Binance Square

HackerNews

185,117 views
126 Discussing
AIBlockWorks
--
A Cryptocurrency Network Suddenly Stopped Working: Funds Could Be Stolen by Hackers at Any MomentIt has been reported that the fate of approximately $500,000 worth of investor funds was put at risk after the Layer-2 network Re.al suddenly stopped working. Researcher Luca Donno, who stated that blockchain production stopped on Friday, announced that the network became dysfunctional due to the inactivity of the platform's data availability committee (DAC). Donno, who works on the L2Beat research platform, drew attention to a potential security vulnerability in his post on X, saying, “With the current state of the network, a malicious person can steal all the funds by making changes to the system, and there is no way to prevent this.” The Data Availability Committee (DAC) is a structure that whitelists certain addresses and is responsible for sharing off-chain data in the Re.al project. However, when this structure is not working, the network loses its vitality and transactions come to a halt. Donno’s warning isn’t just a problem specific to Re.al; it also highlights a larger vulnerability facing the decentralized finance (DeFi) world. According to DefiLlama data, the total amount of funds stolen in crypto attacks in 2025 exceeded $2 billion, a 50% increase compared to the entire year of 2024. Re.al was developed by the Tangible team behind the USDR stablecoin project, which collapsed in 2023 due to its inability to manage its treasury. USDR lost 50% of its dollar peg, and investors suffered serious losses. After this failure, the team turned to the Re.al project, aiming to tokenize physical assets. Launched in 2024, Re.al, a platform that tokenizes real estate assets, quickly raised up to $18 million in investment. However, the total asset value tied to the project has now fallen below $500,000. Donno noted that users can attempt to withdraw funds via the Ethereum network, but this process will take 12 days. During this time, a malicious actor could steal existing funds by making a malicious update to the system, as the off-chain data that is required to be provided by the DAC is missing from the network, leaving transactions vulnerable. #Hacker #HackerAlert #HackerNews

A Cryptocurrency Network Suddenly Stopped Working: Funds Could Be Stolen by Hackers at Any Moment

It has been reported that the fate of approximately $500,000 worth of investor funds was put at risk after the Layer-2 network Re.al suddenly stopped working.
Researcher Luca Donno, who stated that blockchain production stopped on Friday, announced that the network became dysfunctional due to the inactivity of the platform's data availability committee (DAC).
Donno, who works on the L2Beat research platform, drew attention to a potential security vulnerability in his post on X, saying, “With the current state of the network, a malicious person can steal all the funds by making changes to the system, and there is no way to prevent this.”
The Data Availability Committee (DAC) is a structure that whitelists certain addresses and is responsible for sharing off-chain data in the Re.al project. However, when this structure is not working, the network loses its vitality and transactions come to a halt.

Donno’s warning isn’t just a problem specific to Re.al; it also highlights a larger vulnerability facing the decentralized finance (DeFi) world. According to DefiLlama data, the total amount of funds stolen in crypto attacks in 2025 exceeded $2 billion, a 50% increase compared to the entire year of 2024.
Re.al was developed by the Tangible team behind the USDR stablecoin project, which collapsed in 2023 due to its inability to manage its treasury. USDR lost 50% of its dollar peg, and investors suffered serious losses. After this failure, the team turned to the Re.al project, aiming to tokenize physical assets.
Launched in 2024, Re.al, a platform that tokenizes real estate assets, quickly raised up to $18 million in investment. However, the total asset value tied to the project has now fallen below $500,000.
Donno noted that users can attempt to withdraw funds via the Ethereum network, but this process will take 12 days. During this time, a malicious actor could steal existing funds by making a malicious update to the system, as the off-chain data that is required to be provided by the DAC is missing from the network, leaving transactions vulnerable.
#Hacker #HackerAlert #HackerNews
New Crypto Malware Steals Screenshots of Seed Phrases — Even from Official App StoresSecurity experts at Kaspersky are warning about a newly discovered threat targeting crypto users. A new strain of malware has emerged that steals screenshots containing wallet seed phrases, the crucial keys to accessing crypto funds. 📲 Malware Disguised as Legitimate Apps Attackers are spreading the malware through apps that look trustworthy — ranging from modified TikTok versions to crypto trackers, gambling tools, and adult content platforms. Some of the fake apps, such as Soex Wallet Tracker and Coin Wallet Pro, even managed to sneak into Google Play and Apple’s App Store, being downloaded by thousands of unsuspecting users. Often, these apps trick users into installing a special developer profile, which allows them to bypass regular phone security checks. Once installed, the app quietly requests access to the phone’s photo gallery and uses optical character recognition (OCR) to scan for seed phrases in screenshots. If detected, this sensitive data is silently sent to the attacker. 🎯 Target Region: Southeast Asia — But the Threat Is Global The malware, named SparkKitty, primarily targets users in Southeast Asia and China. It appears to be a successor to SparkCat, another campaign discovered in early 2024. In both cases, the malware shows a strong focus on accessing crypto wallets by capturing recovery phrases. The malicious apps were actively promoted via social media ads and Telegram channels. For example, Soex Wallet Tracker was downloaded over 5,000 times from Google Play before being taken down. 🧪 Kaspersky Acted Quickly — But the Risk Remains After being alerted by Kaspersky, both Apple and Google removed the malicious apps from their stores. However, researchers say the campaign has likely been active since April 2024, with traces dating back even further. This means similar malware could reappear, using the same methods but under new names. #CryptoSecurity , #CyberSecurity , #HackerAlert , #HackerNews , #StaySafe Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

New Crypto Malware Steals Screenshots of Seed Phrases — Even from Official App Stores

Security experts at Kaspersky are warning about a newly discovered threat targeting crypto users. A new strain of malware has emerged that steals screenshots containing wallet seed phrases, the crucial keys to accessing crypto funds.

