Binance Square

cyberattacks

68,347 views
27 Discussing
Lina Crypto
--
BREAKING: DeepSeek reports service degradation caused by a 'large-scale malicious attack.' Markets could pump from here šŸš€ "Disclaimer: This is for informational purposes only and not endorsed by Binance. Crypto investments are volatile and can lead to losses. Do your own research. Not financial advice." #DeepSeek #cyberattacks #technews #MarketWatch #BreakingNews
BREAKING:

DeepSeek reports service degradation caused by a 'large-scale malicious attack.'

Markets could pump from here šŸš€

"Disclaimer: This is for informational purposes only and not endorsed by Binance. Crypto investments are volatile and can lead to losses. Do your own research. Not financial advice."

#DeepSeek #cyberattacks #technews #MarketWatch #BreakingNews
Cyprus Police Warn Public After Crypto Investor Loses $58,000 to Fee ScamsInvestors Face Risks from Fee-Related Scams Cypriot authorities are urging the public to exercise caution after a 50-year-old man from Limassol lost $58,000 to a fraudulent cryptocurrency trading platform. This incident highlights the growing prevalence of manipulative tactics used in crypto market scams. How the Scam Unfolded Fake Platform with a Professional Appearance The victim encountered a website in December that appeared to be a legitimate trading platform. It featured detailed charts, interactive dashboards, and tools for tracking profits. Lured by the professional design and promises of high returns, the man invested a total of $58,000 across multiple transactions. Manipulated Data and Illusions of Profit The scammers used a manipulated dashboard to display fake rising profits. This common tactic creates the illusion of successful investments, encouraging victims to continue depositing funds. Demands for "Additional Fees" When the man attempted to withdraw his supposed earnings, the scammers refused to release the funds, instead demanding additional fees to "unlock" the profits. This tactic, known as an advance fee scam, involves pressuring victims to pay more money under false pretenses, only to leave their funds inaccessible. Recommendations from Authorities and Additional Warnings Caution in Investing The Cypriot Financial Crime Investigation Bureau advises against sharing sensitive financial and personal information and recommends investing only through licensed and reputable institutions. They also emphasize the importance of verifying the credibility of any advisor or platform. Other Crypto Scam Incidents Similar warnings have been issued by U.S. financial authorities. For instance, in June 2024, another investor lost $310,000 through a fake platform called Ethfinance. Scammers employed similar tactics, leveraging manipulated data to deceive victims. More Sophisticated Scams In July, another scam was uncovered where fraudsters offered fake loans. Victims were convinced their trading account profits would cover the loan repayments. However, the victims ended up repaying the loans from their own pockets while their supposed earnings remained locked on the platform. Summary This case from Cyprus underscores the risks of investing in cryptocurrencies through unverified platforms. Police and financial authorities warn against scammers who manipulate data and exploit investor trust. Exercising caution and thoroughly verifying investment opportunities are crucial for avoiding financial losses. #CyberSecurity , #HackerAlert , #cyberattacks , #CryptoScamAlert , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Cyprus Police Warn Public After Crypto Investor Loses $58,000 to Fee Scams

Investors Face Risks from Fee-Related Scams
Cypriot authorities are urging the public to exercise caution after a 50-year-old man from Limassol lost $58,000 to a fraudulent cryptocurrency trading platform. This incident highlights the growing prevalence of manipulative tactics used in crypto market scams.
How the Scam Unfolded
Fake Platform with a Professional Appearance
The victim encountered a website in December that appeared to be a legitimate trading platform. It featured detailed charts, interactive dashboards, and tools for tracking profits. Lured by the professional design and promises of high returns, the man invested a total of $58,000 across multiple transactions.
Manipulated Data and Illusions of Profit
The scammers used a manipulated dashboard to display fake rising profits. This common tactic creates the illusion of successful investments, encouraging victims to continue depositing funds.
Demands for "Additional Fees"
When the man attempted to withdraw his supposed earnings, the scammers refused to release the funds, instead demanding additional fees to "unlock" the profits. This tactic, known as an advance fee scam, involves pressuring victims to pay more money under false pretenses, only to leave their funds inaccessible.
Recommendations from Authorities and Additional Warnings
Caution in Investing
The Cypriot Financial Crime Investigation Bureau advises against sharing sensitive financial and personal information and recommends investing only through licensed and reputable institutions. They also emphasize the importance of verifying the credibility of any advisor or platform.
Other Crypto Scam Incidents
Similar warnings have been issued by U.S. financial authorities. For instance, in June 2024, another investor lost $310,000 through a fake platform called Ethfinance. Scammers employed similar tactics, leveraging manipulated data to deceive victims.
More Sophisticated Scams
In July, another scam was uncovered where fraudsters offered fake loans. Victims were convinced their trading account profits would cover the loan repayments. However, the victims ended up repaying the loans from their own pockets while their supposed earnings remained locked on the platform.
Summary
This case from Cyprus underscores the risks of investing in cryptocurrencies through unverified platforms. Police and financial authorities warn against scammers who manipulate data and exploit investor trust. Exercising caution and thoroughly verifying investment opportunities are crucial for avoiding financial losses.

#CyberSecurity , #HackerAlert , #cyberattacks , #CryptoScamAlert , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
U.S. Agency Warns About the Dangerous Trinity RansomwareThe Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure. The Threat of Trinity Ransomware and How It Works A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities. Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key. Hackers’ Demands: 24-Hour Deadline for Payment In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery. "Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers. Attacks on Healthcare Institutions The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector. Crypto Ransom Payments Reached $1 Billion in 2023 According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates. The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks. #cyberattacks Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ Ā 

U.S. Agency Warns About the Dangerous Trinity Ransomware

The Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure.
The Threat of Trinity Ransomware and How It Works
A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities.
Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key.
Hackers’ Demands: 24-Hour Deadline for Payment
In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery.
"Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers.
Attacks on Healthcare Institutions
The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector.
Crypto Ransom Payments Reached $1 Billion in 2023
According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates.
The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks.
#cyberattacks

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Ā 
🚨Crypto Losses to #hacks Exceed $313M in August 🚨 Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class. The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry. This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector. The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets. 🌐Source: #Cointelegraph Follow me to keep yourself updated ā—ā•ā—
🚨Crypto Losses to #hacks Exceed $313M in August 🚨

Cryptocurrency hackers stole $313.86 million in digital assets across more than 10 #cyberattacks in August, raising significant doubts about the broader acceptance of the asset class.

The alarming figure highlights a growing trend of sophisticated #cybercrime targeting the crypto industry.

This wave of thefts has prompted renewed calls for stricter regulation and better security measures within the sector.

The recent hacks add pressure on #exchanges and custodians to bolster their defenses and protect user assets.

