Binance Square

Hackers

357,694 views
140 Discussing
Kasonso-Cryptography
--
Hackers to send cryptos price dumping: Another Bad News for Crypto investors😳 #hackers
Hackers to send cryptos price dumping: Another Bad News for Crypto investors😳

#hackers
North Korean Hackers Use Fake Job Offers to Breach Cloud Systems and Steal Billions in CryptoState-sponsored hackers from North Korea are pushing boundaries once again. By offering fake freelance IT jobs, they’ve infiltrated cloud infrastructures of crypto companies and stolen hundreds of millions in digital assets — all through malware, social engineering, and even artificial intelligence. 🎯 The Target: Employees' Trust According to recent cybersecurity findings, the North Korean group UNC4899 (also known as TraderTraitor) approached unsuspecting employees via social media, posing as recruiters with enticing IT job offers. Once they gained the target's trust, they sent “test tasks” which, when executed, infected the victim’s device with malware. This opened the door to cloud environments, allowing the hackers to steal login credentials, explore the infrastructure, and identify the servers responsible for processing crypto transactions. The result? Several multi-million dollar thefts in just one attack — repeated across various companies. 🧠 AI as a Weapon of the Future The report highlights how these hackers are extremely adaptive. They use artificial intelligence to generate highly realistic messages and conversations that build rapport with their victims. Their phishing scripts and malware-laced communications are now more convincing than ever. The attackers often impersonate journalists, professors, or subject matter experts to boost credibility. 🛠 From JavaScript to Electron This campaign began as early as 2020, when hackers used fake job offers to trick employees into downloading applications built with Node.js and the Electron framework — apps that turned out to be trojans. By 2024, their methods evolved, focusing on malicious open-source code and intensive targeting of crypto exchanges. 📉 Some of the largest attacks include: 🔹 The DMM Bitcoin hack in Japan – $305 million stolen 🔹 The Bybit hack – $1.5 billion stolen late in 2024 ☁️ Why Cloud Infrastructure? Cloud platforms are the lifeblood of many young crypto firms — which also makes them incredibly vulnerable. Many of these companies are cloud-native and still maturing their security practices. Experts say cloud-based attacks enable hackers to target broader systems, increasing their chance to profit on a larger scale. 💰 Tally So Far: $1.6 Billion in 2025 Reports estimate that North Korean hacking groups have stolen over $1.6 billion in crypto assets in 2025 alone. These operations are highly organized, with thousands of individuals spread across overlapping subgroups. The country has become a global leader in crypto hacking, accounting for 35% of all stolen funds worldwide in 2024. 🚨 What’s Next? North Korean hackers continue to evolve and adapt — leveraging AI, cloud weaknesses, and advanced social engineering tactics. And their operations show no signs of slowing down. “There are no signs of these attacks slowing. If anything, the expansion will likely accelerate,” experts warn. #CyberSecurity , #northkorea , #hackers , #cyberattack , #cybercrime Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Use Fake Job Offers to Breach Cloud Systems and Steal Billions in Crypto

State-sponsored hackers from North Korea are pushing boundaries once again. By offering fake freelance IT jobs, they’ve infiltrated cloud infrastructures of crypto companies and stolen hundreds of millions in digital assets — all through malware, social engineering, and even artificial intelligence.

🎯 The Target: Employees' Trust
According to recent cybersecurity findings, the North Korean group UNC4899 (also known as TraderTraitor) approached unsuspecting employees via social media, posing as recruiters with enticing IT job offers. Once they gained the target's trust, they sent “test tasks” which, when executed, infected the victim’s device with malware.
This opened the door to cloud environments, allowing the hackers to steal login credentials, explore the infrastructure, and identify the servers responsible for processing crypto transactions.
The result? Several multi-million dollar thefts in just one attack — repeated across various companies.

🧠 AI as a Weapon of the Future
The report highlights how these hackers are extremely adaptive. They use artificial intelligence to generate highly realistic messages and conversations that build rapport with their victims. Their phishing scripts and malware-laced communications are now more convincing than ever.
The attackers often impersonate journalists, professors, or subject matter experts to boost credibility.