📲 Malware Disguised as Legitimate Apps
Attackers are spreading the malware through apps that look trustworthy — ranging from modified TikTok versions to crypto trackers, gambling tools, and adult content platforms. Some of the fake apps, such as Soex Wallet Tracker and Coin Wallet Pro, even managed to sneak into Google Play and Apple’s App Store, being downloaded by thousands of unsuspecting users.
Often, these apps trick users into installing a special developer profile, which allows them to bypass regular phone security checks. Once installed, the app quietly requests access to the phone’s photo gallery and uses optical character recognition (OCR) to scan for seed phrases in screenshots. If detected, this sensitive data is silently sent to the attacker.

🎯 Target Region: Southeast Asia — But the Threat Is Global
The malware, named SparkKitty, primarily targets users in Southeast Asia and China. It appears to be a successor to SparkCat, another campaign discovered in early 2024. In both cases, the malware shows a strong focus on accessing crypto wallets by capturing recovery phrases.
The malicious apps were actively promoted via social media ads and Telegram channels. For example, Soex Wallet Tracker was downloaded over 5,000 times from Google Play before being taken down.

🧪 Kaspersky Acted Quickly — But the Risk Remains
After being alerted by Kaspersky, both Apple and Google removed the malicious apps from their stores. However, researchers say the campaign has likely been active since April 2024, with traces dating back even further. This means similar malware could reappear, using the same methods but under new names.

#CryptoSecurity , #CyberSecurity , #HackerAlert , #HackerNews , #StaySafe

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
--
Bullish
🛑 Iran’s Nobitex Hacked for $82M — Israeli Cyber Unit “Gonjeshke Darande” Claims Responsibility In a shocking cyberattack that’s rocking the global crypto scene, Iran’s largest crypto exchange, Nobitex, has suffered an $81.7 million loss — reportedly at the hands of pro-Israel hackers. On June 16, 2025, blockchain sleuth ZachXBT revealed that massive sums were drained from Nobitex's hot wallets on both Ethereum and Tron chains. What’s most chilling? The attackers used custom vanity addresses like “TK***kiRGCTerrorists…mNX” and “0xffFFfFFffFF…Dead” — making a clear, politically charged statement. Experts now believe Nobitex’s internal controls were dangerously weak, with Cyvers’ analyst Hakan Unal saying, “These kinds of addresses should’ve been blocked by any competent system.” Claiming credit is the Israeli-aligned hacker group “Gonjeshke Darande”, which called Nobitex a “regime financing” tool and threatened to leak sensitive internal data within 24 hours. The breach follows escalating military conflict between Israel and Iran, with hundreds of casualties reported in the most intense fighting since the 1980s. Nobitex insists that the majority of users’ funds remain safe in cold storage — only hot wallets were impacted. However, the stolen funds have not been moved since the incident, suggesting either preparation for further laundering — or a warning of more to come. This breach isn’t just about one exchange. It highlights a growing intersection between geopolitics and crypto warfare, where digital currencies are now battlegrounds for nation-state-level cyberconflict. The world — and Nobitex users — will be watching closely to see how trust is rebuilt and defenses reinforced. $BTC $ETH $BNB #IsraelIranConflict #Hack #HackerNews #MyTradingStyle
🛑 Iran’s Nobitex Hacked for $82M — Israeli Cyber Unit “Gonjeshke Darande” Claims Responsibility

In a shocking cyberattack that’s rocking the global crypto scene, Iran’s largest crypto exchange, Nobitex, has suffered an $81.7 million loss — reportedly at the hands of pro-Israel hackers. On June 16, 2025, blockchain sleuth ZachXBT revealed that massive sums were drained from Nobitex's hot wallets on both Ethereum and Tron chains.

What’s most chilling? The attackers used custom vanity addresses like “TK***kiRGCTerrorists…mNX” and “0xffFFfFFffFF…Dead” — making a clear, politically charged statement. Experts now believe Nobitex’s internal controls were dangerously weak, with Cyvers’ analyst Hakan Unal saying, “These kinds of addresses should’ve been blocked by any competent system.”

Claiming credit is the Israeli-aligned hacker group “Gonjeshke Darande”, which called Nobitex a “regime financing” tool and threatened to leak sensitive internal data within 24 hours. The breach follows escalating military conflict between Israel and Iran, with hundreds of casualties reported in the most intense fighting since the 1980s.

Nobitex insists that the majority of users’ funds remain safe in cold storage — only hot wallets were impacted. However, the stolen funds have not been moved since the incident, suggesting either preparation for further laundering — or a warning of more to come.