🌐Source: #Cointelegraph

Follow me to keep yourself updated ā—ā•ā—
Radiant Capital and Other Victims: Millions Lost in the Crypto WorldAccording to CertiK's analytical report, the cryptocurrency industry experienced significant financial losses of $116 million due to cyberattacks and fraudulent activities. Despite the substantial damage, this figure represents a positive trend, marking the lowest losses in the past six months and suggesting a gradual reduction in criminal activities within the sector. Protocol exploits were the primary source of damage, accounting for over $113.3 million of the total losses. Among the affected projects, the decentralized lending platform Radiant Capital suffered the most, with losses reaching $34.7 million. Other significant financial damages were recorded in the Terra LFG and Berry DAO ecosystems, with losses of $5.4 million and $2.9 million, respectively. Flash attacks targeting lending protocols caused $1.5 million in losses. The attackers used complex algorithmic manipulations of asset pricing parameters, which were particularly evident in the Universe Project, which lost approximately $996,000. Scam schemes resulted in $1.2 million in losses, with the most significant damage of $487,000 occurring in the Wize project. Of particular concern is the ongoing trend of fraudulent schemes involving the deliberate withdrawal of assets, where investment initiative organizers intentionally liquidate their operations and misappropriate investors' funds. #Cryptocurrency #BlockchainSecurity #Cyberattacks #FraudInCrypto #RadiantCapital

Radiant Capital and Other Victims: Millions Lost in the Crypto World

According to CertiK's analytical report, the cryptocurrency industry experienced significant financial losses of $116 million due to cyberattacks and fraudulent activities. Despite the substantial damage, this figure represents a positive trend, marking the lowest losses in the past six months and suggesting a gradual reduction in criminal activities within the sector.
Protocol exploits were the primary source of damage, accounting for over $113.3 million of the total losses. Among the affected projects, the decentralized lending platform Radiant Capital suffered the most, with losses reaching $34.7 million. Other significant financial damages were recorded in the Terra LFG and Berry DAO ecosystems, with losses of $5.4 million and $2.9 million, respectively.
Flash attacks targeting lending protocols caused $1.5 million in losses. The attackers used complex algorithmic manipulations of asset pricing parameters, which were particularly evident in the Universe Project, which lost approximately $996,000.
Scam schemes resulted in $1.2 million in losses, with the most significant damage of $487,000 occurring in the Wize project. Of particular concern is the ongoing trend of fraudulent schemes involving the deliberate withdrawal of assets, where investment initiative organizers intentionally liquidate their operations and misappropriate investors' funds.

#Cryptocurrency #BlockchainSecurity #Cyberattacks #FraudInCrypto #RadiantCapital
$DOGE 🫵#Elonmusk 🪿 not there are official representative in the past ribbon #Trump and not there are systemic administrator 🪿🫵 #USCryptoReserve #RUSCryptoReserve #CyberAttacks
$DOGE 🫵#Elonmusk 🪿 not there are official representative in the past ribbon #Trump and not there are systemic administrator 🪿🫵 #USCryptoReserve #RUSCryptoReserve #CyberAttacks
Binance Announcement
--
Join the ā€œRoad to the Crypto Summit" Trading Tournament to Share $307,000 in BNB and USDC Token Vouchers!
This is a general announcement and marketing communication. Products and services referred to here may not be available in your region.
Fellow Binancians,
Binance is excited to kick off a new ā€œRoad to the Crypto Summitā€ trading tournament. Users can participate by trading selected tokens during the Promotion Period for a chance to share in a reward pool of $307,000 in BNB and USDC token vouchers.
Register for the Promotion Now!
Promotion Period: 2025-03-03 12:30 (UTC) to 2025-03-10 23:59 (UTC)
Promotion A: Join the Trading Tournament to Share $237,000 in BNB
All eligible users who confirm their participation and reach a total Spot trading volume of at least $500 equivalent on eligible Spot trading pairs during the Promotion Period will qualify to participate in this Promotion.
TokenEligible Spot Trading PairsADAADA/USDT, ADA/USDC, ADA/FDUSD, ADA/EUR, ADA/BTC, ADA/ETH, ADA/BNB, ADA/BRL, ADA/TRY, ADA/JPYBNBBNB/USDT, BNB/FDUSD, BNB/TUSD, BNB/BTC, BNB/ETH, BNB/UAH, BNB/BRL, BNB/EUR, BNB/TRY, BNB/JPYBTCBTC/USDT, BTC/USDC, BTC/FDUSD, BTC/TUSD, BTC/UAH, BTC/BRL, BTC/EUR, BTC/TRY, BTC/JPY, BTC/MXN, BTC/DAI, BTC/ZAR, BTC/ARS, BTC/PLN, BTC/EURI, BTC/RONETHETH/USDT, ETH/FDUSD, ETH/TUSD, ETH/BTC, ETH/BRL, ETH/EUR, ETH/TRY, ETH/JPYSOLSOL/USDT, SOL/FDUSD, SOL/TUSD, SOL/BNB, SOL/BTC, SOL/ETH, SOL/BRL, SOL/EUR, SOL/TRY, SOL/JPY, BNSOL/USDT, BNSOL/SOLXRPXRP/USDT, XRP/USDC, XRP/FDUSD, XRP/TUSD, XRP/BNB, XRP/BTC, XRP/ETH, XRP/BRL, XRP/EUR, XRP/TRY, XRP/JPY, XRP/MXN, TRX/XRP
Qualified participants will be ranked by their total Spot trading volume (including both buys and sells) during the Promotion Period. The top 200 qualifying participants will stand to share $237,000 in BNB token vouchers, as per the dynamic reward pool below.
Dynamic Reward Pool:
The ā€œRoad to the Crypto Summitā€ Trading Tournament features a dynamic prize pool of up to $237,000 in BNB token vouchers. The total number of eligible participants* will determine the final prize.
Number of Eligible Participants*Dynamic Reward Pool to Be Unlocked (in BNB Token Vouchers)1 - 10,000$20,00010,001 - 20,000$40,00020,001 - 40,000$60,00040,001 - 60,000$80,00060,001 - 80,000$100,00080,001 - 100,000$140,000100,001 - 200,000$180,000200,001 - 300,000$200,000300,001 - 400,000$237,000
Note: *An eligible participant refers to a user who has confirmed participation in the ā€œRoad to the Crypto Summitā€ Trading Tournament and trades a total Spot trading volume of at least $500 equivalent during the Promotion Period.
Rewards Structure:
Rankings by the Total Spot Trading Volume (including Buys and Sells) during the Promotion PeriodReward per Eligible UserMinimum Spot Trading Volume During the Promotion Period1st Place25% of dynamic reward pool unlockedAt least $10,000 equivalent2nd Place10% of dynamic reward pool unlocked3rd Place8% of dynamic reward pool unlocked4th Place6% of dynamic reward pool unlocked5th Place4% of dynamic reward pool unlocked6th - 20th PlacesAn equal share of 10% of dynamic reward pool unlocked21st - 50th PlacesAn equal share of 10% of dynamic reward pool unlocked51st - 200th PlacesAn equal share of 10% of dynamic reward pool unlockedAll Remaining Eligible Participants(i.e., Each with a total Spot trading volume of at least $500 equivalent during the Promotion Period)An equal share of 17% of dynamic reward pool unlockedAt least $500 equivalent
Promotion B: Exclusive Rewards For Early Birds
This Promotion is open to eligible users as highlighted in the table below. Qualified users who confirm their participation and complete any of the following task(s) during the Promotion Period can get USDC in token vouchers on a first-come, first-served basis.
EligibilityTaskReward per Qualified User (in Token Voucher)The first 10,000 new qualified users who have not traded on Spot Trading prior to 2025-03-03 12:30 (UTC)Complete their first Spot trade of at least $1,000 equivalent on any of the above mentioned trading pairs on Binance Spot5 USDCThe first 10,000 existing qualified users who have traded on Spot Trading in the past 30 days from 2025-03-03 12:30 (UTC)Trade at least $1,000 equivalent on any of the above mentioned trading pairs on Binance Spot2 USDC
Guides & Related Materials:
How to Spot Trade (App/Web)
Terms & Conditions:
All verified users who click the [Register Now] button on the tournament page by the end of the Promotion Period may successfully participate in the Promotion. Liquidity providers in the Binance Spot Liquidity Provider Program are not eligible to participate in the Promotion.This Promotion is only available to eligible users who are enabled for Binance Spot trading, and may not be available or may be restricted in certain jurisdictions or regions, or to certain users, depending on legal and regulatory requirements.Trading volumes on all FDUSD, TUSD, and USDT trading pairs will not count toward the trading volume requirement for EEA users in this Promotion.Trading volume of all USD stablecoin trading pairs with zero trading fees and USDC trading pairs with zero trading fees, as well as any other trading pairs with zero trading fees, will be excluded from final trading volume calculation.
To view which trading pairs have zero trading fees, please check here.
Users are responsible for informing themselves about and observing any restrictions and/or requirements imposed with respect to the access to and use of Binance Spot trading services in each country from which the services are accessed.Binance reserves the right to change, modify or impose additional restrictions with respect to the access to and use of Binance Spot trading services from time to time in its sole discretion at any time without notification.Binance will use the BNB/USD closing price on 2025-03-10 (UTC) as the exchange rate for rewards distribution. Please note that the actual value of rewards received is subject to change due to market fluctuation.All token voucher rewards will be distributed to eligible users within 21 working days after the end of the Promotion Period. Users will be able to login and redeem their token voucher rewards via Profile > Rewards Hub. All token voucher rewards will expire within two weeks after distribution. Eligible users should claim their vouchers before the expiration date. Learn how to redeem a voucher.Tokens referenced in the context of this campaign, are not in any way being recommended, vetted or endorsed by Binance (political or otherwise) and we assume no responsibility or liability for your interaction with these tokens.Binance reserves the right to disqualify any participants who, in its reasonable opinion, are acting fraudulently or not in accordance with any applicable terms and conditions.Binance reserves the right to disqualify trades that are deemed to be prohibited trading activities, including but not limited to, churning, pump-and-dump schemes, ramping, wash trading and other market manipulation aimed at creating a false representation of price and/or quantity, illegal bulk account registrations, self-dealing, etc.Binance reserves the right at any time in its sole and absolute discretion to terminate, and/or vary these terms and conditions without prior notice, including but not limited to canceling, extending, terminating, or suspending this Promotion, changing the eligibility terms and criteria, the selection and number of winners, and/or the timing of any act to be done, and all participants shall be bound by any such amendments.Binance reserves the right to disqualify any participants who tamper with Binance program code, or interfere with the operation of Binance program code with other software.
Additional promotion terms and conditions can be accessed here.There may be discrepancies between this original content in English and any translated versions. Please refer to the original English version for the most accurate information, in case any discrepancies arise.
Thank you for your support!
Binance Team
2025-03-03
Note: This announcement was updated on 2025-03-04 to remove SOL/USDC from the list of eligible spot trading pairs.
USDC is an e-money token issued by Circle Internet Financial Europe SAS (https://www.circle.com/). USDC’s whitepaper is available here. You may contact Circle using the following contact information: +33(1)59000130 and [email protected].
Holders of USDC have a legal claim against Circle SAS as the EU issuer of USDC. These holders are entitled to request redemption of their USDC from Circle SAS. Such redemption will be made at any time and at par value.
EURI is an e-money token issued by Banking Circle S.A (https://www.bankingcircle.com/). EURI’s whitepaper is available here. You may contact Banking Circle using the following contact information: +44 (0)7867254482 and [email protected].
EURI purchasers can exchange their EURI at par value for funds denominated in the official currency that the EURI is referencing (EUR) for the monetary value of the EUR held by Banking Circle for the purchaser of the EURI.
USA, Japan, and South Korea Warn Against Hiring North Korean IT WorkersIn a joint statement, the governments of the United States, Japan, and South Korea have highlighted the growing risk posed by North Korean cyberattacks on the global blockchain and cryptocurrency sectors. The warning particularly focuses on the potential threats associated with hiring IT workers from North Korea. The Threat of North Korean Hackers to the Blockchain Industry The three nations emphasized in their January 14 statement that North Korean hacking groups, such as the infamous Lazarus Group, are increasingly targeting crypto exchanges and investors. These groups employ sophisticated tactics, including social engineering, and spread malware like TraderTraitor and AppleJeus. A Call for Caution in IT Recruitment Government authorities urged companies operating in the web3 and blockchain sectors to thoroughly vet new hires to avoid employing IT professionals from North Korea. Research indicates that such workers often pose as remote employees or investors. The report also mentioned initiatives to foster collaboration between the private and public sectors, such as Crypto-ISAC in the United States, as well as similar efforts in Japan and South Korea. North Korean Cyberattacks in 2024 In 2024, North Korean cyber groups were linked to several high-profile attacks: A hack on Japan’s DMM Bitcoin exchange resulted in losses of $308 million.An attack on South Korea’s Upbit platform led to the theft of $50 million. These incidents underscore the severity of the threat that North Korean activities pose to the global financial system. Fraudulent Practices by North Korean Hackers At the Cyberwarcon conference in November 2024, researchers revealed that North Korean hackers often disguise themselves as: Remote IT workers employed by major tech companies,Recruiters or venture capital investors. Two specific hacking groups, Sapphire Sleet and Ruby Sleet, allegedly stole $10 million in just six months using these methods. Collaboration Is Key to Protection The governments of the USA, Japan, and South Korea have called on companies and individuals to remain vigilant and work together to create effective defense mechanisms. Thorough employee screening and adherence to security recommendations could help mitigate the risks of cyberattacks and safeguard the global financial ecosystem. #CyberSecurity , #CryptoNewss , #cryptohacks , #cyberattacks , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

