Binance Square

SlowMist

1,432 views
7 Discussing
Wilber Delarme BNB
--
🚨 URGENT SECURITY ALERT: HashiCorp Vault Vulnerabilities Expose Crypto Wallets & Keys šŸ” Critical Risk:Ā MultipleĀ zero-day vulnerabilitiesĀ found inĀ HashiCorp Vault—a top tool for crypto wallet/key management. Exploits could: āœ…Ā Bypass MFA & locks āœ…Ā Enable remote code execution āœ…Ā Compromise entire infrastructures šŸ›”ļø Action Steps: 1ļøāƒ£Ā Upgrade immediatelyĀ to the latest patched version. 2ļøāƒ£Ā Audit access logsĀ for suspicious activity. 3ļøāƒ£Ā Isolate critical systemsĀ until confirmed secure. šŸ”— Official Response: HashiCorp + CyataĀ are collaborating on fixes. SlowMist CISOĀ warns:Ā "Delay = Risk." #HashiCorp #SlowMist #BinanceSecurity šŸ’¬ Discussion: → Are your orgs affected?Ā Comment protocols below! → Tag projects using HashiCorp Vault!
🚨 URGENT SECURITY ALERT: HashiCorp Vault Vulnerabilities Expose Crypto Wallets & Keys
šŸ” Critical Risk:Ā MultipleĀ zero-day vulnerabilitiesĀ found inĀ HashiCorp Vault—a top tool for crypto wallet/key management.

Exploits could:
āœ…Ā Bypass MFA & locks
āœ…Ā Enable remote code execution
āœ…Ā Compromise entire infrastructures

šŸ›”ļø Action Steps:
1ļøāƒ£Ā Upgrade immediatelyĀ to the latest patched version.
2ļøāƒ£Ā Audit access logsĀ for suspicious activity.
3ļøāƒ£Ā Isolate critical systemsĀ until confirmed secure.

šŸ”— Official Response:
HashiCorp + CyataĀ are collaborating on fixes.
SlowMist CISOĀ warns:Ā "Delay = Risk."
#HashiCorp #SlowMist #BinanceSecurity
šŸ’¬ Discussion:
→ Are your orgs affected?Ā Comment protocols below!
→ Tag projects using HashiCorp Vault!
🚨 Breaking News Alert 🚨 āš ļø Fake Ledger Scam Resurfaces — Targeting High-Net-Worth Users! šŸ¤‘šŸ’° According to PANews, the notorious ā€˜Fake Ledger’ scam is BACK! Hackers are šŸ“¦ mailing counterfeit Ledger devices with fake manuals, urging victims to enter their real recovery phrases into a šŸ•µļøā€ā™‚ļø malicious app — leading to šŸ’ø asset theft! This attack, first spotted in 2021, now includes: šŸ” Preset recovery phrases šŸŽ² Tampered RNG chips 🧠 Expert Warning: These physical phishing attacks may seem rare but have a šŸš€ high success rate, especially among šŸ’¼ high-net-worth users. How to Stay Safe: āœ… Never enter your seed phrase into ANY app or website āœ… Buy ONLY from official sources āŒ Don’t trust unsolicited packages — even if it looks ā€œofficialā€ šŸ” Protect your crypto. Stay sharp. Stay safe! #CryptoSecurity #LedgerScam #Web3Alert #PhishingScam #SlowMist $BTC {spot}(BTCUSDT) $ETH {spot}(ETHUSDT) $XRP {spot}(XRPUSDT)
🚨 Breaking News Alert 🚨

āš ļø Fake Ledger Scam Resurfaces — Targeting High-Net-Worth Users! šŸ¤‘šŸ’°

According to PANews, the notorious ā€˜Fake Ledger’ scam is BACK!
Hackers are šŸ“¦ mailing counterfeit Ledger devices with fake manuals, urging victims to enter their real recovery phrases into a šŸ•µļøā€ā™‚ļø malicious app — leading to šŸ’ø asset theft!

This attack, first spotted in 2021, now includes:
šŸ” Preset recovery phrases
šŸŽ² Tampered RNG chips

🧠 Expert Warning: These physical phishing attacks may seem rare but have a šŸš€ high success rate, especially among šŸ’¼ high-net-worth users.

How to Stay Safe:
āœ… Never enter your seed phrase into ANY app or website
āœ… Buy ONLY from official sources
āŒ Don’t trust unsolicited packages — even if it looks ā€œofficialā€

šŸ” Protect your crypto. Stay sharp. Stay safe!

