Binance Square

hacking

270,384 views
119 Discussing
-db022
--
💥 The Incredible Story of Wei Zhang: The Teen Who Lost 99,000 BTC — Now Worth $BTC 11 Billion 💥 In 2010, a Chinese teenager named Wei Zhang discovered an obscure digital currency called Bitcoin. At the time, BTC was trading for less than a penny. With just $10, he bought nearly 99,000 $BTC —a move that would change his life forever. Wei wasn’t just lucky. He was smart, curious, and way ahead of his time. By 2014, at just 19 years old, he launched CryptoLeap, the world’s first crypto margin trading platform. Traders loved it. Volume exploded. Wei became one of the most powerful figures in crypto, holding 99,000 BTC—worth billions today. But in early 2018, tragedy struck. Wei received an email from what looked like a legit VC firm. It had all the details of a big partnership opportunity. Excited, he clicked the link. What he didn’t know? It was a phishing scam—a deadly one. Within minutes, hackers drained every last BTC from CryptoLeap’s wallets. 99,000 BTC. Gone. At today’s value? That’s over $11.4 billion. The crypto world was stunned. Lawsuits flew in. Regulators cracked down. Wei was crushed. He shut down CryptoLeap and vanished from the spotlight. But he didn’t give up. Wei returned to tech—this time, focusing on cybersecurity. He now helps others protect their digital assets and has become a respected mentor to the next generation of builders in Web3. His story is more than a loss. It’s a lesson in vigilance. A warning for everyone in crypto. And a reminder that in this wild world, your biggest asset is your security. 📌 Like and Follow for more insane real-life crypto stories. #Bitcoin #CryptoNews #BTC #hacking #CyberSecurity #Altcoins #CryptoStory #WeiZhang #Web3
💥 The Incredible Story of Wei Zhang: The Teen Who Lost 99,000 BTC — Now Worth $BTC 11 Billion 💥

In 2010, a Chinese teenager named Wei Zhang discovered an obscure digital currency called Bitcoin. At the time, BTC was trading for less than a penny. With just $10, he bought nearly 99,000 $BTC —a move that would change his life forever.

Wei wasn’t just lucky. He was smart, curious, and way ahead of his time. By 2014, at just 19 years old, he launched CryptoLeap, the world’s first crypto margin trading platform. Traders loved it. Volume exploded. Wei became one of the most powerful figures in crypto, holding 99,000 BTC—worth billions today.

But in early 2018, tragedy struck.

Wei received an email from what looked like a legit VC firm. It had all the details of a big partnership opportunity. Excited, he clicked the link. What he didn’t know? It was a phishing scam—a deadly one.

Within minutes, hackers drained every last BTC from CryptoLeap’s wallets.
99,000 BTC. Gone.
At today’s value? That’s over $11.4 billion.

The crypto world was stunned. Lawsuits flew in. Regulators cracked down. Wei was crushed. He shut down CryptoLeap and vanished from the spotlight.

But he didn’t give up.

Wei returned to tech—this time, focusing on cybersecurity. He now helps others protect their digital assets and has become a respected mentor to the next generation of builders in Web3.

His story is more than a loss.
It’s a lesson in vigilance.
A warning for everyone in crypto.
And a reminder that in this wild world, your biggest asset is your security.

📌 Like and Follow for more insane real-life crypto stories.
#Bitcoin #CryptoNews #BTC #hacking #CyberSecurity #Altcoins #CryptoStory #WeiZhang #Web3
Seven crypto ATMs were seized and two people were arrested in southwest London on suspicion of money laundering and operating an illegal cryptocurrency exchange #UK #FCA #cryptocurrency #crypto #scam #scammers #security #cybersecurity #hackers #hacking
Seven crypto ATMs were seized and two people were arrested in southwest London on suspicion of money laundering and operating an illegal cryptocurrency exchange

