Binance Square

cyberattack

24,830 views
59 Discussing
CheckDot-is-SAFU
--
Surge in Cyberattacks Linked to Russian Host Proton66 Raises Alarms *April 2025* A new wave of cyberattacks has been traced back to *Proton66*, a Russian bulletproof hosting provider known for shielding criminal operations. Since January 8, 2025, Proton66 has been tied to a significant spike in malicious activity, including brute-force attacks, malware distribution, ransomware deployments, and phishing campaigns. Researchers have identified the use of *SuperBlack* and *WeaXor* ransomware strains, both capable of evading traditional security tools. Notably, attackers are exploiting multiple zero-day vulnerabilities discovered in late 2024 and early 2025, allowing them to breach even well-defended systems. Perhaps most troubling is evidence that some attack traffic is being routed through *Kaspersky Lab’s network infrastructure*. While it’s unclear whether this is an abuse of trusted pathways or something more intentional, the tactic further complicates detection and attribution. Phishing campaigns launched from hijacked WordPress websites have also intensified, targeting businesses and individuals with fake login pages and malware-laced downloads. Cybersecurity experts urge organizations to patch all systems immediately, monitor network traffic for suspicious routes, and strengthen endpoint defenses to guard against these advanced threats. The use of bulletproof hosting and fresh zero-days marks this as a coordinated, high-level operation likely to continue escalating. #cyberattack #HackerAlert
Surge in Cyberattacks Linked to Russian Host Proton66 Raises Alarms
*April 2025*

A new wave of cyberattacks has been traced back to *Proton66*, a Russian bulletproof hosting provider known for shielding criminal operations. Since January 8, 2025, Proton66 has been tied to a significant spike in malicious activity, including brute-force attacks, malware distribution, ransomware deployments, and phishing campaigns.

Researchers have identified the use of *SuperBlack* and *WeaXor* ransomware strains, both capable of evading traditional security tools. Notably, attackers are exploiting multiple zero-day vulnerabilities discovered in late 2024 and early 2025, allowing them to breach even well-defended systems.

Perhaps most troubling is evidence that some attack traffic is being routed through *Kaspersky Lab’s network infrastructure*. While it’s unclear whether this is an abuse of trusted pathways or something more intentional, the tactic further complicates detection and attribution.

Phishing campaigns launched from hijacked WordPress websites have also intensified, targeting businesses and individuals with fake login pages and malware-laced downloads.

Cybersecurity experts urge organizations to patch all systems immediately, monitor network traffic for suspicious routes, and strengthen endpoint defenses to guard against these advanced threats. The use of bulletproof hosting and fresh zero-days marks this as a coordinated, high-level operation likely to continue escalating.

#cyberattack #HackerAlert
--
Bullish
The United Nations (UN) highlighted that North Korea funds 50% of its foreign exchange through cyberattacks, through an investigation into an attack on a crypto company that caused losses of $3 billion. #cyberattack #northkorea #Exploiter
The United Nations (UN) highlighted that North Korea funds 50% of its foreign exchange through cyberattacks, through an investigation into an attack on a crypto company that caused losses of $3 billion.
#cyberattack #northkorea #Exploiter
--
Bullish
According to TRM, in 2023, cryptocurrency hacks decreased by over 50%, with cybercriminals stealing around $1.7bn compared to nearly $4bn in 2022. ⚫The number of attacks remained stable, but the value of stolen assets dropped ⚫Infrastructure attacks accounted for nearly 60% of the total stolen amount, averaging almost $30m per incident ⚫The decline is attributed to enhanced industry security, increased law enforcement actions, and improved industry coordination. #bitcoin #Cryptocurrrency #cyberattack
According to TRM, in 2023, cryptocurrency hacks decreased by over 50%, with cybercriminals stealing around $1.7bn compared to nearly $4bn in 2022.

⚫The number of attacks remained stable, but the value of stolen assets dropped
⚫Infrastructure attacks accounted for nearly 60% of the total stolen amount, averaging almost $30m per incident
⚫The decline is attributed to enhanced industry security, increased law enforcement actions, and improved industry coordination.

#bitcoin #Cryptocurrrency #cyberattack
🚨#InfiniBreach 🚨 #CyberAttack 🔐 ❓ What Happened in the Infini Security Breach, and How Did Usual's Systems Stay Secure? 🔴 🚨 Infini Security Breach Overview: 🌐 A major cyberattack targeted Infini, a top cybersecurity firm. 🦠 Hackers infiltrated the system, exposing sensitive client data. ⚠️ Security vulnerabilities in major firms raised serious concerns. 🟢 🛡️ Usual's Systems Remain Secure: ✅ Despite the breach, Usual’s systems were fully protected. 🔐 Advanced encryption & multi-layered security stopped unauthorized access. 🔍 Real-time monitoring & security audits prevented infiltration. 🟡 🔥 Key Reasons for Usual’s Cybersecurity Success: 🏰 Zero Trust Architecture (ZTA) 🏰 – Strict access control kept threats out. 🔒 End-to-End Encryption 🔒 – All data transmissions remained secure. 🤖 AI-Powered Threat Detection 🤖 – Identified & blocked threats instantly. 🚀 Proactive Cybersecurity Measures 🚀 – Frequent updates & employee training boosted security. ⚡ 🌍 Industry Impact & Next Steps: 🔎 The Infini breach highlights the growing need for stronger cybersecurity. 💡 Companies should adopt Usual’s security model for better protection. 🕵️‍♂️ Investigations are underway to track down the hackers & prevent future breaches.
🚨#InfiniBreach 🚨 #CyberAttack 🔐
❓ What Happened in the Infini Security Breach, and How Did Usual's Systems Stay Secure?

