEXs) and then being cashed out. Some of the stolen crypto was funneled through Tornado Cash and even bridged to Bitcoin via THORChain – classic hacker moves to cover their tracks. The exchange claims user withdrawals are unaffected and that they're tracking the stolen funds with a third-party security firm. DeFi protocols remain a prime target for hackers šŸŽÆ, with recent exploits hitting Cetus and Nervos. Security analysts are emphasizing the importance of access control to prevent future attacks. What do you think of this growing threat? Follow for exclusive analysis! #CryptoHack #DeFiSecurity #BlockchainSecurity #TornadoCash #CryptoNews
🚨 Exchange Hack Alert! Millions Vanish! 🚨

A crypto exchange called BitoPro got hit with a security breach šŸ’„losing over $11.5 million in digital assets.

The hack happened on May 8, but wasn't disclosed until recently. On-chain data sleuths noticed funds moving to decentralized exchanges (DEXs) and then being cashed out. Some of the stolen crypto was funneled through Tornado Cash and even bridged to Bitcoin via THORChain – classic hacker moves to cover their tracks.

The exchange claims user withdrawals are unaffected and that they're tracking the stolen funds with a third-party security firm. DeFi protocols remain a prime target for hackers šŸŽÆ, with recent exploits hitting Cetus and Nervos.

Security analysts are emphasizing the importance of access control to prevent future attacks.

What do you think of this growing threat?
Follow for exclusive analysis!
#CryptoHack #DeFiSecurity #BlockchainSecurity #TornadoCash #CryptoNews
āš ļø Part 2 of our quantum series is live! šŸ’£ Discover why quantum computing poses a serious threat to your crypto assets. šŸ”“ From private key cracking and mining domination to smart contract breaches and trust erosion – we break down the four key risks that quantum computers bring to the blockchain. šŸ”¢ Find out exactly how many qubits it takes to compromise today's cryptography and the status of IBM Condor and Google's latest quantum advances. šŸ‘‰ Read the second article here: [Pt.2: The Quantum Threat to Crypto Assets](https://www.binance.com/en/square/post/25032057750642) Don't miss the next installment on how to protect yourself! #CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat $BTC
āš ļø Part 2 of our quantum series is live!

šŸ’£ Discover why quantum computing poses a serious threat to your crypto assets.

šŸ”“ From private key cracking and mining domination to smart contract breaches and trust erosion – we break down the four key risks that quantum computers bring to the blockchain.

šŸ”¢ Find out exactly how many qubits it takes to compromise today's cryptography and the status of IBM Condor and Google's latest quantum advances.

šŸ‘‰ Read the second article here: Pt.2: The Quantum Threat to Crypto Assets

Don't miss the next installment on how to protect yourself!

#CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat

$BTC
Pt.2: The Quantum Threat to Crypto AssetsQuantum computers pose a significant challenge to the security of cryptocurrencies and blockchain-based assets. Current cryptographic systems rely on mathematical problems that are extremely hard for classical computers to solve, like factoring large prime numbers. However, quantum algorithms such as Shor’s algorithm can solve these problems exponentially faster. Here are the four main risks posed by quantum computing to crypto assets: Breaking Private Keys Quantum computers can break the cryptographic schemes protecting private keys, making it possible to steal funds from wallets. It’s estimated that around 4,000 logical qubits would be needed to break widely used public-key cryptography, such as RSA and ECC (Elliptic Curve Cryptography). Dominating Mining Quantum computers could outperform classical miners, monopolizing block creation and disrupting the network’s fair distribution of rewards.Smart Contract Vulnerabilities Quantum attacks can target smart contracts and decentralized applications, potentially changing their behavior or bypassing security measures. Loss of Trust If quantum attacks become feasible, trust in blockchain networks could erode, leading to a collapse in confidence and the value of digital assets. Currently, the IBM Condor chip – with 1,121 qubits – represents a major milestone. Google’s research suggests that millions of physical qubits would be needed for large-scale quantum error correction, so we’re not yet at the point of quantum supremacy in breaking crypto, but progress is accelerating. Stay tuned – more insights coming in the next parts! If you missed the previous part, you can find it [here](https://www.binance.com/en/square/post/24960332519193). #CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat $BTC

Pt.2: The Quantum Threat to Crypto Assets

Quantum computers pose a significant challenge to the security of cryptocurrencies and blockchain-based assets. Current cryptographic systems rely on mathematical problems that are extremely hard for classical computers to solve, like factoring large prime numbers. However, quantum algorithms such as Shor’s algorithm can solve these problems exponentially faster.

Here are the four main risks posed by quantum computing to crypto assets:
Breaking Private Keys

Quantum computers can break the cryptographic schemes protecting private keys, making it possible to steal funds from wallets. It’s estimated that around 4,000 logical qubits would be needed to break widely used public-key cryptography, such as RSA and ECC (Elliptic Curve Cryptography).
Dominating Mining

Quantum computers could outperform classical miners, monopolizing block creation and disrupting the network’s fair distribution of rewards.Smart Contract Vulnerabilities

Quantum attacks can target smart contracts and decentralized applications, potentially changing their behavior or bypassing security measures.
Loss of Trust

If quantum attacks become feasible, trust in blockchain networks could erode, leading to a collapse in confidence and the value of digital assets.

Currently, the IBM Condor chip – with 1,121 qubits – represents a major milestone. Google’s research suggests that millions of physical qubits would be needed for large-scale quantum error correction, so we’re not yet at the point of quantum supremacy in breaking crypto, but progress is accelerating.

Stay tuned – more insights coming in the next parts!
If you missed the previous part, you can find it here.

#CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat

$BTC
āš ļø The Day Bitcoin Almost Died: The 184 Billion BTC Bug August 15, 2010 — The Forgotten Fork That Saved Bitcoin Before Bitcoin hit $70,000… Before it was called ā€œdigital goldā€ā€¦ Before institutions adopted it… Bitcoin nearly vanished forever. On August 15, 2010, a single transaction appeared on the blockchain that credited 184,467,440,737 BTC to one wallet — over 8,800 times more than Bitcoin’s total supply of 21 million. This wasn’t a scam — it was a critical software bug known as an integer overflow. It allowed the attacker to generate near-infinite BTC, violating Bitcoin’s core principle of scarcity. Panic set in. Bitcoin’s future hung by a thread. But just hours later, Satoshi Nakamoto and a few early developers sprang into action: • They released a patch (v0.3.10) • Coordinated a hard fork to erase the invalid transaction • Rolled back the chain to restore consensus It remains the only time in Bitcoin history that a transaction was removed from the blockchain. This bug showed the world that Bitcoin was not invincible. It was software — and software can fail. Still, Bitcoin didn’t die. In fact, it came back stronger. Today, Bitcoin is secured by global infrastructure, robust audits, and a decentralized community. While a bug of this scale is unlikely now, the lesson remains: Bitcoin is resilient, not untouchable. This event reminds us that trust in code is earned. It takes vigilance, transparency, and a global effort to protect decentralized systems. So next time someone says, ā€œBitcoin can’t fail,ā€ remember — it almost did. šŸ” Want more untold crypto stories? Visit Binance Academy to explore the past, understand the present, and prepare for the future of blockchain. #Bitcoin #CryptoFlashback #BinanceAcademy #BlockchainSecurity #184BillionBug
āš ļø The Day Bitcoin Almost Died: The 184 Billion BTC Bug

August 15, 2010 — The Forgotten Fork That Saved Bitcoin

Before Bitcoin hit $70,000…
Before it was called ā€œdigital goldā€ā€¦
Before institutions adopted it…
Bitcoin nearly vanished forever.

On August 15, 2010, a single transaction appeared on the blockchain that credited 184,467,440,737 BTC to one wallet — over 8,800 times more than Bitcoin’s total supply of 21 million.

This wasn’t a scam — it was a critical software bug known as an integer overflow. It allowed the attacker to generate near-infinite BTC, violating Bitcoin’s core principle of scarcity.

Panic set in. Bitcoin’s future hung by a thread.

But just hours later, Satoshi Nakamoto and a few early developers sprang into action:
• They released a patch (v0.3.10)
• Coordinated a hard fork to erase the invalid transaction
• Rolled back the chain to restore consensus

It remains the only time in Bitcoin history that a transaction was removed from the blockchain.

This bug showed the world that Bitcoin was not invincible. It was software — and software can fail.

Still, Bitcoin didn’t die. In fact, it came back stronger.

Today, Bitcoin is secured by global infrastructure, robust audits, and a decentralized community. While a bug of this scale is unlikely now, the lesson remains:

Bitcoin is resilient, not untouchable.

This event reminds us that trust in code is earned. It takes vigilance, transparency, and a global effort to protect decentralized systems.

So next time someone says, ā€œBitcoin can’t fail,ā€ remember — it almost did.

šŸ” Want more untold crypto stories?
Visit Binance Academy to explore the past, understand the present, and prepare for the future of blockchain.

#Bitcoin #CryptoFlashback #BinanceAcademy #BlockchainSecurity #184BillionBug
🤯 $68M Gone in a Crypto Blink?! 🚨 Address poisoning is hitting hard, folks. Imagine thinking you're sending crypto to the right place, but a sneaky scammer swaps the address at the last second. 😱 It's like a digital pickpocket! They create fake addresses that LOOK almost identical to yours. These attacks aren't just small-time stuff. One trader lost a WHOPPING $68 million in WBTC! šŸ’„ Over $83 million has been confirmed stolen through these scams. They're getting smarter with phishing, fake QR codes, and even hacking your clipboard. So how do you stay safe? Rotate your Binance addresses, use a hardware wallet, and double-check EVERYTHING. Whitelisting trusted addresses is also a pro move. Let's stay vigilant out there! Stay tuned for the latest updates! #CryptoSecurity #AddressPoisoning #DeFiSafety #Bitcoin #BlockchainSecurity
🤯 $68M Gone in a Crypto Blink?! 🚨

Address poisoning is hitting hard, folks. Imagine thinking you're sending crypto to the right place, but a sneaky scammer swaps the address at the last second. 😱 It's like a digital pickpocket! They create fake addresses that LOOK almost identical to yours.

These attacks aren't just small-time stuff. One trader lost a WHOPPING $68 million in WBTC! šŸ’„ Over $83 million has been confirmed stolen through these scams. They're getting smarter with phishing, fake QR codes, and even hacking your clipboard.

So how do you stay safe? Rotate your Binance addresses, use a hardware wallet, and double-check EVERYTHING. Whitelisting trusted addresses is also a pro move. Let's stay vigilant out there!