#UK #FCA #cryptocurrency #crypto #scam #scammers #security #cybersecurity #hackers #hacking
Microsoft Hack Puts U.S. Nuclear Security at RiskThe U.S. National Nuclear Security Administration (NNSA), which oversees the design and maintenance of America’s nuclear weapons arsenal, has become one of the victims of a cyberattack targeting Microsoft SharePoint. The incident also affected several other key government agencies – and all signs point once again to China-linked hackers. Microsoft Targeted Again – Along with the U.S. Nuclear Authority The vulnerability in Microsoft SharePoint was exploited on July 18, and according to a spokesperson from the Department of Energy, some systems were affected. Fortunately, due to widespread use of Microsoft 365 cloud services and robust cybersecurity measures, the damage was reportedly minimal, with only a few systems impacted – all of which are now being restored. Representatives of the NNSA confirmed that no classified information was leaked during the incident. Still, the fact that someone managed to access infrastructure related to U.S. nuclear operations is highly concerning. SharePoint – The Weak Link The vulnerability only affected locally hosted SharePoint systems – not the cloud-based ones – which opened the door to this breach. The attack extended far beyond U.S. borders, hitting Middle Eastern and EU government systems as well. Other U.S. victims included the Department of Education, the Florida Department of Financial Services, and Rhode Island’s General Assembly. Earlier reports revealed that hackers stole login credentials, tokens, and hash codes, potentially giving them access to sensitive internal systems. China-Linked Groups Suspected Microsoft has named several hacking groups believed to be backed by the Chinese government – specifically Violet Typhoon, Linen Typhoon, and Storm-2603. Cybersecurity firm Mandiant, owned by Google, stated that at least one attacker was very likely of Chinese origin. U.S. cybersecurity agency CISA confirmed that the SharePoint vulnerability is being actively exploited. Microsoft has already released three updates to fix the issue. The Chinese embassy in Washington responded by denying any involvement and warned against “groundless accusations.” Microsoft Under Fire Microsoft has become a repeated target of high-level cyberattacks in recent years. In 2021, a separate Chinese group called Hafnium breached systems via a vulnerability in Microsoft Exchange Server. After facing sharp criticism for its previous response, Microsoft CEO Satya Nadella declared that cybersecurity is now the company’s top priority. Recently, Microsoft also announced it would no longer rely on Chinese engineers for developing cloud services tied to the U.S. Department of Defense – following concerns that such arrangements may have enabled access to sensitive systems. The Flaw Was First Discovered – by Ethical Hackers Interestingly, the SharePoint vulnerability was first discovered in May during a hacking contest in Berlin organized by cybersecurity firm Trend Micro. The event offered $100,000 rewards for discovering zero-day vulnerabilities, demonstrating just how valuable – and dangerous – these flaws can be. Summary: Another Security Blow for the U.S. Although no classified data was leaked, confidence in government infrastructure has taken another hit. The NNSA was among several high-profile victims, and China-sponsored cyber threats continue to rise. The U.S. once again finds itself needing to strengthen its cyber defenses – not just against foreign adversaries, but also against its own systemic vulnerabilities. #CyberSecurity , #Microsoft , #cyberattack , #hacking , #CryptoNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Microsoft Hack Puts U.S. Nuclear Security at Risk

The U.S. National Nuclear Security Administration (NNSA), which oversees the design and maintenance of America’s nuclear weapons arsenal, has become one of the victims of a cyberattack targeting Microsoft SharePoint. The incident also affected several other key government agencies – and all signs point once again to China-linked hackers.

Microsoft Targeted Again – Along with the U.S. Nuclear Authority
The vulnerability in Microsoft SharePoint was exploited on July 18, and according to a spokesperson from the Department of Energy, some systems were affected. Fortunately, due to widespread use of Microsoft 365 cloud services and robust cybersecurity measures, the damage was reportedly minimal, with only a few systems impacted – all of which are now being restored.
Representatives of the NNSA confirmed that no classified information was leaked during the incident. Still, the fact that someone managed to access infrastructure related to U.S. nuclear operations is highly concerning.

SharePoint – The Weak Link
The vulnerability only affected locally hosted SharePoint systems – not the cloud-based ones – which opened the door to this breach. The attack extended far beyond U.S. borders, hitting Middle Eastern and EU government systems as well. Other U.S. victims included the Department of Education, the Florida Department of Financial Services, and Rhode Island’s General Assembly.
Earlier reports revealed that hackers stole login credentials, tokens, and hash codes, potentially giving them access to sensitive internal systems.

China-Linked Groups Suspected
Microsoft has named several hacking groups believed to be backed by the Chinese government – specifically Violet Typhoon, Linen Typhoon, and Storm-2603. Cybersecurity firm Mandiant, owned by Google, stated that at least one attacker was very likely of Chinese origin.
U.S. cybersecurity agency CISA confirmed that the SharePoint vulnerability is being actively exploited. Microsoft has already released three updates to fix the issue.
The Chinese embassy in Washington responded by denying any involvement and warned against “groundless accusations.”

Microsoft Under Fire
Microsoft has become a repeated target of high-level cyberattacks in recent years. In 2021, a separate Chinese group called Hafnium breached systems via a vulnerability in Microsoft Exchange Server. After facing sharp criticism for its previous response, Microsoft CEO Satya Nadella declared that cybersecurity is now the company’s top priority.
Recently, Microsoft also announced it would no longer rely on Chinese engineers for developing cloud services tied to the U.S. Department of Defense – following concerns that such arrangements may have enabled access to sensitive systems.

The Flaw Was First Discovered – by Ethical Hackers
Interestingly, the SharePoint vulnerability was first discovered in May during a hacking contest in Berlin organized by cybersecurity firm Trend Micro. The event offered $100,000 rewards for discovering zero-day vulnerabilities, demonstrating just how valuable – and dangerous – these flaws can be.

Summary: Another Security Blow for the U.S.
Although no classified data was leaked, confidence in government infrastructure has taken another hit. The NNSA was among several high-profile victims, and China-sponsored cyber threats continue to rise.
The U.S. once again finds itself needing to strengthen its cyber defenses – not just against foreign adversaries, but also against its own systemic vulnerabilities.