🔴 🚨 Infini Security Breach Overview:

🌐 A major cyberattack targeted Infini, a top cybersecurity firm.

🦠 Hackers infiltrated the system, exposing sensitive client data.

⚠️ Security vulnerabilities in major firms raised serious concerns.

🟢 🛡️ Usual's Systems Remain Secure:

✅ Despite the breach, Usual’s systems were fully protected.

🔐 Advanced encryption & multi-layered security stopped unauthorized access.

🔍 Real-time monitoring & security audits prevented infiltration.

🟡 🔥 Key Reasons for Usual’s Cybersecurity Success:

🏰 Zero Trust Architecture (ZTA) 🏰 – Strict access control kept threats out.

🔒 End-to-End Encryption 🔒 – All data transmissions remained secure.

🤖 AI-Powered Threat Detection 🤖 – Identified & blocked threats instantly.

🚀 Proactive Cybersecurity Measures 🚀 – Frequent updates & employee training boosted security.

⚡ 🌍 Industry Impact & Next Steps:

🔎 The Infini breach highlights the growing need for stronger cybersecurity.

💡 Companies should adopt Usual’s security model for better protection.

🕵️‍♂️ Investigations are underway to track down the hackers & prevent future breaches.
🚨 Bybit Hack: $1.5 Billion Stolen! Biggest Crypto Heists Revealed 🔥💸 The crypto world is shaken again as Bybit, one of the largest exchanges, suffered a massive $1.5 billion hack. This brings back memories of some of the biggest crypto thefts in history. Let’s dive into the Bybit breach and other record-breaking crypto heists. 💀 What Happened? 🔹 Hackers stole $1.5 billion worth of digital assets from Bybit. 🔹 The attack targeted hot wallets, exposing vulnerabilities in exchange security. 🔹 Bybit has paused withdrawals and is investigating the breach. ⚡ Biggest Crypto Hacks & Heists Ever! 🔸 Ronin Network (2022) – $625M Stolen 💀 🔸 Poly Network (2021) – $610M Breach 🔓 🔸 Mt. Gox (2014) – $470M Vanished 🏴‍☠️ 🔸 FTX Collapse (2022) – $415M Hacked 🚨 🔸 Coincheck (2018) – $530M Lost 💸 🚀 Why It Matters? 📌 Security Risks – Despite advancements in blockchain security, hackers continue to exploit vulnerabilities. 📌 Trust Issues – Exchange hacks reduce confidence in centralized platforms, pushing more users toward self-custody. 📌 Regulatory Pressure – Governments & regulators might tighten crypto security measures after such breaches. 💡 How to Protect Your Crypto? ✅ Use cold wallets for large holdings. ✅ Enable 2FA & use strong passwords. ✅ Stick to trusted exchanges with solid security measures. ✅ Avoid clicking on phishing links & double-check transactions. The Bybit hack is a harsh reminder of the risks in crypto! Do you think centralized exchanges are safe enough, or is DeFi the future? 🤔💬 🔥 $BTC $ETH $BNB {spot}(BNBUSDT) {spot}(ETHUSDT) {spot}(BTCUSDT) #BybitHack #CryptoSecurity #BlockchainNews #Bitcoin #CyberAttack
🚨 Bybit Hack: $1.5 Billion Stolen! Biggest Crypto Heists Revealed 🔥💸

The crypto world is shaken again as Bybit, one of the largest exchanges, suffered a massive $1.5 billion hack. This brings back memories of some of the biggest crypto thefts in history. Let’s dive into the Bybit breach and other record-breaking crypto heists.

💀 What Happened?

🔹 Hackers stole $1.5 billion worth of digital assets from Bybit.
🔹 The attack targeted hot wallets, exposing vulnerabilities in exchange security.
🔹 Bybit has paused withdrawals and is investigating the breach.

⚡ Biggest Crypto Hacks & Heists Ever!

🔸 Ronin Network (2022) – $625M Stolen 💀
🔸 Poly Network (2021) – $610M Breach 🔓
🔸 Mt. Gox (2014) – $470M Vanished 🏴‍☠️
🔸 FTX Collapse (2022) – $415M Hacked 🚨
🔸 Coincheck (2018) – $530M Lost 💸

🚀 Why It Matters?

📌 Security Risks – Despite advancements in blockchain security, hackers continue to exploit vulnerabilities.
📌 Trust Issues – Exchange hacks reduce confidence in centralized platforms, pushing more users toward self-custody.
📌 Regulatory Pressure – Governments & regulators might tighten crypto security measures after such breaches.

💡 How to Protect Your Crypto?

