Binance Square

HACK

756,533 views
270 Discussing
Monirul-Islam-20bd
--
#HackerAlert #Hack #hackattack hacker address:-šŸ‘‡ 0xd24347d9e7e9ffd3f67cb997c807b5e29896e38e Many people have had dollars automatically transferred from their accounts to their accounts.
#HackerAlert #Hack #hackattack
hacker address:-šŸ‘‡

0xd24347d9e7e9ffd3f67cb997c807b5e29896e38e

Many people have had dollars automatically transferred from their accounts to their accounts.
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom UpdatesšŸ”¹ Fake Zoom meeting invites and update links deceive Web3 teams šŸ”¹ New NimDoor malware infiltrates macOS with advanced evasion techniques šŸ”¹ Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: šŸ”¹ Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. šŸ”¹ System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: šŸ”¹ Automatically reinstalls itself if users try to terminate or delete it šŸ”¹ Creates hidden files and folders that look like legitimate macOS system components šŸ”¹ Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic šŸ”¹ Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

šŸ”¹ Fake Zoom meeting invites and update links deceive Web3 teams

šŸ”¹ New NimDoor malware infiltrates macOS with advanced evasion techniques

šŸ”¹ Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
šŸ”¹ Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

šŸ”¹ System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
šŸ”¹ Automatically reinstalls itself if users try to terminate or delete it

šŸ”¹ Creates hidden files and folders that look like legitimate macOS system components

šŸ”¹ Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

šŸ”¹ Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
🚨 Nobitex Resumes Service After $90M Hack! Iran’s biggest crypto exchange was hit by pro-Israel hackers, losing $90M. Spot wallets are back online for verified users, but don’t deposit to old addresses use new wallets only! Full restoration ongoing. #Crypto #Nobitex #hack
🚨 Nobitex Resumes Service After $90M Hack!

Iran’s biggest crypto exchange was hit by pro-Israel hackers, losing $90M. Spot wallets are back online for verified users, but don’t deposit to old addresses use new wallets only! Full restoration ongoing.

#Crypto #Nobitex #hack
Crypto Hacks 2025: $2.1B Stolen, Seed Phrases and Front-Ends Hit HardCrypto hacks in 2025 are on track to break records, with $2.1 billion stolen in just six months. According to a recent report by blockchain intelligence firm TRM Labs, seed phrases and front-ends are in hackers’ crosshairs. Crypto Hacks Hit $2.1B in 2025 H1: Details TheĀ TRM Labs reportĀ paints a concerning picture: crypto thefts have skyrocketed 50% year-over-year. Across 75 incidents, the year has seen a massive loss of $2.1 billion in the first half. This figure almost eclipses all the crypto theft losses in 2024. Notably, the bulk of losses came from infrastructure attacks, which compromised the technical foundations of crypto systems through private key thefts, seed phrase breaches, and front-end hijacks. This accounts for over 80% of stolen funds, yielding 10 times more than other attack types on average. The statement read, Infrastructure attacks — such asĀ private key and seed phrase thefts, and front-end compromises — accounted for overĀ 80%Ā of stolen funds in H1 2025 and were, on average, ten times larger than other attack types… Often enabled by social engineering or insider access, these breaches expose critical weaknesses at the foundation of cryptosecurity. Over the past week, three notable crypto news outlets have fallen victim to security breaches. As we noted,Ā CoinMarketCap and Cointelgraph have facedĀ front-end breaches, where users received a malicious pop-up. In the latest event of crypto hacks, attackers targeted the official X account of the crypto news outlet, PANews. On June 27, hackers compromised the X account to spread misinformation about an airdrop. Following the incident, PANews warned users to avoid clicking on any links associated with this crypto hack. North Korea’s Role in Rising Crypto Hacks According to the TRM Labs report, the largest hack of 2025 to date is the $1.4 billion breach of Bybit, a Dubai-based crypto exchange, which occurred in February. Linked to the North Korean hackers, this crypto hack represents about 70% of total losses this year. This incident pushed the average hack size to nearly $30 million, doubling the $15 million average seen in the first half of 2024. Interestingly, the report attributes $1.6 billion of stolen funds in H1 2025 crypto hacks to the North Korean group. The fund accumulated by them accounts for 70% of the total losses. The Bybit theft significantly contributed to this staggering amount, highlighting the Democratic People’s Republic of Korea’s ongoing efforts to exploit crypto for sanctions evasion, nuclear program funding, and statecraft. Another major crypto hack that shook the global crypto space is theĀ Nobitex breach. Earlier this month, the Iranian crypto exchange Nobitex faced a massive hack, losing over $100 million in crypto assets. Reportedly, the Israeli hackers, Gonjeshke Darande, have led the attack. To combat these threats, TRM Labs recommends that the crypto industry implement robust security measures. This includes multi-factor authentication, cold storage for funds, regular security audits, and targeted countermeasures against insider threats and social engineering attacks. #IsraelIranConflict #hacks #HackerAlert #Hack #crypto

