Binance Square

HackerNews

188,182 views
133 Discussing
Rupesh Kumar Yadav
--
🔐To keep your Binance account safe, 🫆1. Enable Two-Factor Authentication (2FA) 2. Use a Strong, Unique Password 3. Enable Anti-Phishing Code 4. Whitelist Withdrawal Addresses 5. Monitor Account Activity 6. Secure Your Email & Device 7. Be Aware of Common Scams 8. Use Cold Storage for Large Holdings 9. Keep Backup Codes Secure 10 .Stay Informed About Binance Security What to Do If Hacked? 1.Change password immediately. 2. Disable withdrawals. 3. Contact Binance support. 4. Check for malware on your device . $BTC {spot}(BTCUSDT) #HackerNews

🔐To keep your Binance account safe, 🫆

1. Enable Two-Factor Authentication (2FA)
2. Use a Strong, Unique Password
3. Enable Anti-Phishing Code
4. Whitelist Withdrawal Addresses
5. Monitor Account Activity
6. Secure Your Email & Device
7. Be Aware of Common Scams
8. Use Cold Storage for Large Holdings
9. Keep Backup Codes Secure
10 .Stay Informed About Binance Security

What to Do If Hacked?
1.Change password immediately.
2. Disable withdrawals.
3. Contact Binance support.
4. Check for malware on your device .
$BTC
#HackerNews
Top 5 Mistakes⚔️❌New Binance Users Make And How To Avoid ThemBinance is the largest crypto exchange in the world, but many new users make simple mistakes that can lead to loss of funds, account restrictions, or even getting scammed. If you're a beginner, this guide will help you avoid the most common mistakes and use Binance safely. ❌ Mistake #1: Not Completing KYC (Verification) The Problem: Many users create an account but skip identity verification. The Risk: You won’t be able to deposit, trade, or withdraw — and your account may be limited or flagged. ✅ Fix: Complete full KYC with your valid ID card or passport. For Pakistani users, linking your Payoneer account helps for withdrawals. --- ❌ Mistake #2: Not Understanding Binance Wallets The Problem: New users often don’t know the difference between P2P, Spot, and Funding wallets. The Risk: You might buy crypto and then wonder where it went — or struggle to transfer it for trading. ✅ Fix: P2P Wallet: Where crypto lands after P2P purchases. Spot Wallet: Used for trading cryptocurrencies. Funding Wallet: Used for staking, Earn, and gift cards. > 🔁 Use the “Transfer” option to move crypto between wallets. --- ❌ Mistake #3: Buying Crypto from Unverified Sources The Problem: Some users get tricked by scammers on Telegram or WhatsApp offering cheaper crypto. The Risk: You send money and never receive your crypto — and Binance can’t help if the deal was outside their system. ✅ Fix: Only use Binance P2P with verified sellers. Avoid anyone asking you to trade off-platform. --- ❌ Mistake #4: Writing “Crypto” or “USDT” in Payment Remarks The Problem: While sending payment via Easypaisa or bank transfer, users write “Binance” or “USDT” in the remarks. The Risk: Your account could be flagged or frozen by the payment service. ✅ Fix: Never mention crypto in payment remarks. Leave it blank or use something generic like “Payment.” --- ❌ Mistake #5: Not Enabling 2FA Security The Problem: People rely only on passwords and email — which are easy to hack. The Risk: Your account can be hacked and funds stolen if you don’t add extra protection. ✅ Fix: Go to your Binance account and enable Google Authenticator (2FA). Use a strong password and don’t share login details. --- 💡 Bonus Tips: Explore Binance’s Learn & Earn section to earn free crypto. Follow Binance’s blog or YouTube for updates and tips. --- ✅ Final Thoughts Crypto can be powerful and profitable — but only if you use platforms like Binance the right way. Avoid these common mistakes, stay alert, and always trade safely. Found this helpful? Share with friends who are new on Binance #MarketPullback #HackerAlert #HackerNews #Crypto_Jobs🎯 #Earncommissions

