Binance Square

Hacking

258,168 views
104 Discussing
Professor Mende - Bonuz Ecosystem Founder
--
🚨 Iranian Exchange hacked for $81M by ISRAEL-LINKED hackers! Iran’s largest crypto exchange just suffered a massive $81M exploit. The attacker? A pro-Israel group calling itself Gonjeshke Darande. Here’s what went down: - Hackers used vanity wallet addresses with blunt messages, like “TerroristsNoBiTEX”, to drain Nobitex’s hot wallets across multiple chains. So far, at least $81.7M has been siphoned off - $49M in one strike alone. - Nobitex confirmed “unauthorized access” but says cold wallets are safe and losses will be covered by their insurance fund. - Even wilder: the hacker group claims this was a political act, calling Nobitex a “sanctions evasion tool” for the Iranian regime. They’re threatening to release source code and internal docs in the next 24 hours. Meanwhile, $55M in USDT might be recoverable if Tether acts fast. The rest? Scattered across burner wallets, gone for good unless frozen. This isn’t your usual hack. This is crypto warfare in real time. Stay alert. Stay safe. This war took a turn on the blockchain which is absolutely crazy! #IsraelIranConflict #Israel #Iran #Hacking #NoBITEX
🚨 Iranian Exchange hacked for $81M by ISRAEL-LINKED hackers!

Iran’s largest crypto exchange just suffered a massive $81M exploit. The attacker? A pro-Israel group calling itself Gonjeshke Darande. Here’s what went down:

- Hackers used vanity wallet addresses with blunt messages, like “TerroristsNoBiTEX”, to drain Nobitex’s hot wallets across multiple chains. So far, at least $81.7M has been siphoned off - $49M in one strike alone.

- Nobitex confirmed “unauthorized access” but says cold wallets are safe and losses will be covered by their insurance fund.

- Even wilder: the hacker group claims this was a political act, calling Nobitex a “sanctions evasion tool” for the Iranian regime. They’re threatening to release source code and internal docs in the next 24 hours.

Meanwhile, $55M in USDT might be recoverable if Tether acts fast. The rest? Scattered across burner wallets, gone for good unless frozen. This isn’t your usual hack. This is crypto warfare in real time. Stay alert. Stay safe. This war took a turn on the blockchain which is absolutely crazy! #IsraelIranConflict #Israel #Iran #Hacking #NoBITEX
☄️ The pro-Israeli hacker group Gonjeshke Darande has claimed responsibility for the hack of the Iranian crypto exchange Nobitex. The hackers called Nobitex "a key tool of the Iranian regime for financing terrorism and evading sanctions" and promised to release internal data and the exchange's source code within 24 hours. #hacking #news #war #IranIsraelConflict #Nobitex
☄️ The pro-Israeli hacker group Gonjeshke Darande has claimed responsibility for the hack of the Iranian crypto exchange Nobitex. The hackers called Nobitex "a key tool of the Iranian regime for financing terrorism and evading sanctions" and promised to release internal data and the exchange's source code within 24 hours.
#hacking #news #war #IranIsraelConflict #Nobitex
Lc96:
Israel e mestre em guerras, sempre pega no calcanhar de Aquiles de seus oponentes estando passos a frente.
--
Bearish
🚨 NOBITEX HACK EXPOSED: $81.7M VANITY‐ADDRESS HEIST 🚨 🔹 $BTC 🔹 Key Indicators: • Massive Drain: $81.7 M in assets siphoned from Nobitex hot wallets across Tron & EVM chains $ETH {spot}(ETHUSDT) • Vanity Exploit: First $49 M stolen via address “TKiRGCTerroristsNoBiTEXy2r7mNX,” then another $32.7 M through “0xffFFf…FFFFDead” $TRX {spot}(TRXUSDT) • Attack Group: Pro Israel hacker collective “Gonjeshke Darande” claims responsibility and vows to dump source code & remaining funds • Funds Frozen: Surprisingly, the stolen assets remain unmoved—potential for partial recovery if USDT is reissued • User Safety: Nobitex shut down affected hot wallets immediately; cold storage untouched and insurance fund to cover losses 💬 Your take: Drop “🔒” if you trust Nobitex’s insurance fund will cover you or “❓” if you’re moving to another exchange & tag @FaisCryptoUpdates !@larryhodl @chrisc_binance @CZ 🔁 Also repost as New Post to hijack the Square algorithm—stay ahead of exchange security breaches! #Nobitex #hacking #Tron #Ethereum #IsraelIranConflict
🚨 NOBITEX HACK EXPOSED: $81.7M VANITY‐ADDRESS HEIST 🚨
🔹 $BTC
🔹 Key Indicators:
• Massive Drain: $81.7 M in assets siphoned from Nobitex hot wallets across Tron & EVM chains $ETH