Crypto Hacks 2025: $2.1B Stolen, Seed Phrases and Front-Ends Hit Hard

Crypto hacks in 2025 are on track to break records, with $2.1 billion stolen in just six months. According to a recent report by blockchain intelligence firm TRM Labs, seed phrases and front-ends are in hackers’ crosshairs.
Crypto Hacks Hit $2.1B in 2025 H1: Details
TheĀ TRM Labs reportĀ paints a concerning picture: crypto thefts have skyrocketed 50% year-over-year. Across 75 incidents, the year has seen a massive loss of $2.1 billion in the first half. This figure almost eclipses all the crypto theft losses in 2024.
Notably, the bulk of losses came from infrastructure attacks, which compromised the technical foundations of crypto systems through private key thefts, seed phrase breaches, and front-end hijacks. This accounts for over 80% of stolen funds, yielding 10 times more than other attack types on average. The statement read,
Infrastructure attacks — such asĀ private key and seed phrase thefts, and front-end compromises — accounted for overĀ 80%Ā of stolen funds in H1 2025 and were, on average, ten times larger than other attack types… Often enabled by social engineering or insider access, these breaches expose critical weaknesses at the foundation of cryptosecurity.
Over the past week, three notable crypto news outlets have fallen victim to security breaches. As we noted,Ā CoinMarketCap and Cointelgraph have facedĀ front-end breaches, where users received a malicious pop-up.
In the latest event of crypto hacks, attackers targeted the official X account of the crypto news outlet, PANews. On June 27, hackers compromised the X account to spread misinformation about an airdrop. Following the incident, PANews warned users to avoid clicking on any links associated with this crypto hack.
North Korea’s Role in Rising Crypto Hacks
According to the TRM Labs report, the largest hack of 2025 to date is the $1.4 billion breach of Bybit, a Dubai-based crypto exchange, which occurred in February. Linked to the North Korean hackers, this crypto hack represents about 70% of total losses this year. This incident pushed the average hack size to nearly $30 million, doubling the $15 million average seen in the first half of 2024.
Interestingly, the report attributes $1.6 billion of stolen funds in H1 2025 crypto hacks to the North Korean group. The fund accumulated by them accounts for 70% of the total losses. The Bybit theft significantly contributed to this staggering amount, highlighting the Democratic People’s Republic of Korea’s ongoing efforts to exploit crypto for sanctions evasion, nuclear program funding, and statecraft.
Another major crypto hack that shook the global crypto space is theĀ Nobitex breach. Earlier this month, the Iranian crypto exchange Nobitex faced a massive hack, losing over $100 million in crypto assets. Reportedly, the Israeli hackers, Gonjeshke Darande, have led the attack.
To combat these threats, TRM Labs recommends that the crypto industry implement robust security measures. This includes multi-factor authentication, cold storage for funds, regular security audits, and targeted countermeasures against insider threats and social engineering attacks.