Top 5 Mistakes⚔️❌New Binance Users Make And How To Avoid Them

Binance is the largest crypto exchange in the world, but many new users make simple mistakes that can lead to loss of funds, account restrictions, or even getting scammed.
If you're a beginner, this guide will help you avoid the most common mistakes and use Binance safely.
❌ Mistake #1: Not Completing KYC (Verification)
The Problem:
Many users create an account but skip identity verification.
The Risk:
You won’t be able to deposit, trade, or withdraw — and your account may be limited or flagged.
✅ Fix:
Complete full KYC with your valid ID card or passport.
For Pakistani users, linking your Payoneer account helps for withdrawals.
---
❌ Mistake #2: Not Understanding Binance Wallets
The Problem:
New users often don’t know the difference between P2P, Spot, and Funding wallets.
The Risk:
You might buy crypto and then wonder where it went — or struggle to transfer it for trading.
✅ Fix:
P2P Wallet: Where crypto lands after P2P purchases.
Spot Wallet: Used for trading cryptocurrencies.
Funding Wallet: Used for staking, Earn, and gift cards.
> 🔁 Use the “Transfer” option to move crypto between wallets.
---
❌ Mistake #3: Buying Crypto from Unverified Sources
The Problem:
Some users get tricked by scammers on Telegram or WhatsApp offering cheaper crypto.
The Risk:
You send money and never receive your crypto — and Binance can’t help if the deal was outside their system.
✅ Fix:
Only use Binance P2P with verified sellers.
Avoid anyone asking you to trade off-platform.
---
❌ Mistake #4: Writing “Crypto” or “USDT” in Payment Remarks
The Problem:
While sending payment via Easypaisa or bank transfer, users write “Binance” or “USDT” in the remarks.
The Risk:
Your account could be flagged or frozen by the payment service.
✅ Fix:
Never mention crypto in payment remarks.
Leave it blank or use something generic like “Payment.”
---
❌ Mistake #5: Not Enabling 2FA Security
The Problem:
People rely only on passwords and email — which are easy to hack.
The Risk:
Your account can be hacked and funds stolen if you don’t add extra protection.
✅ Fix:
Go to your Binance account and enable Google Authenticator (2FA).
Use a strong password and don’t share login details.
---
💡 Bonus Tips:
Explore Binance’s Learn & Earn section to earn free crypto.
Follow Binance’s blog or YouTube for updates and tips.
---
✅ Final Thoughts
Crypto can be powerful and profitable — but only if you use platforms like Binance the right way.
Avoid these common mistakes, stay alert, and always trade safely.
Found this helpful? Share with friends who are new on Binance
#MarketPullback #HackerAlert #HackerNews #Crypto_Jobs🎯 #Earncommissions
South Korean Woman Steals $480,000 in Cryptocurrency to Pay Off DebtsWoman Exploited Access to Friend's Phone A South Korean woman has been arrested for allegedly stealing $480,000 worth of cryptocurrency (700 million won) from her friend. Reports state that she met her victim a few months prior via a chat application. On January 7, the woman reportedly stole her friend’s phone from their home in Jeju City. She then used the phone to access his cryptocurrency holdings, sold the assets, and transferred the proceeds to her own bank accounts. Suspect Quickly Apprehended After committing the crime, the woman fled the scene. However, the victim reported the theft, enabling police to track her down. The suspect was arrested on January 8 in Gomi, North Jeolla Province. She admitted to the crime, claiming her motive was to pay off her debts. Investigation Continues Authorities are still investigating the case to uncover further details. This incident adds to a growing list of cryptocurrency-related thefts in South Korea. Similar Cases in South Korea In December 2024, a South Korean banker was sentenced to 15 years in prison for stealing $12.4 million from his employer, Woori Bank. The funds were used to finance his cryptocurrency addiction. Over a period of 10 months, the banker forged loan documents, redirected funds to his personal accounts, and spent $10.4 million on failed cryptocurrency investments. He ultimately lost $4.35 million. The court ordered him to repay 10.52 billion won ($7.3 million). While $3 million worth of assets were recovered, the remaining $4 million was deemed unrecoverable. #CryptoScamAlert , #CryptoCrime , #HackerNews , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

South Korean Woman Steals $480,000 in Cryptocurrency to Pay Off Debts

Woman Exploited Access to Friend's Phone
A South Korean woman has been arrested for allegedly stealing $480,000 worth of cryptocurrency (700 million won) from her friend. Reports state that she met her victim a few months prior via a chat application.
On January 7, the woman reportedly stole her friend’s phone from their home in Jeju City. She then used the phone to access his cryptocurrency holdings, sold the assets, and transferred the proceeds to her own bank accounts.
Suspect Quickly Apprehended
After committing the crime, the woman fled the scene. However, the victim reported the theft, enabling police to track her down. The suspect was arrested on January 8 in Gomi, North Jeolla Province. She admitted to the crime, claiming her motive was to pay off her debts.
Investigation Continues
Authorities are still investigating the case to uncover further details. This incident adds to a growing list of cryptocurrency-related thefts in South Korea.
Similar Cases in South Korea
In December 2024, a South Korean banker was sentenced to 15 years in prison for stealing $12.4 million from his employer, Woori Bank. The funds were used to finance his cryptocurrency addiction.
Over a period of 10 months, the banker forged loan documents, redirected funds to his personal accounts, and spent $10.4 million on failed cryptocurrency investments. He ultimately lost $4.35 million. The court ordered him to repay 10.52 billion won ($7.3 million). While $3 million worth of assets were recovered, the remaining $4 million was deemed unrecoverable.

#CryptoScamAlert , #CryptoCrime , #HackerNews , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Hackers Steal $840,000 from Orange FinanceHackers Exploit Orange Finance Platform Orange Finance, a major liquidity manager on the Arbitrum network, suffered a hacking incident resulting in the theft of $840,000. The Orange Finance team announced the breach on January 8 via X, urging users to avoid interacting with the protocol. Details of the Attack According to the team, the hackers gained control of the administrator address, upgraded the contracts, and transferred the funds to their wallet. The team confirmed that the contracts are no longer under their control and noted that they currently lack precise details about the attack. Message to the Hacker In a subsequent statement, the Orange Finance team revealed they contacted the hacker via an on-chain message. They requested a "positive response within 24 hours" and offered to handle the situation as a "white hat" matter without involving law enforcement agencies. Funds Converted to Ethereum Blockchain analytics firm Cyvers Alert reported that the hacker had already swapped the stolen funds for Ethereum (ETH). The Orange Finance team continues to investigate the incident and has advised users to revoke all contract approvals linked to Orange Finance to ensure their safety. A Significant Loss for Arbitrum’s Largest Liquidity Manager Before the attack, Orange Finance was the largest liquidity manager on the Arbitrum network, with over $1.5 million in total value locked, according to data from DefiLlama. This incident is a major blow to the platform’s operations and reputation. Conclusion The hack on Orange Finance highlights the risks associated with decentralized finance protocols. Users are urged to secure their funds and regularly review contract approvals to prevent similar incidents. The Orange Finance team is working to investigate the breach and recover the stolen funds. #HackerAlert , #CryptoFraud , #CryptoScamAlert , #CryptoNewss , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hackers Steal $840,000 from Orange Finance

Hackers Exploit Orange Finance Platform
Orange Finance, a major liquidity manager on the Arbitrum network, suffered a hacking incident resulting in the theft of $840,000. The Orange Finance team announced the breach on January 8 via X, urging users to avoid interacting with the protocol.

Details of the Attack
According to the team, the hackers gained control of the administrator address, upgraded the contracts, and transferred the funds to their wallet. The team confirmed that the contracts are no longer under their control and noted that they currently lack precise details about the attack.
Message to the Hacker
In a subsequent statement, the Orange Finance team revealed they contacted the hacker via an on-chain message. They requested a "positive response within 24 hours" and offered to handle the situation as a "white hat" matter without involving law enforcement agencies.