• Vanity Exploit: First $49 M stolen via address “TKiRGCTerroristsNoBiTEXy2r7mNX,” then another $32.7 M through “0xffFFf…FFFFDead” $TRX

• Attack Group: Pro Israel hacker collective “Gonjeshke Darande” claims responsibility and vows to dump source code & remaining funds
• Funds Frozen: Surprisingly, the stolen assets remain unmoved—potential for partial recovery if USDT is reissued
• User Safety: Nobitex shut down affected hot wallets immediately; cold storage untouched and insurance fund to cover losses
💬 Your take: Drop “🔒” if you trust Nobitex’s insurance fund will cover you or “❓” if you’re moving to another exchange & tag @FaisalCrypto007 !@Larryhodl @Chris Cao @CZ
🔁 Also repost as New Post to hijack the Square algorithm—stay ahead of exchange security breaches!
#Nobitex #hacking #Tron #Ethereum #IsraelIranConflict
🚨 BREAKING: Pro-Israel hacker group Gonjeshke Darande has claimed responsibility for the $48Mhack on Iranian crypto exchange Nobitex, executed via the Tron network. 💸💻 🇮🇱 vs 🇮🇷 — Cyberwar spills into crypto. 🔗 Funds reportedly moved in $USDC and $BTC 🕵️‍♂️ Investigation ongoing… $BTC #CryptoNewss #Tron #Nobitex #hacking #CyberWar {spot}(BTCUSDT)
🚨 BREAKING: Pro-Israel hacker group Gonjeshke Darande has claimed responsibility for the $48Mhack on Iranian crypto exchange Nobitex, executed via the Tron network. 💸💻

🇮🇱 vs 🇮🇷 — Cyberwar spills into crypto.

🔗 Funds reportedly moved in $USDC and $BTC
🕵️‍♂️ Investigation ongoing…
$BTC #CryptoNewss #Tron #Nobitex #hacking #CyberWar
🚨 CONFIRMED: Paraguayan President X's Account Hacked 💀🇵🇾 🔴 Official Update: The hacking of the Paraguayan President's X (formerly Twitter) account has been CONFIRMED. 📲 The attack generated strange and potentially dangerous posts from a verified presidential profile. ⚠️ This event highlights the serious cybersecurity risks to which even heads of state are exposed. 💰 Although it has not been directly linked to cryptocurrencies, hackers often use these accounts for crypto scams, promoting fake tokens, or phishing links. 🧠 Is the world prepared to protect the digital identity of its leaders? What if the next attack involves BTC, ETH, or a memecoin? 🔗 [Create your Binance account to buy BTC](https://accounts.binance.com/register?ref=YAW7SIBT) #Paraguay #hacking
🚨 CONFIRMED: Paraguayan President X's Account Hacked 💀🇵🇾
🔴 Official Update: The hacking of the Paraguayan President's X (formerly Twitter) account has been CONFIRMED.

📲 The attack generated strange and potentially dangerous posts from a verified presidential profile.