#CyberSecurity , #Microsoft , #cyberattack , #hacking , #CryptoNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
--
Bullish
🚨 BREAKING: China Hacks US Nuclear Agency via Microsoft Flaw 🇨🇳💻🇺🇸 A massive cyberattack linked to Chinese state-backed hackers has breached over 400 organizations, including the U.S. Nuclear Security Agency, by exploiting a critical Microsoft SharePoint vulnerability. 🔓 Targets included: 🇺🇸 National Nuclear Security Administration (NNSA) 🧬 National Institutes of Health (NIH) 🏢 Hundreds of private and public institutions Microsoft’s initial patch was ineffective, giving hackers a wide-open backdoor. 💥 Despite officials saying “no big deal,” cybersecurity experts warn this breach highlights how fragile U.S. digital infrastructure still is—especially when relying on legacy, on-prem systems. 🧠 Reminder for the crypto community: ➡️ Centralized tech = Single points of failure ➡️ Decentralization = Security through distribution #CyberSecurity #CryptoNews #ChinaCrackdown #Microsoft #Hacking
🚨 BREAKING: China Hacks US Nuclear Agency via Microsoft Flaw 🇨🇳💻🇺🇸

A massive cyberattack linked to Chinese state-backed hackers has breached over 400 organizations, including the U.S. Nuclear Security Agency, by exploiting a critical Microsoft SharePoint vulnerability.

🔓 Targets included:

🇺🇸 National Nuclear Security Administration (NNSA)

🧬 National Institutes of Health (NIH)

🏢 Hundreds of private and public institutions

Microsoft’s initial patch was ineffective, giving hackers a wide-open backdoor.

💥 Despite officials saying “no big deal,” cybersecurity experts warn this breach highlights how fragile U.S. digital infrastructure still is—especially when relying on legacy, on-prem systems.

🧠 Reminder for the crypto community: ➡️ Centralized tech = Single points of failure
➡️ Decentralization = Security through distribution

#CyberSecurity #CryptoNews #ChinaCrackdown #Microsoft #Hacking
💥 𝐏𝐫𝐨-𝐈𝐬𝐫𝐚𝐞𝐥 𝐇𝐚𝐜𝐤𝐞𝐫𝐬 𝐓𝐨𝐨𝐤 $𝟖𝟏𝐌 𝐢𝐧 𝐂𝐫𝐲𝐩𝐭𝐨 𝐁𝐮𝐭 𝐈𝐭 𝗪𝗮𝘀𝗻’𝘁 𝐀𝐛𝐨𝐮𝐭 𝐭𝐡𝐞 𝐌𝐨𝐧𝐞𝐲! 🔐 𝐑𝐮𝐠𝐏𝐫𝐨𝐨𝐟 𝐑𝐞𝐩𝐨𝐫𝐭 A group called “Handala Hack” stole $81 MILLION in crypto 💰 But here’s the twist: 👉 It wasn’t for profit — it was a political message They drained wallets linked to terror funding (as they claimed) This is a reminder: 📲 Crypto isn’t just money — it’s power, politics & code ⚡ What do YOU think? Was it justice or just another hack? 👇 Drop your thoughts! #CryptoNews #blockchain #CyberWar #Web3 #hacking @RugProof_HQ 🔐 👉 𝐅𝐨𝐥𝐥𝐨𝐰 𝐅𝐨𝐫 𝐌𝐨𝐫𝐞 🔔
💥 𝐏𝐫𝐨-𝐈𝐬𝐫𝐚𝐞𝐥 𝐇𝐚𝐜𝐤𝐞𝐫𝐬 𝐓𝐨𝐨𝐤 $𝟖𝟏𝐌 𝐢𝐧 𝐂𝐫𝐲𝐩𝐭𝐨 𝐁𝐮𝐭 𝐈𝐭 𝗪𝗮𝘀𝗻’𝘁 𝐀𝐛𝐨𝐮𝐭 𝐭𝐡𝐞 𝐌𝐨𝐧𝐞𝐲!
🔐 𝐑𝐮𝐠𝐏𝐫𝐨𝐨𝐟 𝐑𝐞𝐩𝐨𝐫𝐭

A group called “Handala Hack” stole $81 MILLION in crypto 💰
But here’s the twist:
👉 It wasn’t for profit — it was a political message

They drained wallets linked to terror funding (as they claimed)
This is a reminder:
📲 Crypto isn’t just money — it’s power, politics & code ⚡

What do YOU think?
Was it justice or just another hack?