✅ Use cold wallets for large holdings.
✅ Enable 2FA & use strong passwords.
✅ Stick to trusted exchanges with solid security measures.
✅ Avoid clicking on phishing links & double-check transactions.

The Bybit hack is a harsh reminder of the risks in crypto! Do you think centralized exchanges are safe enough, or is DeFi the future? 🤔💬

🔥 $BTC $ETH $BNB



#BybitHack #CryptoSecurity #BlockchainNews #Bitcoin #CyberAttack
🚨 X Platform Hit by Major Cyberattack! Linked to Mirai Variant ⚠️💻 The X Platform (formerly Twitter) has reportedly suffered a large-scale cyberattack, with early findings linking it to a Mirai botnet variant—a notorious malware used in massive DDoS attacks. 🔹 Key Details: 🔺 Attack suspected to involve millions of infected devices 🔺 Possible disruption to services, user data, and security 🔺 Cybersecurity teams on high alert to mitigate further risks 🔥 What’s Next? Experts warn of potential follow-up attacks as hackers exploit vulnerabilities in connected devices. Users are advised to stay cautious, update security settings, and enable 2FA! How serious do you think this could get? Drop your thoughts below! 👇💬 $BNB {spot}(BNBUSDT) $BTC {spot}(BTCUSDT) #CyberAttack #XPlatform #MiraiBotnet #USStocksPlunge #MtGoxTransfers
🚨 X Platform Hit by Major Cyberattack! Linked to Mirai Variant ⚠️💻

The X Platform (formerly Twitter) has reportedly suffered a large-scale cyberattack, with early findings linking it to a Mirai botnet variant—a notorious malware used in massive DDoS attacks.

🔹 Key Details:
🔺 Attack suspected to involve millions of infected devices
🔺 Possible disruption to services, user data, and security
🔺 Cybersecurity teams on high alert to mitigate further risks

🔥 What’s Next?
Experts warn of potential follow-up attacks as hackers exploit vulnerabilities in connected devices. Users are advised to stay cautious, update security settings, and enable 2FA!

How serious do you think this could get? Drop your thoughts below! 👇💬
$BNB
$BTC

#CyberAttack #XPlatform #MiraiBotnet #USStocksPlunge #MtGoxTransfers
🚨 NBA & NASCAR Social Media Hacked – What Went Wrong? 🏀🏎️ In a shocking cybersecurity breach, the official social media accounts of the NBA and NASCAR were hacked, leaving fans and followers stunned! 🚨 The attack raises serious concerns about online security in the sports industry. Here’s what happened and what it means for digital safety. 🔍 What Happened? ✔️ NBA and NASCAR’s official X (Twitter) accounts were taken over by hackers. ✔️ Suspicious posts promoting malicious links and scams were shared before being deleted. ✔️ The incident highlights the growing risks of cyber threats in high-profile organizations. 🛡️ Who’s Behind the Attack? 🔹 The hackers haven’t been officially identified, but these breaches often involve phishing attacks or compromised admin credentials. 🔹 The posts suggested a possible crypto-related scam, a common trend in recent high-profile hacks. 🔹 Similar incidents have targeted government agencies, celebrities, and major corporations. ⚠️ Why This Matters? 🔸 Massive Audience Exposure: NBA and NASCAR have millions of followers, meaning thousands may have clicked on harmful links. 🔸 Data Security Concerns: If admin accounts were compromised, private data might also be at risk. 🔸 Brand Trust Issues: Frequent cyberattacks can damage public trust in organizations, making fans hesitant to engage online. 🔐 How Can Organizations Prevent Future Hacks? ✅ Stronger Passwords & 2FA: Multi-factor authentication (2FA) should be mandatory. ✅ Cybersecurity Training: Employees need to be aware of phishing scams and social engineering tactics. ✅ Rapid Response Teams: Quick detection and removal of suspicious activity can limit damage. 📌 Final Thought: This breach is a wake-up call for major organizations to tighten their cybersecurity measures. With digital threats on the rise, even the biggest names in sports aren’t safe from hackers! 🔗 #CyberAttack #NBAHack #CryptoMarketWatch #OnlineSecurity
🚨 NBA & NASCAR Social Media Hacked – What Went Wrong? 🏀🏎️

In a shocking cybersecurity breach, the official social media accounts of the NBA and NASCAR were hacked, leaving fans and followers stunned! 🚨 The attack raises serious concerns about online security in the sports industry. Here’s what happened and what it means for digital safety.

🔍 What Happened?

✔️ NBA and NASCAR’s official X (Twitter) accounts were taken over by hackers.
✔️ Suspicious posts promoting malicious links and scams were shared before being deleted.
✔️ The incident highlights the growing risks of cyber threats in high-profile organizations.

🛡️ Who’s Behind the Attack?

🔹 The hackers haven’t been officially identified, but these breaches often involve phishing attacks or compromised admin credentials.
🔹 The posts suggested a possible crypto-related scam, a common trend in recent high-profile hacks.
🔹 Similar incidents have targeted government agencies, celebrities, and major corporations.

⚠️ Why This Matters?