⚠️ This event highlights the serious cybersecurity risks to which even heads of state are exposed.

💰 Although it has not been directly linked to cryptocurrencies, hackers often use these accounts for crypto scams, promoting fake tokens, or phishing links.

🧠 Is the world prepared to protect the digital identity of its leaders? What if the next attack involves BTC, ETH, or a memecoin?

🔗 Create your Binance account to buy BTC

#Paraguay #hacking
🔴 #URGENT: Was the Paraguayan president's X account hacked? 💀 🚨 Breaking News from Paraguay: Users detect suspicious activity on the president's X (Twitter) account 🇵🇾. 💻 Strange messages, deleted posts, and unusual behavior have set off alarm bells. 👀 Although there is no official confirmation, everything points to a possible hack, which would be extremely serious given the sensitivity of the position. ⚠️ This opens the door to an urgent reflection: How vulnerable are world leaders on social media? 🛡️ In the digital age, even a tweet can move markets, cause chaos, or... start conflicts. 🔗 [Create your Binance account to buy BTC](https://accounts.binance.com/register?ref=YAW7SIBT) #Paraguay #Hacking
🔴 #URGENT: Was the Paraguayan president's X account hacked? 💀
🚨 Breaking News from Paraguay: Users detect suspicious activity on the president's X (Twitter) account 🇵🇾.

💻 Strange messages, deleted posts, and unusual behavior have set off alarm bells.

👀 Although there is no official confirmation, everything points to a possible hack, which would be extremely serious given the sensitivity of the position.

⚠️ This opens the door to an urgent reflection: How vulnerable are world leaders on social media?

🛡️ In the digital age, even a tweet can move markets, cause chaos, or... start conflicts.

🔗 Create your Binance account to buy BTC

#Paraguay #Hacking
$WRX #WRX Coin Chart Analysis Despite issues like the #hacking incident and other factors, the chart looks promising. It seems to have formed an impulse wave, and the WXY correction appears to be in progress. Once the correction ends, the bull run should begin, right? However, how high it will rise remains uncertain. I’ll revisit the chart later, but for now, it doesn’t look bad. If you'd like to see more chart analysis, please follow.
$WRX

#WRX Coin Chart Analysis

Despite issues like the #hacking incident and other factors, the chart looks promising.

It seems to have formed an impulse wave, and the WXY correction appears to be in progress.

Once the correction ends, the bull run should begin, right?
However, how high it will rise remains uncertain.

I’ll revisit the chart later, but for now, it doesn’t look bad.