#CryptoSecurity #LedgerScam #Web3Alert #PhishingScam #SlowMist
$BTC
$ETH
$XRP
$27M Heist Hits BigONE in Sophisticated Supply Chain Attack 🚨 In a major blow to crypto security, BigONE Exchange has fallen victim to a supply chain attack that drained over $27 million from its platform. šŸ” According to on-chain security firm SlowMist, the attacker compromised BigONE’s production network—specifically the servers handling account management and risk control. Instead of stealing private keys, the attacker manipulated the operating logic of these systems, authorizing fraudulent withdrawals without triggering alarms. šŸ’» The breach allowed the hacker to siphon funds across multiple chains including Ethereum, BNB Chain, Solana, Bitcoin, and Tron. SlowMist has already tracked the suspicious wallet addresses and is actively monitoring the movement of stolen assets. šŸ›”ļø In response, BigONE has: Shut down deposit and withdrawal services temporarily Identified and patched the vulnerability Activated internal security reserves to protect user assets Started borrowing external liquidity to restore platform operations ā€œAll private keys remain secure,ā€ said BigONE, adding that services will resume shortly after implementing enhanced security reinforcements. This incident underscores a growing threat in the crypto world: server-side logic manipulation, where attackers don’t need access to wallets—they just change the rules of the game. Stay alert, stay secure. šŸ§ šŸ” #BigONE #CryptoHack #SupplyChainAttack #SlowMist #Web3Security
$27M Heist Hits BigONE in Sophisticated Supply Chain Attack 🚨

In a major blow to crypto security, BigONE Exchange has fallen victim to a supply chain attack that drained over $27 million from its platform.

šŸ” According to on-chain security firm SlowMist, the attacker compromised BigONE’s production network—specifically the servers handling account management and risk control.

Instead of stealing private keys, the attacker manipulated the operating logic of these systems, authorizing fraudulent withdrawals without triggering alarms.

šŸ’» The breach allowed the hacker to siphon funds across multiple chains including Ethereum, BNB Chain, Solana, Bitcoin, and Tron. SlowMist has already tracked the suspicious wallet addresses and is actively monitoring the movement of stolen assets.

šŸ›”ļø In response, BigONE has:

Shut down deposit and withdrawal services temporarily

Identified and patched the vulnerability

Activated internal security reserves to protect user assets

Started borrowing external liquidity to restore platform operations

ā€œAll private keys remain secure,ā€ said BigONE, adding that services will resume shortly after implementing enhanced security reinforcements.

This incident underscores a growing threat in the crypto world: server-side logic manipulation, where attackers don’t need access to wallets—they just change the rules of the game.

Stay alert, stay secure. šŸ§ šŸ”

#BigONE #CryptoHack #SupplyChainAttack #SlowMist #Web3Security
āš ļø Warning: $EOS Address Spoofing Attack! #SlowMist reports an ongoing attack in the EOS network where scammers are creating fake accounts resembling #OKX and Binance. They send small amounts (0.001 EOS) to users with the goal of tricking them into making transactions, leading to stolen funds. šŸ‘€šŸ’° Be cautious, double-check addresses before interacting with any EOS transactions, and stay alert! šŸ’„ #EOS重大利儽
āš ļø Warning: $EOS Address Spoofing Attack!

#SlowMist reports an ongoing attack in the EOS network where scammers are creating fake accounts resembling #OKX and Binance. They send small amounts (0.001 EOS) to users with the goal of tricking them into making transactions, leading to stolen funds. šŸ‘€šŸ’°

Be cautious, double-check addresses before interacting with any EOS transactions, and stay alert! šŸ’„

#EOS重大利儽
SlowMist Security Alert: Android banking Trojan "Crocodilus" attacks crypto users On June 4, SlowMist issued a security alert that the Android banking Trojan "Crocodilus" has recently been upgraded and has attacked global cryptocurrency users and banking applications. The main threats include: Spreading through fake browser updates in Facebook ads; Using overlay attacks to steal login credentials; Extracting crypto wallet mnemonics and private keys; Injecting fake "bank support" numbers into contact lists; Malware as a service: available for rent ($100-300 per attack). Remind users to avoid unknown app updates and ad links. #Trojan #SlowMist
SlowMist Security Alert: Android banking Trojan "Crocodilus" attacks crypto users

On June 4, SlowMist issued a security alert that the Android banking Trojan "Crocodilus" has recently been upgraded and has attacked global cryptocurrency users and banking applications. The main threats include:

Spreading through fake browser updates in Facebook ads;
Using overlay attacks to steal login credentials;

Extracting crypto wallet mnemonics and private keys;

Injecting fake "bank support" numbers into contact lists;

Malware as a service: available for rent ($100-300 per attack).
Remind users to avoid unknown app updates and ad links.

#Trojan #SlowMist
Login to explore more contents
Explore the latest crypto news
āš”ļø Be a part of the latests discussions in crypto
šŸ’¬ Interact with your favorite creators
šŸ‘ Enjoy content that interests you
Email / Phone number