🛠 From JavaScript to Electron
This campaign began as early as 2020, when hackers used fake job offers to trick employees into downloading applications built with Node.js and the Electron framework — apps that turned out to be trojans.
By 2024, their methods evolved, focusing on malicious open-source code and intensive targeting of crypto exchanges.
📉 Some of the largest attacks include:
🔹 The DMM Bitcoin hack in Japan – $305 million stolen

🔹 The Bybit hack – $1.5 billion stolen late in 2024

☁️ Why Cloud Infrastructure?
Cloud platforms are the lifeblood of many young crypto firms — which also makes them incredibly vulnerable. Many of these companies are cloud-native and still maturing their security practices.
Experts say cloud-based attacks enable hackers to target broader systems, increasing their chance to profit on a larger scale.

💰 Tally So Far: $1.6 Billion in 2025
Reports estimate that North Korean hacking groups have stolen over $1.6 billion in crypto assets in 2025 alone. These operations are highly organized, with thousands of individuals spread across overlapping subgroups.
The country has become a global leader in crypto hacking, accounting for 35% of all stolen funds worldwide in 2024.

🚨 What’s Next?
North Korean hackers continue to evolve and adapt — leveraging AI, cloud weaknesses, and advanced social engineering tactics. And their operations show no signs of slowing down.
“There are no signs of these attacks slowing. If anything, the expansion will likely accelerate,” experts warn.

#CyberSecurity , #northkorea , #hackers , #cyberattack , #cybercrime

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨🇰🇵Research reveals North Korean #hackers , including groups like Lazarus, have #stolen $1.6 billion in cryptocurrency by infiltrating cloud systems through fake IT job offers, employing evolving tactics from malicious apps to exploiting open-source vulnerabilities. $ETH $BTC $BNB
🚨🇰🇵Research reveals North Korean #hackers , including groups like Lazarus, have #stolen $1.6 billion in cryptocurrency by infiltrating cloud systems through fake IT job offers, employing evolving tactics from malicious apps to exploiting open-source vulnerabilities.

$ETH $BTC $BNB
#CreatorPad Hi users of binance here are the ways on how to protect your counter from hackers, go to account settings create your login pin with password based known to, then set up passkeys from either your tablet, cellular, or laptop. whenever you login it will require your passkey that no one won't be able to use. secondly let no one decive you to share you email address they do that with an intention of learning your password, for the case of withdraw please consult with your customer command centre, so be wise not to sign up for any link that they send you from online. #hackers
#CreatorPad Hi users of binance here are the ways on how to protect your counter from hackers, go to account settings create your login pin with password based known to, then set up passkeys from either your tablet, cellular, or laptop.
whenever you login it will require your passkey that no one won't be able to use.
secondly let no one decive you to share you email address they do that with an intention of learning your password, for the case of withdraw please consult with your customer command centre, so be wise not to sign up for any link that they send you from online.
#hackers
Crypto Scams: Beware! ‼️🚨‼️🚨‼️🚨‼️🚨‼️🚨 - FTX: Collapsed in 2022, $ billions missing - Luna/TerraUSD: $60 billion loss, founder arrested - QuadrigaCX: $215 million inaccessible after founder's death - Africrypt: 70,000 BTC stolen, founders investigated - SafeMoon: Executives withdrew $200 million, SEC charges - Pro-deum: Exit scam, investors lost all funds - Pincoin/iFan: $660 million Ponzi scheme - Celsius Network: Bankruptcy, $4.7 billion owed - Centra Tech: Fraudulent promises, founders jailed - Mining Max: $250 million scam, 18,000 investors affected Protect yourself: 🫵🫵🫵🫵 research, verify, diversify, and stay informed. Watch for red flags: ‼️‼️‼️‼️‼️‼️ unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market! $BTC $ETH $BNB #Write2Earn! #scamriskwarning #hackers #Alert🔴 #CPI_BTC_Watch
Crypto Scams: Beware! ‼️🚨‼️🚨‼️🚨‼️🚨‼️🚨

- FTX: Collapsed in 2022, $ billions missing
- Luna/TerraUSD: $60 billion loss, founder arrested
- QuadrigaCX: $215 million inaccessible after founder's death
- Africrypt: 70,000 BTC stolen, founders investigated
- SafeMoon: Executives withdrew $200 million, SEC charges
- Pro-deum: Exit scam, investors lost all funds
- Pincoin/iFan: $660 million Ponzi scheme
- Celsius Network: Bankruptcy, $4.7 billion owed
- Centra Tech: Fraudulent promises, founders jailed
- Mining Max: $250 million scam, 18,000 investors affected

Protect yourself: 🫵🫵🫵🫵
research, verify, diversify, and stay informed.