🔸 Massive Audience Exposure: NBA and NASCAR have millions of followers, meaning thousands may have clicked on harmful links.
🔸 Data Security Concerns: If admin accounts were compromised, private data might also be at risk.
🔸 Brand Trust Issues: Frequent cyberattacks can damage public trust in organizations, making fans hesitant to engage online.

🔐 How Can Organizations Prevent Future Hacks?

✅ Stronger Passwords & 2FA: Multi-factor authentication (2FA) should be mandatory.
✅ Cybersecurity Training: Employees need to be aware of phishing scams and social engineering tactics.
✅ Rapid Response Teams: Quick detection and removal of suspicious activity can limit damage.

📌 Final Thought: This breach is a wake-up call for major organizations to tighten their cybersecurity measures. With digital threats on the rise, even the biggest names in sports aren’t safe from hackers!

🔗 #CyberAttack #NBAHack #CryptoMarketWatch #OnlineSecurity
Trezor Discovers Email Provider Breach Resulting in Malicious EmailsTrezor, a hardware #wallet provider, recently acknowledged that a security breach involving their third-party email service resulted in a series of fraudulent emails being sent to their customers over the last 12 hours. On January 24, #Trezor issued a statement revealing that they had identified an unauthorized email, which falsely claimed to be from the company, disseminated by a third-party email service they use. The deceptive email, sent from "[email protected]," falsely instructed users to update their "network" or face the risk of losing their funds. The email contained a link leading to a website that asked users to input their seed phrase. Trezor has reported no instances of users losing funds due to this phishing scam, and there are no indications that any Trezor users have been duped by this fraudulent scheme. Trezor Says it Has Deactivated the Malicious Link Trezor has informed its customers that they have effectively neutralized the harmful link and assured them that their funds are secure as long as they haven't entered their recovery seed. "We rapidly disabled the malicious link in the email, significantly reducing the threat's potential impact!" However, Trezor has advised customers who did input their recovery seed to move their funds to a new wallet immediately. According to Trezor's ongoing inquiry, an unauthorized party accessed their email address database, primarily used for newsletters, and then sent the fraudulent emails using a third-party email service. Recently, on January 23, MailerLite, an email marketing software company, reported a security breach. This incident led to a spate of phishing emails exploiting the branded domains of various companies, including Cointelegraph, WalletConnect, and Token Terminal. It remains uncertain whether Trezor uses the same email domain provider as those affected. Digital asset attorney Joe Carlasare recounted his experience of receiving the phishing email in a post, labeling it as a “sophisticated scam.” Exploring the Link Between Support Portal Breach and Recent Hack There is speculation that the recent #cyberattack might be connected to a prior security breach involving Trezor's support portal, where the personal information of approximately 66,000 users was exposed on January 17. Despite this breach, the company has stressed that no recovery seed phrases were compromised as a result of the incident. At that time, Trezor, the hardware wallet provider, took immediate action to limit unauthorized access and has been actively reaching out to affected users. It's important to highlight that this is not the first instance where Trezor has encountered attempts to compromise user assets. Despite its reputable standing in the cryptocurrency hardware wallet industry, Trezor has faced various security challenges in recent years. In February of the previous year, Trezor issued a warning to users about a phishing attack designed to deceive investors into disclosing their recovery phrase on a counterfeit Trezor website. Additionally, in May, the cybersecurity firm Kaspersky reported the emergence of a counterfeit hardware wallet posing as a genuine Trezor product. This deceptive device used a substituted microcontroller to gain access to a user's private keys, enabling fraudsters to steal funds. Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Trezor Discovers Email Provider Breach Resulting in Malicious Emails

Trezor, a hardware #wallet provider, recently acknowledged that a security breach involving their third-party email service resulted in a series of fraudulent emails being sent to their customers over the last 12 hours.
On January 24, #Trezor issued a statement revealing that they had identified an unauthorized email, which falsely claimed to be from the company, disseminated by a third-party email service they use.
The deceptive email, sent from "[email protected]," falsely instructed users to update their "network" or face the risk of losing their funds.
The email contained a link leading to a website that asked users to input their seed phrase.
Trezor has reported no instances of users losing funds due to this phishing scam, and there are no indications that any Trezor users have been duped by this fraudulent scheme.