USA, Japan, and South Korea Warn Against Hiring North Korean IT Workers

In a joint statement, the governments of the United States, Japan, and South Korea have highlighted the growing risk posed by North Korean cyberattacks on the global blockchain and cryptocurrency sectors. The warning particularly focuses on the potential threats associated with hiring IT workers from North Korea.
The Threat of North Korean Hackers to the Blockchain Industry
The three nations emphasized in their January 14 statement that North Korean hacking groups, such as the infamous Lazarus Group, are increasingly targeting crypto exchanges and investors. These groups employ sophisticated tactics, including social engineering, and spread malware like TraderTraitor and AppleJeus.
A Call for Caution in IT Recruitment
Government authorities urged companies operating in the web3 and blockchain sectors to thoroughly vet new hires to avoid employing IT professionals from North Korea. Research indicates that such workers often pose as remote employees or investors. The report also mentioned initiatives to foster collaboration between the private and public sectors, such as Crypto-ISAC in the United States, as well as similar efforts in Japan and South Korea.
North Korean Cyberattacks in 2024
In 2024, North Korean cyber groups were linked to several high-profile attacks:
A hack on Japan’s DMM Bitcoin exchange resulted in losses of $308 million.An attack on South Korea’s Upbit platform led to the theft of $50 million.
These incidents underscore the severity of the threat that North Korean activities pose to the global financial system.
Fraudulent Practices by North Korean Hackers
At the Cyberwarcon conference in November 2024, researchers revealed that North Korean hackers often disguise themselves as:
Remote IT workers employed by major tech companies,Recruiters or venture capital investors.
Two specific hacking groups, Sapphire Sleet and Ruby Sleet, allegedly stole $10 million in just six months using these methods.
Collaboration Is Key to Protection
The governments of the USA, Japan, and South Korea have called on companies and individuals to remain vigilant and work together to create effective defense mechanisms. Thorough employee screening and adherence to security recommendations could help mitigate the risks of cyberattacks and safeguard the global financial ecosystem.