If you'd like to see more chart analysis, please follow.
--
Bullish
@defioasis explains that the #Eigenpie ($EGP ) IDO presents a compelling investment opportunity with several advantages, including a low public sale FDV of $6 million and a #TVL exceeding $1 billion, which suggests significant upside potential compared to similar projects like #Magpie . With a short timeline featuring a 100% unlock at TGE and confirmed listings on #Bitget , KuCoin, and Bybit around the 25th, the project has also secured strong backing from notable investors like the @arbitrum_official and @PancakeSwap . Furthermore, the public sale offers full refunds, with a total investment of $1.03 million ongoing until the 24th. However, potential risks include decreased investor confidence stemming from a previous #hacking incident involving Magpie's Penpie subDAO, as well as possible market fatigue due to ongoing projects. Overall, while EigenPie has attractive features, thorough research (DYOR) is crucial to navigate the associated risks.
@defioasis explains that the #Eigenpie ($EGP ) IDO presents a compelling investment opportunity with several advantages, including a low public sale FDV of $6 million and a #TVL exceeding $1 billion, which suggests significant upside potential compared to similar projects like #Magpie . With a short timeline featuring a 100% unlock at TGE and confirmed listings on #Bitget , KuCoin, and Bybit around the 25th, the project has also secured strong backing from notable investors like the @Arbitrum Foundation and @PancakeSwap . Furthermore, the public sale offers full refunds, with a total investment of $1.03 million ongoing until the 24th. However, potential risks include decreased investor confidence stemming from a previous #hacking incident involving Magpie's Penpie subDAO, as well as possible market fatigue due to ongoing projects. Overall, while EigenPie has attractive features, thorough research (DYOR) is crucial to navigate the associated risks.
Il 21 Febbraio 2025, l' Exchange di criptovaluta Bybit ha subito un attacco hacker,con un furto di 1,5 miliardi di dollari in token . Gli hacker hanno sottratto 400000Ethereum da un portafoglio freddo,sfruttando una vulnerabilità nei contratti intelligenti. Bybit assicura che i mondi degli utenti sono al sicuro e sta collaborando con esperti blockchain per intervenire e investigare.Questo e' uno delle più grandi furti nella storia delle criptovalute. #cosa ne pensate ?Bybit riuscirebbe a gestire la situazione? #Bybit#SicurezzaCrypto #Hacking #Ethereum#
Il 21 Febbraio 2025, l' Exchange di criptovaluta Bybit ha subito un attacco hacker,con un furto di 1,5 miliardi di dollari in token . Gli hacker hanno sottratto 400000Ethereum da un portafoglio freddo,sfruttando una vulnerabilità nei contratti intelligenti.
Bybit assicura che i mondi degli utenti sono al sicuro e sta collaborando con esperti blockchain per intervenire e investigare.Questo e' uno delle più grandi furti nella storia delle criptovalute.
#cosa ne pensate ?Bybit riuscirebbe a gestire la situazione?
#Bybit#SicurezzaCrypto #Hacking #Ethereum#
Bybit взломан: похищено более $1,46 млрд в Ethereum. Криптовалютная биржа Bybit подверглась тому, что может стать крупнейшим взломом в истории цифровых валют - из горячих кошельков было выведено $1,46 млрд в Ethereum (ETH). Генеральный директор Bybit Бен Чжоу подтвердил факт взлома через социальные сети, заявив, что хакер получил контроль над определенным холодным ETH-кошельком и перевел все его содержимое на неизвестный адрес. Подозрения о взломе возникли, когда данные в блокчейне показали массивный перевод 401 346 ETH, стоимостью примерно $1,13 млрд, с горячего кошелька Bybit на неизвестный кошелек. Этот перевод не только вызвал тревогу о возможном взломе, но и повлиял на рыночную цену Ethereum, которая упала более чем на 4% после того, как украденные средства начали ликвидировать. Чжоу заверил пользователей, что, несмотря на взлом, все остальные холодные кошельки остаются в безопасности, а вывод средств работает в нормальном режиме. Метод, использованный при взломе Bybit, сильно напоминает техники, применявшиеся в предыдущих крупных взломах, таких как взломы WazirX и Radiant Capital в 2024 году. $ETH {spot}(ETHUSDT) #взлом #bybit #hacking
Bybit взломан: похищено более $1,46 млрд в Ethereum.

Криптовалютная биржа Bybit подверглась тому, что может стать крупнейшим взломом в истории цифровых валют - из горячих кошельков было выведено $1,46 млрд в Ethereum (ETH). Генеральный директор Bybit Бен Чжоу подтвердил факт взлома через социальные сети, заявив, что хакер получил контроль над определенным холодным ETH-кошельком и перевел все его содержимое на неизвестный адрес.

Подозрения о взломе возникли, когда данные в блокчейне показали массивный перевод 401 346 ETH, стоимостью примерно $1,13 млрд, с горячего кошелька Bybit на неизвестный кошелек. Этот перевод не только вызвал тревогу о возможном взломе, но и повлиял на рыночную цену Ethereum, которая упала более чем на 4% после того, как украденные средства начали ликвидировать.

Чжоу заверил пользователей, что, несмотря на взлом, все остальные холодные кошельки остаются в безопасности, а вывод средств работает в нормальном режиме.