Funds Converted to Ethereum
Blockchain analytics firm Cyvers Alert reported that the hacker had already swapped the stolen funds for Ethereum (ETH). The Orange Finance team continues to investigate the incident and has advised users to revoke all contract approvals linked to Orange Finance to ensure their safety.
A Significant Loss for Arbitrum’s Largest Liquidity Manager
Before the attack, Orange Finance was the largest liquidity manager on the Arbitrum network, with over $1.5 million in total value locked, according to data from DefiLlama. This incident is a major blow to the platform’s operations and reputation.
Conclusion
The hack on Orange Finance highlights the risks associated with decentralized finance protocols. Users are urged to secure their funds and regularly review contract approvals to prevent similar incidents. The Orange Finance team is working to investigate the breach and recover the stolen funds.

#HackerAlert , #CryptoFraud , #CryptoScamAlert , #CryptoNewss , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
--
Bullish
🛑 Iran’s Nobitex Hacked for $82M — Israeli Cyber Unit “Gonjeshke Darande” Claims Responsibility In a shocking cyberattack that’s rocking the global crypto scene, Iran’s largest crypto exchange, Nobitex, has suffered an $81.7 million loss — reportedly at the hands of pro-Israel hackers. On June 16, 2025, blockchain sleuth ZachXBT revealed that massive sums were drained from Nobitex's hot wallets on both Ethereum and Tron chains. What’s most chilling? The attackers used custom vanity addresses like “TK***kiRGCTerrorists…mNX” and “0xffFFfFFffFF…Dead” — making a clear, politically charged statement. Experts now believe Nobitex’s internal controls were dangerously weak, with Cyvers’ analyst Hakan Unal saying, “These kinds of addresses should’ve been blocked by any competent system.” Claiming credit is the Israeli-aligned hacker group “Gonjeshke Darande”, which called Nobitex a “regime financing” tool and threatened to leak sensitive internal data within 24 hours. The breach follows escalating military conflict between Israel and Iran, with hundreds of casualties reported in the most intense fighting since the 1980s. Nobitex insists that the majority of users’ funds remain safe in cold storage — only hot wallets were impacted. However, the stolen funds have not been moved since the incident, suggesting either preparation for further laundering — or a warning of more to come. This breach isn’t just about one exchange. It highlights a growing intersection between geopolitics and crypto warfare, where digital currencies are now battlegrounds for nation-state-level cyberconflict. The world — and Nobitex users — will be watching closely to see how trust is rebuilt and defenses reinforced. $BTC $ETH $BNB #IsraelIranConflict #Hack #HackerNews #MyTradingStyle
🛑 Iran’s Nobitex Hacked for $82M — Israeli Cyber Unit “Gonjeshke Darande” Claims Responsibility

In a shocking cyberattack that’s rocking the global crypto scene, Iran’s largest crypto exchange, Nobitex, has suffered an $81.7 million loss — reportedly at the hands of pro-Israel hackers. On June 16, 2025, blockchain sleuth ZachXBT revealed that massive sums were drained from Nobitex's hot wallets on both Ethereum and Tron chains.

What’s most chilling? The attackers used custom vanity addresses like “TK***kiRGCTerrorists…mNX” and “0xffFFfFFffFF…Dead” — making a clear, politically charged statement. Experts now believe Nobitex’s internal controls were dangerously weak, with Cyvers’ analyst Hakan Unal saying, “These kinds of addresses should’ve been blocked by any competent system.”

Claiming credit is the Israeli-aligned hacker group “Gonjeshke Darande”, which called Nobitex a “regime financing” tool and threatened to leak sensitive internal data within 24 hours. The breach follows escalating military conflict between Israel and Iran, with hundreds of casualties reported in the most intense fighting since the 1980s.

Nobitex insists that the majority of users’ funds remain safe in cold storage — only hot wallets were impacted. However, the stolen funds have not been moved since the incident, suggesting either preparation for further laundering — or a warning of more to come.

This breach isn’t just about one exchange. It highlights a growing intersection between geopolitics and crypto warfare, where digital currencies are now battlegrounds for nation-state-level cyberconflict. The world — and Nobitex users — will be watching closely to see how trust is rebuilt and defenses reinforced.
$BTC $ETH $BNB
#IsraelIranConflict #Hack #HackerNews #MyTradingStyle
☄️ The hackers who breached Bybit wallets managed to launder all 499K ETH ($1.4B) in just 10 days using the THORChain protocol, which, thanks to North Korean hackers, earned $5.5M in fees. #HackerNews #news #bybit #ETH $ETH #sadstory
☄️ The hackers who breached Bybit wallets managed to launder all 499K ETH ($1.4B) in just 10 days using the THORChain protocol, which, thanks to North Korean hackers, earned $5.5M in fees.

#HackerNews #news #bybit #ETH $ETH #sadstory
#HackerNews #CoinbaseExchange. follow like share The hacker who stole over 300 million dollars from Coinbase has spent 2.31 million DAI to buy 649 ETH at an average price of 3561 dollars. This guy is really bold, continuing to hoard ETH as if mocking regulation, with 45.36 million DAI left in two wallets, likely to increase his holdings. Considering that recently a giant whale has added 5512 ETH, with a floating profit of 5.12 million, this whale activity suggests a strong ETH, but also reminds retail investors that on-chain anomalies often lead to significant volatility. I see that ETH ecosystem tokens like ENA have risen by 12.7%, I suggest following up but setting stop losses to avoid becoming the next victim of liquidation {future}(ETHUSDT)
#HackerNews

#CoinbaseExchange.