Stay tuned for the latest updates!
#CryptoSecurity #AddressPoisoning #DeFiSafety #Bitcoin #BlockchainSecurity
Pt.1: What is Quantum Computing and How Does It Work?Quantum computing is a cutting-edge field that leverages the unique properties of quantum mechanics to perform computations far beyond the reach of classical computers. At its core, quantum computing uses qubits (quantum bits) instead of traditional bits (0s and 1s). Qubits can exist in a state of superposition, meaning they can represent both 0 and 1 simultaneously. This allows quantum computers to process an enormous amount of information in parallel. Another crucial phenomenon is entanglement. When qubits are entangled, the state of one qubit instantly affects the state of another, regardless of distance. This enables quantum computers to perform complex calculations with unprecedented speed and efficiency. Classical computers process data sequentially, using binary logic. Quantum computers, in contrast, harness the probabilistic nature of quantum mechanics to explore multiple solutions at once, promising breakthroughs in fields like materials science, cryptography, and finance. Currently, quantum technology is still in its early stages, with researchers working on stabilizing qubits and scaling up the number of usable qubits in quantum processors. Major players like IBM, Google, and Rigetti are pushing the boundaries of what’s possible. A term that has gained traction in the quantum community is Q Day – the moment when quantum computers become powerful enough to break existing cryptographic systems. While we’re not there yet, it’s a looming event that drives much of the current research and preparation. Stay tuned – more insights coming in the next parts! #CryptoSecurity #quantumcomputing #BlockchainSecurity $BTC

Pt.1: What is Quantum Computing and How Does It Work?

Quantum computing is a cutting-edge field that leverages the unique properties of quantum mechanics to perform computations far beyond the reach of classical computers.
At its core, quantum computing uses qubits (quantum bits) instead of traditional bits (0s and 1s). Qubits can exist in a state of superposition, meaning they can represent both 0 and 1 simultaneously. This allows quantum computers to process an enormous amount of information in parallel.
Another crucial phenomenon is entanglement. When qubits are entangled, the state of one qubit instantly affects the state of another, regardless of distance. This enables quantum computers to perform complex calculations with unprecedented speed and efficiency.
Classical computers process data sequentially, using binary logic. Quantum computers, in contrast, harness the probabilistic nature of quantum mechanics to explore multiple solutions at once, promising breakthroughs in fields like materials science, cryptography, and finance.
Currently, quantum technology is still in its early stages, with researchers working on stabilizing qubits and scaling up the number of usable qubits in quantum processors. Major players like IBM, Google, and Rigetti are pushing the boundaries of what’s possible.
A term that has gained traction in the quantum community is Q Day – the moment when quantum computers become powerful enough to break existing cryptographic systems. While we’re not there yet, it’s a looming event that drives much of the current research and preparation.

Stay tuned – more insights coming in the next parts!
#CryptoSecurity #quantumcomputing #BlockchainSecurity
$BTC
The Day Bitcoin Almost Died: The 184 Billion BTC Bug That Nearly Erased EverythingBy Binance Editorial Team | Crypto Flashback | August 15, 2010 – The Forgotten Fork That Saved It All Before #Bitcoin2025 $BTC {spot}(BTCUSDT) Bitcoin ($BTC) reached $70,000… Before institutions called it an asset class… Before the world hailed it as digital gold — it almost vanished. On August 15, 2010, Bitcoin came seconds from self-destruction. One transaction, one bug, and one obscure line of code brought the entire Bitcoin network to its knees. It's a story rarely told — but it’s one every crypto investor should know. šŸ’„ The Transaction That Broke the Rules In 2010, Bitcoin was in its infancy. One BTC traded for just 7 cents. Mining was done on laptops. The whitepaper was still fresh. Then, out of nowhere, a transaction appeared on the blockchain that sent 184,467,440,737 BTC to a single wallet. Yes — that’s over 184 billion BTC. More than 8,800 times Bitcoin’s hard-coded supply cap of 21 million. It shouldn’t have been possible. But it happened. šŸ› The Bug in the Code The culprit? A critical integer overflow bug in Bitcoin's codebase — a software flaw that caused the system to mishandle large numerical values. The attacker exploited it to create a near-infinite number of bitcoins from thin air. For a few terrifying hours, the unthinkable became reality. Bitcoin’s core principle — scarcity — was broken. Had this continued unnoticed, Bitcoin could have collapsed entirely. šŸ§‘ā€šŸ’» Satoshi Responds Bitcoin’s anonymous creator, Satoshi Nakamoto, acted fast. Detected the exploit within hoursPublished a patch in Bitcoin version 0.3.10Coordinated a hard fork to invalidate the exploitRewrote the blockchain to erase the fraudulent transactionIt marked the only time in Bitcoin’s history that a transaction was manually removed and the chain was rolled back. The network split. Honest nodes rejected the corrupted chain. Consensus returned. Bitcoin survived. šŸ” The Fork That Changed Everything This emergency fork — known to some as the day Bitcoin almost died — serves as a sobering reminder: Bitcoin is software. And software can fail. The 184 billion BTC bug shattered the illusion of invincibility. It exposed how dependent early Bitcoin was on a small group of developers — and just how fragile the system was before global adoption, hashpower, and decentralized infrastructure took root. ā“Could It Happen Again? Today, Bitcoin has matured. It’s undergone audits, core rewrites, and network upgrades. The odds of such a catastrophic bug slipping through again are dramatically lower. But no system is entirely immune. Bitcoin’s strength lies in its open-source nature, community vigilance, and the transparency of its code. 🧠 Lessons from the Brink Bitcoin is resilient, not invulnerableTrust in the network is built — and can be brokenDecentralized communities must remain alertSo the next time someone says ā€œBitcoin can’t failā€, remember: it almost did. And it’s only because of fast thinking, open collaboration, and a handful of anonymous heroes that we still have it today. #Bitcoin #CryptoHistoryMade story #BinanceAcademy #BlockchainSecurity ity Want to learn more about Bitcoin's early challenges? Explore [Binance Academy](https://academy.binance.com) for deep dives, tutorials, and history-defining moments that shaped the future of crypto. Would you like this formatted for publishing on Binance Blog or social media platforms too?