👇 Drop your thoughts!
#CryptoNews #blockchain #CyberWar #Web3 #hacking @AniyaXTrader 🔐
👉 𝐅𝐨𝐥𝐥𝐨𝐰 𝐅𝐨𝐫 𝐌𝐨𝐫𝐞 🔔
Global Cyberattack Exposes Microsoft Vulnerability: U.S. Agencies and Infrastructure HitThe world is facing another major cyberattack—this time targeting the very core of governmental institutions. Hackers have exploited an unpatched vulnerability in Microsoft’s widely used SharePoint Server software, compromising dozens of organizations worldwide, from U.S. federal agencies to telecom networks across Asia. Unlike Microsoft’s cloud-based services like Microsoft 365, the issue lies within local SharePoint servers—internal systems used for storing and sharing documents. These servers became the prime targets. Zero-Day Flaw Left Thousands of Systems Unprotected This is a "zero-day" vulnerability—an undisclosed flaw with no available patch. According to security experts, thousands of institutions were left exposed with no defenses in place. Early investigations show that attackers infiltrated systems of over 50 organizations, including European government agencies, a major energy provider in the U.S., and a university in Brazil. In one Eastern U.S. state, hackers blocked access to a batch of public documents, making it impossible for the government to delete or retrieve them. No Patch from Microsoft Yet — Organizations Forced to Improvise Despite the severity of the breach, Microsoft has yet to release an official patch. Affected institutions have had to resort to temporary fixes—such as server reconfigurations or disconnecting them from the internet—to reduce risk. While Microsoft confirmed the breach and issued a security advisory, the company has remained publicly silent. It recommended users quarantine vulnerable servers and take them offline if necessary. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with counterparts in Canada and Australia, has launched an investigation. The Center for Internet Security (CIS), which works with local U.S. governments, identified nearly 100 at-risk organizations, including public schools and universities. The situation is further complicated by recent budget cuts, which led to the termination of 60% of the personnel handling threat response. According to CIS Vice President Randy Rose, it took six hours on Saturday night to process the first incident alert. "If we hadn’t lost so many team members, it would’ve been much faster," he added. Microsoft Faces Growing Scrutiny This isn’t the first time Microsoft has faced doubts about its ability to protect customers. The Department of Homeland Security noted that the attackers may have built on an earlier SharePoint vulnerability that Microsoft had only partially addressed. Experts warn of long-term consequences. Once attackers gain access to SharePoint servers, they can move laterally into systems like Outlook, Microsoft Teams, and internal databases. Some reportedly stole cryptographic keys that could enable future access—even after a patch is applied. One anonymous researcher involved in the federal investigation warned, “Even if Microsoft releases a fix on Monday or Tuesday, it won’t help those already breached in the past 72 hours.” Past Criticism Comes Back into Focus Last year, a government-appointed panel criticized Microsoft’s handling of a targeted Chinese cyberattack on U.S. federal email systems—including communications by then-Commerce Secretary Gina Raimondo. In that case, hackers abused Microsoft’s cloud platform to access sensitive government emails. The situation escalated further after a ProPublica report revealed that Microsoft had hired engineers in China to work on cloud systems tied to the U.S. military. In response, Microsoft announced on Friday that it would no longer employ Chinese workers on Pentagon-related projects. Long-Term Fallout Likely Governments, cybersecurity agencies, and corporations worldwide are now questioning whether Microsoft can still be trusted as a critical tech provider when it repeatedly fails to address major vulnerabilities in time. While attackers gain access to sensitive data, the world is waiting for Microsoft to deliver a real solution—and wondering what the consequences will be for those already affected. #cyberattack , #CyberSecurity , #HackAlert , #Microsoft , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Global Cyberattack Exposes Microsoft Vulnerability: U.S. Agencies and Infrastructure Hit

The world is facing another major cyberattack—this time targeting the very core of governmental institutions. Hackers have exploited an unpatched vulnerability in Microsoft’s widely used SharePoint Server software, compromising dozens of organizations worldwide, from U.S. federal agencies to telecom networks across Asia.
Unlike Microsoft’s cloud-based services like Microsoft 365, the issue lies within local SharePoint servers—internal systems used for storing and sharing documents. These servers became the prime targets.

Zero-Day Flaw Left Thousands of Systems Unprotected
This is a "zero-day" vulnerability—an undisclosed flaw with no available patch. According to security experts, thousands of institutions were left exposed with no defenses in place.
Early investigations show that attackers infiltrated systems of over 50 organizations, including European government agencies, a major energy provider in the U.S., and a university in Brazil. In one Eastern U.S. state, hackers blocked access to a batch of public documents, making it impossible for the government to delete or retrieve them.

No Patch from Microsoft Yet — Organizations Forced to Improvise
Despite the severity of the breach, Microsoft has yet to release an official patch. Affected institutions have had to resort to temporary fixes—such as server reconfigurations or disconnecting them from the internet—to reduce risk.
While Microsoft confirmed the breach and issued a security advisory, the company has remained publicly silent. It recommended users quarantine vulnerable servers and take them offline if necessary.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with counterparts in Canada and Australia, has launched an investigation. The Center for Internet Security (CIS), which works with local U.S. governments, identified nearly 100 at-risk organizations, including public schools and universities.
The situation is further complicated by recent budget cuts, which led to the termination of 60% of the personnel handling threat response. According to CIS Vice President Randy Rose, it took six hours on Saturday night to process the first incident alert. "If we hadn’t lost so many team members, it would’ve been much faster," he added.

Microsoft Faces Growing Scrutiny
This isn’t the first time Microsoft has faced doubts about its ability to protect customers. The Department of Homeland Security noted that the attackers may have built on an earlier SharePoint vulnerability that Microsoft had only partially addressed.
Experts warn of long-term consequences. Once attackers gain access to SharePoint servers, they can move laterally into systems like Outlook, Microsoft Teams, and internal databases. Some reportedly stole cryptographic keys that could enable future access—even after a patch is applied.
One anonymous researcher involved in the federal investigation warned, “Even if Microsoft releases a fix on Monday or Tuesday, it won’t help those already breached in the past 72 hours.”