follow like share

The hacker who stole over 300 million dollars from Coinbase has spent 2.31 million DAI to buy 649 ETH at an average price of 3561 dollars.
This guy is really bold, continuing to hoard ETH as if mocking regulation, with 45.36 million DAI left in two wallets, likely to increase his holdings.
Considering that recently a giant whale has added 5512 ETH, with a floating profit of 5.12 million, this whale activity suggests a strong ETH, but also reminds retail investors that on-chain anomalies often lead to significant volatility.
I see that ETH ecosystem tokens like ENA have risen by 12.7%, I suggest following up but setting stop losses to avoid becoming the next victim of liquidation
USA, Japan, and South Korea Warn Against Hiring North Korean IT WorkersIn a joint statement, the governments of the United States, Japan, and South Korea have highlighted the growing risk posed by North Korean cyberattacks on the global blockchain and cryptocurrency sectors. The warning particularly focuses on the potential threats associated with hiring IT workers from North Korea. The Threat of North Korean Hackers to the Blockchain Industry The three nations emphasized in their January 14 statement that North Korean hacking groups, such as the infamous Lazarus Group, are increasingly targeting crypto exchanges and investors. These groups employ sophisticated tactics, including social engineering, and spread malware like TraderTraitor and AppleJeus. A Call for Caution in IT Recruitment Government authorities urged companies operating in the web3 and blockchain sectors to thoroughly vet new hires to avoid employing IT professionals from North Korea. Research indicates that such workers often pose as remote employees or investors. The report also mentioned initiatives to foster collaboration between the private and public sectors, such as Crypto-ISAC in the United States, as well as similar efforts in Japan and South Korea. North Korean Cyberattacks in 2024 In 2024, North Korean cyber groups were linked to several high-profile attacks: A hack on Japan’s DMM Bitcoin exchange resulted in losses of $308 million.An attack on South Korea’s Upbit platform led to the theft of $50 million. These incidents underscore the severity of the threat that North Korean activities pose to the global financial system. Fraudulent Practices by North Korean Hackers At the Cyberwarcon conference in November 2024, researchers revealed that North Korean hackers often disguise themselves as: Remote IT workers employed by major tech companies,Recruiters or venture capital investors. Two specific hacking groups, Sapphire Sleet and Ruby Sleet, allegedly stole $10 million in just six months using these methods. Collaboration Is Key to Protection The governments of the USA, Japan, and South Korea have called on companies and individuals to remain vigilant and work together to create effective defense mechanisms. Thorough employee screening and adherence to security recommendations could help mitigate the risks of cyberattacks and safeguard the global financial ecosystem. #CyberSecurity , #CryptoNewss , #cryptohacks , #cyberattacks , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

USA, Japan, and South Korea Warn Against Hiring North Korean IT Workers

In a joint statement, the governments of the United States, Japan, and South Korea have highlighted the growing risk posed by North Korean cyberattacks on the global blockchain and cryptocurrency sectors. The warning particularly focuses on the potential threats associated with hiring IT workers from North Korea.
The Threat of North Korean Hackers to the Blockchain Industry
The three nations emphasized in their January 14 statement that North Korean hacking groups, such as the infamous Lazarus Group, are increasingly targeting crypto exchanges and investors. These groups employ sophisticated tactics, including social engineering, and spread malware like TraderTraitor and AppleJeus.
A Call for Caution in IT Recruitment
Government authorities urged companies operating in the web3 and blockchain sectors to thoroughly vet new hires to avoid employing IT professionals from North Korea. Research indicates that such workers often pose as remote employees or investors. The report also mentioned initiatives to foster collaboration between the private and public sectors, such as Crypto-ISAC in the United States, as well as similar efforts in Japan and South Korea.
North Korean Cyberattacks in 2024
In 2024, North Korean cyber groups were linked to several high-profile attacks:
A hack on Japan’s DMM Bitcoin exchange resulted in losses of $308 million.An attack on South Korea’s Upbit platform led to the theft of $50 million.
These incidents underscore the severity of the threat that North Korean activities pose to the global financial system.
Fraudulent Practices by North Korean Hackers
At the Cyberwarcon conference in November 2024, researchers revealed that North Korean hackers often disguise themselves as:
Remote IT workers employed by major tech companies,Recruiters or venture capital investors.
Two specific hacking groups, Sapphire Sleet and Ruby Sleet, allegedly stole $10 million in just six months using these methods.
Collaboration Is Key to Protection
The governments of the USA, Japan, and South Korea have called on companies and individuals to remain vigilant and work together to create effective defense mechanisms. Thorough employee screening and adherence to security recommendations could help mitigate the risks of cyberattacks and safeguard the global financial ecosystem.

#CyberSecurity , #CryptoNewss , #cryptohacks , #cyberattacks , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
$150M XRP HEIST — YOU WON’T BELIEVE HOW IT HAPPENED! 🔥 Ripple co-founder Chris Larsen’s crypto fortune vanished in a jaw-dropping hack — all traced back to the 2022 LastPass breach. 💀 Hackers stole his private keys straight from his password manager. If it can happen to him, it can happen to anyone. Are YOUR assets really safe? Let’s talk security, risk, and the future of crypto. Sound off in the comments! 🚀💬 #CryptoScandal #xrp #CyberSecurity #HackerNews #CryptoSafety
$150M XRP HEIST — YOU WON’T BELIEVE HOW IT HAPPENED! 🔥
Ripple co-founder Chris Larsen’s crypto fortune vanished in a jaw-dropping hack — all traced back to the 2022 LastPass breach. 💀 Hackers stole his private keys straight from his password manager.

If it can happen to him, it can happen to anyone. Are YOUR assets really safe?

Let’s talk security, risk, and the future of crypto. Sound off in the comments! 🚀💬

#CryptoScandal #xrp #CyberSecurity #HackerNews #CryptoSafety
Binance founder CZ shared key tips to help users avoid phishing attacks. 🔜Never share your password with support agents. 🔜Avoid clicking on suspicious email links, always type the URL manually. 🔜Use different strong passwords for each site with a password manager. 🔜Enable hardware-based 2FA for added protection. #CZ #CZBİNANCE #HackerNews #SafetyTips #CryptoRegulation
Binance founder CZ shared key tips to help users avoid phishing attacks.

🔜Never share your password with support agents.

🔜Avoid clicking on suspicious email links, always type the URL manually.

🔜Use different strong passwords for each site with a password manager.