Trezor Says it Has Deactivated the Malicious Link
Trezor has informed its customers that they have effectively neutralized the harmful link and assured them that their funds are secure as long as they haven't entered their recovery seed.
"We rapidly disabled the malicious link in the email, significantly reducing the threat's potential impact!"
However, Trezor has advised customers who did input their recovery seed to move their funds to a new wallet immediately.
According to Trezor's ongoing inquiry, an unauthorized party accessed their email address database, primarily used for newsletters, and then sent the fraudulent emails using a third-party email service.
Recently, on January 23, MailerLite, an email marketing software company, reported a security breach. This incident led to a spate of phishing emails exploiting the branded domains of various companies, including Cointelegraph, WalletConnect, and Token Terminal.
It remains uncertain whether Trezor uses the same email domain provider as those affected.
Digital asset attorney Joe Carlasare recounted his experience of receiving the phishing email in a post, labeling it as a “sophisticated scam.”
Exploring the Link Between Support Portal Breach and Recent Hack
There is speculation that the recent #cyberattack might be connected to a prior security breach involving Trezor's support portal, where the personal information of approximately 66,000 users was exposed on January 17.
Despite this breach, the company has stressed that no recovery seed phrases were compromised as a result of the incident. At that time, Trezor, the hardware wallet provider, took immediate action to limit unauthorized access and has been actively reaching out to affected users.
It's important to highlight that this is not the first instance where Trezor has encountered attempts to compromise user assets. Despite its reputable standing in the cryptocurrency hardware wallet industry, Trezor has faced various security challenges in recent years.
In February of the previous year, Trezor issued a warning to users about a phishing attack designed to deceive investors into disclosing their recovery phrase on a counterfeit Trezor website.
Additionally, in May, the cybersecurity firm Kaspersky reported the emergence of a counterfeit hardware wallet posing as a genuine Trezor product. This deceptive device used a substituted microcontroller to gain access to a user's private keys, enabling fraudsters to steal funds.

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 BREAKING: Elon Musk confirmed that 𝕏 is facing a massive cyberattack! 💻⚡️ First Tesla, and now 𝕏—there seems to be a coordinated effort targeting Elon Musk and his companies. 🛑🔒 #Cyberattack #ElonMusk #X $BNB $BTC $XRP
🚨 BREAKING: Elon Musk confirmed that 𝕏 is facing a massive cyberattack! 💻⚡️

First Tesla, and now 𝕏—there seems to be a coordinated effort targeting Elon Musk and his companies. 🛑🔒 #Cyberattack #ElonMusk #X
$BNB $BTC $XRP
The #cyberattack against #Cencora , where the hackers received $75 million in extortion payments, was notable for being executed through #Bitcoin ($BTC ) transactions across three installments in March 2024. The payment breakdown is as follows: 1. March 7, 2024 (296.5 #BTC ) - Transaction hash: `e3e203db2752edeb5bb716a77ed30f977bee70b06cefecd69d1c38921ad5d1b2` - Time: 10:04 pm UTC 2. March 8, 2024 (408 BTC) - Transaction hash: `db4a0742aa2fe67c20f02642bb776fb4140cf32beca43b7552435f5eddb58d92` - Time: 7:45 pm UTC 3. March 8, 2024 (387 BTC) - Transaction hash: `bf408baa4d6598a42a6852012fe412514ff7bb70ca8a94deb9865c9b46f19ddf` - Time: 9:39 pm UTC All three transactions were funded from the same source, and the funds flowed into addresses with known exposure to illicit activity, indicating the payments were likely part of a ransomware settlement. To trace these payments on-chain, one would need to analyze blockchain data for the given transaction hashes and look for any connections to wallets flagged for illegal activities. It appears the attackers had sophisticated methods for moving funds across the blockchain, possibly utilizing coin-mixing services or #darknet wallets to obscure the transaction trail. Reknown crypto investigator @ZachXBT shared the details after a Bloomberg article about the hack as posted.
The #cyberattack against #Cencora , where the hackers received $75 million in extortion payments, was notable for being executed through #Bitcoin ($BTC ) transactions across three installments in March 2024. The payment breakdown is as follows:

1. March 7, 2024 (296.5 #BTC )
- Transaction hash: `e3e203db2752edeb5bb716a77ed30f977bee70b06cefecd69d1c38921ad5d1b2`
- Time: 10:04 pm UTC

2. March 8, 2024 (408 BTC)
- Transaction hash: `db4a0742aa2fe67c20f02642bb776fb4140cf32beca43b7552435f5eddb58d92`
- Time: 7:45 pm UTC

3. March 8, 2024 (387 BTC)
- Transaction hash: `bf408baa4d6598a42a6852012fe412514ff7bb70ca8a94deb9865c9b46f19ddf`
- Time: 9:39 pm UTC

All three transactions were funded from the same source, and the funds flowed into addresses with known exposure to illicit activity, indicating the payments were likely part of a ransomware settlement. To trace these payments on-chain, one would need to analyze blockchain data for the given transaction hashes and look for any connections to wallets flagged for illegal activities.

It appears the attackers had sophisticated methods for moving funds across the blockchain, possibly utilizing coin-mixing services or #darknet wallets to obscure the transaction trail. Reknown crypto investigator @ZachXBT shared the details after a Bloomberg article about the hack as posted.
--
Bearish
🔻🔻$BTC ________🔥 for BTC updates ⏫️⏫️⏫️ United Nations report: North Korea obtains 50% of its foreign exchange income through cyber attacks and loses approximately US$30 billion BTC - SELL Reason: Increased likelihood of North Korea's cyberattack activities targeting digital wallets impacts investor confidence in Bitcoin. Signal strength: HIGH Signal time: 2024-03-23 20:55:02 GMT #northkorea #cyberattack #Forex #BTCUSDT #SignalAlert Always DYOR. It’s not a financial advice, but our POV on the most likely asset move amid the event. What’s yours?
🔻🔻$BTC ________🔥 for BTC updates ⏫️⏫️⏫️

United Nations report: North Korea obtains 50% of its foreign exchange income through cyber attacks and loses approximately US$30 billion

BTC - SELL

Reason: Increased likelihood of North Korea's cyberattack activities targeting digital wallets impacts investor confidence in Bitcoin.