Past Criticism Comes Back into Focus
Last year, a government-appointed panel criticized Microsoft’s handling of a targeted Chinese cyberattack on U.S. federal email systems—including communications by then-Commerce Secretary Gina Raimondo. In that case, hackers abused Microsoft’s cloud platform to access sensitive government emails.
The situation escalated further after a ProPublica report revealed that Microsoft had hired engineers in China to work on cloud systems tied to the U.S. military. In response, Microsoft announced on Friday that it would no longer employ Chinese workers on Pentagon-related projects.

Long-Term Fallout Likely
Governments, cybersecurity agencies, and corporations worldwide are now questioning whether Microsoft can still be trusted as a critical tech provider when it repeatedly fails to address major vulnerabilities in time.
While attackers gain access to sensitive data, the world is waiting for Microsoft to deliver a real solution—and wondering what the consequences will be for those already affected.

#cyberattack , #CyberSecurity , #HackAlert , #Microsoft , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Bybit Breach: How the Lazarus Group Struck Crypto Again—and What It Means for Your Digital Wallet ✍This is Lazarus They just stole $1.46 billion from #bybit And they didn’t break the code — they broke the people Here’s untold story of how they did it (and why no one is truly safe) 👇 1/10 Lazarus is a state-backed North Korean #hacking group They’ve stolen billions from banks, crypto exchanges, and DeFi protocols And now, they’ve pulled off the biggest #crypto heist in history But how? Well... 2/10 There was no code exploit. No leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet... 3/10 But that raises a terrifying question. How did Lazarus know exactly who to target? A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed. That means Lazarus didn’t just hack Bybit… They knew who to manipulate 4/10 There are only a few ways to get that kind of information. • Inside job – Someone leaked the signer list. • Social engineering – Lazarus studied their emails & behavior. • Device compromise – One or more signers were infected with malware. This means other exchanges are at risk too... 5/10 Today Lazarus stole 0.42% of all #Ethereum It means they own More than the Ethereum Foundation. More than Vitalik Buterin. And more than Fidelity. But laundering that much ETH without detection isn’t easy... 6/10 In previous attacks, Lazarus has used: • Bridging to other #blockchain • On-chain mixing services • OTC trading via illicit brokers Would they try the same tactics again? 7/10 Investigators quickly flagged the 53 wallets holding the stolen ETH. Any attempt to cash out or swap funds would immediately raise red flags. But Lazarus are in no hurry... 8/10 In 2022, Chainalysis found Lazarus still held $55M from hacks six years earlier. They don’t cash out fast. They wait. And no one has ever gotten their money back. Not once. Lazarus doesn’t negotiate. They don’t return funds. So what happens to users? 9/10 Bybit’s CEO, Ben Zhou, addressed the crisis publicly: • “Client funds are 1:1 backed.” • “We have enough liquidity to cover withdrawals.” • “All other wallets remain secure.” So far, no bank run... 10/10 But this isn’t the first time this happened And it won’t be the last. So how do you stay safe? Follow these simple steps:

Bybit Breach: How the Lazarus Group Struck Crypto Again—and What It Means for Your Digital Wallet ✍

This is Lazarus
They just stole $1.46 billion from #bybit
And they didn’t break the code — they broke the people
Here’s untold story of how they did it (and why no one is truly safe) 👇

1/10
Lazarus is a state-backed North Korean #hacking group
They’ve stolen billions from banks, crypto exchanges, and DeFi protocols
And now, they’ve pulled off the biggest #crypto heist in history
But how? Well...

2/10
There was no code exploit.
No leaked private keys.
Bybit’s own multisig signers approved the transactions.
They thought they were signing a routine transfer.
Instead, they were handing over their entire cold wallet...

3/10
But that raises a terrifying question.
How did Lazarus know exactly who to target?
A multisig wallet requires multiple signers.
If even one refused to sign, the hack would fail.
But they all signed.
That means Lazarus didn’t just hack Bybit…
They knew who to manipulate
4/10
There are only a few ways to get that kind of information.
• Inside job – Someone leaked the signer list.
• Social engineering – Lazarus studied their emails & behavior.
• Device compromise – One or more signers were infected with malware.
This means other exchanges are at risk too...

5/10
Today Lazarus stole 0.42% of all #Ethereum
It means they own
More than the Ethereum Foundation.
More than Vitalik Buterin.
And more than Fidelity.
But laundering that much ETH without detection isn’t easy...

6/10
In previous attacks, Lazarus has used:
• Bridging to other #blockchain
• On-chain mixing services
• OTC trading via illicit brokers
Would they try the same tactics again?

7/10
Investigators quickly flagged the 53 wallets holding the stolen ETH.
Any attempt to cash out or swap funds would immediately raise red flags.
But Lazarus are in no hurry...

8/10
In 2022, Chainalysis found Lazarus still held $55M from hacks six years earlier.
They don’t cash out fast. They wait.
And no one has ever gotten their money back.
Not once.
Lazarus doesn’t negotiate. They don’t return funds.
So what happens to users?

9/10
Bybit’s CEO, Ben Zhou, addressed the crisis publicly:
• “Client funds are 1:1 backed.”
• “We have enough liquidity to cover withdrawals.”
• “All other wallets remain secure.”
So far, no bank run...