#CyberSecurity , #CryptoNewss , #cryptohacks , #cyberattacks , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
šŸ‡ØšŸ‡³Details of China's cyberattack on U.S. Treasury On December 30, the U.S. Treasury reported a cyberattack carried out by Chinese hackers through a vulnerability in third-party software, BeyondTrust šŸ” The attackers gained access to a key used to secure the Treasury’s cloud service, allowing them to remotely access workstations and unclassified documents šŸ‘€ Although the service was shut down and there is no evidence of continued access, the incident highlighted vulnerabilities in government systems reliant on third-party vendors #cyberattacks #US #btc2025 #china #BTCMiningPeak
šŸ‡ØšŸ‡³Details of China's cyberattack on U.S. Treasury

On December 30, the U.S. Treasury reported a cyberattack carried out by Chinese hackers through a vulnerability in third-party software, BeyondTrust

šŸ” The attackers gained access to a key used to secure the Treasury’s cloud service, allowing them to remotely access workstations and unclassified documents

šŸ‘€ Although the service was shut down and there is no evidence of continued access, the incident highlighted vulnerabilities in government systems reliant on third-party vendors
#cyberattacks #US #btc2025 #china #BTCMiningPeak
Hackers Begin Using AI to Spread MalwareResearchers from HP have discovered malware created using generative #artificialintelligence during the analysis of a suspicious email. Generative AI Accelerates Malware Creation The development of malware has become easier and faster thanks to generative AI. Malware developers can now use AI to speed up the process of writing code, leading to an increase in the number of #Attacks and allowing even less experienced individuals to develop harmful software. A September report from HP’s Wolf Security team uncovered a new version of the AsyncRAT trojan, which is used to remotely control a victim’s computer. Researchers found this version while analyzing a suspicious email sent to one of their clients. Malware Written with Artificial Intelligence While the original AsyncRAT was developed by humans, this new version contained an injection technique that researchers believe was created using generative AI. Although AI has previously been used to create phishing lures, the report notes that there was little evidence of AI being used to write malicious code "in the wild" before this discovery. One of the key indicators was that the code contained detailed comments explaining the function of each part. This is unusual for #Cybercriminals , who generally do not want others to understand how their malware works. In-Depth Analysis of the Malware Researchers initially encountered the suspicious email, which was sent to users of HP’s Sure Click threat containment software. The email appeared to be an invoice written in French, likely targeting French-speaking individuals. Initially, the contents of the file were difficult to determine because it was encrypted. However, after breaking the password, the hidden malware was revealed. The #Malware consisted of a Visual Basic script that wrote data to the user’s registry, installed a JavaScript file, and launched Powershell. This led to the installation of AsyncRAT malware on the device. AsyncRAT Development and Its Risks AsyncRAT, originally released on GitHub in 2019, is a remote management tool. Although its developers claim it is a legitimate open-source software, it has been predominantly used by cybercriminals. It allows attackers to remotely control infected devices and can be used to steal sensitive data, such as private keys or phrases for cryptocurrency wallets, leading to potential financial losses. Although AsyncRAT is not new, this variant uses a new injection method, which shows signs of having been created using generative AI. This indicates that the new technology is making it easier for attackers to carry out cyberattacks. AI Increases the Threat of Cyberattacks HP’s report highlights that generative artificial intelligence is accelerating #cyberattacks and lowering the barrier for cybercriminals to infect devices. Security researchers are still grappling with the effects of AI advancements on cybersecurity. The risks associated with AI include its potential misuse to identify vulnerabilities in smart contracts, which could be exploited by both ethical and malicious hackers. In May 2023, Meta also warned that some malware creators are using fake versions of popular AI tools to lure victims. Generative artificial intelligence is fundamentally changing the rules of cybersecurity and presents a new challenge in the fight against malware. Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ Ā 

Hackers Begin Using AI to Spread Malware

Researchers from HP have discovered malware created using generative #artificialintelligence during the analysis of a suspicious email.

Generative AI Accelerates Malware Creation
The development of malware has become easier and faster thanks to generative AI. Malware developers can now use AI to speed up the process of writing code, leading to an increase in the number of #Attacks and allowing even less experienced individuals to develop harmful software.
A September report from HP’s Wolf Security team uncovered a new version of the AsyncRAT trojan, which is used to remotely control a victim’s computer. Researchers found this version while analyzing a suspicious email sent to one of their clients.
Malware Written with Artificial Intelligence
While the original AsyncRAT was developed by humans, this new version contained an injection technique that researchers believe was created using generative AI. Although AI has previously been used to create phishing lures, the report notes that there was little evidence of AI being used to write malicious code "in the wild" before this discovery.
One of the key indicators was that the code contained detailed comments explaining the function of each part. This is unusual for #Cybercriminals , who generally do not want others to understand how their malware works.

In-Depth Analysis of the Malware
Researchers initially encountered the suspicious email, which was sent to users of HP’s Sure Click threat containment software. The email appeared to be an invoice written in French, likely targeting French-speaking individuals. Initially, the contents of the file were difficult to determine because it was encrypted. However, after breaking the password, the hidden malware was revealed.
The #Malware consisted of a Visual Basic script that wrote data to the user’s registry, installed a JavaScript file, and launched Powershell. This led to the installation of AsyncRAT malware on the device.

AsyncRAT Development and Its Risks
AsyncRAT, originally released on GitHub in 2019, is a remote management tool. Although its developers claim it is a legitimate open-source software, it has been predominantly used by cybercriminals. It allows attackers to remotely control infected devices and can be used to steal sensitive data, such as private keys or phrases for cryptocurrency wallets, leading to potential financial losses.
Although AsyncRAT is not new, this variant uses a new injection method, which shows signs of having been created using generative AI. This indicates that the new technology is making it easier for attackers to carry out cyberattacks.
AI Increases the Threat of Cyberattacks
HP’s report highlights that generative artificial intelligence is accelerating #cyberattacks and lowering the barrier for cybercriminals to infect devices. Security researchers are still grappling with the effects of AI advancements on cybersecurity.
The risks associated with AI include its potential misuse to identify vulnerabilities in smart contracts, which could be exploited by both ethical and malicious hackers. In May 2023, Meta also warned that some malware creators are using fake versions of popular AI tools to lure victims.
Generative artificial intelligence is fundamentally changing the rules of cybersecurity and presents a new challenge in the fight against malware.

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Ā 
Coinbase Layer 2 Chain Base Attacked, Approximately $1 Million LostThe Layer 2 "Base" network on the Coinbase platform has been the target of a large-scale price manipulation attack. This attack focused on an unverified loan contract, leading to a loss of approximately $1 million. CertiK Warned of the Attack Early this morning, CertiK Alert monitoring system informed users on the X platform about the ongoing attack. According to the report, the attack targeted the Base chain and affected an unverified loan contract starting with the address 0x5c52. According to CertiK’s post on X: "The exploiter manipulated the price of WETH and Sui and gained approximately $1 million in tokens through excessive borrowing." CertiK also noted that the oracle used to verify this loan contract, which was deployed only six days ago, has a liquidity of only around $400,000. Repeated Contract Manipulation Incident This attack marks the second similar incident in the last two days. On October 24, suspicious transactions were detected on the Polygon network, affecting an unverified NAS contract with the address 0x5d6084Bf..F36Ac7. In that case, the attacker obtained a large amount of NAS tokens, which were later exchanged for USDT. Base Has Yet to Comment The Base platform has not yet commented on the incident. However, on October 30, Base announced the launch of Fault Proofs, which aims to provide a more secure environment by removing trusted third parties. The new update will also allow users to monitor and challenge invalid withdrawals. #hackers , #cyberattacks , #CoinbaseExchange. , #cybersecurity , #CryptoHack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Coinbase Layer 2 Chain Base Attacked, Approximately $1 Million Lost

The Layer 2 "Base" network on the Coinbase platform has been the target of a large-scale price manipulation attack. This attack focused on an unverified loan contract, leading to a loss of approximately $1 million.
CertiK Warned of the Attack
Early this morning, CertiK Alert monitoring system informed users on the X platform about the ongoing attack. According to the report, the attack targeted the Base chain and affected an unverified loan contract starting with the address 0x5c52.

According to CertiK’s post on X: "The exploiter manipulated the price of WETH and Sui and gained approximately $1 million in tokens through excessive borrowing." CertiK also noted that the oracle used to verify this loan contract, which was deployed only six days ago, has a liquidity of only around $400,000.

Repeated Contract Manipulation Incident
This attack marks the second similar incident in the last two days. On October 24, suspicious transactions were detected on the Polygon network, affecting an unverified NAS contract with the address 0x5d6084Bf..F36Ac7. In that case, the attacker obtained a large amount of NAS tokens, which were later exchanged for USDT.
Base Has Yet to Comment
The Base platform has not yet commented on the incident. However, on October 30, Base announced the launch of Fault Proofs, which aims to provide a more secure environment by removing trusted third parties. The new update will also allow users to monitor and challenge invalid withdrawals.