This breach isn’t just about one exchange. It highlights a growing intersection between geopolitics and crypto warfare, where digital currencies are now battlegrounds for nation-state-level cyberconflict. The world — and Nobitex users — will be watching closely to see how trust is rebuilt and defenses reinforced.
$BTC $ETH $BNB
#IsraelIranConflict #Hack #HackerNews #MyTradingStyle
USA, Japan, and South Korea Warn Against Hiring North Korean IT WorkersIn a joint statement, the governments of the United States, Japan, and South Korea have highlighted the growing risk posed by North Korean cyberattacks on the global blockchain and cryptocurrency sectors. The warning particularly focuses on the potential threats associated with hiring IT workers from North Korea. The Threat of North Korean Hackers to the Blockchain Industry The three nations emphasized in their January 14 statement that North Korean hacking groups, such as the infamous Lazarus Group, are increasingly targeting crypto exchanges and investors. These groups employ sophisticated tactics, including social engineering, and spread malware like TraderTraitor and AppleJeus. A Call for Caution in IT Recruitment Government authorities urged companies operating in the web3 and blockchain sectors to thoroughly vet new hires to avoid employing IT professionals from North Korea. Research indicates that such workers often pose as remote employees or investors. The report also mentioned initiatives to foster collaboration between the private and public sectors, such as Crypto-ISAC in the United States, as well as similar efforts in Japan and South Korea. North Korean Cyberattacks in 2024 In 2024, North Korean cyber groups were linked to several high-profile attacks: A hack on Japan’s DMM Bitcoin exchange resulted in losses of $308 million.An attack on South Korea’s Upbit platform led to the theft of $50 million. These incidents underscore the severity of the threat that North Korean activities pose to the global financial system. Fraudulent Practices by North Korean Hackers At the Cyberwarcon conference in November 2024, researchers revealed that North Korean hackers often disguise themselves as: Remote IT workers employed by major tech companies,Recruiters or venture capital investors. Two specific hacking groups, Sapphire Sleet and Ruby Sleet, allegedly stole $10 million in just six months using these methods. Collaboration Is Key to Protection The governments of the USA, Japan, and South Korea have called on companies and individuals to remain vigilant and work together to create effective defense mechanisms. Thorough employee screening and adherence to security recommendations could help mitigate the risks of cyberattacks and safeguard the global financial ecosystem. #CyberSecurity , #CryptoNewss , #cryptohacks , #cyberattacks , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

USA, Japan, and South Korea Warn Against Hiring North Korean IT Workers

In a joint statement, the governments of the United States, Japan, and South Korea have highlighted the growing risk posed by North Korean cyberattacks on the global blockchain and cryptocurrency sectors. The warning particularly focuses on the potential threats associated with hiring IT workers from North Korea.
The Threat of North Korean Hackers to the Blockchain Industry
The three nations emphasized in their January 14 statement that North Korean hacking groups, such as the infamous Lazarus Group, are increasingly targeting crypto exchanges and investors. These groups employ sophisticated tactics, including social engineering, and spread malware like TraderTraitor and AppleJeus.
A Call for Caution in IT Recruitment
Government authorities urged companies operating in the web3 and blockchain sectors to thoroughly vet new hires to avoid employing IT professionals from North Korea. Research indicates that such workers often pose as remote employees or investors. The report also mentioned initiatives to foster collaboration between the private and public sectors, such as Crypto-ISAC in the United States, as well as similar efforts in Japan and South Korea.
North Korean Cyberattacks in 2024
In 2024, North Korean cyber groups were linked to several high-profile attacks:
A hack on Japan’s DMM Bitcoin exchange resulted in losses of $308 million.An attack on South Korea’s Upbit platform led to the theft of $50 million.
These incidents underscore the severity of the threat that North Korean activities pose to the global financial system.
Fraudulent Practices by North Korean Hackers
At the Cyberwarcon conference in November 2024, researchers revealed that North Korean hackers often disguise themselves as:
Remote IT workers employed by major tech companies,Recruiters or venture capital investors.
Two specific hacking groups, Sapphire Sleet and Ruby Sleet, allegedly stole $10 million in just six months using these methods.
Collaboration Is Key to Protection
The governments of the USA, Japan, and South Korea have called on companies and individuals to remain vigilant and work together to create effective defense mechanisms. Thorough employee screening and adherence to security recommendations could help mitigate the risks of cyberattacks and safeguard the global financial ecosystem.

#CyberSecurity , #CryptoNewss , #cryptohacks , #cyberattacks , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
South Korean Woman Steals $480,000 in Cryptocurrency to Pay Off DebtsWoman Exploited Access to Friend's Phone A South Korean woman has been arrested for allegedly stealing $480,000 worth of cryptocurrency (700 million won) from her friend. Reports state that she met her victim a few months prior via a chat application. On January 7, the woman reportedly stole her friend’s phone from their home in Jeju City. She then used the phone to access his cryptocurrency holdings, sold the assets, and transferred the proceeds to her own bank accounts. Suspect Quickly Apprehended After committing the crime, the woman fled the scene. However, the victim reported the theft, enabling police to track her down. The suspect was arrested on January 8 in Gomi, North Jeolla Province. She admitted to the crime, claiming her motive was to pay off her debts. Investigation Continues Authorities are still investigating the case to uncover further details. This incident adds to a growing list of cryptocurrency-related thefts in South Korea. Similar Cases in South Korea In December 2024, a South Korean banker was sentenced to 15 years in prison for stealing $12.4 million from his employer, Woori Bank. The funds were used to finance his cryptocurrency addiction. Over a period of 10 months, the banker forged loan documents, redirected funds to his personal accounts, and spent $10.4 million on failed cryptocurrency investments. He ultimately lost $4.35 million. The court ordered him to repay 10.52 billion won ($7.3 million). While $3 million worth of assets were recovered, the remaining $4 million was deemed unrecoverable. #CryptoScamAlert , #CryptoCrime , #HackerNews , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