10/10
But this isn’t the first time this happened
And it won’t be the last.
So how do you stay safe? Follow these simple steps:
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯 Monday news: ✔️ Retail sales and industrial production data from China showed an economic slowdown ✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining ✔️ The Dow Jones stock index reached a new high of $41,558 💵 ✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15 ✔️ Binance warned of a potential threat to user accounts due to malware called Clipper ✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑 ✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million ✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million #BTC #DowJones #ETH #hacking
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯

Monday news:

✔️ Retail sales and industrial production data from China showed an economic slowdown

✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining

✔️ The Dow Jones stock index reached a new high of $41,558 💵

✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15

✔️ Binance warned of a potential threat to user accounts due to malware called Clipper

✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑

✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million

✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million

#BTC #DowJones #ETH #hacking
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement. According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts. Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities. “This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.” Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations. Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown
In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement.
According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts.
Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities.
“This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.”
Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations.
Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
Crypto Crime Trends: Rising Threats and Increased Losse The cryptocurrency space continues to attract both innovation and risk, with increasing concerns over cybersecurity. As digital assets like Bitcoin and Ethereum become more mainstream, they are also becoming prime targets for cybercriminals. In 2024, cryptocurrency hack losses have surged by 21%, reaching an eye-watering $2.2 billion, according to recent reports. This marks the fourth consecutive year where cryptocurrency-related crimes have caused massive financial losses. The nature of these attacks is becoming more sophisticated. Cybercriminals now have access to advanced techniques to breach digital wallets, exchanges, and even decentralized platforms. These attacks often occur through phishing, ransomware, or exploiting vulnerabilities in smart contracts. The stolen funds are typically funneled through decentralized exchanges, making it difficult for authorities to trace the illicit movements. As the crypto industry grows, so does the scale of the threat. The decentralized nature of cryptocurrencies, while offering benefits like privacy and security, also makes them vulnerable to misuse. Hackers can act with relative anonymity, moving stolen assets across borders in seconds, making the recovery of stolen funds incredibly challenging. For investors and crypto enthusiasts, these rising threats highlight the need for robust security measures. Using hardware wallets, enabling multi-factor authentication, and choosing exchanges with strong security protocols are essential steps to protect digital assets from cyberattacks. Additionally, vigilance in monitoring accounts for suspicious activity is critical to preventing significant losses. The rise in cybercrime also underscores the importance of regulatory oversight and institutional partnerships to strengthen security frameworks across the cryptocurrency ecosystem. As the industry matures, ensuring that platforms and users adhere to the highest security standards will be crucial to combatting the growing threat of digital crime. #BTCNextMove #Hacking
Crypto Crime Trends: Rising Threats and Increased Losse

The cryptocurrency space continues to attract both innovation and risk, with increasing concerns over cybersecurity. As digital assets like Bitcoin and Ethereum become more mainstream, they are also becoming prime targets for cybercriminals. In 2024, cryptocurrency hack losses have surged by 21%, reaching an eye-watering $2.2 billion, according to recent reports. This marks the fourth consecutive year where cryptocurrency-related crimes have caused massive financial losses.
The nature of these attacks is becoming more sophisticated. Cybercriminals now have access to advanced techniques to breach digital wallets, exchanges, and even decentralized platforms. These attacks often occur through phishing, ransomware, or exploiting vulnerabilities in smart contracts. The stolen funds are typically funneled through decentralized exchanges, making it difficult for authorities to trace the illicit movements.
As the crypto industry grows, so does the scale of the threat. The decentralized nature of cryptocurrencies, while offering benefits like privacy and security, also makes them vulnerable to misuse. Hackers can act with relative anonymity, moving stolen assets across borders in seconds, making the recovery of stolen funds incredibly challenging.

For investors and crypto enthusiasts, these rising threats highlight the need for robust security measures. Using hardware wallets, enabling multi-factor authentication, and choosing exchanges with strong security protocols are essential steps to protect digital assets from cyberattacks. Additionally, vigilance in monitoring accounts for suspicious activity is critical to preventing significant losses.
The rise in cybercrime also underscores the importance of regulatory oversight and institutional partnerships to strengthen security frameworks across the cryptocurrency ecosystem. As the industry matures, ensuring that platforms and users adhere to the highest security standards will be crucial to combatting the growing threat of digital crime.

#BTCNextMove #Hacking
See original
🔴 Hackers are attacking through fake Office extensions — over 4,600 wallets stolen Experts from Kaspersky Lab are sounding the alarm: hackers are spreading malware through fake Microsoft Office add-ons. The goal is mining on your computer and stealing crypto by substituting addresses. 📌 How it works: – The malware is disguised as Office extensions – Distributed through the SourceForge website – The victim runs the installer → the system gets infected – ClipBanker changes the cryptocurrency wallet address in the clipboard – Money is transferred to the attackers – Already 4,604 users have been affected, of which 90% are in Russia 📉 Impact: negative — a blow to trust in alternative software sources and an increased risk among crypto investors. 📜 Historical fact: A similar ClipBanker was used in attacks in 2021. At that time, the virus replaced addresses for more than 10,000 users — the damage exceeded $2.5 million. 📢 You are not a trader if you find out about everything last. Subscribe 🔔 #CryptoSecurity #Hacking #ClipBanker #MicrosoftOffice #Kaspersky
🔴 Hackers are attacking through fake Office extensions — over 4,600 wallets stolen

Experts from Kaspersky Lab are sounding the alarm: hackers are spreading malware through fake Microsoft Office add-ons. The goal is mining on your computer and stealing crypto by substituting addresses.