#hackers , #cyberattacks , #CoinbaseExchange. , #cybersecurity , #CryptoHack
Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
Massive Cyberattack Hits X! šŸšØšŸ’» Elon Musk Points to Ukraine Link šŸ‡ŗšŸ‡¦? What Happened? 🤯 Social media giant X (formerly Twitter) was rocked by a massive cyberattack! āš”šŸ–„ļø Millions of users faced outages, data breaches, and account hacks. šŸ”“šŸ“± Chaos erupted as spam, scams, and misinformation flooded the platform. šŸŒŖļøšŸ“² Elon Musk Speaks Out šŸ—£ļøšŸš€ Musk claimed the attack might be linked to Ukraine šŸ‡ŗšŸ‡¦šŸ•µļøā€ā™‚ļø He didn’t share hard proof, but said there were ā€œstrong indicationsā€ pointing to the region. šŸ§šŸ“” The comments quickly sparked controversy and debate worldwide. šŸŒšŸ”„ X Users React 😱🫣 Millions scrambled to secure their accounts šŸ”‘ Some lost access to personal messages and sensitive info! 😨 Hashtags like #XHack and #CyberAttack trended fast. šŸ“ˆšŸ’£ Security Experts Weigh In šŸ•¶ļøšŸ” Cybersecurity teams are investigating who’s behind it. šŸ•µļøā€ā™€ļø Some say blaming Ukraine without evidence is risky and political. āš ļøšŸŽ­ Others warn: More attacks could be coming! ā³šŸ’£ Ukraine’s Response šŸ‡ŗšŸ‡¦āœ‹ Ukrainian officials denied involvement, calling the claims baseless. šŸ™…ā€ā™‚ļø They said they are also victims of cyber warfare and focus on defense, not offense. šŸ›”ļø What’s Next? šŸ”® X promises upgrades to protect user data. šŸ› ļøšŸ”’ Global tensions over cybersecurity are heating up! šŸŒ”ļøšŸŒ Musk says they’re ā€œworking around the clockā€ to fix the damage. ā°āš™ļø The Bottom Line šŸ“‰ Massive attack on one of the world’s biggest platforms. šŸ–„ļøšŸš« Fingers are pointing—but the truth isn’t clear yet. ā“ Stay safe. Update passwords. Watch this space! šŸ›”ļøāœ…šŸ‘€ #cyberattacks #BinanceAlphaAlert #BTCNextATH $BTC $BNB $XRP
Massive Cyberattack Hits X! šŸšØšŸ’»

Elon Musk Points to Ukraine Link šŸ‡ŗšŸ‡¦?

What Happened? 🤯

Social media giant X (formerly Twitter) was rocked by a massive cyberattack! āš”šŸ–„ļø

Millions of users faced outages, data breaches, and account hacks. šŸ”“šŸ“±

Chaos erupted as spam, scams, and misinformation flooded the platform. šŸŒŖļøšŸ“²

Elon Musk Speaks Out šŸ—£ļøšŸš€

Musk claimed the attack might be linked to Ukraine šŸ‡ŗšŸ‡¦šŸ•µļøā€ā™‚ļø

He didn’t share hard proof, but said there were ā€œstrong indicationsā€ pointing to the region. šŸ§šŸ“”

The comments quickly sparked controversy and debate worldwide. šŸŒšŸ”„

X Users React 😱🫣

Millions scrambled to secure their accounts šŸ”‘

Some lost access to personal messages and sensitive info! 😨

Hashtags like #XHack and #CyberAttack trended fast. šŸ“ˆšŸ’£

Security Experts Weigh In šŸ•¶ļøšŸ”

Cybersecurity teams are investigating who’s behind it. šŸ•µļøā€ā™€ļø

Some say blaming Ukraine without evidence is risky and political. āš ļøšŸŽ­

Others warn: More attacks could be coming! ā³šŸ’£

Ukraine’s Response šŸ‡ŗšŸ‡¦āœ‹

Ukrainian officials denied involvement, calling the claims baseless. šŸ™…ā€ā™‚ļø

They said they are also victims of cyber warfare and focus on defense, not offense. šŸ›”ļø

What’s Next? šŸ”®

X promises upgrades to protect user data. šŸ› ļøšŸ”’

Global tensions over cybersecurity are heating up! šŸŒ”ļøšŸŒ

Musk says they’re ā€œworking around the clockā€ to fix the damage. ā°āš™ļø

The Bottom Line šŸ“‰

Massive attack on one of the world’s biggest platforms. šŸ–„ļøšŸš«

Fingers are pointing—but the truth isn’t clear yet. ā“

Stay safe. Update passwords. Watch this space! šŸ›”ļøāœ…šŸ‘€
#cyberattacks #BinanceAlphaAlert #BTCNextATH
$BTC $BNB $XRP
Tracking and recovery of stolen crypto assets a top priority: Crypto exchange Wazir X#wazirX #CryptoNewss #CryptoDawar #cyberattacks #CyberSafety BENGALURU: Crypto exchange WazirX, in a virtual conference on Monday stressed that tracking and recovering stolen crypto assets is a top priority for the exchange. WazirX, which is pursuing a restructuring of crypto balances which will take at least six months, filed a moratorium application in Singapore Court and as part of the restructuring, aims to engage with a white knight to provide capital and pursue partnerships and collaborations. The cyberattack on July 18 resulted in a large volume of ERC-20 tokens being stolen. About Rs 2,000 crore worth of user funds were lost. Last month, Google subsidiary Mandiant Solutions provided a clean chit to the crypto exchange, but digital assets security firm Liminal Custody questioned the scope and methodology of the audit. When asked about it, Nischal Shetty, WaxirX Founder and CEO toldĀ TNIE. "It's just three laptops that we used for accessing the liminal website. Our infrastructure was not impacted or involved in this process. We gave the entire laptop image and data to the forensic team, we have even provided this to the right authorities." He added that there is nothing beyond the laptop image that exists with us since nothing else on our end was used for accessing the Liminal website except these three laptops. George Gwee, director of restructuring at Kroll and Jason Kardachi, MD of Kroll, also addressed the conference. Kroll is the financial advisor and according to them, customers will receive returns of 55 per cent to 57 per cent of the funds. This means, 43 per cent of the money would not be able to recover. However, Shetty added that they are in the negotiation and the ideation stage. The exchange also has an ownership dispute with Binance. While Zanmai India operates WazirX, Zettai is Singapore-incorporated, and it has applied for a moratorium. The exchange also explained that restructuring is not insolvency, liquidation or bankruptcy. It is a plan to distribute assets to users in a pro-rata, equitable way, and in crypto (not fiat); and it allows users who need liquidity urgently to withdraw crypto more quickly and not exit the restructuring. Since Zanmai was not affected by the cyberattack, the platform reopened INR withdrawals up to a limit of 66 per cent. The remaining INR are frozen due to ongoing disputes, and investigations by various Indian Law Enforcement Agencies and will be made available for withdrawal as and when they are unfrozen, the crypto exchange informed.