South Korean Woman Steals $480,000 in Cryptocurrency to Pay Off Debts

Woman Exploited Access to Friend's Phone
A South Korean woman has been arrested for allegedly stealing $480,000 worth of cryptocurrency (700 million won) from her friend. Reports state that she met her victim a few months prior via a chat application.
On January 7, the woman reportedly stole her friend’s phone from their home in Jeju City. She then used the phone to access his cryptocurrency holdings, sold the assets, and transferred the proceeds to her own bank accounts.
Suspect Quickly Apprehended
After committing the crime, the woman fled the scene. However, the victim reported the theft, enabling police to track her down. The suspect was arrested on January 8 in Gomi, North Jeolla Province. She admitted to the crime, claiming her motive was to pay off her debts.
Investigation Continues
Authorities are still investigating the case to uncover further details. This incident adds to a growing list of cryptocurrency-related thefts in South Korea.
Similar Cases in South Korea
In December 2024, a South Korean banker was sentenced to 15 years in prison for stealing $12.4 million from his employer, Woori Bank. The funds were used to finance his cryptocurrency addiction.
Over a period of 10 months, the banker forged loan documents, redirected funds to his personal accounts, and spent $10.4 million on failed cryptocurrency investments. He ultimately lost $4.35 million. The court ordered him to repay 10.52 billion won ($7.3 million). While $3 million worth of assets were recovered, the remaining $4 million was deemed unrecoverable.

#CryptoScamAlert , #CryptoCrime , #HackerNews , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Binance founder CZ shared key tips to help users avoid phishing attacks. 🔜Never share your password with support agents. 🔜Avoid clicking on suspicious email links, always type the URL manually. 🔜Use different strong passwords for each site with a password manager. 🔜Enable hardware-based 2FA for added protection. #CZ #CZBİNANCE #HackerNews #SafetyTips #CryptoRegulation
Binance founder CZ shared key tips to help users avoid phishing attacks.

🔜Never share your password with support agents.

🔜Avoid clicking on suspicious email links, always type the URL manually.

🔜Use different strong passwords for each site with a password manager.

🔜Enable hardware-based 2FA for added protection.
#CZ #CZBİNANCE #HackerNews #SafetyTips #CryptoRegulation
☄️ The hackers who breached Bybit wallets managed to launder all 499K ETH ($1.4B) in just 10 days using the THORChain protocol, which, thanks to North Korean hackers, earned $5.5M in fees. #HackerNews #news #bybit #ETH $ETH #sadstory
☄️ The hackers who breached Bybit wallets managed to launder all 499K ETH ($1.4B) in just 10 days using the THORChain protocol, which, thanks to North Korean hackers, earned $5.5M in fees.

#HackerNews #news #bybit #ETH $ETH #sadstory
Hackers Steal $840,000 from Orange FinanceHackers Exploit Orange Finance Platform Orange Finance, a major liquidity manager on the Arbitrum network, suffered a hacking incident resulting in the theft of $840,000. The Orange Finance team announced the breach on January 8 via X, urging users to avoid interacting with the protocol. Details of the Attack According to the team, the hackers gained control of the administrator address, upgraded the contracts, and transferred the funds to their wallet. The team confirmed that the contracts are no longer under their control and noted that they currently lack precise details about the attack. Message to the Hacker In a subsequent statement, the Orange Finance team revealed they contacted the hacker via an on-chain message. They requested a "positive response within 24 hours" and offered to handle the situation as a "white hat" matter without involving law enforcement agencies. Funds Converted to Ethereum Blockchain analytics firm Cyvers Alert reported that the hacker had already swapped the stolen funds for Ethereum (ETH). The Orange Finance team continues to investigate the incident and has advised users to revoke all contract approvals linked to Orange Finance to ensure their safety. A Significant Loss for Arbitrum’s Largest Liquidity Manager Before the attack, Orange Finance was the largest liquidity manager on the Arbitrum network, with over $1.5 million in total value locked, according to data from DefiLlama. This incident is a major blow to the platform’s operations and reputation. Conclusion The hack on Orange Finance highlights the risks associated with decentralized finance protocols. Users are urged to secure their funds and regularly review contract approvals to prevent similar incidents. The Orange Finance team is working to investigate the breach and recover the stolen funds. #HackerAlert , #CryptoFraud , #CryptoScamAlert , #CryptoNewss , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hackers Steal $840,000 from Orange Finance

Hackers Exploit Orange Finance Platform
Orange Finance, a major liquidity manager on the Arbitrum network, suffered a hacking incident resulting in the theft of $840,000. The Orange Finance team announced the breach on January 8 via X, urging users to avoid interacting with the protocol.

Details of the Attack
According to the team, the hackers gained control of the administrator address, upgraded the contracts, and transferred the funds to their wallet. The team confirmed that the contracts are no longer under their control and noted that they currently lack precise details about the attack.
Message to the Hacker
In a subsequent statement, the Orange Finance team revealed they contacted the hacker via an on-chain message. They requested a "positive response within 24 hours" and offered to handle the situation as a "white hat" matter without involving law enforcement agencies.

Funds Converted to Ethereum
Blockchain analytics firm Cyvers Alert reported that the hacker had already swapped the stolen funds for Ethereum (ETH). The Orange Finance team continues to investigate the incident and has advised users to revoke all contract approvals linked to Orange Finance to ensure their safety.
A Significant Loss for Arbitrum’s Largest Liquidity Manager
Before the attack, Orange Finance was the largest liquidity manager on the Arbitrum network, with over $1.5 million in total value locked, according to data from DefiLlama. This incident is a major blow to the platform’s operations and reputation.
Conclusion
The hack on Orange Finance highlights the risks associated with decentralized finance protocols. Users are urged to secure their funds and regularly review contract approvals to prevent similar incidents. The Orange Finance team is working to investigate the breach and recover the stolen funds.