#IsraelIranConflict #hacks #HackerAlert #Hack #crypto
The Crypto Market Doesn't Care About Your Beliefs/EmotionsWatch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, unscammable, and FRUSTRATE HACKERS even WITH exposed seedphrases: U - T V B E ( @HackersFrustrator ) T ! |< t 0 |< ( @HackersFrustrator ) X ( @HACKERFRUSTRATE ) When the crypto market takes a downturn, some people might attribute it to various factors, including external forces beyond our control. One claim that often surfaces is that "God is annoyed." While beliefs and spirituality are personal and valid, let's take a closer look at this idea. The Market Moves on Its Own The crypto market operates based on supply and demand, driven by human actions, market sentiment, and economic principles. Prices rise and fall due to factors like: - Market Sentiment: How investors feel about the market can greatly influence price movements. - Economic Indicators: Factors like inflation, interest rates, and global economic health play a role. - Technological Developments: Advances in blockchain technology and adoption rates can impact prices. - Regulatory News: Government policies and regulations can cause significant market shifts. The Role of Human Decision-Making The crypto market is shaped by the collective actions of millions of individuals making decisions based on their own research, risk tolerance, and investment strategies. It's a system driven by human behavior, not divine intervention. A Rational Perspective When the market experiences volatility, it's essential to rely on data and logical analysis rather than attributing market movements to supernatural forces. By understanding the real factors at play, investors can make more informed decisions. In summary, the crypto market is a complex system influenced by human actions and economic principles. While personal beliefs are important, it's crucial to separate them from market analysis. By focusing on the factors that truly drive the market, investors can navigate the ups and downs with greater clarity and confidence. Stay ahead of the game and protect your digital assets from SCAMMERS & HACKERS. Remember, God doesn't give a fvck about your crypto portfolio – it's up to you to stay informed and secure. Watch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, and FRUSTRATE HACKERS: U - T V B E ( @HackersFrustrator ) T ! |< t 0 |< ( @HackersFrustrator ) X ( @HACKERFRUSTRATE ) #BinanceAlphaAlert #MarketRebound #SaylorBTCPurchase #hackers #Hack

The Crypto Market Doesn't Care About Your Beliefs/Emotions

Watch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, unscammable, and FRUSTRATE HACKERS even WITH exposed seedphrases:
U - T V B E ( @HackersFrustrator )
T ! |< t 0 |< ( @HackersFrustrator )
X ( @HACKERFRUSTRATE )

When the crypto market takes a downturn, some people might attribute it to various factors, including external forces beyond our control. One claim that often surfaces is that "God is annoyed." While beliefs and spirituality are personal and valid, let's take a closer look at this idea.

The Market Moves on Its Own
The crypto market operates based on supply and demand, driven by human actions, market sentiment, and economic principles. Prices rise and fall due to factors like:
- Market Sentiment: How investors feel about the market can greatly influence price movements.
- Economic Indicators: Factors like inflation, interest rates, and global economic health play a role.
- Technological Developments: Advances in blockchain technology and adoption rates can impact prices.
- Regulatory News: Government policies and regulations can cause significant market shifts.
The Role of Human Decision-Making
The crypto market is shaped by the collective actions of millions of individuals making decisions based on their own research, risk tolerance, and investment strategies. It's a system driven by human behavior, not divine intervention.
A Rational Perspective
When the market experiences volatility, it's essential to rely on data and logical analysis rather than attributing market movements to supernatural forces. By understanding the real factors at play, investors can make more informed decisions.
In summary, the crypto market is a complex system influenced by human actions and economic principles. While personal beliefs are important, it's crucial to separate them from market analysis. By focusing on the factors that truly drive the market, investors can navigate the ups and downs with greater clarity and confidence.
Stay ahead of the game and protect your digital assets from SCAMMERS & HACKERS. Remember, God doesn't give a fvck about your crypto portfolio – it's up to you to stay informed and secure.

Watch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, and FRUSTRATE HACKERS:
U - T V B E ( @HackersFrustrator )
T ! |< t 0 |< ( @HackersFrustrator )
X ( @HACKERFRUSTRATE )
#BinanceAlphaAlert #MarketRebound #SaylorBTCPurchase #hackers #Hack
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? šŸ”„ Yesterday, the crypto world exploded with two shocking headlines: 1ļøāƒ£ A major exchange lost $1.5 billion in Ethereum after a massive hack. 2ļøāƒ£ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯 Coincidence? Or something bigger? šŸ”¹ The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang. šŸ”¹ North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen! šŸ”¹ Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots. šŸ’¬ What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! šŸ‘‡šŸ”„ šŸ”” Follow for more real-time crypto updates! šŸš€ #BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? šŸ”„

Yesterday, the crypto world exploded with two shocking headlines:

1ļøāƒ£ A major exchange lost $1.5 billion in Ethereum after a massive hack.