Tracking and recovery of stolen crypto assets a top priority: Crypto exchange Wazir X

#wazirX #CryptoNewss #CryptoDawar #cyberattacks #CyberSafety

BENGALURU: Crypto exchange WazirX, in a virtual conference on Monday stressed that tracking and recovering stolen crypto assets is a top priority for the exchange.
WazirX, which is pursuing a restructuring of crypto balances which will take at least six months, filed a moratorium application in Singapore Court and as part of the restructuring, aims to engage with a white knight to provide capital and pursue partnerships and collaborations.
The cyberattack on July 18 resulted in a large volume of ERC-20 tokens being stolen. About Rs 2,000 crore worth of user funds were lost.
Last month, Google subsidiary Mandiant Solutions provided a clean chit to the crypto exchange, but digital assets security firm Liminal Custody questioned the scope and methodology of the audit.
When asked about it, Nischal Shetty, WaxirX Founder and CEO toldĀ TNIE. "It's just three laptops that we used for accessing the liminal website. Our infrastructure was not impacted or involved in this process. We gave the entire laptop image and data to the forensic team, we have even provided this to the right authorities."
He added that there is nothing beyond the laptop image that exists with us since nothing else on our end was used for accessing the Liminal website except these three laptops.
George Gwee, director of restructuring at Kroll and Jason Kardachi, MD of Kroll, also addressed the conference. Kroll is the financial advisor and according to them, customers will receive returns of 55 per cent to 57 per cent of the funds. This means, 43 per cent of the money would not be able to recover.
However, Shetty added that they are in the negotiation and the ideation stage. The exchange also has an ownership dispute with Binance. While Zanmai India operates WazirX, Zettai is Singapore-incorporated, and it has applied for a moratorium.
The exchange also explained that restructuring is not insolvency, liquidation or bankruptcy. It is a plan to distribute assets to users in a pro-rata, equitable way, and in crypto (not fiat); and it allows users who need liquidity urgently to withdraw crypto more quickly and not exit the restructuring.
Since Zanmai was not affected by the cyberattack, the platform reopened INR withdrawals up to a limit of 66 per cent. The remaining INR are frozen due to ongoing disputes, and investigations by various Indian Law Enforcement Agencies and will be made available for withdrawal as and when they are unfrozen, the crypto exchange informed.
zkLend Loses $4.9 Million in Starknet Exploit, Offers Hacker a BountyzkLend Hit by a $4.9 Million Hack Decentralized lending protocol zkLend fell victim to a cyberattack on February 12, resulting in a loss of $4.9 million. The incident was detected by blockchain security firm Cyvers, which reported that the stolen funds were bridged to Ethereum and laundered through the privacy protocol Railgun. However, due to Railgun's internal policies, some of the stolen assets were returned to the original address. zkLend Offers Hacker a Reward Following the attack, zkLend extended an offer to the hacker, allowing them to keep 10% of the stolen funds as a white hat bounty, provided they return the remaining 90%. The company stated: "We understand that you are responsible for today's attack on zkLend. You may keep 10% of the funds as a white hat reward and return the remaining 3,300 ETH." Additionally, zkLend warned that if the hacker fails to respond by 00:00 UTC on February 14, 2025, they will escalate the matter to law enforcement and security agencies. 2025 Could Be Another Record Year for Crypto Hacks Despite a 44% year-over-year decline in crypto-related hacks in January 2025, cybercriminals still managed to steal over $73 million in just the first month of the year. Experts caution that 2025 could see another wave of major crypto exploits. In 2024 alone, hackers stole $2.3 billion across 165 incidents, marking a 40% increase from 2023, when the total losses reached $1.69 billion. Unexpected Endings: Some Hackers Return Stolen Funds Interestingly, some cybercriminals have had a change of heart after stealing millions in crypto, returning funds once their actions drew intense scrutiny from blockchain investigators. In May 2024, an unidentified hacker returned $71 million worth of stolen ETH tokens following a high-profile wallet-draining scam. The hacker had initially tricked a victim into sending wrapped Bitcoin (WBTC) worth $71 million to a lookalike wallet address, a method commonly used in wallet poisoning scams. However, as major blockchain investigation firms got involved, the attacker surprisingly decided to return the stolen assets to the victim. New Technologies Aim to Prevent Crypto Exploits To combat such incidents, blockchain security firms like Cyvers are actively developing new solutions aimed at preventing future hacks. One promising development is off-chain transaction verification, a mechanism that could potentially prevent 99% of all crypto-related hacks and scams by simulating and verifying blockchain transactions before they are finalized on-chain. According to Michael Pearl, Vice President of GTM Strategy at Cyvers, this emerging technology could significantly enhance security across the crypto ecosystem and minimize the risks associated with cyberattacks. #cyberattacks , #CyberSecurity , #CryptoScamAlert , #HackerAlert , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

zkLend Loses $4.9 Million in Starknet Exploit, Offers Hacker a Bounty

zkLend Hit by a $4.9 Million Hack
Decentralized lending protocol zkLend fell victim to a cyberattack on February 12, resulting in a loss of $4.9 million. The incident was detected by blockchain security firm Cyvers, which reported that the stolen funds were bridged to Ethereum and laundered through the privacy protocol Railgun. However, due to Railgun's internal policies, some of the stolen assets were returned to the original address.

zkLend Offers Hacker a Reward
Following the attack, zkLend extended an offer to the hacker, allowing them to keep 10% of the stolen funds as a white hat bounty, provided they return the remaining 90%. The company stated:
"We understand that you are responsible for today's attack on zkLend. You may keep 10% of the funds as a white hat reward and return the remaining 3,300 ETH."
Additionally, zkLend warned that if the hacker fails to respond by 00:00 UTC on February 14, 2025, they will escalate the matter to law enforcement and security agencies.

2025 Could Be Another Record Year for Crypto Hacks
Despite a 44% year-over-year decline in crypto-related hacks in January 2025, cybercriminals still managed to steal over $73 million in just the first month of the year.
Experts caution that 2025 could see another wave of major crypto exploits. In 2024 alone, hackers stole $2.3 billion across 165 incidents, marking a 40% increase from 2023, when the total losses reached $1.69 billion.
Unexpected Endings: Some Hackers Return Stolen Funds
Interestingly, some cybercriminals have had a change of heart after stealing millions in crypto, returning funds once their actions drew intense scrutiny from blockchain investigators.
In May 2024, an unidentified hacker returned $71 million worth of stolen ETH tokens following a high-profile wallet-draining scam. The hacker had initially tricked a victim into sending wrapped Bitcoin (WBTC) worth $71 million to a lookalike wallet address, a method commonly used in wallet poisoning scams.
However, as major blockchain investigation firms got involved, the attacker surprisingly decided to return the stolen assets to the victim.
New Technologies Aim to Prevent Crypto Exploits
To combat such incidents, blockchain security firms like Cyvers are actively developing new solutions aimed at preventing future hacks.
One promising development is off-chain transaction verification, a mechanism that could potentially prevent 99% of all crypto-related hacks and scams by simulating and verifying blockchain transactions before they are finalized on-chain.
According to Michael Pearl, Vice President of GTM Strategy at Cyvers, this emerging technology could significantly enhance security across the crypto ecosystem and minimize the risks associated with cyberattacks.

#cyberattacks , #CyberSecurity , #CryptoScamAlert , #HackerAlert , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
--
Bullish
See original
🚨 Cryptocurrency losses 2024: the numbers are shocking! Attention, crypto community! In 2024, the crypto world suffered losses of $3.01 billion šŸ’ø — this is as much as 15% more than in 2023 (then it was $2.61 billion). Here is how the losses were distributed: šŸ”» $2.15 billion stolen by hackers — security technologies are under threat. šŸ”» $834.5 million went to fraud — scams have become even more cunning. šŸ”¹ The good news? We managed to return $488.5 million — but this is only 16% of what was stolen. šŸ’” What does this mean for us? Cyberattacks are becoming more sophisticated, and fraudsters are becoming more inventive. It's time to think about the security of your funds and choose platforms with strong protection šŸ”. Be vigilant to keep your crypto assets with you! #CryptoSecurity #CyberAttacks #Hackers #Fraud #Blockchain $BTC {spot}(BTCUSDT)
🚨 Cryptocurrency losses 2024: the numbers are shocking!

Attention, crypto community! In 2024, the crypto world suffered losses of $3.01 billion šŸ’ø — this is as much as 15% more than in 2023 (then it was $2.61 billion).