Signal strength: HIGH

Signal time: 2024-03-23 20:55:02 GMT

#northkorea #cyberattack #Forex #BTCUSDT #SignalAlert

Always DYOR. It’s not a financial advice, but our POV on the most likely asset move amid the event. What’s yours?
#WazirX is accusing wallet provider for the cyberattack. A separate forensic analysis revealed no compromise of WazirX's IT systems, the beleaguered cryptocurrency exchange claimed on Monday, nearly a month after it completed a preliminary investigation into a security breach that resulted in a $230 million loss. WazirX blamed the cyberattack on its wallet service provider Custody. WazirX said that Mandiant Solutions, a cybersecurity company and a division of Google, was in charge of the inquiry. "A comprehensive analysis will soon be available, but the results generally suggest that Liminal was the source of the problem that gave rise to the cyberattack. According to a press release from WazirX, "the wallet that was attacked was managed using Liminal's digital asset custody and wallet infrastructure." Once the cyberattack was discovered, Liminal Custody made it clear that its systems were safe. Given that WazirX was the custodian of five of the six keys, Liminal stated in a statement that "if one were to go by the information WazirX has shared, this actually raises serious questions on the security of their network infrastructure, operational custody controls and overall security posture." The business went on to say that auditors had been assigned to look into the matter. The founder and CEO of WazirX, Nischal Shetty, stated in a post on X (formerly Twitter) that the company had not yet "heard credible answers from Liminal." #cyberattack #CryptoNewss #PowellAtJacksonHole #CryptoMarketMoves
#WazirX is accusing wallet provider for the cyberattack.

A separate forensic analysis revealed no compromise of WazirX's IT systems, the beleaguered cryptocurrency exchange claimed on Monday, nearly a month after it completed a preliminary investigation into a security breach that resulted in a $230 million loss. WazirX blamed the cyberattack on its wallet service provider Custody.
WazirX said that Mandiant Solutions, a cybersecurity company and a division of Google, was in charge of the inquiry.

"A comprehensive analysis will soon be available, but the results generally suggest that Liminal was the source of the problem that gave rise to the cyberattack. According to a press release from WazirX, "the wallet that was attacked was managed using Liminal's digital asset custody and wallet infrastructure."

Once the cyberattack was discovered, Liminal Custody made it clear that its systems were safe.
Given that WazirX was the custodian of five of the six keys, Liminal stated in a statement that "if one were to go by the information WazirX has shared, this actually raises serious questions on the security of their network infrastructure, operational custody controls and overall security posture."
The business went on to say that auditors had been assigned to look into the matter.

The founder and CEO of WazirX, Nischal Shetty, stated in a post on X (formerly Twitter) that the company had not yet "heard credible answers from Liminal."

#cyberattack #CryptoNewss #PowellAtJacksonHole #CryptoMarketMoves
🚨 Bybit’s $1.5B Heist EXPOSED – North Korea’s Lazarus Strikes Again! 💻🔓 The crypto world is reeling after Arkham Intelligence unmasked the Lazarus Group as the masterminds behind Bybit’s $1.5 billion hack! ⚠️ Who is Lazarus? A North Korean cybercrime syndicate infamous for billion-dollar heists since 2009, laundering stolen funds through mixers & DeFi protocols. 🔥 What Happens Next? 🔹 Will authorities track the funds? 🔹 Can Bybit recover user assets? 🔹 Will crypto security tighten after this major breach? This saga is FAR from over. Stay tuned! #BybitHack #CryptoSecurity #LazarusGroup #CyberAttack #BlockchainNews
🚨 Bybit’s $1.5B Heist EXPOSED – North Korea’s Lazarus Strikes Again! 💻🔓

The crypto world is reeling after Arkham Intelligence unmasked the Lazarus Group as the masterminds behind Bybit’s $1.5 billion hack!

⚠️ Who is Lazarus?
A North Korean cybercrime syndicate infamous for billion-dollar heists since 2009, laundering stolen funds through mixers & DeFi protocols.

🔥 What Happens Next?
🔹 Will authorities track the funds?
🔹 Can Bybit recover user assets?
🔹 Will crypto security tighten after this major breach?

This saga is FAR from over. Stay tuned!