🔜Enable hardware-based 2FA for added protection.
#CZ #CZBİNANCE #HackerNews #SafetyTips #CryptoRegulation
Crypto Scammers Use Fake Job Interviews to Deploy Malware BackdoorsNew Scam Targets Web3 Professionals Scammers are now targeting professionals in the Web3 and cryptocurrency industries. They lure victims with fake job interviews and trick them into running malicious code. This sophisticated scheme involves offering attractive job opportunities from fake recruiters posing as representatives of major cryptocurrency firms. How the Scam Works According to investigator Taylor Monahan, who highlighted this attack on December 28, scammers approach victims through platforms like LinkedIn, Telegram, or freelancing sites. After expressing interest in the job offer, victims are directed to a video interview platform called "Willo | Video Interviewing", which appears legitimate but is part of the scam. During the interview, scammers initially ask standard questions, such as the victim’s views on current cryptocurrency trends, to build trust. The critical moment occurs during the final step, where the victim is required to upload a video. The Turning Point: Fake Troubleshooting Instructions While attempting to upload the video, victims encounter a "technical issue" with their microphone or camera. At this point, scammers provide troubleshooting steps that require the victim to execute commands or follow instructions on their device. If the victim complies, the attackers gain backdoor access to their system. Taylor Monahan warns that this process grants attackers complete access to the victim’s device, allowing them to install malware, monitor activity, steal sensitive data, or drain cryptocurrency wallets. Recommendations for Protection Monahan advises: Never execute unknown code on your device.If you suspect being targeted, completely wipe your device to prevent further compromise. Other Scam Examples This type of attack differs from typical fake job offer scams. For example, Cado Security Labs recently uncovered a fake meeting application that injected malware upon installation, enabling attackers to steal cryptocurrency funds and login credentials. Last year, crypto.news reported a case where fake recruiters on Upwork tricked blockchain developers into downloading malicious packages from GitHub. These packages contained scripts that allowed attackers to gain remote access to the victim's devices. Trust and vigilance are critical to protecting against these sophisticated scams. #HackerAlert , #CyberSecurity , #CryptoNewss , #CryptoSecurity , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Scammers Use Fake Job Interviews to Deploy Malware Backdoors

New Scam Targets Web3 Professionals
Scammers are now targeting professionals in the Web3 and cryptocurrency industries. They lure victims with fake job interviews and trick them into running malicious code. This sophisticated scheme involves offering attractive job opportunities from fake recruiters posing as representatives of major cryptocurrency firms.
How the Scam Works
According to investigator Taylor Monahan, who highlighted this attack on December 28, scammers approach victims through platforms like LinkedIn, Telegram, or freelancing sites. After expressing interest in the job offer, victims are directed to a video interview platform called "Willo | Video Interviewing", which appears legitimate but is part of the scam.
During the interview, scammers initially ask standard questions, such as the victim’s views on current cryptocurrency trends, to build trust. The critical moment occurs during the final step, where the victim is required to upload a video.
The Turning Point: Fake Troubleshooting Instructions
While attempting to upload the video, victims encounter a "technical issue" with their microphone or camera. At this point, scammers provide troubleshooting steps that require the victim to execute commands or follow instructions on their device. If the victim complies, the attackers gain backdoor access to their system.
Taylor Monahan warns that this process grants attackers complete access to the victim’s device, allowing them to install malware, monitor activity, steal sensitive data, or drain cryptocurrency wallets.
Recommendations for Protection
Monahan advises:
Never execute unknown code on your device.If you suspect being targeted, completely wipe your device to prevent further compromise.

Other Scam Examples
This type of attack differs from typical fake job offer scams. For example, Cado Security Labs recently uncovered a fake meeting application that injected malware upon installation, enabling attackers to steal cryptocurrency funds and login credentials.
Last year, crypto.news reported a case where fake recruiters on Upwork tricked blockchain developers into downloading malicious packages from GitHub. These packages contained scripts that allowed attackers to gain remote access to the victim's devices.
Trust and vigilance are critical to protecting against these sophisticated scams.

#HackerAlert , #CyberSecurity , #CryptoNewss , #CryptoSecurity , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
--
Bearish
🚫🚫🚫🚫 Hacked 🚫🚫🚫🚫🚫 Alert. Many people are saying that the $COW swap has been hacked. Is it correct? #emergency #HackerNews
🚫🚫🚫🚫 Hacked 🚫🚫🚫🚫🚫

Alert. Many people are saying that the $COW swap has been hacked. Is it correct?

#emergency
#HackerNews
Xeggex CEO’s Account Hacked: Funds at RiskThe cryptocurrency exchange Xeggex is facing serious issues after users reported unexpected login problems and missing funds. Some traders fear that the platform might have suffered a major security breach that could threaten its operations. CEO’s Account Compromised, Leading to Access Suspension According to official reports, the CEO’s account was hacked, leading to a temporary suspension of login access and user funds. However, the company has reassured users that their wallets have been successfully secured to prevent any financial losses. To counter further attacks and mitigate potential risks, Xeggex disconnected its database from the network. While the exchange’s website remained operational, users were unable to log into their accounts. User Panic: Missing Balances and Empty Order Books The incident has caused widespread panic within the community. Many users noticed their balances had disappeared, and order books were completely empty. This has fueled speculation that the problem could be far more severe than initially assumed. In response to these concerns, Xeggex took its database offline to prevent hackers from further exploiting the platform. Xeggex Launches Internal Investigation The company has confirmed that it is conducting a full assessment of the breach, and users will be updated as soon as more details emerge. Blockchain data indicates that no major fund transfers have been recorded, but investigations are ongoing. Xeggex has assured its users that it is taking all necessary steps to secure wallets and prevent further breaches. Official Statement from Xeggex The exchange released the following statement: "Dear users, we are facing a challenging situation as our CEO has been hacked, losing access to their Telegram account and the Xeggex community group. We are still investigating the full details of this incident. The good news is that we have successfully locked all wallets to keep funds secure." Additionally, the company stated: "The login issue persists because we have disconnected the database from the network for security reasons. A thorough internal investigation is underway. As soon as we have a clearer picture of the situation, we will provide further updates." What’s Next? Xeggex now faces a critical challenge: restoring user confidence and ensuring the safety of all assets. Users will be eagerly awaiting further updates and the results of the ongoing investigation. Given the sensitivity of the situation, it will be crucial to see how quickly the exchange recovers and what security measures it implements moving forward. #HackerNews , #HackerAlert , #CyberSecurity , #scam , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Xeggex CEO’s Account Hacked: Funds at Risk