#HackerAlert , #CryptoFraud , #CryptoScamAlert , #CryptoNewss , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
$150M XRP HEIST — YOU WON’T BELIEVE HOW IT HAPPENED! 🔥 Ripple co-founder Chris Larsen’s crypto fortune vanished in a jaw-dropping hack — all traced back to the 2022 LastPass breach. 💀 Hackers stole his private keys straight from his password manager. If it can happen to him, it can happen to anyone. Are YOUR assets really safe? Let’s talk security, risk, and the future of crypto. Sound off in the comments! 🚀💬 #CryptoScandal #xrp #CyberSecurity #HackerNews #CryptoSafety
$150M XRP HEIST — YOU WON’T BELIEVE HOW IT HAPPENED! 🔥
Ripple co-founder Chris Larsen’s crypto fortune vanished in a jaw-dropping hack — all traced back to the 2022 LastPass breach. 💀 Hackers stole his private keys straight from his password manager.

If it can happen to him, it can happen to anyone. Are YOUR assets really safe?

Let’s talk security, risk, and the future of crypto. Sound off in the comments! 🚀💬

#CryptoScandal #xrp #CyberSecurity #HackerNews #CryptoSafety
--
Bearish
🚫🚫🚫🚫 Hacked 🚫🚫🚫🚫🚫 Alert. Many people are saying that the $COW swap has been hacked. Is it correct? #emergency #HackerNews
🚫🚫🚫🚫 Hacked 🚫🚫🚫🚫🚫

Alert. Many people are saying that the $COW swap has been hacked. Is it correct?

#emergency
#HackerNews
$ETH ALERT: Hackers on the Move! Stolen Ethereum Transferred to New Wallets Hackers behind the GMX and MIM Spell contract breaches have struck again, transferring 6,262 ETH (worth nearly $13 million) to three new wallets, reports PANews. The Heist: - *Contract Breaches*: GMX and MIM Spell contracts were infiltrated, resulting in the theft of 6,262 ETH. - *New Wallets*: Hackers have moved the stolen ETH to three new wallets, attempting to cover their tracks. - *Value*: The stolen ETH is valued at approximately $13 million. Stay Vigilant: As the hackers attempt to launder the stolen funds, it's essential to monitor the situation closely. The cryptocurrency community must remain alert and work together to prevent further illicit activities. Follow for Updates: Stay informed about the latest developments in this ongoing story. #ETH #stolen #HackerNews #BinanceAlphaAlert #Alert🔴
$ETH
ALERT: Hackers on the Move!

Stolen Ethereum Transferred to New Wallets
Hackers behind the GMX and MIM Spell contract breaches have struck again, transferring 6,262 ETH (worth nearly $13 million) to three new wallets, reports PANews.

The Heist:
- *Contract Breaches*: GMX and MIM Spell contracts were infiltrated, resulting in the theft of 6,262 ETH.
- *New Wallets*: Hackers have moved the stolen ETH to three new wallets, attempting to cover their tracks.
- *Value*: The stolen ETH is valued at approximately $13 million.

Stay Vigilant:
As the hackers attempt to launder the stolen funds, it's essential to monitor the situation closely. The cryptocurrency community must remain alert and work together to prevent further illicit activities.

Follow for Updates:
Stay informed about the latest developments in this ongoing story.

#ETH #stolen #HackerNews #BinanceAlphaAlert #Alert🔴
Crypto Scammers Use Fake Job Interviews to Deploy Malware BackdoorsNew Scam Targets Web3 Professionals Scammers are now targeting professionals in the Web3 and cryptocurrency industries. They lure victims with fake job interviews and trick them into running malicious code. This sophisticated scheme involves offering attractive job opportunities from fake recruiters posing as representatives of major cryptocurrency firms. How the Scam Works According to investigator Taylor Monahan, who highlighted this attack on December 28, scammers approach victims through platforms like LinkedIn, Telegram, or freelancing sites. After expressing interest in the job offer, victims are directed to a video interview platform called "Willo | Video Interviewing", which appears legitimate but is part of the scam. During the interview, scammers initially ask standard questions, such as the victim’s views on current cryptocurrency trends, to build trust. The critical moment occurs during the final step, where the victim is required to upload a video. The Turning Point: Fake Troubleshooting Instructions While attempting to upload the video, victims encounter a "technical issue" with their microphone or camera. At this point, scammers provide troubleshooting steps that require the victim to execute commands or follow instructions on their device. If the victim complies, the attackers gain backdoor access to their system. Taylor Monahan warns that this process grants attackers complete access to the victim’s device, allowing them to install malware, monitor activity, steal sensitive data, or drain cryptocurrency wallets. Recommendations for Protection Monahan advises: Never execute unknown code on your device.If you suspect being targeted, completely wipe your device to prevent further compromise. Other Scam Examples This type of attack differs from typical fake job offer scams. For example, Cado Security Labs recently uncovered a fake meeting application that injected malware upon installation, enabling attackers to steal cryptocurrency funds and login credentials. Last year, crypto.news reported a case where fake recruiters on Upwork tricked blockchain developers into downloading malicious packages from GitHub. These packages contained scripts that allowed attackers to gain remote access to the victim's devices. Trust and vigilance are critical to protecting against these sophisticated scams. #HackerAlert , #CyberSecurity , #CryptoNewss , #CryptoSecurity , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Scammers Use Fake Job Interviews to Deploy Malware Backdoors