The Day Bitcoin Almost Died: The 184 Billion BTC Bug That Nearly Erased Everything

By Binance Editorial Team | Crypto Flashback | August 15, 2010 – The Forgotten Fork That Saved It All

Before #Bitcoin2025 $BTC
Bitcoin ($BTC ) reached $70,000…

Before institutions called it an asset class…

Before the world hailed it as digital gold — it almost vanished.
On August 15, 2010, Bitcoin came seconds from self-destruction. One transaction, one bug, and one obscure line of code brought the entire Bitcoin network to its knees. It's a story rarely told — but it’s one every crypto investor should know.
šŸ’„ The Transaction That Broke the Rules
In 2010, Bitcoin was in its infancy. One BTC traded for just 7 cents. Mining was done on laptops. The whitepaper was still fresh.
Then, out of nowhere, a transaction appeared on the blockchain that sent 184,467,440,737 BTC to a single wallet.
Yes — that’s over 184 billion BTC.

More than 8,800 times Bitcoin’s hard-coded supply cap of 21 million.

It shouldn’t have been possible. But it happened.

šŸ› The Bug in the Code

The culprit? A critical integer overflow bug in Bitcoin's codebase — a software flaw that caused the system to mishandle large numerical values. The attacker exploited it to create a near-infinite number of bitcoins from thin air.

For a few terrifying hours, the unthinkable became reality.

Bitcoin’s core principle — scarcity — was broken.

Had this continued unnoticed, Bitcoin could have collapsed entirely.

šŸ§‘ā€šŸ’» Satoshi Responds
Bitcoin’s anonymous creator, Satoshi Nakamoto, acted fast.

Detected the exploit within hoursPublished a patch in Bitcoin version 0.3.10Coordinated a hard fork to invalidate the exploitRewrote the blockchain to erase the fraudulent transactionIt marked the only time in Bitcoin’s history that a transaction was manually removed and the chain was rolled back.
The network split. Honest nodes rejected the corrupted chain. Consensus returned. Bitcoin survived.

šŸ” The Fork That Changed Everything
This emergency fork — known to some as the day Bitcoin almost died — serves as a sobering reminder:

Bitcoin is software. And software can fail.

The 184 billion BTC bug shattered the illusion of invincibility. It exposed how dependent early Bitcoin was on a small group of developers — and just how fragile the system was before global adoption, hashpower, and decentralized infrastructure took root.

ā“Could It Happen Again?

Today, Bitcoin has matured. It’s undergone audits, core rewrites, and network upgrades. The odds of such a catastrophic bug slipping through again are dramatically lower.

But no system is entirely immune. Bitcoin’s strength lies in its open-source nature, community vigilance, and the transparency of its code.

🧠 Lessons from the Brink
Bitcoin is resilient, not invulnerableTrust in the network is built — and can be brokenDecentralized communities must remain alertSo the next time someone says ā€œBitcoin can’t failā€, remember: it almost did.
And it’s only because of fast thinking, open collaboration, and a handful of anonymous heroes that we still have it today.
#Bitcoin #CryptoHistoryMade story #BinanceAcademy #BlockchainSecurity ity
Want to learn more about Bitcoin's early challenges? Explore Binance Academy for deep dives, tutorials, and history-defining moments that shaped the future of crypto.

Would you like this formatted for publishing on Binance Blog or social media platforms too?
BiyaPayäøå†»å”å‡ŗé‡‘:
č˜‘č‡åƒå¤šäŗ†
The 184 Billion Bitcoin Bug: A Lesson in Blockchain Security In 2010, a bug in Bitcoin’s code led to the accidental creation of 184 billion BTC in a single block, threatening the integrity of the entire network. Known as the "Value Overflow Incident," this flaw was quickly identified and fixed by core developers. The event became a defining moment in crypto history, showcasing the importance of rapid response and robust security in blockchain systems. It also reinforced Bitcoin’s resilience and the critical need for ongoing vigilance in code development. #Bitcoin #CryptoHistory #BlockchainSecurity #BTCBug #BitcoinResilienc #CryptoNews
The 184 Billion Bitcoin Bug: A Lesson in Blockchain Security

In 2010, a bug in Bitcoin’s code led to the accidental creation of 184 billion BTC in a single block, threatening the integrity of the entire network. Known as the "Value Overflow Incident," this flaw was quickly identified and fixed by core developers. The event became a defining moment in crypto history, showcasing the importance of rapid response and robust security in blockchain systems. It also reinforced Bitcoin’s resilience and the critical need for ongoing vigilance in code development.

#Bitcoin #CryptoHistory #BlockchainSecurity #BTCBug #BitcoinResilienc #CryptoNews
ā€œBitcoin is a very exciting development, it might lead to a world currency.ā€ – Kim Dotcom. $ZEC $DASH {spot}(DASHUSDT) {spot}(ZECUSDT) Monero, Zcash, and Dash prioritize privacy. Monero’s untraceable transactions protect user anonymity. Zcash offers optional privacy with zero-knowledge proofs. Dash focuses on fast, private payments. These coins cater to users valuing financial privacy, a growing concern in the digital age. Understand their tech to appreciate their value.$MASK {spot}(MASKUSDT) #Monero #Zcash #Dash #CryptoPrivacy #BlockchainSecurity
ā€œBitcoin is a very exciting development, it might lead to a world currency.ā€ – Kim Dotcom.
$ZEC $DASH