Here is how the losses were distributed:
šŸ”» $2.15 billion stolen by hackers — security technologies are under threat.
šŸ”» $834.5 million went to fraud — scams have become even more cunning.
šŸ”¹ The good news? We managed to return $488.5 million — but this is only 16% of what was stolen.

šŸ’” What does this mean for us?
Cyberattacks are becoming more sophisticated, and fraudsters are becoming more inventive. It's time to think about the security of your funds and choose platforms with strong protection šŸ”.

Be vigilant to keep your crypto assets with you!

#CryptoSecurity
#CyberAttacks
#Hackers
#Fraud
#Blockchain
$BTC
EyeOnChain
--
Bearish
🚨 WazirX Experiences Massive Asset Transfer and Dumping 🚨

More than $230M of assets have been abnormally transferred from the #WazirX (@WazirXIndia) wallet to wallet "0x04b2". This wallet is actively dumping these assets.

Dumped so far: 640.27B $PEPE ($7.6M)

Offloading Address:šŸ‘‡
0x04b21735E93Fa3f8df70e2Da89e6922616891a88

Stolen Assets Include:
5.43T $SHIB ($102M)
15,298 $ETH ($52.5M)
20.5M $MATIC ($11.24M)
640.27B $PEPE ($7.6M)
5.79M $USDT
135M $GALA ($3.5M)
...

ā€¼ļø Please Note: The hacker is actively selling these assets!

Current Status:
$SHIB Sales: The exploiter has sold 35B $SHIB ($618K) and currently holds 5.4T $SHIB ($95.45M).

Stay vigilant and monitor transactions involving these assets!
Crypto Market Suffers Massive Losses in February – Bybit Hack Leads to $1.5 Billion in Stolen FundsMassive Crypto Attacks Cause Record-Breaking Losses Losses caused by fraud, hacks, and exploits reached nearly $1.53 billion in February, with the Bybit hack accounting for $1.4 billion of that total. According to a report by blockchain security firm CertiK, this incident was the largest crypto hack in history. Excluding the Bybit attack, remaining crypto losses amounted to approximately $126 million, still representing a 28.5% increase compared to January. Bybit Hack Shatters Previous Records The February 21st attack on Bybit became the largest crypto hack ever, surpassing the $650 million Ronin Bridge attack in 2022. šŸ”¹ The attack was orchestrated by the North Korean Lazarus Group, as confirmed by the FBI. šŸ”¹ Hackers gained control of Bybit’s wallet and began transferring stolen funds to thousands of addresses across multiple blockchains. šŸ”¹ This was an unprecedented attack, prompting increased security measures and regulatory scrutiny in the crypto space. Other Major Crypto Hacks in February Although the Bybit attack was the most significant, it wasn’t the only major exploit in February. Other notable attacks included: šŸ”ø Infini hack (February 24) – $49 million stolen A key wallet that had been previously involved in Infini’s smart contract development retained admin privileges.Hackers used these permissions to drain all Vault tokens.Infini’s team offered the hacker 20% of the stolen funds in exchange for returning the rest and avoiding legal consequences, but no response has been received. šŸ”ø ZkLend protocol exploit (February 12) – $10 million stolen This ranked as the third-largest exploit of February. Main Causes of Crypto Losses According to CertiK, the primary reasons for crypto losses in February were: 1ļøāƒ£ Wallet compromises – the leading cause of total damages. 2ļøāƒ£ Code vulnerabilities – leading to $20 million in losses. 3ļøāƒ£ Phishing attacks – resulting in $1.8 million in stolen funds. Decline in Crypto Attacks Towards Late 2024 Despite the massive losses in February, crypto-related exploits and hacks had been declining in the final months of 2024: šŸ“‰ December 2024 recorded the lowest stolen funds – $28.6 million. šŸ“‰ November – $63.8 million. šŸ“‰ October – $115.8 million. While February marked a record-breaking month for crypto theft, the overall trend suggests potential stabilization in security measures and improved protection against future cyberattacks. šŸš€ #CyberSecurity , #cyberattacks , #CryptoScamAlert , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Crypto Market Suffers Massive Losses in February – Bybit Hack Leads to $1.5 Billion in Stolen Funds

Massive Crypto Attacks Cause Record-Breaking Losses
Losses caused by fraud, hacks, and exploits reached nearly $1.53 billion in February, with the Bybit hack accounting for $1.4 billion of that total. According to a report by blockchain security firm CertiK, this incident was the largest crypto hack in history.
Excluding the Bybit attack, remaining crypto losses amounted to approximately $126 million, still representing a 28.5% increase compared to January.

Bybit Hack Shatters Previous Records
The February 21st attack on Bybit became the largest crypto hack ever, surpassing the $650 million Ronin Bridge attack in 2022.
šŸ”¹ The attack was orchestrated by the North Korean Lazarus Group, as confirmed by the FBI.
šŸ”¹ Hackers gained control of Bybit’s wallet and began transferring stolen funds to thousands of addresses across multiple blockchains.
šŸ”¹ This was an unprecedented attack, prompting increased security measures and regulatory scrutiny in the crypto space.
Other Major Crypto Hacks in February
Although the Bybit attack was the most significant, it wasn’t the only major exploit in February. Other notable attacks included:
šŸ”ø Infini hack (February 24) – $49 million stolen
A key wallet that had been previously involved in Infini’s smart contract development retained admin privileges.Hackers used these permissions to drain all Vault tokens.Infini’s team offered the hacker 20% of the stolen funds in exchange for returning the rest and avoiding legal consequences, but no response has been received.
šŸ”ø ZkLend protocol exploit (February 12) – $10 million stolen
This ranked as the third-largest exploit of February.

Main Causes of Crypto Losses
According to CertiK, the primary reasons for crypto losses in February were:
1ļøāƒ£ Wallet compromises – the leading cause of total damages.
2ļøāƒ£ Code vulnerabilities – leading to $20 million in losses.
3ļøāƒ£ Phishing attacks – resulting in $1.8 million in stolen funds.
Decline in Crypto Attacks Towards Late 2024
Despite the massive losses in February, crypto-related exploits and hacks had been declining in the final months of 2024:
šŸ“‰ December 2024 recorded the lowest stolen funds – $28.6 million.
šŸ“‰ November – $63.8 million.
šŸ“‰ October – $115.8 million.
While February marked a record-breaking month for crypto theft, the overall trend suggests potential stabilization in security measures and improved protection against future cyberattacks. šŸš€

#CyberSecurity , #cyberattacks , #CryptoScamAlert , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
Trump campaign says it was hacked, blames Iran āš ļøWASHINGTON, Aug 10 - Donald #Trump's U.S. presidential campaign said on Saturday some of its internal communications were hacked and blamed the Iranian government, citing past hostilities between Trump and Iran without providing direct evidence. The Republican's campaign statement came shortly after news website Politico reported it had begun receiving emails in July from an anonymous source offering authentic documents from inside Trump's operation, including a report about running mate JD Vance's "potential vulnerabilities." "These documents were obtained illegally from foreign sources hostile to the United States, intended to interfere with the 2024 election and sow chaos throughout our Democratic process," Trump campaign spokesperson Steven Cheung said in a statement. Late on Saturday, Trump posted on his Truth Social app that Microsoft (MSFT.O), opens new tab had just informed the campaign that Iran had hacked one of its websites. He cast blame on #Iran , adding they were "only able to get publicly available information." He did not elaborate further on the hack. Reuters has not independently verified the identity of the alleged hackers or their motivation. The Trump campaign referred to a Friday report from Microsoft researchers that said Iranian government-tied hackers tried breaking into the account of a "high-ranking official" on a U.S. presidential campaign in June. The hackers had taken over an account belonging to a former political advisor and then used it to target the official, the report said. That report did not provide further details on the targets' identities. A Microsoft spokesperson declined to name the targeted officials or provide additional details after the report was published. Iran's permanent mission to the United Nations in New York said in an email that "the Iranian government neither possesses nor harbors any intent or motive to interfere in the United States presidential election." "We do not accord any credence to such reports," it added in response to the Trump campaign's allegations. On Friday, in response to Microsoft's findings, Iran's U.N. mission told its cyber capabilities were "defensive and proportionate to the threats it faces," and that it had no plans to launch cyberattacks. The former president had tense relations with Iran while in office. Under Trump, the United States killed Iranian military commander Qassem Soleimani in 2020 and withdrew from a multilateral Iran nuclear deal. #MarketDownturn #Write2Earn! #cyberattacks