Метод, использованный при взломе Bybit, сильно напоминает техники, применявшиеся в предыдущих крупных взломах, таких как взломы WazirX и Radiant Capital в 2024 году.
$ETH
#взлом #bybit #hacking
Bybit Breach: How the Lazarus Group Struck Crypto Again—and What It Means for Your Digital Wallet ✍This is Lazarus They just stole $1.46 billion from #bybit And they didn’t break the code — they broke the people Here’s untold story of how they did it (and why no one is truly safe) 👇 1/10 Lazarus is a state-backed North Korean #hacking group They’ve stolen billions from banks, crypto exchanges, and DeFi protocols And now, they’ve pulled off the biggest #crypto heist in history But how? Well... 2/10 There was no code exploit. No leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet... 3/10 But that raises a terrifying question. How did Lazarus know exactly who to target? A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed. That means Lazarus didn’t just hack Bybit… They knew who to manipulate 4/10 There are only a few ways to get that kind of information. • Inside job – Someone leaked the signer list. • Social engineering – Lazarus studied their emails & behavior. • Device compromise – One or more signers were infected with malware. This means other exchanges are at risk too... 5/10 Today Lazarus stole 0.42% of all #Ethereum It means they own More than the Ethereum Foundation. More than Vitalik Buterin. And more than Fidelity. But laundering that much ETH without detection isn’t easy... 6/10 In previous attacks, Lazarus has used: • Bridging to other #blockchain • On-chain mixing services • OTC trading via illicit brokers Would they try the same tactics again? 7/10 Investigators quickly flagged the 53 wallets holding the stolen ETH. Any attempt to cash out or swap funds would immediately raise red flags. But Lazarus are in no hurry... 8/10 In 2022, Chainalysis found Lazarus still held $55M from hacks six years earlier. They don’t cash out fast. They wait. And no one has ever gotten their money back. Not once. Lazarus doesn’t negotiate. They don’t return funds. So what happens to users? 9/10 Bybit’s CEO, Ben Zhou, addressed the crisis publicly: • “Client funds are 1:1 backed.” • “We have enough liquidity to cover withdrawals.” • “All other wallets remain secure.” So far, no bank run... 10/10 But this isn’t the first time this happened And it won’t be the last. So how do you stay safe? Follow these simple steps:

Bybit Breach: How the Lazarus Group Struck Crypto Again—and What It Means for Your Digital Wallet ✍

This is Lazarus
They just stole $1.46 billion from #bybit
And they didn’t break the code — they broke the people
Here’s untold story of how they did it (and why no one is truly safe) 👇

1/10
Lazarus is a state-backed North Korean #hacking group
They’ve stolen billions from banks, crypto exchanges, and DeFi protocols
And now, they’ve pulled off the biggest #crypto heist in history
But how? Well...

2/10
There was no code exploit.
No leaked private keys.
Bybit’s own multisig signers approved the transactions.
They thought they were signing a routine transfer.
Instead, they were handing over their entire cold wallet...

3/10
But that raises a terrifying question.
How did Lazarus know exactly who to target?
A multisig wallet requires multiple signers.
If even one refused to sign, the hack would fail.
But they all signed.
That means Lazarus didn’t just hack Bybit…
They knew who to manipulate
4/10
There are only a few ways to get that kind of information.
• Inside job – Someone leaked the signer list.
• Social engineering – Lazarus studied their emails & behavior.
• Device compromise – One or more signers were infected with malware.
This means other exchanges are at risk too...

5/10
Today Lazarus stole 0.42% of all #Ethereum
It means they own
More than the Ethereum Foundation.
More than Vitalik Buterin.
And more than Fidelity.
But laundering that much ETH without detection isn’t easy...

6/10
In previous attacks, Lazarus has used:
• Bridging to other #blockchain
• On-chain mixing services
• OTC trading via illicit brokers
Would they try the same tactics again?