📌 How it works:

– The malware is disguised as Office extensions

– Distributed through the SourceForge website

– The victim runs the installer → the system gets infected

– ClipBanker changes the cryptocurrency wallet address in the clipboard

– Money is transferred to the attackers

– Already 4,604 users have been affected, of which 90% are in Russia

📉 Impact: negative — a blow to trust in alternative software sources and an increased risk among crypto investors.

📜 Historical fact:

A similar ClipBanker was used in attacks in 2021. At that time, the virus replaced addresses for more than 10,000 users — the damage exceeded $2.5 million.

📢 You are not a trader if you find out about everything last. Subscribe 🔔

#CryptoSecurity #Hacking #ClipBanker #MicrosoftOffice #Kaspersky
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️* $BTC $NOT $BNB 🌏⤴️🪙 {spot}(BNBUSDT) {spot}(NOTUSDT) {spot}(BTCUSDT) *Key Developments 📊* 1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖. 2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸. 3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈. *Laundering Efforts 🚮* 1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊. 2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰. *Timeline 📆* 1. November 23, 2023: Kyber network exploited 🔥. 2. Today: Hacker resurfaced, transferring $5.83M 📈. *Implications 🤔* 1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒. 2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨. *Expert Insights 💡* "DeFi security requires constant vigilance." "Money laundering prevention is crucial." *Conclusion 🤝* The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes. #CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️*
$BTC $NOT $BNB 🌏⤴️🪙



*Key Developments 📊*

1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖.
2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸.
3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈.

*Laundering Efforts 🚮*

1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊.
2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰.

*Timeline 📆*

1. November 23, 2023: Kyber network exploited 🔥.
2. Today: Hacker resurfaced, transferring $5.83M 📈.

*Implications 🤔*

1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒.
2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨.

*Expert Insights 💡*

"DeFi security requires constant vigilance."
"Money laundering prevention is crucial."

*Conclusion 🤝*

The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes.

#CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
🚨 30-Year Prison Sentence For Crypto Mixer Founder Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges. Disputed Conviction and Sentence: Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft. However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court. A Call for Fairness: Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation. Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment. What do you think about this sentencing? Drop your comment below! #bitcoin #tornadocash #scam #cryptoscam #hacking $BTC
🚨 30-Year Prison Sentence For Crypto Mixer Founder

Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges.

Disputed Conviction and Sentence:

Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft.

However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court.

A Call for Fairness:

Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation.

Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment.

What do you think about this sentencing?

Drop your comment below!

#bitcoin #tornadocash #scam #cryptoscam #hacking
$BTC
See original
Bybit Hacked: Over $1.46 Billion in Ethereum Stolen Cryptocurrency exchange Bybit has suffered what could be the largest hack in digital currency history, with $1.46 billion in Ethereum (ETH) being withdrawn from hot wallets. Bybit CEO Ben Zhou confirmed the hack via social media, saying that the hacker had taken control of a specific ETH cold wallet and transferred its entire contents to an unknown address. Suspicions of a hack were raised when blockchain data showed a massive transfer of 401,346 ETH, worth approximately $1.13 billion, from a Bybit hot wallet to an unknown wallet. Not only did this transfer raise alarms about a possible hack, it also impacted the market price of Ethereum, which fell more than 4% after the stolen funds began to be liquidated. Zhou assured users that despite the hack, all other cold wallets remain safe and withdrawals are working normally. The method used in the Bybit hack is very similar to techniques used in previous major hacks, such as the WazirX and Radiant Capital hacks in 2024. $ETH {spot}(ETHUSDT) #взлом #bybit #hacking
Bybit Hacked: Over $1.46 Billion in Ethereum Stolen

Cryptocurrency exchange Bybit has suffered what could be the largest hack in digital currency history, with $1.46 billion in Ethereum (ETH) being withdrawn from hot wallets. Bybit CEO Ben Zhou confirmed the hack via social media, saying that the hacker had taken control of a specific ETH cold wallet and transferred its entire contents to an unknown address.

Suspicions of a hack were raised when blockchain data showed a massive transfer of 401,346 ETH, worth approximately $1.13 billion, from a Bybit hot wallet to an unknown wallet. Not only did this transfer raise alarms about a possible hack, it also impacted the market price of Ethereum, which fell more than 4% after the stolen funds began to be liquidated.

Zhou assured users that despite the hack, all other cold wallets remain safe and withdrawals are working normally.

The method used in the Bybit hack is very similar to techniques used in previous major hacks, such as the WazirX and Radiant Capital hacks in 2024.

$ETH
#взлом #bybit #hacking
$WRX #WRX Coin Chart Analysis Despite issues like the #hacking incident and other factors, the chart looks promising. It seems to have formed an impulse wave, and the WXY correction appears to be in progress. Once the correction ends, the bull run should begin, right? However, how high it will rise remains uncertain. I’ll revisit the chart later, but for now, it doesn’t look bad. If you'd like to see more chart analysis, please follow.
$WRX

#WRX Coin Chart Analysis

Despite issues like the #hacking incident and other factors, the chart looks promising.