Trump campaign says it was hacked, blames Iran āš ļø

WASHINGTON, Aug 10 - Donald #Trump's U.S. presidential campaign said on Saturday some of its internal communications were hacked and blamed the Iranian government, citing past hostilities between Trump and Iran without providing direct evidence.
The Republican's campaign statement came shortly after news website Politico reported it had begun receiving emails in July from an anonymous source offering authentic documents from inside Trump's operation, including a report about running mate JD Vance's "potential vulnerabilities."
"These documents were obtained illegally from foreign sources hostile to the United States, intended to interfere with the 2024 election and sow chaos throughout our Democratic process," Trump campaign spokesperson Steven Cheung said in a statement.
Late on Saturday, Trump posted on his Truth Social app that Microsoft (MSFT.O), opens new tab had just informed the campaign that Iran had hacked one of its websites. He cast blame on #Iran , adding they were "only able to get publicly available information." He did not elaborate further on the hack.
Reuters has not independently verified the identity of the alleged hackers or their motivation.
The Trump campaign referred to a Friday report from Microsoft researchers that said Iranian government-tied hackers tried breaking into the account of a "high-ranking official" on a U.S. presidential campaign in June. The hackers had taken over an account belonging to a former political advisor and then used it to target the official, the report said. That report did not provide further details on the targets' identities.
A Microsoft spokesperson declined to name the targeted officials or provide additional details after the report was published.
Iran's permanent mission to the United Nations in New York said in an email that "the Iranian government neither possesses nor harbors any intent or motive to interfere in the United States presidential election."
"We do not accord any credence to such reports," it added in response to the Trump campaign's allegations.
On Friday, in response to Microsoft's findings, Iran's U.N. mission told its cyber capabilities were "defensive and proportionate to the threats it faces," and that it had no plans to launch cyberattacks.
The former president had tense relations with Iran while in office. Under Trump, the United States killed Iranian military commander Qassem Soleimani in 2020 and withdrew from a multilateral Iran nuclear deal.

#MarketDownturn #Write2Earn! #cyberattacks
🚨 JUST BREAKING NEWS 🚨 šŸ”„ Elon Musk claims that Ukrainian IP addresses are linked to the cyber attack that took X (Twitter) offline today! šŸ” More details are yet to emerge on this shocking development. Stay tuned! #ElonMuskTalks #cyberattacks #X
🚨 JUST BREAKING NEWS 🚨

šŸ”„ Elon Musk claims that Ukrainian IP addresses are linked to the cyber attack that took X (Twitter) offline today!

šŸ” More details are yet to emerge on this shocking development. Stay tuned!

#ElonMuskTalks #cyberattacks #X
North Korean Hackers Stole $3 Billion in Crypto Since 2017: ReportStolen cryptocurrency funds are reportedly funding more than half of North Korea's nuclear and missile programs. Study Reveals Massive Crypto Crime A recent study by Microsoft revealed that North Korean hackers have stolen over $3 billion in cryptocurrency since 2017. In 2023 alone, the amount stolen in crypto ranges between $600 million and $1 billion. The 2024 Microsoft Digital Defense Report highlights the complexity of global cyber threats, driven by the rising number of crypto-targeted attacks. Cryptocurrencies Financing North Korea’s Weapons Programs According to the report, the stolen crypto funds are allegedly used to finance more than half of North Korea's nuclear and missile programs. Anne Neuberger, the White House National Security Advisor, noted that North Korea is increasingly relying on these tactics. North Korea uses cryptocurrencies to evade international sanctions and support its ambitions to project geopolitical power through nuclear weapons and ballistic missiles. Major North Korean Hacking Groups Since 2023, Microsoft has identified three key North Korean hacking groups: Jade Sleet, Sapphire Sleet, and Citrine Sleet. These groups have been particularly active in targeting organizations dealing with cryptocurrencies. Additionally, a new North Korean threat actor, Moonstone Sleet, developed its own ransomware called FakePenny. This ransomware was deployed in defense and aerospace organizations after extracting sensitive data from compromised networks. Microsoft analysts noted that the emergence of these threat groups signals an increasing reliance on cybercrime to bolster North Korea's financial resources. Other Threats: Iranian and Russian Hacking Groups In addition to North Korean hackers, the Microsoft report identified Iranian threat actors who are increasingly using cyber operations for financial gain. The report points out that this marks a shift from previous behavior, where ransomware attacks that appeared financially motivated were actually destructive. Iran has heavily focused on Israel, especially after the outbreak of the war between Israel and Hamas. Iranian actors are also targeting the United States and Gulf countries, including the United Arab Emirates and Bahrain. Meanwhile, Russian hacking groups have been integrating more commodity malware into their operations and supporting cyber espionage efforts for criminal organizations. #cyberattacks , #Cryptoscam , #digitalsecurity ,#northkorea , #CryptoNewsšŸš€šŸ”„ Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

North Korean Hackers Stole $3 Billion in Crypto Since 2017: Report

Stolen cryptocurrency funds are reportedly funding more than half of North Korea's nuclear and missile programs.
Study Reveals Massive Crypto Crime
A recent study by Microsoft revealed that North Korean hackers have stolen over $3 billion in cryptocurrency since 2017. In 2023 alone, the amount stolen in crypto ranges between $600 million and $1 billion.
The 2024 Microsoft Digital Defense Report highlights the complexity of global cyber threats, driven by the rising number of crypto-targeted attacks.
Cryptocurrencies Financing North Korea’s Weapons Programs
According to the report, the stolen crypto funds are allegedly used to finance more than half of North Korea's nuclear and missile programs. Anne Neuberger, the White House National Security Advisor, noted that North Korea is increasingly relying on these tactics.
North Korea uses cryptocurrencies to evade international sanctions and support its ambitions to project geopolitical power through nuclear weapons and ballistic missiles.
Major North Korean Hacking Groups
Since 2023, Microsoft has identified three key North Korean hacking groups: Jade Sleet, Sapphire Sleet, and Citrine Sleet. These groups have been particularly active in targeting organizations dealing with cryptocurrencies.
Additionally, a new North Korean threat actor, Moonstone Sleet, developed its own ransomware called FakePenny. This ransomware was deployed in defense and aerospace organizations after extracting sensitive data from compromised networks.
Microsoft analysts noted that the emergence of these threat groups signals an increasing reliance on cybercrime to bolster North Korea's financial resources.
Other Threats: Iranian and Russian Hacking Groups
In addition to North Korean hackers, the Microsoft report identified Iranian threat actors who are increasingly using cyber operations for financial gain.
The report points out that this marks a shift from previous behavior, where ransomware attacks that appeared financially motivated were actually destructive.
Iran has heavily focused on Israel, especially after the outbreak of the war between Israel and Hamas. Iranian actors are also targeting the United States and Gulf countries, including the United Arab Emirates and Bahrain.
Meanwhile, Russian hacking groups have been integrating more commodity malware into their operations and supporting cyber espionage efforts for criminal organizations.
#cyberattacks , #Cryptoscam , #digitalsecurity ,#northkorea , #CryptoNewsšŸš€šŸ”„

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
Login to explore more contents
Explore the latest crypto news
āš”ļø Be a part of the latests discussions in crypto
šŸ’¬ Interact with your favorite creators
šŸ‘ Enjoy content that interests you
Email / Phone number