2ļøāƒ£ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯

Coincidence? Or something bigger?
šŸ”¹ The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang.

šŸ”¹ North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen!

šŸ”¹ Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots.

šŸ’¬ What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! šŸ‘‡šŸ”„

šŸ”” Follow for more real-time crypto updates! šŸš€

#BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
30.1K #BTC ($2.1B) of #Silk Road #hack funds controlled by US government is on the move right now. 0.001 BTC ($69) transferred to a Coinbase deposit address so it’s a test transfer possibly. txn hash 9c3af4b48e66565f1da1da8278036fa1dbb09f2beaaca99c3504475390ba4590 Coinbase deposit address 3KrZVU9Jz4UKHpKUtuvkEMX1tY8zeiTvX2
30.1K #BTC ($2.1B) of #Silk Road #hack funds controlled by US government is on the move right now.

0.001 BTC ($69) transferred to a Coinbase deposit address so it’s a test transfer possibly.

txn hash
9c3af4b48e66565f1da1da8278036fa1dbb09f2beaaca99c3504475390ba4590

Coinbase deposit address
3KrZVU9Jz4UKHpKUtuvkEMX1tY8zeiTvX2
Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in EthereumOn Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter. Theft Details: 3,250 ETH Moved by Unknown Perpetrators A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability. Personal Accounts of Jeff 'Jiho' Zirlin Compromised Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it. Security of Ronin and Sky Mavis Unaffected In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals. Impact on Ronin's Market Value As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97. Historical Context: Ronin Bridge Attack The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack. $ETH #Ronin #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in Ethereum

On Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter.
Theft Details: 3,250 ETH Moved by Unknown Perpetrators
A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability.
Personal Accounts of Jeff 'Jiho' Zirlin Compromised
Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it.

Security of Ronin and Sky Mavis Unaffected
In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals.
Impact on Ronin's Market Value
As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97.
Historical Context: Ronin Bridge Attack
The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack.

$ETH
#Ronin #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
Gala Games CEO Attributes $23M Exploit to Internal Control FailuresGala Games CEO Eric Schiermeyer has confirmed that a "security incident" led to the unauthorized sale of 600 million GALA tokens, worth approximately $23 million. The breach, which Schiermeyer attributed to "messed up" internal controls, has raised significant concerns within the blockchain gaming community. Incident Overview On May 20, at 7:32 pm UTC, blockchain observers reported the minting of 5 billion GALA tokens, valued at around $200 million at the time. The compromised wallet was selling the tokens in batches, leading to a sharp drop in GALA's price. The token hit a 24-hour low of $0.038, a 20% decrease from its daily high, before recovering slightly to $0.041, according to CoinGecko. ā€œWe had an incident that resulted in the unauthorized sale of 600 million GALA tokens and the effective burn of 4.4 billion tokens,ā€ Schiermeyer wrote in a May 20 post on X (formerly Twitter). He admitted, ā€œWe messed up our internal controls. This shouldn’t have happened, and we are taking steps to ensure it doesn’t happen again.ā€ Response and Mitigation Gala Games quickly identified the compromise and revoked unauthorized access to the GALA contract. Schiermeyer assured users that the Ethereum contract was secure and had not been compromised. The company believes it has identified the person responsible and is collaborating with the FBI, the U.S. Justice Department, and international authorities to address the incident. In a follow-up post on X, Gala Games announced that the security breach had been contained and the affected wallet frozen. However, details about the perpetrator and the method of access to the GALA contract remain undisclosed. Ongoing Legal Disputes This security incident occurs amid ongoing legal battles between Schiermeyer and Gala Games co-founder Wright Thurston. Both have filed lawsuits against each other, with Thurston accusing Schiermeyer of squandering millions in company assets, while Schiermeyer alleges that Thurston stole $130 million worth of GALA tokens. Gala Games did not respond to requests for additional comments. The incident underscores the critical need for robust internal controls and security measures in the cryptocurrency and blockchain industries, as companies continue to navigate complex technological and legal landscapes. $GALA #GALA #GalaGames #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Gala Games CEO Attributes $23M Exploit to Internal Control Failures