The cryptocurrency exchange Xeggex is facing serious issues after users reported unexpected login problems and missing funds. Some traders fear that the platform might have suffered a major security breach that could threaten its operations.
CEO’s Account Compromised, Leading to Access Suspension
According to official reports, the CEO’s account was hacked, leading to a temporary suspension of login access and user funds. However, the company has reassured users that their wallets have been successfully secured to prevent any financial losses.
To counter further attacks and mitigate potential risks, Xeggex disconnected its database from the network. While the exchange’s website remained operational, users were unable to log into their accounts.
User Panic: Missing Balances and Empty Order Books
The incident has caused widespread panic within the community. Many users noticed their balances had disappeared, and order books were completely empty. This has fueled speculation that the problem could be far more severe than initially assumed.
In response to these concerns, Xeggex took its database offline to prevent hackers from further exploiting the platform.
Xeggex Launches Internal Investigation
The company has confirmed that it is conducting a full assessment of the breach, and users will be updated as soon as more details emerge. Blockchain data indicates that no major fund transfers have been recorded, but investigations are ongoing.
Xeggex has assured its users that it is taking all necessary steps to secure wallets and prevent further breaches.
Official Statement from Xeggex
The exchange released the following statement:
"Dear users, we are facing a challenging situation as our CEO has been hacked, losing access to their Telegram account and the Xeggex community group. We are still investigating the full details of this incident. The good news is that we have successfully locked all wallets to keep funds secure."
Additionally, the company stated:
"The login issue persists because we have disconnected the database from the network for security reasons. A thorough internal investigation is underway. As soon as we have a clearer picture of the situation, we will provide further updates."
What’s Next?
Xeggex now faces a critical challenge: restoring user confidence and ensuring the safety of all assets. Users will be eagerly awaiting further updates and the results of the ongoing investigation. Given the sensitivity of the situation, it will be crucial to see how quickly the exchange recovers and what security measures it implements moving forward.

#HackerNews , #HackerAlert , #CyberSecurity , #scam , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
$ETH ALERT: Hackers on the Move! Stolen Ethereum Transferred to New Wallets Hackers behind the GMX and MIM Spell contract breaches have struck again, transferring 6,262 ETH (worth nearly $13 million) to three new wallets, reports PANews. The Heist: - *Contract Breaches*: GMX and MIM Spell contracts were infiltrated, resulting in the theft of 6,262 ETH. - *New Wallets*: Hackers have moved the stolen ETH to three new wallets, attempting to cover their tracks. - *Value*: The stolen ETH is valued at approximately $13 million. Stay Vigilant: As the hackers attempt to launder the stolen funds, it's essential to monitor the situation closely. The cryptocurrency community must remain alert and work together to prevent further illicit activities. Follow for Updates: Stay informed about the latest developments in this ongoing story. #ETH #stolen #HackerNews #BinanceAlphaAlert #Alert🔴
$ETH
ALERT: Hackers on the Move!

Stolen Ethereum Transferred to New Wallets
Hackers behind the GMX and MIM Spell contract breaches have struck again, transferring 6,262 ETH (worth nearly $13 million) to three new wallets, reports PANews.

The Heist:
- *Contract Breaches*: GMX and MIM Spell contracts were infiltrated, resulting in the theft of 6,262 ETH.
- *New Wallets*: Hackers have moved the stolen ETH to three new wallets, attempting to cover their tracks.
- *Value*: The stolen ETH is valued at approximately $13 million.

Stay Vigilant:
As the hackers attempt to launder the stolen funds, it's essential to monitor the situation closely. The cryptocurrency community must remain alert and work together to prevent further illicit activities.

Follow for Updates:
Stay informed about the latest developments in this ongoing story.

#ETH #stolen #HackerNews #BinanceAlphaAlert #Alert🔴
See original
The industry receives a major wake-up call Just a few days before its historic inclusion in the S&P 500 index, Coinbase revealed yesterday through a presentation that a cyberattack earlier this month resulted in the theft of customer account data. Bloomberg, citing a source, reports that hackers have had access to the data since the beginning of the year. Coinbase insists that if any customer was tricked into mistakenly sending funds, they will receive a refund. The incident could cost the exchange up to 400 million dollars, according to the platform. "In the long list of cryptocurrency companies that have been hacked, there are many examples of financial losses that are much more painful than what Coinbase seems to be suffering as a result of the attack," Bloomberg stated. "However, this case stands out for its significance. This time, the victim was possibly the most influential American company in the sector." In an openly aggressive scheme, cybercriminals bribed customer representatives to steal their confidential data (names, birth dates, addresses, nationalities, government-issued identification numbers, banking information like balances, and even details about when accounts were created); then the culprits demanded a ransom of 20 million dollars to delete them, Bloomberg said. "It's a significant leak," said Mike Dudas, managing partner of 6MV, a Web3 company, who told Bloomberg that he had been targeted by Coinbase hackers. "The amount of personal information shared is astounding," he added. #HackerNews
The industry receives a major wake-up call

Just a few days before its historic inclusion in the S&P 500 index, Coinbase revealed yesterday through a presentation that a cyberattack earlier this month resulted in the theft of customer account data.

Bloomberg, citing a source, reports that hackers have had access to the data since the beginning of the year.

Coinbase insists that if any customer was tricked into mistakenly sending funds, they will receive a refund. The incident could cost the exchange up to 400 million dollars, according to the platform.