Monero, Zcash, and Dash prioritize privacy. Monero’s untraceable transactions protect user anonymity. Zcash offers optional privacy with zero-knowledge proofs. Dash focuses on fast, private payments. These coins cater to users valuing financial privacy, a growing concern in the digital age. Understand their tech to appreciate their value.$MASK
#Monero #Zcash #Dash #CryptoPrivacy #BlockchainSecurity
North Korean Hackers Strike Again – This Time It's PersonalIndividual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24. šŸ”Ž Victims included: – >šŸ¦ Exchange wallets –> šŸ” Multi-sig wallets – >šŸ“¤ External accounts šŸ‘ā€šŸ—Ø On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate. šŸ” Protect yourself before you’re next: šŸ”ø Switch to cold storage šŸ”ø Enable 2FA everywhere šŸ”ø NEVER click unknown links šŸ”ø Keep wallets & devices updated šŸ”ø Audit your wallet activity regularly āš ļø This isn’t just another hack—this is a wake-up call for every investor in crypto. 🧠 Be smart. Be safe. Your keys, your coins. #CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly

North Korean Hackers Strike Again – This Time It's Personal

Individual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24.
šŸ”Ž Victims included:
– >šŸ¦ Exchange wallets
–> šŸ” Multi-sig wallets
– >šŸ“¤ External accounts
šŸ‘ā€šŸ—Ø On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate.
šŸ” Protect yourself before you’re next:
šŸ”ø Switch to cold storage
šŸ”ø Enable 2FA everywhere
šŸ”ø NEVER click unknown links
šŸ”ø Keep wallets & devices updated
šŸ”ø Audit your wallet activity regularly
āš ļø This isn’t just another hack—this is a wake-up call for every investor in crypto.
🧠 Be smart. Be safe. Your keys, your coins.
#CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly
--
Bearish
šŸšØšŸ’° North Korean Hackers Strike Again – This Time It's Personal! šŸ’»āš ļø šŸŽÆ Individual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24. šŸ”Ž Victims included: – >šŸ¦ Exchange wallets –> šŸ” Multi-sig wallets – >šŸ“¤ External accounts šŸ‘ā€šŸ—Ø On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate. šŸ” Protect yourself before you’re next: šŸ”ø Switch to cold storage šŸ”ø Enable 2FA everywhere šŸ”ø NEVER click unknown links šŸ”ø Keep wallets & devices updated šŸ”ø Audit your wallet activity regularly āš ļø This isn’t just another hack—this is a wake-up call for every investor in crypto. 🧠 Be smart. Be safe. Your keys, your coins. #CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly
šŸšØšŸ’° North Korean Hackers Strike Again – This Time It's Personal! šŸ’»āš ļø

šŸŽÆ Individual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24.

šŸ”Ž Victims included:
– >šŸ¦ Exchange wallets
–> šŸ” Multi-sig wallets
– >šŸ“¤ External accounts

šŸ‘ā€šŸ—Ø On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate.

šŸ” Protect yourself before you’re next:
šŸ”ø Switch to cold storage
šŸ”ø Enable 2FA everywhere
šŸ”ø NEVER click unknown links
šŸ”ø Keep wallets & devices updated
šŸ”ø Audit your wallet activity regularly

āš ļø This isn’t just another hack—this is a wake-up call for every investor in crypto.

🧠 Be smart. Be safe. Your keys, your coins.
#CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly
Vlkcerny:
i wasnt the one who made the claim was i?
ALERTA CRYPTOGRAMA: Sua Riqueza Cripto EstÔ Segura no Mundo Real?Saudações comudidade Glogal Cryptograma! Percebemos que com a recente euforia e as altas do mercado cripto, um assunto crucial tem emergegido das sombras e exige nossa atenção: a segurança física de quem detém ativos digitais. Não é alarmismo, é preparo estratégico. O artigo recente da Equipe de Segurança Física da Binance (que você pode conferir no blog da Binance) joga luz sobre uma tendência preocupante: embora ainda raros comparados a crimes comuns, os ataques físicos direcionados a investidores e profissionais de cripto estão aumentando, especialmente em períodos de alta do mercado. Por Que Isso Importa AGORA? Criminosos estão cada vez mais sofisticados. Se as defesas digitais se fortalecem, eles buscam o "elo mais fraco", que muitas vezes pode ser o próprio indivíduo no mundo físico. Casos de sequestro e coação para transferência de fundos, como o do cofundador da Ledger em janeiro de 2025, são um duro lembrete de que a segurança 360º é vital. Onde Mora o Perigo? Regiões em Foco: América do Norte, Europa Ocidental e Sudeste AsiÔtico têm visto um número maior desses incidentes. Quem é o Alvo? Indivíduos com exposição pública (influenciadores, empresÔrios do setor, traders conhecidos) ou aqueles que se presume terem acesso direto a grandes volumes de criptoativos. Blindando Sua Fortaleza Cripto (Além do Digital): 5 Pilares Essenciais Discrição é Poder: Evite ostentar seus holdings ou ganhos em plataformas públicas. Sua "identidade cripto" online não precisa gritar riqueza. Menos holofotes, menos alvos. Privacidade Digital Reforçada: Suas redes sociais podem ser um mapa para criminosos. Desative geotags, evite compartilhar planos de viagem em tempo real e configure suas contas para o modo privado. Ofusque a Propriedade de Carteiras: Não vincule publicamente seu nome a endereços de carteiras. Explore ferramentas e carteiras que priorizem a privacidade em suas transações on-chain. Consciência Situacional Aguçada: Sua rotina pode ser seu calcanhar de Aquiles. Varie trajetos, seja discreto em eventos cripto e, se necessÔrio, considere auditorias de segurança para sua residência ou escritório. Planos de Contingência Robustos: Tenha um plano de crise. Carteiras multi-assinatura (multisig) ou módulos de segurança de hardware (HSMs) podem impedir transferências forçadas. Em caso de ameaça, contate as autoridades IMEDIATAMENTE. A Binance tem trabalhado ativamente com autoridades para combater esses crimes, mas a primeira linha de defesa é VOCÊ. Para Reflexão, Cryptograma: Você jÔ parou para pensar na sua segurança física no contexto dos seus investimentos cripto? Quais medidas você jÔ adota ou pretende adotar? Compartilhe suas estratégias e dúvidas nos comentÔrios! Vamos fortalecer nossa comunidade com conhecimento e precaução. #BinanceSecurity #Cryptograma #BlockchainSecurity

ALERTA CRYPTOGRAMA: Sua Riqueza Cripto EstĆ” Segura no Mundo Real?