#BybitHack #CryptoSecurity #LazarusGroup #CyberAttack #BlockchainNews
🔥 KaitoX Twitter Account Hacked! 🔥 Based on the search results, it is accurate that the Kaito AI X (formerly Twitter) account, along with the account of its founder, Yu Hu, were indeed hacked. Here's a summary of the key points:   {future}(BTCUSDT) Compromised Accounts: Both the official Kaito AI X account and Yu Hu's personal X account were compromised. Misinformation Spread: {spot}(USDCUSDT) The hackers used the accounts to spread false information, claiming that Kaito wallets were compromised, and attempting to create fear and uncertainty (FUD) among users.   Malicious Intent: Reports indicate that the hackers had opened short positions on the KAITO token before the hack, suggesting they aimed to manipulate the market by causing a price drop. Response: The Kaito AI team acted quickly to regain control of the accounts and reassure users that wallets were not compromised. Trend: This attack is part of a growing trend of social media account hacks targeting the cryptocurrency space. Therefore, the news of the Kaito AI X account being hacked is confirmed. 🔒 Stay Safe! Avoid clicking on suspicious links and verify all information from trusted sources. ⚠️ Have you noticed any unusual activity? Share your thoughts below! $BTC $SOL $BNB #KaitoXAccountHacked #CryptoSecurity #StaySafe #CyberAttack
🔥 KaitoX Twitter Account Hacked! 🔥

Based on the search results, it is accurate that the Kaito AI X (formerly Twitter) account, along with the account of its founder, Yu Hu, were indeed hacked. Here's a summary of the key points:  


Compromised Accounts:
Both the official Kaito AI X account and Yu Hu's personal X account were compromised.
Misinformation Spread:


The hackers used the accounts to spread false information, claiming that Kaito wallets were compromised, and attempting to create fear and uncertainty (FUD) among users.  
Malicious Intent:
Reports indicate that the hackers had opened short positions on the KAITO token before the hack, suggesting they aimed to manipulate the market by causing a price drop.
Response:
The Kaito AI team acted quickly to regain control of the accounts and reassure users that wallets were not compromised.
Trend:
This attack is part of a growing trend of social media account hacks targeting the cryptocurrency space.
Therefore, the news of the Kaito AI X account being hacked is confirmed.
🔒 Stay Safe! Avoid clicking on suspicious links and verify all information from trusted sources.

⚠️ Have you noticed any unusual activity? Share your thoughts below! $BTC $SOL $BNB

#KaitoXAccountHacked #CryptoSecurity #StaySafe #CyberAttack
🚨 JUST BREAKING NEWS 🚨 🔥 Elon Musk has revealed that X (formerly Twitter) is under a massive cyberattack! ⚠️💻 🔴 Users may experience disruptions as security teams work to counter the attack. ⚡ Stay alert for updates! #ElonMusk 🚀 | #CyberAttack 🛡️ | #XSecurity 🔐 #ElonMuskTalks #X
🚨 JUST BREAKING NEWS 🚨

🔥 Elon Musk has revealed that X (formerly Twitter) is under a massive cyberattack! ⚠️💻

🔴 Users may experience disruptions as security teams work to counter the attack.

⚡ Stay alert for updates!

#ElonMusk 🚀 | #CyberAttack 🛡️ | #XSecurity 🔐 #ElonMuskTalks #X
Elon musk "X" under massive cyber attack There was (still is) a massive cyberattack against 𝕏. We get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and/or a country is involved. Tracing … #ElonMusk. #X #cyberattack
Elon musk "X" under massive cyber attack

There was (still is) a massive cyberattack against 𝕏.

We get attacked every day, but this was done with a lot of resources. Either a large, coordinated group and/or a country is involved.

Tracing …

#ElonMusk. #X #cyberattack
Ethereum under attack: Are North Korean hackers planning a new strike? After reports of the Bybit hack stealing $1.5 billion in ETH, suspicious transfers of 50,000 ETH ($110 million) from unknown wallets were spotted on X today. Experts are speculating: is this money laundering of stolen funds or preparation for another attack? Rumors point to North Korean hackers, and ETH’s 4% drop in a day is fueling panic. Hypothesis: the market could see an even bigger crash if exchanges don’t strengthen security. #Ethereum #CryptoSecurity #Hackers #CyberAttack #ETHCrash $BTC $ETH $BNB
Ethereum under attack: Are North Korean hackers planning a new strike?

After reports of the Bybit hack stealing $1.5 billion in ETH, suspicious transfers of 50,000 ETH ($110 million) from unknown wallets were spotted on X today. Experts are speculating: is this money laundering of stolen funds or preparation for another attack? Rumors point to North Korean hackers, and ETH’s 4% drop in a day is fueling panic. Hypothesis: the market could see an even bigger crash if exchanges don’t strengthen security.

#Ethereum #CryptoSecurity #Hackers #CyberAttack #ETHCrash

$BTC $ETH $BNB
🔔🔔NEWS ALERT🔔🔔 🔥🔥Crypto Trader Loses $220,764 In MEV Bot Attack🔥🔥🔥🔥 The incident resulted in the trader losing nearly 98% of the transaction's value to a Maximum Extractable Value (MEV) bot. #mev #cyberattack #Loses #botattack #crypto $XRP {spot}(XRPUSDT) $ADA
🔔🔔NEWS ALERT🔔🔔
🔥🔥Crypto Trader Loses $220,764 In MEV Bot Attack🔥🔥🔥🔥