"In the long list of cryptocurrency companies that have been hacked, there are many examples of financial losses that are much more painful than what Coinbase seems to be suffering as a result of the attack," Bloomberg stated. "However, this case stands out for its significance. This time, the victim was possibly the most influential American company in the sector."

In an openly aggressive scheme, cybercriminals bribed customer representatives to steal their confidential data (names, birth dates, addresses, nationalities, government-issued identification numbers, banking information like balances, and even details about when accounts were created); then the culprits demanded a ransom of 20 million dollars to delete them, Bloomberg said.

"It's a significant leak," said Mike Dudas, managing partner of 6MV, a Web3 company, who told Bloomberg that he had been targeted by Coinbase hackers. "The amount of personal information shared is astounding," he added.

#HackerNews
🚨 HACKER UPDATE 🚨 The #sneakyhacker 🤖 just made a big move! 🤯 After stealing over $300M from Coinbase users 😱, they sold 26,762 $ETH for a whopping $69.25M 💸 two months ago... and now they're back at it! 🔥 They just bought 4,863 $ETH for $12.55M 💸! What's their game plan? 🤔 Are they trying to make a comeback? 🔄 or just splurging on some ETH? 🤷‍♂️ Guess only time will tell! 🕰️ Stay vigilant, crypto fam! $ETH #coinbase #HackerNews
🚨 HACKER UPDATE 🚨

The #sneakyhacker 🤖 just made a big move! 🤯 After stealing over $300M from Coinbase users 😱, they sold 26,762 $ETH for a whopping $69.25M 💸 two months ago... and now they're back at it! 🔥
They just bought 4,863 $ETH for $12.55M 💸! What's their game plan? 🤔 Are they trying to make a comeback? 🔄 or just splurging on some ETH? 🤷‍♂️
Guess only time will tell! 🕰️ Stay vigilant, crypto fam!
$ETH
#coinbase #HackerNews
See original
Hackers invade company linked to Pix and divert at least R$ 400 millionThe attack compromised the reserve account of at least five financial institutions; the Central Bank, Civil Police, and Federal Police are investigating. A large-scale cyber attack hit the servers of C&M Software on Tuesday (1st), a company that connects financial institutions to the Pix infrastructure and the Brazilian Payment System (SPB). According to reports gathered by Valor Econômico, the hackers used C&M as a gateway to invade reserve accounts maintained at the Central Bank by at least five institutions. The estimated loss is R$ 400 million.

Hackers invade company linked to Pix and divert at least R$ 400 million

The attack compromised the reserve account of at least five financial institutions; the Central Bank, Civil Police, and Federal Police are investigating.
A large-scale cyber attack hit the servers of C&M Software on Tuesday (1st), a company that connects financial institutions to the Pix infrastructure and the Brazilian Payment System (SPB). According to reports gathered by Valor Econômico, the hackers used C&M as a gateway to invade reserve accounts maintained at the Central Bank by at least five institutions. The estimated loss is R$ 400 million.
Hackers Use Fake GitHub Code to Steal Bitcoin – Kaspersky WarnsNew Cyber Threat: GitVenom According to the latest report from Kaspersky, a dangerous attack known as GitVenom is spreading through GitHub. This campaign, active for at least two years, continues to grow and poses a serious threat to both developers and cryptocurrency investors. The attack starts with fake GitHub projects that appear to be legitimate tools – such as Telegram bots for managing Bitcoin wallets or utilities for PC gaming. However, these projects contain malicious code designed to steal cryptocurrencies. How Does GitVenom Work? Hackers use several techniques to disguise their malicious software: 🔹 Fake GitHub Projects – Fraudulent repositories present seemingly useful tools for managing crypto assets or gaming applications. 🔹 Manipulated README Files – Often generated by AI to appear trustworthy. 🔹 Trojan Horse in the Code – In Python-based scripts, attackers hide malicious code behind a string of 2,000 spaces, which decrypts and activates malware upon execution. 🔹 JavaScript-based Attacks – A rogue function is embedded in the main script, which, when executed, downloads additional malicious tools from repositories controlled by hackers. One of the victims was a developer whose Bitcoin wallet was drained of more than $400,000 in November. What Happens After Infection? Once the system is compromised, the malware executes various malicious activities: 🔺 Node.js Stealer – Collects passwords, cryptocurrency wallet details, and browsing history. 🔺 Remote Access Trojan (RAT) – Tools such as AsyncRAT and Quasar allow hackers to take control of the device, log keystrokes, and capture screenshots. 🔺 Clipper Malware – Automatically replaces copied wallet addresses with hacker-controlled addresses, redirecting funds. 📌 In one case, attackers successfully stole 5 BTC (worth $485,000) in just one month! Where Is the Threat Most Prevalent? GitVenom has been detected most frequently in Russia, Brazil, and Turkey, but Kaspersky warns that its spread is global. Hackers continuously update their code, imitate active development, and modify tactics to evade antivirus detection. How to Protect Yourself? 🛑 Thoroughly inspect any code before running it! 🛑 Verify the authenticity of a GitHub project and its update history. 🛑 Be cautious of "perfectly written" README files. 🛑 Use cybersecurity protection and monitor suspicious system activities. 📢 Kaspersky warns that attacks like GitVenom are unlikely to stop and will likely evolve further. Users should remain constantly vigilant. #HackerAlert , #CyberSecurity , #CryptoNewss , #HackerNews , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hackers Use Fake GitHub Code to Steal Bitcoin – Kaspersky Warns