New Scam Targets Web3 Professionals
Scammers are now targeting professionals in the Web3 and cryptocurrency industries. They lure victims with fake job interviews and trick them into running malicious code. This sophisticated scheme involves offering attractive job opportunities from fake recruiters posing as representatives of major cryptocurrency firms.
How the Scam Works
According to investigator Taylor Monahan, who highlighted this attack on December 28, scammers approach victims through platforms like LinkedIn, Telegram, or freelancing sites. After expressing interest in the job offer, victims are directed to a video interview platform called "Willo | Video Interviewing", which appears legitimate but is part of the scam.
During the interview, scammers initially ask standard questions, such as the victim’s views on current cryptocurrency trends, to build trust. The critical moment occurs during the final step, where the victim is required to upload a video.
The Turning Point: Fake Troubleshooting Instructions
While attempting to upload the video, victims encounter a "technical issue" with their microphone or camera. At this point, scammers provide troubleshooting steps that require the victim to execute commands or follow instructions on their device. If the victim complies, the attackers gain backdoor access to their system.
Taylor Monahan warns that this process grants attackers complete access to the victim’s device, allowing them to install malware, monitor activity, steal sensitive data, or drain cryptocurrency wallets.
Recommendations for Protection
Monahan advises:
Never execute unknown code on your device.If you suspect being targeted, completely wipe your device to prevent further compromise.

Other Scam Examples
This type of attack differs from typical fake job offer scams. For example, Cado Security Labs recently uncovered a fake meeting application that injected malware upon installation, enabling attackers to steal cryptocurrency funds and login credentials.
Last year, crypto.news reported a case where fake recruiters on Upwork tricked blockchain developers into downloading malicious packages from GitHub. These packages contained scripts that allowed attackers to gain remote access to the victim's devices.
Trust and vigilance are critical to protecting against these sophisticated scams.

#HackerAlert , #CyberSecurity , #CryptoNewss , #CryptoSecurity , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Xeggex CEO’s Account Hacked: Funds at RiskThe cryptocurrency exchange Xeggex is facing serious issues after users reported unexpected login problems and missing funds. Some traders fear that the platform might have suffered a major security breach that could threaten its operations. CEO’s Account Compromised, Leading to Access Suspension According to official reports, the CEO’s account was hacked, leading to a temporary suspension of login access and user funds. However, the company has reassured users that their wallets have been successfully secured to prevent any financial losses. To counter further attacks and mitigate potential risks, Xeggex disconnected its database from the network. While the exchange’s website remained operational, users were unable to log into their accounts. User Panic: Missing Balances and Empty Order Books The incident has caused widespread panic within the community. Many users noticed their balances had disappeared, and order books were completely empty. This has fueled speculation that the problem could be far more severe than initially assumed. In response to these concerns, Xeggex took its database offline to prevent hackers from further exploiting the platform. Xeggex Launches Internal Investigation The company has confirmed that it is conducting a full assessment of the breach, and users will be updated as soon as more details emerge. Blockchain data indicates that no major fund transfers have been recorded, but investigations are ongoing. Xeggex has assured its users that it is taking all necessary steps to secure wallets and prevent further breaches. Official Statement from Xeggex The exchange released the following statement: "Dear users, we are facing a challenging situation as our CEO has been hacked, losing access to their Telegram account and the Xeggex community group. We are still investigating the full details of this incident. The good news is that we have successfully locked all wallets to keep funds secure." Additionally, the company stated: "The login issue persists because we have disconnected the database from the network for security reasons. A thorough internal investigation is underway. As soon as we have a clearer picture of the situation, we will provide further updates." What’s Next? Xeggex now faces a critical challenge: restoring user confidence and ensuring the safety of all assets. Users will be eagerly awaiting further updates and the results of the ongoing investigation. Given the sensitivity of the situation, it will be crucial to see how quickly the exchange recovers and what security measures it implements moving forward. #HackerNews , #HackerAlert , #CyberSecurity , #scam , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Xeggex CEO’s Account Hacked: Funds at Risk

The cryptocurrency exchange Xeggex is facing serious issues after users reported unexpected login problems and missing funds. Some traders fear that the platform might have suffered a major security breach that could threaten its operations.
CEO’s Account Compromised, Leading to Access Suspension
According to official reports, the CEO’s account was hacked, leading to a temporary suspension of login access and user funds. However, the company has reassured users that their wallets have been successfully secured to prevent any financial losses.
To counter further attacks and mitigate potential risks, Xeggex disconnected its database from the network. While the exchange’s website remained operational, users were unable to log into their accounts.
User Panic: Missing Balances and Empty Order Books
The incident has caused widespread panic within the community. Many users noticed their balances had disappeared, and order books were completely empty. This has fueled speculation that the problem could be far more severe than initially assumed.
In response to these concerns, Xeggex took its database offline to prevent hackers from further exploiting the platform.
Xeggex Launches Internal Investigation
The company has confirmed that it is conducting a full assessment of the breach, and users will be updated as soon as more details emerge. Blockchain data indicates that no major fund transfers have been recorded, but investigations are ongoing.
Xeggex has assured its users that it is taking all necessary steps to secure wallets and prevent further breaches.
Official Statement from Xeggex
The exchange released the following statement:
"Dear users, we are facing a challenging situation as our CEO has been hacked, losing access to their Telegram account and the Xeggex community group. We are still investigating the full details of this incident. The good news is that we have successfully locked all wallets to keep funds secure."
Additionally, the company stated:
"The login issue persists because we have disconnected the database from the network for security reasons. A thorough internal investigation is underway. As soon as we have a clearer picture of the situation, we will provide further updates."
What’s Next?
Xeggex now faces a critical challenge: restoring user confidence and ensuring the safety of all assets. Users will be eagerly awaiting further updates and the results of the ongoing investigation. Given the sensitivity of the situation, it will be crucial to see how quickly the exchange recovers and what security measures it implements moving forward.