Watch for red flags: ‼️‼️‼️‼️‼️‼️

unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market!
$BTC $ETH $BNB
#Write2Earn! #scamriskwarning #hackers #Alert🔴 #CPI_BTC_Watch
--
Bullish
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code. #northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code.

#northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
🚨I Lost My Whole Capital! Now Let’s Talk About Bybit Wallet Security! 🔐😂I'm 💯 sure you didn't read any post or article like my article, it will blow your mind. Ok let's start discussing So, imagine waking up one day, logging into your wallet, and BAM 💥—your ETH is gone! Just like that! Vanished into the abyss! 😭 Well, after experiencing this nightmare (hypothetically... hopefully), I decided it's time to talk about Bybit Wallet Security and how hackers steal ETH! 🕵️‍♂️ 👾 How Hackers Steal Your ETH? Hackers don’t just wave a magic wand and steal your crypto (I wish it was that simple 😅). Instead, they use tricks like: 🔹 Phishing Attacks – Fake websites that look EXACTLY like Bybit, waiting for you to enter your details. 🤦‍♂️ 🔹 Malware & Keyloggers – That "free airdrop" you clicked on? Yeah, that just gave someone access to your private keys. 🤷‍♂️ 🔹 Smart Contract Exploits – Ever heard of those "too-good-to-be-true" DeFi projects? Well, hackers use dodgy contracts to drain your funds. 🚀💀 🔹 SIM Swapping & Social Engineering – If your 2FA is linked to your phone number, hackers might just "convince" your mobile provider to hand over your SIM. 🧐 💀 So… Can Hackers Even Use Stolen ETH? Short answer: NO! ❌ Once ETH is stolen, it’s tracked on every exchange like a wanted criminal! 🚔 Most exchanges, including Bybit, Binance, OKX, and others, mark stolen ETH as “tainted”—making it IMPOSSIBLE to cash out. Every transaction gets flagged like 🚨 "SPAM ALERT!" 🚨 But wait… there’s a catch! 😨 🐍 The BTC Loophole Hackers can use mixers like Tornado Cash (until regulators shut it down) or simply convert ETH into BTC! Why? Because Bitcoin’s blockchain doesn’t have a built-in "spam" or "blacklist" system. So, if they swap ETH → BTC, they might just get away with it. 😱 (Don't tell that f**** trick to hacker's 😁 ✅ How to Secure Your Wallet? Alright, enough scary talk—let's make sure YOU don’t end up like me (hypothetically, of course 😜): 🔹 Enable 2FA! Don’t be lazy. Google Authenticator > SMS (Always!) 🔑 🔹 Use a Hardware Wallet (Ledger/Trezor) to store large amounts. 🏦 🔹 NEVER click random links! Even if it’s from "Bybit Support" (Spoiler: It’s NOT). 🚫 🔹 Check Contract Approvals – Use tools like revoke.cash to remove unnecessary permissions. 🧐 🔹 Stay Updated! Follow Bybit’s official security alerts and crypto security news. 📰 Final Words: Don’t Learn the Hard Way! 😅 If I had secured my Bybit wallet better, maybe I wouldn’t be writing this post with tears in my eyes. 😭😂 So, be smart, stay safe, and don’t let hackers enjoy your hard-earned crypto! 🚀🔒 #Bybit #CryptoSecurity #Ethereum #Hackers #StaySafe

🚨I Lost My Whole Capital! Now Let’s Talk About Bybit Wallet Security! 🔐😂

I'm 💯 sure you didn't read any post or article like my article, it will blow your mind.
Ok let's start discussing
So, imagine waking up one day, logging into your wallet, and BAM 💥—your ETH is gone! Just like that! Vanished into the abyss! 😭 Well, after experiencing this nightmare (hypothetically... hopefully), I decided it's time to talk about Bybit Wallet Security and how hackers steal ETH! 🕵️‍♂️

👾 How Hackers Steal Your ETH?