SaudaƧƵes comudidade Glogal Cryptograma!
Percebemos que com a recente euforia e as altas do mercado cripto, um assunto crucial tem emergegido das sombras e exige nossa atenção: a segurança física de quem detém ativos digitais. Não é alarmismo, é preparo estratégico.
O artigo recente da Equipe de Segurança Física da Binance (que você pode conferir no blog da Binance) joga luz sobre uma tendência preocupante: embora ainda raros comparados a crimes comuns, os ataques físicos direcionados a investidores e profissionais de cripto estão aumentando, especialmente em períodos de alta do mercado.
Por Que Isso Importa AGORA?
Criminosos estão cada vez mais sofisticados. Se as defesas digitais se fortalecem, eles buscam o "elo mais fraco", que muitas vezes pode ser o próprio indivíduo no mundo físico. Casos de sequestro e coação para transferência de fundos, como o do cofundador da Ledger em janeiro de 2025, são um duro lembrete de que a segurança 360º é vital.
Onde Mora o Perigo?
Regiões em Foco: América do Norte, Europa Ocidental e Sudeste AsiÔtico têm visto um número maior desses incidentes.
Quem é o Alvo? Indivíduos com exposição pública (influenciadores, empresÔrios do setor, traders conhecidos) ou aqueles que se presume terem acesso direto a grandes volumes de criptoativos.

Blindando Sua Fortaleza Cripto (AlƩm do Digital): 5 Pilares Essenciais
Discrição é Poder: Evite ostentar seus holdings ou ganhos em plataformas públicas. Sua "identidade cripto" online não precisa gritar riqueza. Menos holofotes, menos alvos.
Privacidade Digital ReforƧada: Suas redes sociais podem ser um mapa para criminosos. Desative geotags, evite compartilhar planos de viagem em tempo real e configure suas contas para o modo privado.
Ofusque a Propriedade de Carteiras: Não vincule publicamente seu nome a endereços de carteiras. Explore ferramentas e carteiras que priorizem a privacidade em suas transações on-chain.
Consciência Situacional Aguçada: Sua rotina pode ser seu calcanhar de Aquiles. Varie trajetos, seja discreto em eventos cripto e, se necessÔrio, considere auditorias de segurança para sua residência ou escritório.
Planos de Contingência Robustos: Tenha um plano de crise. Carteiras multi-assinatura (multisig) ou módulos de segurança de hardware (HSMs) podem impedir transferências forçadas. Em caso de ameaça, contate as autoridades IMEDIATAMENTE.
A Binance tem trabalhado ativamente com autoridades para combater esses crimes, mas a primeira linha de defesa é VOCÊ.
Para Reflexão, Cryptograma:
Você jÔ parou para pensar na sua segurança física no contexto dos seus investimentos cripto? Quais medidas você jÔ adota ou pretende adotar? Compartilhe suas estratégias e dúvidas nos comentÔrios! Vamos fortalecer nossa comunidade com conhecimento e precaução.
#BinanceSecurity #Cryptograma #BlockchainSecurity
āš ļø North Korean Hackers Strike Again: $5.2M+ in Crypto Vanishes! šŸ§ØšŸŖ™ According to PANews and blockchain sleuth ZachXBT, a major crypto heist has unfolded. Suspected DPRK hackers allegedly drained $5.2 million+ from multiple wallets and exchange accounts on May 24. The Breakdown: šŸ”“ Multi-signature wallets & regular accounts compromised šŸ•³ļø Funds funneled into Tornado Cash to cover tracks šŸ’° 1,000 ETH laundered yesterday alone šŸ” Traced wallet addresses: ā–«ļø 0x9d42...bea ā–«ļø 0x4be5...5c3 ā–«ļø 0x3108...8a3 This is a wake-up call for the crypto community: Cyber threats are evolving—make sure your security is too. #CryptoHack #DPRKHackers #TornadoCash #BlockchainSecurity #ZachXBT #cybercrime #CryptoNews #DeFiRisks Suspected
āš ļø North Korean Hackers Strike Again: $5.2M+ in Crypto Vanishes! šŸ§ØšŸŖ™

According to PANews and blockchain sleuth ZachXBT, a major crypto heist has unfolded.
Suspected DPRK hackers allegedly drained $5.2 million+ from multiple wallets and exchange accounts on May 24.

The Breakdown:
šŸ”“ Multi-signature wallets & regular accounts compromised
šŸ•³ļø Funds funneled into Tornado Cash to cover tracks
šŸ’° 1,000 ETH laundered yesterday alone
šŸ” Traced wallet addresses:
ā–«ļø 0x9d42...bea
ā–«ļø 0x4be5...5c3
ā–«ļø 0x3108...8a3

This is a wake-up call for the crypto community:
Cyber threats are evolving—make sure your security is too.