#HackerNews , #HackerAlert , #CyberSecurity , #scam , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
La industria recibe una gran llamada de atención Apenas unos días antes de su histórica inclusión en el índice S&P 500, Coinbase reveló ayer a través de una presentación que un ciberataque a principios de este mes resultó en robo de datos de cuentas de clientes. Bloomberg , citando una fuente, informa que los piratas informáticos han tenido acceso a los datos desde principios de año. Coinbase insiste en que si algún cliente fue engañado para enviar fondos por error, recibirá un reembolso. El incidente podría costarle al exchange hasta 400 millones de dólares, según la plataforma. "En la larga lista de empresas de criptomonedas que han sido hackeadas, hay muchos ejemplos de pérdidas financieras mucho más dolorosas que las que Coinbase parece estar sufriendo a causa del ataque", declaró Bloomberg. "Sin embargo, este caso destaca por su importancia. En esta ocasión, la víctima fue posiblemente la empresa estadounidense más influyente del sector". En un esquema abiertamente agresivo, los cibercriminales sobornaron a representantes de clientes para robar datos confidenciales de los mismos (nombres, fechas de nacimiento, direcciones, nacionalidades, números de identificación emitidos por el gobierno, información bancaria como saldos e incluso detalles sobre cuándo se crearon las cuentas); luego los culpables exigieron un rescate de 20 millones de dólares para eliminarlos, dijo Bloomberg. "Es una filtración importante", declaró Mike Dudas, socio director de 6MV, una empresa de Web3, quien declaró a Bloomberg que había sido blanco de los hackers de Coinbase. "La cantidad de información personal compartida es asombrosa ", añadió. #HackerNews
La industria recibe una gran llamada de atención

Apenas unos días antes de su histórica inclusión en el índice S&P 500, Coinbase reveló ayer a través de una presentación que un ciberataque a principios de este mes resultó en robo de datos de cuentas de clientes.

Bloomberg , citando una fuente, informa que los piratas informáticos han tenido acceso a los datos desde principios de año.

Coinbase insiste en que si algún cliente fue engañado para enviar fondos por error, recibirá un reembolso. El incidente podría costarle al exchange hasta 400 millones de dólares, según la plataforma.

"En la larga lista de empresas de criptomonedas que han sido hackeadas, hay muchos ejemplos de pérdidas financieras mucho más dolorosas que las que Coinbase parece estar sufriendo a causa del ataque", declaró Bloomberg. "Sin embargo, este caso destaca por su importancia. En esta ocasión, la víctima fue posiblemente la empresa estadounidense más influyente del sector".

En un esquema abiertamente agresivo, los cibercriminales sobornaron a representantes de clientes para robar datos confidenciales de los mismos (nombres, fechas de nacimiento, direcciones, nacionalidades, números de identificación emitidos por el gobierno, información bancaria como saldos e incluso detalles sobre cuándo se crearon las cuentas); luego los culpables exigieron un rescate de 20 millones de dólares para eliminarlos, dijo Bloomberg.

"Es una filtración importante", declaró Mike Dudas, socio director de 6MV, una empresa de Web3, quien declaró a Bloomberg que había sido blanco de los hackers de Coinbase. "La cantidad de información personal compartida es asombrosa ", añadió.

#HackerNews
Ledger CEO Pascal Gauthier's statement "where there's money, there will be hackers" highlights the constant threat of cyber attacks in the financial world, especially in the cryptocurrency space. Gauthier's warning comes after a major security breach resulted in a $1.5 billion hack of Bybit on February 21. The attack targeted the exchange's Ethereum cold wallet, with hackers bypassing multi-signature protocols. Gauthier emphasized the importance of robust security measures, urging users not to leave their digital assets on exchanges where vulnerabilities exist. Instead, he recommends using self-custody solutions, like Ledger's hardware wallets, to store cryptocurrency safely. In a recent interview on Bloomberg TV, Gauthier stressed that Bitcoin itself is designed to be secure, but the platforms where digital assets are stored remain prime targets for hackers. He also noted that as more funds flow into the system, the financial sector, including Bitcoin and other cryptocurrencies, increasingly attracts malicious actors. Gauthier's concerns are not unfounded, as Ledger itself experienced an exploit on its Ledger Connect Kit in December 2023. The incident was quickly contained, but it highlights the ongoing battle against cyber threats in the cryptocurrency space.#HackerNews
Ledger CEO Pascal Gauthier's statement "where there's money, there will be hackers" highlights the constant threat of cyber attacks in the financial world, especially in the cryptocurrency space. Gauthier's warning comes after a major security breach resulted in a $1.5 billion hack of Bybit on February 21. The attack targeted the exchange's Ethereum cold wallet, with hackers bypassing multi-signature protocols.

Gauthier emphasized the importance of robust security measures, urging users not to leave their digital assets on exchanges where vulnerabilities exist. Instead, he recommends using self-custody solutions, like Ledger's hardware wallets, to store cryptocurrency safely.

In a recent interview on Bloomberg TV, Gauthier stressed that Bitcoin itself is designed to be secure, but the platforms where digital assets are stored remain prime targets for hackers. He also noted that as more funds flow into the system, the financial sector, including Bitcoin and other cryptocurrencies, increasingly attracts malicious actors.