Hackers don’t just wave a magic wand and steal your crypto (I wish it was that simple 😅). Instead, they use tricks like:

🔹 Phishing Attacks – Fake websites that look EXACTLY like Bybit, waiting for you to enter your details. 🤦‍♂️
🔹 Malware & Keyloggers – That "free airdrop" you clicked on? Yeah, that just gave someone access to your private keys. 🤷‍♂️
🔹 Smart Contract Exploits – Ever heard of those "too-good-to-be-true" DeFi projects? Well, hackers use dodgy contracts to drain your funds. 🚀💀
🔹 SIM Swapping & Social Engineering – If your 2FA is linked to your phone number, hackers might just "convince" your mobile provider to hand over your SIM. 🧐

💀 So… Can Hackers Even Use Stolen ETH?

Short answer: NO! ❌

Once ETH is stolen, it’s tracked on every exchange like a wanted criminal! 🚔 Most exchanges, including Bybit, Binance, OKX, and others, mark stolen ETH as “tainted”—making it IMPOSSIBLE to cash out. Every transaction gets flagged like 🚨 "SPAM ALERT!" 🚨

But wait… there’s a catch! 😨

🐍 The BTC Loophole

Hackers can use mixers like Tornado Cash (until regulators shut it down) or simply convert ETH into BTC! Why? Because Bitcoin’s blockchain doesn’t have a built-in "spam" or "blacklist" system. So, if they swap ETH → BTC, they might just get away with it. 😱
(Don't tell that f**** trick to hacker's 😁
✅ How to Secure Your Wallet?

Alright, enough scary talk—let's make sure YOU don’t end up like me (hypothetically, of course 😜):

🔹 Enable 2FA! Don’t be lazy. Google Authenticator > SMS (Always!) 🔑
🔹 Use a Hardware Wallet (Ledger/Trezor) to store large amounts. 🏦
🔹 NEVER click random links! Even if it’s from "Bybit Support" (Spoiler: It’s NOT). 🚫
🔹 Check Contract Approvals – Use tools like revoke.cash to remove unnecessary permissions. 🧐
🔹 Stay Updated! Follow Bybit’s official security alerts and crypto security news. 📰

Final Words: Don’t Learn the Hard Way! 😅

If I had secured my Bybit wallet better, maybe I wouldn’t be writing this post with tears in my eyes. 😭😂 So, be smart, stay safe, and don’t let hackers enjoy your hard-earned crypto! 🚀🔒

#Bybit #CryptoSecurity #Ethereum #Hackers #StaySafe
U.S. Agency Warns About the Dangerous Trinity RansomwareThe Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure. The Threat of Trinity Ransomware and How It Works A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities. Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key. Hackers’ Demands: 24-Hour Deadline for Payment In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery. "Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers. Attacks on Healthcare Institutions The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector. Crypto Ransom Payments Reached $1 Billion in 2023 According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates. The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks. #cyberattacks Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“  

U.S. Agency Warns About the Dangerous Trinity Ransomware

The Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure.
The Threat of Trinity Ransomware and How It Works
A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities.
Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key.
Hackers’ Demands: 24-Hour Deadline for Payment
In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery.
"Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers.
Attacks on Healthcare Institutions
The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector.
Crypto Ransom Payments Reached $1 Billion in 2023
According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates.
The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks.
#cyberattacks

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

 
On January 9, the US Securities and Exchange Commission (SEC) suffered a significant breach of cybersecurity and a loss of public confidence as a result of a social media account hack that led to a fake announcement about the approval of spot Bitcoin exchange-traded funds (ETFs). For a short while, hackers gained access to the SEC's X account and released a statement purporting the organisation had approved the much anticipated products, which momentarily raised the price of Bitcoin. US officials launched a probe into the incident, and the SEC's cybersecurity and position on cryptocurrency came under fresh fire. #ETFApprovalDreams #hackers #SEC #CryptoniteUae #BTCETFSPOT
On January 9, the US Securities and Exchange Commission (SEC) suffered a significant breach of cybersecurity and a loss of public confidence as a result of a social media account hack that led to a fake announcement about the approval of spot Bitcoin exchange-traded funds (ETFs).

For a short while, hackers gained access to the SEC's X account and released a statement purporting the organisation had approved the much anticipated products, which momentarily raised the price of Bitcoin. US officials launched a probe into the incident, and the SEC's cybersecurity and position on cryptocurrency came under fresh fire.