#CryptoHack #DPRKHackers #TornadoCash #BlockchainSecurity #ZachXBT #cybercrime #CryptoNews #DeFiRisks

Suspected
Massive Hack Hits Cetus: Overflow Bug Leads to $223 Million LossA seemingly minor yet critical bug in the code of the decentralized protocol Cetus has cost users a staggering $223 million. A detailed analysis by the cybersecurity firm Dedaub revealed a serious flaw in the logic of Cetus' automated market maker (AMM), which hackers were able to exploit on a massive scale. āš ļø Subtle Bug, Devastating Consequences According to Dedaub, the main cause of the exploit was an "overflow" bug—a technical vulnerability that arises when a system fails to handle large numerical inputs correctly during mathematical operations. Instead of rejecting these oversized values, the system improperly truncated them, which made the resulting output appear far smaller than it actually should have been. The attacker exploited this flaw by depositing only a single token, yet the protocol mistakenly credited them with a massive liquidity position. That position was then used to withdraw substantial real assets from liquidity pools. šŸ’» The Bug Survived Migration to Sui Network Even after the Cetus codebase was migrated to the Sui blockchain, the critical vulnerability remained intact. Developers did attempt to implement security checks, but the overflow protection was flawed, allowing the same type of exploit to slip through unnoticed once again. ā€œThis incident highlights why edge cases in DeFi cannot be overlooked,ā€ Dedaub warned, emphasizing that the complex math behind decentralized finance systems requires rigorous manual auditing and extreme caution. šŸ“‰ Fallout: Token Crash and Market Panic The Cetus exploit occurred in the early hours of May 22, marking one of the largest financial losses ever recorded within the Sui ecosystem. Initial reports pointed to a potential Oracle error, but deeper investigation revealed that the core issue was much more serious. The exploit led to over $223 million in losses across various liquidity pools. The breach immediately triggered a massive token sell-off, with SUI and CETUS tokens plummeting over 40% in just a few hours. Smaller memecoins and low-cap tokens suffered even more dramatic drops—some losing more than 90% of their value. šŸ”’ Response: Freezing Funds and Bounty Offer In a coordinated response, the Sui Foundation worked with validators in an attempt to freeze approximately $163 million of the stolen assets. Cetus also announced a $5 million bounty for information that could lead to identifying the attacker. šŸ“Œ Summary šŸ”¹ A simple code bug caused one of the biggest DeFi thefts šŸ”¹ The attacker exploited an overflow bug to gain a huge liquidity position šŸ”¹ Token prices plunged as panic spread across the market šŸ”¹ Efforts are underway to freeze stolen funds and track the perpetrator What’s your take on this? Are DeFi protocols still too vulnerable to replace traditional financial systems? #defi , #CryptoNewss , #BlockchainSecurity , #CryptoSecurity , #CyberSecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Massive Hack Hits Cetus: Overflow Bug Leads to $223 Million Loss

A seemingly minor yet critical bug in the code of the decentralized protocol Cetus has cost users a staggering $223 million. A detailed analysis by the cybersecurity firm Dedaub revealed a serious flaw in the logic of Cetus' automated market maker (AMM), which hackers were able to exploit on a massive scale.

āš ļø Subtle Bug, Devastating Consequences
According to Dedaub, the main cause of the exploit was an "overflow" bug—a technical vulnerability that arises when a system fails to handle large numerical inputs correctly during mathematical operations.
Instead of rejecting these oversized values, the system improperly truncated them, which made the resulting output appear far smaller than it actually should have been. The attacker exploited this flaw by depositing only a single token, yet the protocol mistakenly credited them with a massive liquidity position. That position was then used to withdraw substantial real assets from liquidity pools.

šŸ’» The Bug Survived Migration to Sui Network
Even after the Cetus codebase was migrated to the Sui blockchain, the critical vulnerability remained intact. Developers did attempt to implement security checks, but the overflow protection was flawed, allowing the same type of exploit to slip through unnoticed once again.
ā€œThis incident highlights why edge cases in DeFi cannot be overlooked,ā€ Dedaub warned, emphasizing that the complex math behind decentralized finance systems requires rigorous manual auditing and extreme caution.

šŸ“‰ Fallout: Token Crash and Market Panic
The Cetus exploit occurred in the early hours of May 22, marking one of the largest financial losses ever recorded within the Sui ecosystem. Initial reports pointed to a potential Oracle error, but deeper investigation revealed that the core issue was much more serious.
The exploit led to over $223 million in losses across various liquidity pools. The breach immediately triggered a massive token sell-off, with SUI and CETUS tokens plummeting over 40% in just a few hours. Smaller memecoins and low-cap tokens suffered even more dramatic drops—some losing more than 90% of their value.

šŸ”’ Response: Freezing Funds and Bounty Offer
In a coordinated response, the Sui Foundation worked with validators in an attempt to freeze approximately $163 million of the stolen assets. Cetus also announced a $5 million bounty for information that could lead to identifying the attacker.

šŸ“Œ Summary
šŸ”¹ A simple code bug caused one of the biggest DeFi thefts

šŸ”¹ The attacker exploited an overflow bug to gain a huge liquidity position

šŸ”¹ Token prices plunged as panic spread across the market

šŸ”¹ Efforts are underway to freeze stolen funds and track the perpetrator

What’s your take on this? Are DeFi protocols still too vulnerable to replace traditional financial systems?