New Cyber Threat: GitVenom
According to the latest report from Kaspersky, a dangerous attack known as GitVenom is spreading through GitHub. This campaign, active for at least two years, continues to grow and poses a serious threat to both developers and cryptocurrency investors.
The attack starts with fake GitHub projects that appear to be legitimate tools – such as Telegram bots for managing Bitcoin wallets or utilities for PC gaming. However, these projects contain malicious code designed to steal cryptocurrencies.
How Does GitVenom Work?
Hackers use several techniques to disguise their malicious software:
🔹 Fake GitHub Projects – Fraudulent repositories present seemingly useful tools for managing crypto assets or gaming applications.
🔹 Manipulated README Files – Often generated by AI to appear trustworthy.
🔹 Trojan Horse in the Code – In Python-based scripts, attackers hide malicious code behind a string of 2,000 spaces, which decrypts and activates malware upon execution.
🔹 JavaScript-based Attacks – A rogue function is embedded in the main script, which, when executed, downloads additional malicious tools from repositories controlled by hackers.
One of the victims was a developer whose Bitcoin wallet was drained of more than $400,000 in November.
What Happens After Infection?
Once the system is compromised, the malware executes various malicious activities:
🔺 Node.js Stealer – Collects passwords, cryptocurrency wallet details, and browsing history.
🔺 Remote Access Trojan (RAT) – Tools such as AsyncRAT and Quasar allow hackers to take control of the device, log keystrokes, and capture screenshots.
🔺 Clipper Malware – Automatically replaces copied wallet addresses with hacker-controlled addresses, redirecting funds.
📌 In one case, attackers successfully stole 5 BTC (worth $485,000) in just one month!
Where Is the Threat Most Prevalent?
GitVenom has been detected most frequently in Russia, Brazil, and Turkey, but Kaspersky warns that its spread is global.
Hackers continuously update their code, imitate active development, and modify tactics to evade antivirus detection.
How to Protect Yourself?
🛑 Thoroughly inspect any code before running it!
🛑 Verify the authenticity of a GitHub project and its update history.
🛑 Be cautious of "perfectly written" README files.
🛑 Use cybersecurity protection and monitor suspicious system activities.
📢 Kaspersky warns that attacks like GitVenom are unlikely to stop and will likely evolve further. Users should remain constantly vigilant.

#HackerAlert , #CyberSecurity , #CryptoNewss , #HackerNews , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Crypto Scams Plunge 98% in March: Is the End of Security Risks Near?While the crypto market has faced its fair share of turbulence in 2025, March brought an unexpected wave of optimism. Losses from scams, hacks, and exploits dropped to near-record lows — and that’s definitely worth paying attention to. 🔐 The Safest Month Yet? Losses Plummet from $1.5 Billion to Just $28.8 Million After February's shocking $1.5 billion in crypto losses — largely driven by the massive Bybit hack — March told a completely different story. According to blockchain security firm CertiK, losses dipped to just $28.8 million, signaling that security protocols may be improving — or that attackers are simply finding fewer vulnerabilities to exploit. 🧠 However, smart contract exploits remain a major weak point. The biggest hit came on March 25, when hackers drained over $13 million from Abracadabra.money. 💣 Exploits, Wallet Breaches & Missing BTC: Risks Still Linger Although the trend is promising, some attacks prove the ecosystem is far from risk-free: Zoth Protocol: A deployer wallet was compromised, leading to a loss of over $8.4 million.1inch Bounty Recovery: About $5 million was returned through a bug bounty payout.Coinbase User: Reportedly lost 400 BTC worth $34 million, with no official explanation.Phishing & Exchange Spoofing: May have contributed to additional losses of $46 million. Trump’s Crypto Approach: A New Dawn for Regulation? As the Trump administration shifts its stance on crypto, hopes are rising for a more balanced and innovation-friendly regulatory climate. 👤 Paul Atkins, nominated by Trump as the new SEC Chair, has pledged to establish a clear, coherent, and rational regulatory framework for the crypto industry. 🗣️ "Our top priority is to create a stable regulatory foundation for digital assets through a principled and thoughtful approach," he stated during a Senate Banking Committee hearing. 🔎 What Does It Mean for Investors? Risks still exist, but they’re becoming more manageable.Regulatory clarity could restore market confidence and better protect investors.If executed well, the right regulations could usher in an era of improved safety and long-term stability for the crypto space. #CryptoSecurity , #HackerNews , #CryptoScamAlert , #CyberSecurity , #CryptoRegulation Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Scams Plunge 98% in March: Is the End of Security Risks Near?

While the crypto market has faced its fair share of turbulence in 2025, March brought an unexpected wave of optimism. Losses from scams, hacks, and exploits dropped to near-record lows — and that’s definitely worth paying attention to.

🔐 The Safest Month Yet? Losses Plummet from $1.5 Billion to Just $28.8 Million
After February's shocking $1.5 billion in crypto losses — largely driven by the massive Bybit hack — March told a completely different story. According to blockchain security firm CertiK, losses dipped to just $28.8 million, signaling that security protocols may be improving — or that attackers are simply finding fewer vulnerabilities to exploit.
🧠 However, smart contract exploits remain a major weak point. The biggest hit came on March 25, when hackers drained over $13 million from Abracadabra.money.

💣 Exploits, Wallet Breaches & Missing BTC: Risks Still Linger
Although the trend is promising, some attacks prove the ecosystem is far from risk-free:
Zoth Protocol: A deployer wallet was compromised, leading to a loss of over $8.4 million.1inch Bounty Recovery: About $5 million was returned through a bug bounty payout.Coinbase User: Reportedly lost 400 BTC worth $34 million, with no official explanation.Phishing & Exchange Spoofing: May have contributed to additional losses of $46 million.
Trump’s Crypto Approach: A New Dawn for Regulation?
As the Trump administration shifts its stance on crypto, hopes are rising for a more balanced and innovation-friendly regulatory climate.
👤 Paul Atkins, nominated by Trump as the new SEC Chair, has pledged to establish a clear, coherent, and rational regulatory framework for the crypto industry.
🗣️ "Our top priority is to create a stable regulatory foundation for digital assets through a principled and thoughtful approach," he stated during a Senate Banking Committee hearing.

🔎 What Does It Mean for Investors?
Risks still exist, but they’re becoming more manageable.Regulatory clarity could restore market confidence and better protect investors.If executed well, the right regulations could usher in an era of improved safety and long-term stability for the crypto space.

#CryptoSecurity , #HackerNews , #CryptoScamAlert , #CyberSecurity , #CryptoRegulation
Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number