#ETFApprovalDreams #hackers #SEC #CryptoniteUae #BTCETFSPOT
See original
FTX Hack Mystery Possibly Solved: US Charges Trio with Theft, Including Infamous Attack on#CryptocurrencyExchange The federal indictment does not identify Sam Bankman-Fried's FTX as the robbed company, but Bloomberg reported that it was. The US federal government on Wednesday charged three people in a year-long phone hacking conspiracy that culminated in the infamous theft of $400 million from FTX as Sam Bankman-Fried's cryptocurrency exchange collapsed. In an 18-page indictment filed in a D.C. court, prosecutors charged Robert Powell, Carter Rohn and Emily Hernandez with conspiracy to commit wire fraud and identity theft in their operation of a SIM swapping network that targeted fifty victims. between March 2021 and April 2023. Their most notable heist occurred on November 11, 2022, when the trio siphoned $400 million from an unnamed company. Bloomberg, citing sources familiar with the matter, said that company was FTX. They gained access to a cryptocurrency exchange employee through AT&T and transferred hundreds of millions of dollars in cryptocurrency. #ftx #hacks #hackers #FTXUpdate #ftt
FTX Hack Mystery Possibly Solved: US Charges Trio with Theft, Including Infamous Attack on#CryptocurrencyExchange

The federal indictment does not identify Sam Bankman-Fried's FTX as the robbed company, but Bloomberg reported that it was.

The US federal government on Wednesday charged three people in a year-long phone hacking conspiracy that culminated in the infamous theft of $400 million from FTX as Sam Bankman-Fried's cryptocurrency exchange collapsed.

In an 18-page indictment filed in a D.C. court, prosecutors charged Robert Powell, Carter Rohn and Emily Hernandez with conspiracy to commit wire fraud and identity theft in their operation of a SIM swapping network that targeted fifty victims. between March 2021 and April 2023.

Their most notable heist occurred on November 11, 2022, when the trio siphoned $400 million from an unnamed company. Bloomberg, citing sources familiar with the matter, said that company was FTX.

They gained access to a cryptocurrency exchange employee through AT&T and transferred hundreds of millions of dollars in cryptocurrency.
#ftx #hacks #hackers #FTXUpdate #ftt
This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto HacksCrypto hackers have stolen $4+ billion in the last 2 years. If you are not careful, you'll be next. This article shares 8 security practices that everyone should be using. If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen. Then you won’t need this guide, For everyone else let's begin. 1. Crypto Storage Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time. Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal. 2. Emails Old emails with weak passwords are a common point of entry for hackers. If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it. 3. VPN Most main providers are good enough (nord / express). You can take your privacy even further and try something like Mullvad. 4. 2FA 2FA everything. Cold 2fa Device (Tier 1) - Yubikey or Google Titan Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever. Note: 2FA can be circumvented, it is not an absolute defence.\ 5. Passwords This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself. There are two tiers of data. Level 1 Data Level 2 Data Level 1 Data To determine if your data is level 1 ask yourself this. "If a hacker had access to only this information, would they be able to attack me?" For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency. Level 1 Data Rules - Keep offline - Never be stored on your laptop - When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard - These passwords will be a minimum of 15 keys long and as complex as possible - Have back ups Level 2 Data Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2. This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable. Level 2 Data Rules You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged. 6. EXCHANGES Don't trust any sketchy exchanges with your crypto. -Deposit only what you need to buy/sell. -Use reputable exchanges like Binance. - Use 2FA -Set a global lock that requires a minimum wait time before settings are changed -Whitelist your addresses and set a lock on adding new addresses -Use leverage to reduce counterparty risk 7. Advanced: Separate computers Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets. -High Security Computer -Low Security Computer High Security Computer Used only for handling crypto, banking, trading and other sensitive activities. Your high security device is never to deviate from essential websites or click on any links. All it takes is one mistake to compromise your security. Low Security Computer For all other activities, you can use your low security device. There should never be crossover between these two devices. 8. PROTECT OTHERS Someone you care about getting attacked can be leveraged against you. Share this with others and make sure they are as protected as you. #hackers #BitEagleNews

This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto Hacks

Crypto hackers have stolen $4+ billion in the last 2 years.
If you are not careful, you'll be next.
This article shares 8 security practices that everyone should be using.
If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen.
Then you won’t need this guide,
For everyone else let's begin.

1. Crypto Storage
Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor
Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time.
Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal.

2. Emails
Old emails with weak passwords are a common point of entry for hackers.
If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it.