#defi , #CryptoNewss , #BlockchainSecurity , #CryptoSecurity , #CyberSecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
Coinbase Faces Lawsuit: Investor Alleges Data Breach Cover-Up and Regulatory ViolationsU.S. cryptocurrency exchange Coinbase is under fire—this time in the form of a class action lawsuit. Investor Brady Nessler claims the company withheld crucial information about a serious data breach and failed to disclose regulatory issues in the UK, ultimately harming shareholders. According to the lawsuit, Coinbase deliberately delayed disclosing a security incident that compromised customer data and failed to properly inform investors about a $4.5 million fine imposed by the UK’s Financial Conduct Authority (FCA). Both events allegedly had a negative impact on stock value and investor trust. Data breach and extortion: details emerged too late Coinbase reportedly fell victim to a sophisticated cyberattack during which hackers obtained sensitive client data, including names, addresses, and identification information. The attackers allegedly bribed foreign support staff to gain access. More troubling, the lawsuit states Coinbase kept this incident hidden from the public. It wasn’t until May 15, 2025—months after the breach—that the company confirmed a $20 million extortion attempt. On that same day, Coinbase stock dropped sharply by 7.2%, closing at $244 per share. ā€œBy keeping this hidden, investors lost millions. Coinbase breached its duty to inform shareholders and caused serious harm,ā€ the lawsuit claims. Second blow: fine from UK regulators The lawsuit also references a July 2024 fine from the FCA, imposed on Coinbase’s British subsidiary, CB Payments Ltd. The regulator found that CBPL allowed access to over 13,000 high-risk users in violation of a 2020 agreement banning such onboarding. As a result, nearly $226 million in crypto transactions were processed illegally. When this fine was announced, Coinbase’s stock fell 5.52% to $231.52 per share. Lawsuit demands: compensation and a trial Nessler is requesting class action status for the suit and is seeking financial compensation for all shareholders who purchased COIN stock between April 2021 and May 2025. He is also asking for legal fees to be covered and for the case to go to jury trial. Coinbase has not yet issued a public response. Since the disclosure, COIN shares have partially recovered but still dropped 3.23% on May 23, closing at $263.10, according to Yahoo Finance. #coinbase , #CryptoNewss , #Regulation , #BlockchainSecurity , #DigitalAssets Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Coinbase Faces Lawsuit: Investor Alleges Data Breach Cover-Up and Regulatory Violations

U.S. cryptocurrency exchange Coinbase is under fire—this time in the form of a class action lawsuit. Investor Brady Nessler claims the company withheld crucial information about a serious data breach and failed to disclose regulatory issues in the UK, ultimately harming shareholders.
According to the lawsuit, Coinbase deliberately delayed disclosing a security incident that compromised customer data and failed to properly inform investors about a $4.5 million fine imposed by the UK’s Financial Conduct Authority (FCA). Both events allegedly had a negative impact on stock value and investor trust.

Data breach and extortion: details emerged too late
Coinbase reportedly fell victim to a sophisticated cyberattack during which hackers obtained sensitive client data, including names, addresses, and identification information. The attackers allegedly bribed foreign support staff to gain access.
More troubling, the lawsuit states Coinbase kept this incident hidden from the public. It wasn’t until May 15, 2025—months after the breach—that the company confirmed a $20 million extortion attempt. On that same day, Coinbase stock dropped sharply by 7.2%, closing at $244 per share.
ā€œBy keeping this hidden, investors lost millions. Coinbase breached its duty to inform shareholders and caused serious harm,ā€ the lawsuit claims.

Second blow: fine from UK regulators
The lawsuit also references a July 2024 fine from the FCA, imposed on Coinbase’s British subsidiary, CB Payments Ltd. The regulator found that CBPL allowed access to over 13,000 high-risk users in violation of a 2020 agreement banning such onboarding.
As a result, nearly $226 million in crypto transactions were processed illegally. When this fine was announced, Coinbase’s stock fell 5.52% to $231.52 per share.

Lawsuit demands: compensation and a trial
Nessler is requesting class action status for the suit and is seeking financial compensation for all shareholders who purchased COIN stock between April 2021 and May 2025. He is also asking for legal fees to be covered and for the case to go to jury trial.
Coinbase has not yet issued a public response. Since the disclosure, COIN shares have partially recovered but still dropped 3.23% on May 23, closing at $263.10, according to Yahoo Finance.

#coinbase , #CryptoNewss , #Regulation , #BlockchainSecurity , #DigitalAssets

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
$223M HEIST on Sui Network! The DeFi world just got rocked Cetus DEX was hacked for over $223,000,000 in minutes. But here’s the INSANE part Sui validators FROZE $162M of the stolen crypto! Yes mid hack. LIVE. ON-CHAIN. Is this next-level blockchain security? Or the start of chain-level control that kills decentralization? Think fast: If a network can freeze YOUR funds to stop a hacker. can it also freeze YOU? Drop your take. This changes everything. {spot}(SUIUSDT) #cetushack #SuiNetwork #CryptoScandal #BlockchainSecurity #thecryptoheadquarters
$223M HEIST on Sui Network!

The DeFi world just got rocked
Cetus DEX was hacked for over $223,000,000 in minutes.

But here’s the INSANE part
Sui validators FROZE $162M of the stolen crypto!
Yes mid hack. LIVE. ON-CHAIN.

Is this next-level blockchain security?
Or the start of chain-level control that kills decentralization?

Think fast:
If a network can freeze YOUR funds to stop a hacker.
can it also freeze YOU?
Drop your take. This changes everything.

#cetushack #SuiNetwork #CryptoScandal #BlockchainSecurity #thecryptoheadquarters
Login to explore more contents
Explore the latest crypto news
āš”ļø Be a part of the latests discussions in crypto
šŸ’¬ Interact with your favorite creators
šŸ‘ Enjoy content that interests you
Email / Phone number