Gala Games CEO Eric Schiermeyer has confirmed that a "security incident" led to the unauthorized sale of 600 million GALA tokens, worth approximately $23 million. The breach, which Schiermeyer attributed to "messed up" internal controls, has raised significant concerns within the blockchain gaming community.
Incident Overview
On May 20, at 7:32 pm UTC, blockchain observers reported the minting of 5 billion GALA tokens, valued at around $200 million at the time. The compromised wallet was selling the tokens in batches, leading to a sharp drop in GALA's price. The token hit a 24-hour low of $0.038, a 20% decrease from its daily high, before recovering slightly to $0.041, according to CoinGecko.
ā€œWe had an incident that resulted in the unauthorized sale of 600 million GALA tokens and the effective burn of 4.4 billion tokens,ā€ Schiermeyer wrote in a May 20 post on X (formerly Twitter). He admitted, ā€œWe messed up our internal controls. This shouldn’t have happened, and we are taking steps to ensure it doesn’t happen again.ā€
Response and Mitigation
Gala Games quickly identified the compromise and revoked unauthorized access to the GALA contract. Schiermeyer assured users that the Ethereum contract was secure and had not been compromised. The company believes it has identified the person responsible and is collaborating with the FBI, the U.S. Justice Department, and international authorities to address the incident.
In a follow-up post on X, Gala Games announced that the security breach had been contained and the affected wallet frozen. However, details about the perpetrator and the method of access to the GALA contract remain undisclosed.
Ongoing Legal Disputes
This security incident occurs amid ongoing legal battles between Schiermeyer and Gala Games co-founder Wright Thurston. Both have filed lawsuits against each other, with Thurston accusing Schiermeyer of squandering millions in company assets, while Schiermeyer alleges that Thurston stole $130 million worth of GALA tokens.
Gala Games did not respond to requests for additional comments.
The incident underscores the critical need for robust internal controls and security measures in the cryptocurrency and blockchain industries, as companies continue to navigate complex technological and legal landscapes.
$GALA #GALA #GalaGames #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
--
Bullish
🚨Alart🚨 $1.5B Bybit Hack Linked to North Korean Hacker Park Jin Hyok šŸŽ­šŸ’» The recent $1.5 billion cyberattack on Bybit has been traced back to Park Jin Hyok, a notorious North Korean hacker šŸŽÆ, and his links to the infamous Lazarus Group šŸ’€. Investigators, including ZachXBT šŸ•µļøā€ā™‚ļø and Arkham Intelligence šŸ“ā€ā˜ ļø, discovered that this massive crypto heist shares connections with a $70M hack on Phemex earlier this year šŸ’°šŸ”—. šŸŽ­ Who is Park Jin Hyok? Park is a state-sponsored hacker šŸ‡°šŸ‡µ, known for orchestrating some of the most sophisticated cyberattacks in history, including the WannaCry ransomware šŸ’¾, the Sony Pictures hack šŸŽ¬, and the infamous $600M Ronin Bridge exploit šŸ”„. His involvement in Lazarus Group has made him a key figure in North Korea’s cyber warfare strategy šŸ•¹ļø. šŸ’„ How Did the Bybit Hack Happen? Hackers infiltrated Bybit’s security systems šŸ¦, draining $1.5 billion worth of digital assets šŸ’ø. Traces of their movements were found leading to wallets associated with Lazarus Group, confirming their involvement. Blockchain sleuths 🧩 like ZachXBT and Arkham Intelligence followed the stolen funds, noticing familiar laundering patterns seen in previous Lazarus-led hacks 🚨. šŸ”— Link to the $70M Phemex Hack Earlier this year, Phemex suffered a $70 million exploit āš ļø, and now, investigators believe it was a test run for the larger Bybit attack šŸ“Š. The modus operandi—phishing scams šŸŽ£, security breaches, and rapid fund transfers—bears striking similarities šŸ“ā€ā˜ ļø. šŸš€ What’s Next? With the Lazarus Group’s continued attacks on the crypto industry, exchanges are reinforcing their security walls šŸ›”ļø. Authorities are tracking stolen assets through blockchain analytics šŸ”, hoping to freeze the funds before they vanish into the dark web šŸŒ‘. Stay vigilant, crypto traders! The world of DeFi and CeFi is still a battlefield āš”ļø, and cyber threats are evolving faster than ever. #Hack #LitecoinETF $ETH {spot}(ETHUSDT)
🚨Alart🚨 $1.5B Bybit Hack Linked to North Korean Hacker Park Jin Hyok šŸŽ­šŸ’»