3. VPN
Most main providers are good enough (nord / express).
You can take your privacy even further and try something like Mullvad.

4. 2FA
2FA everything.
Cold 2fa Device (Tier 1) - Yubikey or Google Titan
Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever.
Note: 2FA can be circumvented, it is not an absolute defence.\

5. Passwords
This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself.
There are two tiers of data.
Level 1 Data
Level 2 Data

Level 1 Data
To determine if your data is level 1 ask yourself this.
"If a hacker had access to only this information, would they be able to attack me?"
For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency.

Level 1 Data Rules
- Keep offline
- Never be stored on your laptop
- When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard
- These passwords will be a minimum of 15 keys long and as complex as possible
- Have back ups

Level 2 Data
Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2.
This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable.

Level 2 Data Rules
You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged.

6. EXCHANGES
Don't trust any sketchy exchanges with your crypto.
-Deposit only what you need to buy/sell.
-Use reputable exchanges like Binance.
- Use 2FA
-Set a global lock that requires a minimum wait time before settings are changed
-Whitelist your addresses and set a lock on adding new addresses
-Use leverage to reduce counterparty risk

7. Advanced: Separate computers
Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets.
-High Security Computer
-Low Security Computer

High Security Computer
Used only for handling crypto, banking, trading and other sensitive activities.
Your high security device is never to deviate from essential websites or click on any links.
All it takes is one mistake to compromise your security.

Low Security Computer
For all other activities, you can use your low security device.
There should never be crossover between these two devices.

8. PROTECT OTHERS
Someone you care about getting attacked can be leveraged against you.
Share this with others and make sure they are as protected as you.

#hackers #BitEagleNews
See original
HTX and Poloniex assets are '100% safe', says Justin Sun after $200M hack Cryptocurrency tycoon Justin Sun has said assets held on HTX and Poloniex are "100% safe" following last month's hack in which more than $200 million was siphoned from both exchanges. Both exchanges have opened withdrawals for certain assets, although several altcoins remain blocked. Bitcoin (BTC) and Tron (TRX) are the two digital assets that could retire; This led to both tokens trading at a premium on Poloniex over the past few weeks, meaning users would have to take a haircut of up to 10% to liquidate their asset and withdraw another. The withdrawal freeze came after hackers stole $114 million from Poloniex hot wallets on November 10; This was followed by the theft of $97 million from HTX and the Heco Chain blockchain protocol. “At this time, Poloniex and HTX have recovered from the attack and we are resuming tokens one by one,” investor Justin Sun told CoinDesk. at Poloniex and HTX advisor. “I think for HTX, we have already recovered 95% in terms of assets worth dollars. At Poloniex, we have recovered around 85% in terms of dollar asset value.” “And also note that since we have already covered all token losses on the platform, on HTX and Poloniex, 100% of the assets are 100% safe,” Sun added. “Although in terms of the exchanges themselves, we basically need to make those profits in the future. But for clients’ assets, it is 100% safe.” An HTX spokesperson told CoinDesk: “The recent exit represents a small fraction of our total reserves, and HTX remains in stable and healthy operation.” #HTXExchange #PoloniexHack #hackers #exploit #BTC
HTX and Poloniex assets are '100% safe', says Justin Sun after $200M hack

Cryptocurrency tycoon Justin Sun has said assets held on HTX and Poloniex are "100% safe" following last month's hack in which more than $200 million was siphoned from both exchanges.

Both exchanges have opened withdrawals for certain assets, although several altcoins remain blocked. Bitcoin (BTC) and Tron (TRX) are the two digital assets that could retire; This led to both tokens trading at a premium on Poloniex over the past few weeks, meaning users would have to take a haircut of up to 10% to liquidate their asset and withdraw another.

The withdrawal freeze came after hackers stole $114 million from Poloniex hot wallets on November 10; This was followed by the theft of $97 million from HTX and the Heco Chain blockchain protocol. “At this time, Poloniex and HTX have recovered from the attack and we are resuming tokens one by one,” investor Justin Sun told CoinDesk. at Poloniex and HTX advisor. “I think for HTX, we have already recovered 95% in terms of assets worth dollars. At Poloniex, we have recovered around 85% in terms of dollar asset value.”