The incident resulted in the trader losing nearly 98% of the transaction's value to a Maximum Extractable Value (MEV) bot.
#mev #cyberattack #Loses #botattack #crypto $XRP
$ADA
A Deep Dive Into Bybit’s $1.5 Billion Security Breach: Safe’s Vulnerabilities and Bybit’s Oversight#MultiSig #CyberAttack The recent security breach at Bybit, resulting in the theft of $1.5 billion, has sent shockwaves through the crypto community. At the heart of this incident lies a critical flaw in Safe’s multi-signature infrastructure, exposing serious risks that could impact not just Bybit but the broader Ethereum ecosystem. Let’s break down the key issues that led to this breach. Safe’s Security Breakdown: A Single Point of Failure According to the investigation, the attack stemmed from a compromise of a Safe developer’s machine, granting hackers access to AWS permissions. This unauthorized access enabled them to modify Safe’s front-end infrastructure, inserting malicious code tailored specifically to exploit Bybit’s multi-signature contracts. The most concerning part? The exploit was embedded two days before the attack, lying in wait for Bybit’s routine transactions. Initially, many believed the issue was related to Bybit’s local environment, but further analysis revealed that Safe’s server-side vulnerability was the real entry point. Had the attack gone unnoticed for longer, even more assets could have been at risk—an alarming prospect for multi-signature security. Bybit’s Critical Signing Oversight While Safe’s security lapse was the gateway for the attack, Bybit’s signing process played a major role in enabling the theft. According to reports from OneKey, Bybit engaged in blind signing, meaning transactions were approved without verifying the details. This is equivalent to signing a legal document without reading the terms—an open invitation for exploitation. Had Bybit implemented a thorough verification process, such as parsing transaction data before signing, the attack could have been detected and halted. This oversight highlights a fundamental issue in security practices: even the most advanced wallets and multi-signature mechanisms can fail if users do not exercise due diligence. Key Takeaways: Strengthening Multi-Signature Security This breach exposes two critical weaknesses in multi-signature security: Infrastructure Vulnerability – Safe’s compromised front-end created a systemic risk, proving that a single-point failure in wallet services can have devastating consequences.Lack of Transaction Verification – Bybit’s failure to scrutinize signing requests allowed hackers to exploit their funds effortlessly. Moving forward, the industry must adopt more robust security measures, including enhanced front-end protections, stricter internal controls, and mandatory transaction verification processes. If similar attacks target other major players using Safe’s multi-signature setup, the implications could extend far beyond this single incident. Who bears the greater responsibility in this breach—Safe for its compromised infrastructure, or Bybit for its lack of transaction security? Share your thoughts below. This version delivers a professional, structured, and engaging analysis, eliminating any risk of similarity while ensuring accuracy and clarity. Let me know if you need further refinements! 🚀 #Blockchain #BybitHack #CryptoSecurity

A Deep Dive Into Bybit’s $1.5 Billion Security Breach: Safe’s Vulnerabilities and Bybit’s Oversight

#MultiSig #CyberAttack
The recent security breach at Bybit, resulting in the theft of $1.5 billion, has sent shockwaves through the crypto community. At the heart of this incident lies a critical flaw in Safe’s multi-signature infrastructure, exposing serious risks that could impact not just Bybit but the broader Ethereum ecosystem. Let’s break down the key issues that led to this breach.
Safe’s Security Breakdown: A Single Point of Failure
According to the investigation, the attack stemmed from a compromise of a Safe developer’s machine, granting hackers access to AWS permissions. This unauthorized access enabled them to modify Safe’s front-end infrastructure, inserting malicious code tailored specifically to exploit Bybit’s multi-signature contracts.
The most concerning part? The exploit was embedded two days before the attack, lying in wait for Bybit’s routine transactions. Initially, many believed the issue was related to Bybit’s local environment, but further analysis revealed that Safe’s server-side vulnerability was the real entry point. Had the attack gone unnoticed for longer, even more assets could have been at risk—an alarming prospect for multi-signature security.
Bybit’s Critical Signing Oversight
While Safe’s security lapse was the gateway for the attack, Bybit’s signing process played a major role in enabling the theft. According to reports from OneKey, Bybit engaged in blind signing, meaning transactions were approved without verifying the details. This is equivalent to signing a legal document without reading the terms—an open invitation for exploitation.
Had Bybit implemented a thorough verification process, such as parsing transaction data before signing, the attack could have been detected and halted. This oversight highlights a fundamental issue in security practices: even the most advanced wallets and multi-signature mechanisms can fail if users do not exercise due diligence.
Key Takeaways: Strengthening Multi-Signature Security
This breach exposes two critical weaknesses in multi-signature security:
Infrastructure Vulnerability – Safe’s compromised front-end created a systemic risk, proving that a single-point failure in wallet services can have devastating consequences.Lack of Transaction Verification – Bybit’s failure to scrutinize signing requests allowed hackers to exploit their funds effortlessly.
Moving forward, the industry must adopt more robust security measures, including enhanced front-end protections, stricter internal controls, and mandatory transaction verification processes. If similar attacks target other major players using Safe’s multi-signature setup, the implications could extend far beyond this single incident.
Who bears the greater responsibility in this breach—Safe for its compromised infrastructure, or Bybit for its lack of transaction security? Share your thoughts below.
This version delivers a professional, structured, and engaging analysis, eliminating any risk of similarity while ensuring accuracy and clarity. Let me know if you need further refinements! 🚀
#Blockchain
#BybitHack #CryptoSecurity
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number