The recent $1.5 billion cyberattack on Bybit has been traced back to Park Jin Hyok, a notorious North Korean hacker šŸŽÆ, and his links to the infamous Lazarus Group šŸ’€. Investigators, including ZachXBT šŸ•µļøā€ā™‚ļø and Arkham Intelligence šŸ“ā€ā˜ ļø, discovered that this massive crypto heist shares connections with a $70M hack on Phemex earlier this year šŸ’°šŸ”—.

šŸŽ­ Who is Park Jin Hyok?

Park is a state-sponsored hacker šŸ‡°šŸ‡µ, known for orchestrating some of the most sophisticated cyberattacks in history, including the WannaCry ransomware šŸ’¾, the Sony Pictures hack šŸŽ¬, and the infamous $600M Ronin Bridge exploit šŸ”„. His involvement in Lazarus Group has made him a key figure in North Korea’s cyber warfare strategy šŸ•¹ļø.

šŸ’„ How Did the Bybit Hack Happen?

Hackers infiltrated Bybit’s security systems šŸ¦, draining $1.5 billion worth of digital assets šŸ’ø. Traces of their movements were found leading to wallets associated with Lazarus Group, confirming their involvement. Blockchain sleuths 🧩 like ZachXBT and Arkham Intelligence followed the stolen funds, noticing familiar laundering patterns seen in previous Lazarus-led hacks 🚨.

šŸ”— Link to the $70M Phemex Hack

Earlier this year, Phemex suffered a $70 million exploit āš ļø, and now, investigators believe it was a test run for the larger Bybit attack šŸ“Š. The modus operandi—phishing scams šŸŽ£, security breaches, and rapid fund transfers—bears striking similarities šŸ“ā€ā˜ ļø.

šŸš€ What’s Next?

With the Lazarus Group’s continued attacks on the crypto industry, exchanges are reinforcing their security walls šŸ›”ļø. Authorities are tracking stolen assets through blockchain analytics šŸ”, hoping to freeze the funds before they vanish into the dark web šŸŒ‘.

Stay vigilant, crypto traders! The world of DeFi and CeFi is still a battlefield āš”ļø, and cyber threats are evolving faster than ever.
#Hack #LitecoinETF

$ETH
See original
🄶MetaMask announced on the X platform that the Farcaster account of Dan Finlay, the company's co-founder, had been compromised and used to promote a meme coin. The attacker used the mixing platform to launder money, earning over 1,000 SOL. The company has been working with Farcaster to investigate the incident. The attack has raised concerns in the crypto community about the security of the accounts of founders and large organizations. It is also a reminder that no one, including founders or blockchain experts, is immune to security risks. Awareness and personal security are paramount to protecting your digital assets. #Hack #MetaMask #memecoin
🄶MetaMask announced on the X platform that the Farcaster account of Dan Finlay, the company's co-founder, had been compromised and used to promote a meme coin. The attacker used the mixing platform to launder money, earning over 1,000 SOL. The company has been working with Farcaster to investigate the incident.

The attack has raised concerns in the crypto community about the security of the accounts of founders and large organizations.

It is also a reminder that no one, including founders or blockchain experts, is immune to security risks. Awareness and personal security are paramount to protecting your digital assets.