“And also note that since we have already covered all token losses on the platform, on HTX and Poloniex, 100% of the assets are 100% safe,” Sun added. “Although in terms of the exchanges themselves, we basically need to make those profits in the future. But for clients’ assets, it is 100% safe.”

An HTX spokesperson told CoinDesk: “The recent exit represents a small fraction of our total reserves, and HTX remains in stable and healthy operation.”
#HTXExchange #PoloniexHack #hackers #exploit #BTC
--
Bullish
Schrödinger's Vulnerability: Why Hackers Invent WordPress Security Problems An unusual strategy by cybercriminals is leading to massive infections of websites with malicious code. WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly being tracked under the ID CVE-2023-45124 . The purpose of the attack is to infect websites with a malicious plugin. The emails, masquerading as official messages from WordPress, talk about a critical remote code execution ( RCE ) vulnerability discovered on the administrator's site. WordPress users are being persuaded to install a plugin that claims to solve a security problem. Clicking the “Download plugin” button leads to a fake page “en-gb-wordpress[.]org”, outwardly indistinguishable from the official site “wordpress.com”. The page indicates an inflated number of downloads of the plugin at 500 thousand downloads, as well as fake user reviews. makes it difficult to detect and remove. At the moment, the purpose of the plugin is unknown, but experts suggest that it can be used to inject advertising on compromised sites, redirect visitors, steal confidential information, or even blackmail site owners with the threat of leaking database contents. WordPress security experts from Wordfence and PatchStack have posted warnings on their sites to raise awareness among administrators and users about this threat. It is extremely important to be careful when installing unknown plugins and to pay attention to suspicious emails. #cyborg #BinanceTournament #hackers #News #BTC $BTC $ETH $BNB
Schrödinger's Vulnerability: Why Hackers Invent WordPress Security Problems
An unusual strategy by cybercriminals is leading to massive infections of websites with malicious code.
WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly being tracked under the ID CVE-2023-45124 . The purpose of the attack is to infect websites with a malicious plugin.
The emails, masquerading as official messages from WordPress, talk about a critical remote code execution ( RCE ) vulnerability discovered on the administrator's site. WordPress users are being persuaded to install a plugin that claims to solve a security problem.
Clicking the “Download plugin” button leads to a fake page “en-gb-wordpress[.]org”, outwardly indistinguishable from the official site “wordpress.com”. The page indicates an inflated number of downloads of the plugin at 500 thousand downloads, as well as fake user reviews.
makes it difficult to detect and remove. At the moment, the purpose of the plugin is unknown, but experts suggest that it can be used to inject advertising on compromised sites, redirect visitors, steal confidential information, or even blackmail site owners with the threat of leaking database contents.
WordPress security experts from Wordfence and PatchStack have posted warnings on their sites to raise awareness among administrators and users about this threat. It is extremely important to be careful when installing unknown plugins and to pay attention to suspicious emails.
#cyborg #BinanceTournament #hackers #News #BTC
$BTC $ETH $BNB
📢Hacker use macdonald's insta to promote the meme coin 🪙On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called “GRIMACE.” This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts. The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.# The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards

📢Hacker use macdonald's insta to promote the meme coin 🪙

On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called “GRIMACE.” This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts.
The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.#
The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards
👉👉👉 #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam. Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility. “Due to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,” explained a MailerLite spokesperson today. “As a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.” We extend our sincere apologies to MailerLite for our hasty misjudgment. We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails. While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains! Source - decrypt.co #CryptoNews🔒📰🚫 #BinanceSquareTalks
👉👉👉 #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest

In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam.

Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility.

“Due to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,” explained a MailerLite spokesperson today. “As a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.”

We extend our sincere apologies to MailerLite for our hasty misjudgment.

We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails.

While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains!

Source - decrypt.co

#CryptoNews🔒📰🚫 #BinanceSquareTalks
🚨 Deepfake Alert! 🔴 Manta Network's Kenny Li suspects the notorious Lazarus Group tried to target him in a sophisticated deepfake Zoom attack 🕵️‍♂️. #Hackers used a fake video to gain trust, then pushed a malicious script download before disappearing 💻😱. This incident highlights the growing threat of #deepfakes and social engineering in cybersecurity 🤖💸. Prioritize your online security: ✨ Verify identities before sharing sensitive info ✨ Be cautious of unexpected video calls or requests ✨ Keep software and systems up-to-date
🚨 Deepfake Alert!