Gauthier's concerns are not unfounded, as Ledger itself experienced an exploit on its Ledger Connect Kit in December 2023. The incident was quickly contained, but it highlights the ongoing battle against cyber threats in the cryptocurrency space.#HackerNews
Kanye West Was Offered $2M to Promote a Scam Coin Rapper Kanye West revealed that he was offered $2 million to promote a scam coin. He shared a screenshot of the conversation, confirming that he turned down the offer because he didn’t want to deceive his followers. According to the deal's terms, the post was supposed to stay on his page for eight hours, after which West could claim that his account had been hacked. I wonder how many other celebrities have been "hacked" the same way? 🤔 #news #AlarmingNews #meme_coin #sadstory #HackerNews
Kanye West Was Offered $2M to Promote a Scam Coin
Rapper Kanye West revealed that he was offered $2 million to promote a scam coin. He shared a screenshot of the conversation, confirming that he turned down the offer because he didn’t want to deceive his followers.
According to the deal's terms, the post was supposed to stay on his page for eight hours, after which West could claim that his account had been hacked.
I wonder how many other celebrities have been "hacked" the same way? 🤔
#news #AlarmingNews #meme_coin #sadstory #HackerNews
Crypto Money Laundering Driven by Hackers Surges to $1.3 Billion in 2024Crypto money laundering linked to hacking reached a total of $1.3 billion in 2024, marking a 280% increase compared to 2023, when it stood at $342 million. This data, published by blockchain security firm PeckShield, suggests that the dramatic rise is partly due to the significant increase in cryptocurrency prices, such as Bitcoin, which more than doubled in value during 2024. Hackers Employ Advanced Laundering Techniques The PeckShield report highlights that hackers are increasingly using techniques like "chain hopping", which involves moving coins across multiple blockchains. This method alone facilitated the laundering of $452 million. Another common approach was coin mixing, which accounted for $468 million in laundered funds. Fraud Losses Decline, but Phishing Remains a Major Issue Overall fraud losses in the cryptocurrency industry decreased to $834.5 million in 2024, down 24% from $1.1 billion in 2023. However, phishing scams remained a significant concern, representing nearly 80% of all fraud-related losses, amounting to $660 million. August 2024: The Month with the Highest Losses According to PeckShield's monthly analysis, August 2024 was the most critical month, with losses totaling $293.4 million. The majority of these losses came from Bitcoin-related scams, which amounted to $238 million. Other notable incidents included: A scam involving Wrapped Bitcoin, resulting in $71 million in losses.Rug-pull scams on BitForex and ZKasino, which cost investors $57 million and $33 million, respectively. Total Crypto Industry Losses in 2024 As revealed in early January 2025, total losses in the crypto industry from hacks and scams in 2024 amounted to $3.01 billion, reflecting a 15% increase from $2.61 billion in 2023. Of this total, hacks accounted for $2.15 billion, while scams represented $834.5 million. Positive News: Some Funds Recovered Despite the significant losses, approximately $488.5 million of stolen funds were successfully recovered. This demonstrates that advanced security technologies and collaborative efforts between institutions can help mitigate the damage caused by cybercrime. Conclusion: Rising Crime and the Need for Better Protection The year 2024 highlighted a record surge in crypto money laundering driven by hackers, presenting challenges for the entire cryptocurrency industry. While overall fraud losses are declining, advanced laundering techniques and phishing scams remain significant threats. As such, implementing robust security measures and fostering industry collaboration are essential to protecting investors and reducing the impact of cybercrime. #CryptoNewss , #HackerNews , #hacking , #MoneyLaundering , #CryptoCrime Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Money Laundering Driven by Hackers Surges to $1.3 Billion in 2024

Crypto money laundering linked to hacking reached a total of $1.3 billion in 2024, marking a 280% increase compared to 2023, when it stood at $342 million. This data, published by blockchain security firm PeckShield, suggests that the dramatic rise is partly due to the significant increase in cryptocurrency prices, such as Bitcoin, which more than doubled in value during 2024.
Hackers Employ Advanced Laundering Techniques
The PeckShield report highlights that hackers are increasingly using techniques like "chain hopping", which involves moving coins across multiple blockchains. This method alone facilitated the laundering of $452 million. Another common approach was coin mixing, which accounted for $468 million in laundered funds.

Fraud Losses Decline, but Phishing Remains a Major Issue
Overall fraud losses in the cryptocurrency industry decreased to $834.5 million in 2024, down 24% from $1.1 billion in 2023. However, phishing scams remained a significant concern, representing nearly 80% of all fraud-related losses, amounting to $660 million.
August 2024: The Month with the Highest Losses
According to PeckShield's monthly analysis, August 2024 was the most critical month, with losses totaling $293.4 million. The majority of these losses came from Bitcoin-related scams, which amounted to $238 million. Other notable incidents included:
A scam involving Wrapped Bitcoin, resulting in $71 million in losses.Rug-pull scams on BitForex and ZKasino, which cost investors $57 million and $33 million, respectively.
Total Crypto Industry Losses in 2024
As revealed in early January 2025, total losses in the crypto industry from hacks and scams in 2024 amounted to $3.01 billion, reflecting a 15% increase from $2.61 billion in 2023. Of this total, hacks accounted for $2.15 billion, while scams represented $834.5 million.
Positive News: Some Funds Recovered
Despite the significant losses, approximately $488.5 million of stolen funds were successfully recovered. This demonstrates that advanced security technologies and collaborative efforts between institutions can help mitigate the damage caused by cybercrime.
Conclusion: Rising Crime and the Need for Better Protection
The year 2024 highlighted a record surge in crypto money laundering driven by hackers, presenting challenges for the entire cryptocurrency industry. While overall fraud losses are declining, advanced laundering techniques and phishing scams remain significant threats. As such, implementing robust security measures and fostering industry collaboration are essential to protecting investors and reducing the impact of cybercrime.

#CryptoNewss , #HackerNews , #hacking , #MoneyLaundering , #CryptoCrime

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number