#Hack #MetaMask #memecoin
--
Bullish
🚨 The Most Dangerous Hacker You've Never Heard Of: Park Jin Hyok 🚨 A silent mastermind lurking in the shadows, Park Jin Hyok has left a trail of destruction across the digital world. A core member of North Korea’s Lazarus Group, his cyber heists have reshaped financial security forever. šŸŽ­ Sony Pictures Hack (2014) – A brutal breach that exposed secrets and sent shockwaves through Hollywood. šŸ’° Bangladesh Central Bank (2016) – $81 million vanished in an instant, stolen through a sophisticated SWIFT attack. 🦠 WannaCry Ransomware (2017) – Chaos unleashed worldwide, hospitals and businesses crippled, over $140K in ransom collected. šŸ’ø Bybit Hack (2025) – A jaw-dropping $1.46 billion drained from the exchange, setting a new record in crypto crime. Every move is precise. Every attack is devastating. The world’s financial systems tremble at the mere mention of his name. And yet, he remains a ghost—unseen, untouchable. #BybitSecurityBreach #Hack #BinanceAlphaAlert #Vote-PIOnBinanceYesOrNo $BNB $ETH $BTC {future}(ETHUSDT)
🚨 The Most Dangerous Hacker You've Never Heard Of: Park Jin Hyok 🚨

A silent mastermind lurking in the shadows, Park Jin Hyok has left a trail of destruction across the digital world. A core member of North Korea’s Lazarus Group, his cyber heists have reshaped financial security forever.

šŸŽ­ Sony Pictures Hack (2014) – A brutal breach that exposed secrets and sent shockwaves through Hollywood.

šŸ’° Bangladesh Central Bank (2016) – $81 million vanished in an instant, stolen through a sophisticated SWIFT attack.

🦠 WannaCry Ransomware (2017) – Chaos unleashed worldwide, hospitals and businesses crippled, over $140K in ransom collected.

šŸ’ø Bybit Hack (2025) – A jaw-dropping $1.46 billion drained from the exchange, setting a new record in crypto crime.

Every move is precise. Every attack is devastating. The world’s financial systems tremble at the mere mention of his name. And yet, he remains a ghost—unseen, untouchable.
#BybitSecurityBreach #Hack #BinanceAlphaAlert #Vote-PIOnBinanceYesOrNo $BNB $ETH $BTC
--
Bullish
See original
šŸ” McDonald's Memecoin Hack: Cyber ​​Thieves Steal Around $700,000 in Solana In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered. šŸ’€ The Grimace Memecoin Scam šŸ‘¾ Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes. šŸ“Š Pump & Dump The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes. šŸ’ø The Payout In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana." āš ļø Aftermath The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
šŸ” McDonald's Memecoin Hack: Cyber ​​Thieves Steal Around $700,000 in Solana

In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered.

šŸ’€ The Grimace Memecoin Scam šŸ‘¾

Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes.

šŸ“Š Pump & Dump

The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes.

šŸ’ø The Payout

In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana."

āš ļø Aftermath

The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams.

#scam #hack #Solana⁩ $SOL #RiskManagement
See original
ā–ˆā–‘ā–ˆā–‘ā–ˆ ā–ˆā–€ā–ˆ ā–ˆā–‘ā–ˆā–‘ā–ˆ ▀▄▀▄▀ ā–ˆā–„ā–ˆ ▀▄▀▄▀ there is growth potential in this currency take advantage of the opportunity since there are liquidity cuts secure your pocket #fyp #hack
ā–ˆā–‘ā–ˆā–‘ā–ˆ ā–ˆā–€ā–ˆ ā–ˆā–‘ā–ˆā–‘ā–ˆ
▀▄▀▄▀ ā–ˆā–„ā–ˆ ▀▄▀▄▀ there is growth potential in this currency take advantage of the opportunity since there are liquidity cuts secure your pocket #fyp #hack
AI Crypto Bot Hacked – 55.5 $ETH Stolen! šŸ¤– AIXBT’s dashboard was breached, leading to a $106K exploit in two swift transactions. The dev team acted fast—migrating servers, swapping keys & locking down access. But the damage was done. $AIXBT token crashed 15.5%, reigniting fears about AI-powered trading security. With AI agent tokens still holding a $4.2B market cap, this isn’t just a one-off incident—it’s a wake-up call. Security must evolve as AI trading scales. Who’s next, ai16z? šŸ¤” {spot}(ETHUSDT) {spot}(AIXBTUSDT) #AiXBTSecurityBreach #AIXBT #Hack #BinanceSquareFamily
AI Crypto Bot Hacked – 55.5 $ETH Stolen! šŸ¤–

AIXBT’s dashboard was breached, leading to a $106K exploit in two swift transactions.
The dev team acted fast—migrating servers, swapping keys & locking down access. But the damage was done.