7/10
Investigators quickly flagged the 53 wallets holding the stolen ETH.
Any attempt to cash out or swap funds would immediately raise red flags.
But Lazarus are in no hurry...

8/10
In 2022, Chainalysis found Lazarus still held $55M from hacks six years earlier.
They don’t cash out fast. They wait.
And no one has ever gotten their money back.
Not once.
Lazarus doesn’t negotiate. They don’t return funds.
So what happens to users?

9/10
Bybit’s CEO, Ben Zhou, addressed the crisis publicly:
• “Client funds are 1:1 backed.”
• “We have enough liquidity to cover withdrawals.”
• “All other wallets remain secure.”
So far, no bank run...

10/10
But this isn’t the first time this happened
And it won’t be the last.
So how do you stay safe? Follow these simple steps:
🚨 30-Year Prison Sentence For Crypto Mixer Founder Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges. Disputed Conviction and Sentence: Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft. However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court. A Call for Fairness: Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation. Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment. What do you think about this sentencing? Drop your comment below! #bitcoin #tornadocash #scam #cryptoscam #hacking $BTC
🚨 30-Year Prison Sentence For Crypto Mixer Founder

Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges.

Disputed Conviction and Sentence:

Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft.

However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court.

A Call for Fairness:

Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation.

Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment.

What do you think about this sentencing?

Drop your comment below!

#bitcoin #tornadocash #scam #cryptoscam #hacking
$BTC
✅ Thursday News: ✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire. ✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌 ✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands. ✔️ Quantity Funds has created a Bitcoin and Gold-based ETF. ✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token. ✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC. ✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million. ✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million. ✔️ BTC open interest set a new record at $20 billion. 🤑 ✔️ Hamster Kombat promises the upcoming launch of its second season. #btc #kraken #hacking #etf #news
✅ Thursday News:

✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire.

✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌

✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands.

✔️ Quantity Funds has created a Bitcoin and Gold-based ETF.

✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token.

✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC.

✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million.

✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million.

✔️ BTC open interest set a new record at $20 billion. 🤑

✔️ Hamster Kombat promises the upcoming launch of its second season.
#btc #kraken #hacking #etf #news
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement. According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts. Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities. “This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.” Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations. Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown
In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement.
According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts.
Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities.
“This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.”
Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations.
Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️* $BTC $NOT $BNB 🌏⤴️🪙 {spot}(BNBUSDT) {spot}(NOTUSDT) {spot}(BTCUSDT) *Key Developments 📊* 1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖. 2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸. 3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈. *Laundering Efforts 🚮* 1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊. 2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰. *Timeline 📆* 1. November 23, 2023: Kyber network exploited 🔥. 2. Today: Hacker resurfaced, transferring $5.83M 📈. *Implications 🤔* 1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒. 2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨. *Expert Insights 💡* "DeFi security requires constant vigilance." "Money laundering prevention is crucial." *Conclusion 🤝* The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes. #CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️*
$BTC $NOT $BNB 🌏⤴️🪙



*Key Developments 📊*

1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖.
2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸.
3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈.

*Laundering Efforts 🚮*

1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊.
2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰.

*Timeline 📆*

1. November 23, 2023: Kyber network exploited 🔥.
2. Today: Hacker resurfaced, transferring $5.83M 📈.

*Implications 🤔*

1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒.
2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨.

*Expert Insights 💡*

"DeFi security requires constant vigilance."
"Money laundering prevention is crucial."

*Conclusion 🤝*

The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes.

#CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
🔴 Хакеры атакуют через поддельные Office-расширения — украдено более 4 600 кошельков Эксперты из «Лаборатории Касперского» бьют тревогу: хакеры распространяют вредоносное ПО через фейковые дополнения Microsoft Office. Цель — майнинг на вашем компьютере и кража крипты через подмену адресов. 📌 Как это работает: – Вредонос замаскирован под расширения Office – Распространяется через сайт SourceForge – Жертва запускает установщик → система заражается – ClipBanker меняет адрес криптокошелька в буфере обмена – Деньги при переводе уходят злоумышленникам – Пострадали уже 4604 пользователя, из них 90% — в России 📉 Влияние: отрицательное — удар по доверию к альтернативным источникам ПО и рост риска среди криптоинвесторов. 📜 Исторический факт: Аналогичный ClipBanker использовался в атаках в 2021 году. Тогда вирус заменил адреса более 10 000 пользователей — ущерб составил свыше $2,5 млн. 📢 Ты не трейдер, если узнаёшь обо всём последним. Подписывайся 🔔 #CryptoSecurity #Hacking #ClipBanker #MicrosoftOffice #Kaspersky
🔴 Хакеры атакуют через поддельные Office-расширения — украдено более 4 600 кошельков

Эксперты из «Лаборатории Касперского» бьют тревогу: хакеры распространяют вредоносное ПО через фейковые дополнения Microsoft Office. Цель — майнинг на вашем компьютере и кража крипты через подмену адресов.

📌 Как это работает:

– Вредонос замаскирован под расширения Office

– Распространяется через сайт SourceForge

– Жертва запускает установщик → система заражается

– ClipBanker меняет адрес криптокошелька в буфере обмена

– Деньги при переводе уходят злоумышленникам

– Пострадали уже 4604 пользователя, из них 90% — в России

📉 Влияние: отрицательное — удар по доверию к альтернативным источникам ПО и рост риска среди криптоинвесторов.

📜 Исторический факт:

Аналогичный ClipBanker использовался в атаках в 2021 году. Тогда вирус заменил адреса более 10 000 пользователей — ущерб составил свыше $2,5 млн.

📢 Ты не трейдер, если узнаёшь обо всём последним. Подписывайся 🔔

#CryptoSecurity #Hacking #ClipBanker #MicrosoftOffice #Kaspersky
Crypto Crime Trends: Rising Threats and Increased Losse The cryptocurrency space continues to attract both innovation and risk, with increasing concerns over cybersecurity. As digital assets like Bitcoin and Ethereum become more mainstream, they are also becoming prime targets for cybercriminals. In 2024, cryptocurrency hack losses have surged by 21%, reaching an eye-watering $2.2 billion, according to recent reports. This marks the fourth consecutive year where cryptocurrency-related crimes have caused massive financial losses. The nature of these attacks is becoming more sophisticated. Cybercriminals now have access to advanced techniques to breach digital wallets, exchanges, and even decentralized platforms. These attacks often occur through phishing, ransomware, or exploiting vulnerabilities in smart contracts. The stolen funds are typically funneled through decentralized exchanges, making it difficult for authorities to trace the illicit movements. As the crypto industry grows, so does the scale of the threat. The decentralized nature of cryptocurrencies, while offering benefits like privacy and security, also makes them vulnerable to misuse. Hackers can act with relative anonymity, moving stolen assets across borders in seconds, making the recovery of stolen funds incredibly challenging. For investors and crypto enthusiasts, these rising threats highlight the need for robust security measures. Using hardware wallets, enabling multi-factor authentication, and choosing exchanges with strong security protocols are essential steps to protect digital assets from cyberattacks. Additionally, vigilance in monitoring accounts for suspicious activity is critical to preventing significant losses. The rise in cybercrime also underscores the importance of regulatory oversight and institutional partnerships to strengthen security frameworks across the cryptocurrency ecosystem. As the industry matures, ensuring that platforms and users adhere to the highest security standards will be crucial to combatting the growing threat of digital crime. #BTCNextMove #Hacking
Crypto Crime Trends: Rising Threats and Increased Losse