🔴 Manta Network's Kenny Li suspects the notorious Lazarus Group tried to target him in a sophisticated deepfake Zoom attack 🕵️‍♂️.

#Hackers used a fake video to gain trust, then pushed a malicious script download before disappearing 💻😱.

This incident highlights the growing threat of #deepfakes and social engineering in cybersecurity 🤖💸. Prioritize your online security:

✨ Verify identities before sharing sensitive info
✨ Be cautious of unexpected video calls or requests
✨ Keep software and systems up-to-date
Nigeria: EFCC Arrests 792 Suspects in Cryptocurrency Fraud SchemeCommission Uncovers Massive Cryptocurrency Scam Nigeria’s Economic and Financial Crimes Commission (EFCC) conducted a raid resulting in the arrest of 792 suspects involved in schemes known as crypto romance scams. The fraudsters convinced victims to invest in fake cryptocurrency projects, leading to significant financial losses. Links to International Groups EFCC spokesperson Wilson Uwujaren revealed that among those arrested were 148 Chinese nationals and 40 Filipino citizens. The scammers operated from a luxury building in Lagos, Nigeria’s commercial hub. Most of the victims were citizens of the United States and Europe. During the raid, agents seized computers, mobile phones, and vehicles. Uwujaren stated that Nigerian fraudsters were recruited by international groups to target victims online using phishing techniques. Once the victims’ trust was gained, their information was handed over to foreign counterparts, who carried out the fraud. Collaboration with International Partners The EFCC announced it is working with international partners to identify potential links to organized crime. This collaboration aims to strengthen actions against similar fraudulent activities. Another Case: Nigerian Scammer Defrauds Australians of $5 Million The arrests follow a separate case involving Osang Otukpa, who allegedly defrauded 139 Australians of $5.04 million (8 million AUD) through a fraudulent cryptocurrency platform called Liquid Asset Group. Otukpa reportedly used five different aliases and lured victims through social media. EFCC agents apprehended Otukpa on December 6, shortly after he landed at Murtala Mohammed International Airport in Lagos. According to reports, he will be charged once the investigation is complete. Conclusion The EFCC continues to intensify its efforts to combat cryptocurrency fraud, working closely with global partners to curb these illegal activities. The crackdown on 792 suspects and cases like Otukpa’s highlight Nigeria’s strengthened fight against financial crimes. #hackers , #Cryptoscam , #cryptofraud , #CryptoSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Nigeria: EFCC Arrests 792 Suspects in Cryptocurrency Fraud Scheme

Commission Uncovers Massive Cryptocurrency Scam
Nigeria’s Economic and Financial Crimes Commission (EFCC) conducted a raid resulting in the arrest of 792 suspects involved in schemes known as crypto romance scams. The fraudsters convinced victims to invest in fake cryptocurrency projects, leading to significant financial losses.
Links to International Groups
EFCC spokesperson Wilson Uwujaren revealed that among those arrested were 148 Chinese nationals and 40 Filipino citizens. The scammers operated from a luxury building in Lagos, Nigeria’s commercial hub. Most of the victims were citizens of the United States and Europe.
During the raid, agents seized computers, mobile phones, and vehicles. Uwujaren stated that Nigerian fraudsters were recruited by international groups to target victims online using phishing techniques. Once the victims’ trust was gained, their information was handed over to foreign counterparts, who carried out the fraud.
Collaboration with International Partners
The EFCC announced it is working with international partners to identify potential links to organized crime. This collaboration aims to strengthen actions against similar fraudulent activities.
Another Case: Nigerian Scammer Defrauds Australians of $5 Million
The arrests follow a separate case involving Osang Otukpa, who allegedly defrauded 139 Australians of $5.04 million (8 million AUD) through a fraudulent cryptocurrency platform called Liquid Asset Group.
Otukpa reportedly used five different aliases and lured victims through social media. EFCC agents apprehended Otukpa on December 6, shortly after he landed at Murtala Mohammed International Airport in Lagos. According to reports, he will be charged once the investigation is complete.
Conclusion
The EFCC continues to intensify its efforts to combat cryptocurrency fraud, working closely with global partners to curb these illegal activities. The crackdown on 792 suspects and cases like Otukpa’s highlight Nigeria’s strengthened fight against financial crimes.

#hackers , #Cryptoscam , #cryptofraud , #CryptoSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number