$AIXBT token crashed 15.5%, reigniting fears about AI-powered trading security.
With AI agent tokens still holding a $4.2B market cap, this isn’t just a one-off incident—it’s a wake-up call.

Security must evolve as AI trading scales.

Who’s next, ai16z? šŸ¤”


#AiXBTSecurityBreach #AIXBT #Hack #BinanceSquareFamily
Scammed Twice in 3 Hours — Victim Loses $2.6M in StablecoinsOne crypto user got hit twice in a single night, losing $2.6 million in $USDT. The tool? A sneaky zero-value transfer scam. #Bitcoin2025 #Hack 🧠 Here’s how it works: šŸ”¹ Attackers send $0 transfers to fake but similar addresses šŸ”¹ These show up in your wallet history šŸ”¹ Victims mistake them for trusted contacts šŸ”¹ They later send real funds — straight to the scammer šŸ”¹ No private key needed for the scam to appear onchain The victim first lost $843K, then sent another $1.75M just hours later. This is not a new tactic — one scammer pulled off $20M using this trick last year. It’s an advanced form of address poisoning — and it works. Always double-check full wallet addresses. Don’t rely on history or ā€œfamiliarā€ characters. This scam is getting smarter. Are you?

Scammed Twice in 3 Hours — Victim Loses $2.6M in Stablecoins

One crypto user got hit twice in a single night, losing $2.6 million in $USDT. The tool? A sneaky zero-value transfer scam.
#Bitcoin2025 #Hack
🧠 Here’s how it works:
šŸ”¹ Attackers send $0 transfers to fake but similar addresses

šŸ”¹ These show up in your wallet history

šŸ”¹ Victims mistake them for trusted contacts

šŸ”¹ They later send real funds — straight to the scammer

šŸ”¹ No private key needed for the scam to appear onchain
The victim first lost $843K, then sent another $1.75M just hours later. This is not a new tactic — one scammer pulled off $20M using this trick last year.
It’s an advanced form of address poisoning — and it works. Always double-check full wallet addresses. Don’t rely on history or ā€œfamiliarā€ characters.
This scam is getting smarter. Are you?
Pumpamentals Update: News: "Hackers Leak Solana Co-Founder’s Private Data via Rapper Migos’ Instagram" Could this trigger some green candles? šŸ“ˆ 🦾 šŸ”„ #Solana #Hack #SOL #ETH
Pumpamentals Update:

News:

"Hackers Leak Solana Co-Founder’s Private Data via Rapper Migos’ Instagram"

Could this trigger some green candles?
šŸ“ˆ 🦾 šŸ”„
#Solana #Hack #SOL #ETH
$SUI i Backs Users After $223M Cetus Exploit A $223 million exploit hit the Cetus decentralized exchange on the Sui network, prompting an unusual rescue effort. The Sui Foundation is extending a loan to fully reimburse affected users, with repayment contingent on an upcoming on-chain community vote. This intervention aims to cover massive losses and signals the network’s commitment to user protection. The incident and bailout are making waves as a rare case of a blockchain stepping in to backstop a DeFi failure, sparking debate about decentralization versus user safety. #SUİ #Cetus #Hack #cyberduck #DEFİ
$SUI i Backs Users After $223M Cetus Exploit

A $223 million exploit hit the Cetus decentralized exchange on the Sui network, prompting an unusual rescue effort. The Sui Foundation is extending a loan to fully reimburse affected users, with repayment contingent on an upcoming on-chain community vote.

This intervention aims to cover massive losses and signals the network’s commitment to user protection. The incident and bailout are making waves as a rare case of a blockchain stepping in to backstop a DeFi failure, sparking debate about decentralization versus user safety.

#SUİ #Cetus #Hack #cyberduck #DEFİ
Login to explore more contents
Explore the latest crypto news
āš”ļø Be a part of the latests discussions in crypto
šŸ’¬ Interact with your favorite creators
šŸ‘ Enjoy content that interests you
Email / Phone number