The cryptocurrency space continues to attract both innovation and risk, with increasing concerns over cybersecurity. As digital assets like Bitcoin and Ethereum become more mainstream, they are also becoming prime targets for cybercriminals. In 2024, cryptocurrency hack losses have surged by 21%, reaching an eye-watering $2.2 billion, according to recent reports. This marks the fourth consecutive year where cryptocurrency-related crimes have caused massive financial losses.
The nature of these attacks is becoming more sophisticated. Cybercriminals now have access to advanced techniques to breach digital wallets, exchanges, and even decentralized platforms. These attacks often occur through phishing, ransomware, or exploiting vulnerabilities in smart contracts. The stolen funds are typically funneled through decentralized exchanges, making it difficult for authorities to trace the illicit movements.
As the crypto industry grows, so does the scale of the threat. The decentralized nature of cryptocurrencies, while offering benefits like privacy and security, also makes them vulnerable to misuse. Hackers can act with relative anonymity, moving stolen assets across borders in seconds, making the recovery of stolen funds incredibly challenging.

For investors and crypto enthusiasts, these rising threats highlight the need for robust security measures. Using hardware wallets, enabling multi-factor authentication, and choosing exchanges with strong security protocols are essential steps to protect digital assets from cyberattacks. Additionally, vigilance in monitoring accounts for suspicious activity is critical to preventing significant losses.
The rise in cybercrime also underscores the importance of regulatory oversight and institutional partnerships to strengthen security frameworks across the cryptocurrency ecosystem. As the industry matures, ensuring that platforms and users adhere to the highest security standards will be crucial to combatting the growing threat of digital crime.

#BTCNextMove #Hacking
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯 Monday news: ✔️ Retail sales and industrial production data from China showed an economic slowdown ✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining ✔️ The Dow Jones stock index reached a new high of $41,558 💵 ✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15 ✔️ Binance warned of a potential threat to user accounts due to malware called Clipper ✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑 ✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million ✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million #BTC #DowJones #ETH #hacking
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯

Monday news:

✔️ Retail sales and industrial production data from China showed an economic slowdown

✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining

✔️ The Dow Jones stock index reached a new high of $41,558 💵

✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15

✔️ Binance warned of a potential threat to user accounts due to malware called Clipper

✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑

✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million

✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million

#BTC #DowJones #ETH #hacking
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Хакеры украли с платформы Orbit Chain криптовалюты на $81 млн В канун Нового года южнокорейская криптовалютная платформа Orbit Chain подверглась хакерской атаке, во время которой злоумышленники похитили криптоактивы на сумму более $81 млн. Команда Orbit Chain подтвердила, что 31 декабря к децентрализованному межсетевому мосту Orbit Bridge был получен несанкционированный доступ. Хакеры вывели из протокола ETH, а также стейблкоины USDC и USDT. Orbit Chain заявила, что для расследования кибератаки платформа прибегла к помощи Корейского национального полицейского агентства и Корейского агентства интернета и безопасности (KISA). К расследованию также привлечена компания ChainLight, специализирующаяся на безопасности блокчейнов. Аналитические компании CertiK и PeckShield оценили общие убытки протокола в $81,5 млн, из которых $30 млн приходится на USDT и $10 млн — на USDC. #UFO #hacking
Хакеры украли с платформы Orbit Chain криптовалюты на $81 млн

В канун Нового года южнокорейская криптовалютная платформа Orbit Chain подверглась хакерской атаке, во время которой злоумышленники похитили криптоактивы на сумму более $81 млн.

Команда Orbit Chain подтвердила, что 31 декабря к децентрализованному межсетевому мосту Orbit Bridge был получен несанкционированный доступ. Хакеры вывели из протокола ETH, а также стейблкоины USDC и USDT. Orbit Chain заявила, что для расследования кибератаки платформа прибегла к помощи Корейского национального полицейского агентства и Корейского агентства интернета и безопасности (KISA).

К расследованию также привлечена компания ChainLight, специализирующаяся на безопасности блокчейнов. Аналитические компании CertiK и PeckShield оценили общие убытки протокола в $81,5 млн, из которых $30 млн приходится на USDT и $10 млн — на USDC.
#UFO #hacking
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number