It seems to have formed an impulse wave, and the WXY correction appears to be in progress.

Once the correction ends, the bull run should begin, right?
However, how high it will rise remains uncertain.

I’ll revisit the chart later, but for now, it doesn’t look bad.

If you'd like to see more chart analysis, please follow.
--
Bullish
@defioasis explains that the #Eigenpie ($EGP ) IDO presents a compelling investment opportunity with several advantages, including a low public sale FDV of $6 million and a #TVL exceeding $1 billion, which suggests significant upside potential compared to similar projects like #Magpie . With a short timeline featuring a 100% unlock at TGE and confirmed listings on #Bitget , KuCoin, and Bybit around the 25th, the project has also secured strong backing from notable investors like the @arbitrum_official and @PancakeSwap . Furthermore, the public sale offers full refunds, with a total investment of $1.03 million ongoing until the 24th. However, potential risks include decreased investor confidence stemming from a previous #hacking incident involving Magpie's Penpie subDAO, as well as possible market fatigue due to ongoing projects. Overall, while EigenPie has attractive features, thorough research (DYOR) is crucial to navigate the associated risks.
@defioasis explains that the #Eigenpie ($EGP ) IDO presents a compelling investment opportunity with several advantages, including a low public sale FDV of $6 million and a #TVL exceeding $1 billion, which suggests significant upside potential compared to similar projects like #Magpie . With a short timeline featuring a 100% unlock at TGE and confirmed listings on #Bitget , KuCoin, and Bybit around the 25th, the project has also secured strong backing from notable investors like the @Arbitrum Foundation and @PancakeSwap . Furthermore, the public sale offers full refunds, with a total investment of $1.03 million ongoing until the 24th. However, potential risks include decreased investor confidence stemming from a previous #hacking incident involving Magpie's Penpie subDAO, as well as possible market fatigue due to ongoing projects. Overall, while EigenPie has attractive features, thorough research (DYOR) is crucial to navigate the associated risks.
See original
On February 21, 2025, the cryptocurrency exchange Bybit suffered a hack, resulting in the theft of $1.5 billion in tokens. Hackers stole 400,000 Ethereum from a cold wallet, exploiting a vulnerability in smart contracts. Bybit assures that users' worlds are safe and is working with blockchain experts to intervene and investigate. This is one of the largest thefts in the history of cryptocurrencies.#whatdo you think? Could Bybit handle this? #Bybit#SicurezzaCrypto #Hacking #Ethereum#
On February 21, 2025, the cryptocurrency exchange Bybit suffered a hack, resulting in the theft of $1.5 billion in tokens. Hackers stole 400,000 Ethereum from a cold wallet, exploiting a vulnerability in smart contracts.
Bybit assures that users' worlds are safe and is working with blockchain experts to intervene and investigate. This is one of the largest thefts in the history of cryptocurrencies.#whatdo you think? Could Bybit handle this?
#Bybit#SicurezzaCrypto #Hacking #Ethereum#
See original
Hackers stole $81 million worth of cryptocurrencies from the Orbit Chain platform On New Year's Eve, the South Korean cryptocurrency platform Orbit Chain suffered a hacker attack, during which the attackers stole crypto assets worth more than $81 million. The Orbit Chain team has confirmed that unauthorized access was gained to the decentralized Orbit Bridge on December 31st. Hackers removed ETH from the protocol, as well as stablecoins USDC and USDT. Orbit Chain said the platform has enlisted the help of the Korea National Police Agency and the Korea Internet and Security Agency (KISA) to investigate the cyberattack. ChainLight, a company specializing in blockchain security, is also involved in the investigation. Analytics companies CertiK and PeckShield estimated the total losses of the protocol at $81.5 million, of which $30 million was in USDT and $10 million in USDC. #UFO #hacking
Hackers stole $81 million worth of cryptocurrencies from the Orbit Chain platform

On New Year's Eve, the South Korean cryptocurrency platform Orbit Chain suffered a hacker attack, during which the attackers stole crypto assets worth more than $81 million.

The Orbit Chain team has confirmed that unauthorized access was gained to the decentralized Orbit Bridge on December 31st. Hackers removed ETH from the protocol, as well as stablecoins USDC and USDT. Orbit Chain said the platform has enlisted the help of the Korea National Police Agency and the Korea Internet and Security Agency (KISA) to investigate the cyberattack.

ChainLight, a company specializing in blockchain security, is also involved in the investigation. Analytics companies CertiK and PeckShield estimated the total losses of the protocol at $81.5 million, of which $30 million was in USDT and $10 million in USDC.
#UFO #hacking
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
✅ Thursday News: ✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire. ✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌 ✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands. ✔️ Quantity Funds has created a Bitcoin and Gold-based ETF. ✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token. ✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC. ✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million. ✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million. ✔️ BTC open interest set a new record at $20 billion. 🤑 ✔️ Hamster Kombat promises the upcoming launch of its second season. #btc #kraken #hacking #etf #news
✅ Thursday News:

✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire.

✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌

✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands.

✔️ Quantity Funds has created a Bitcoin and Gold-based ETF.

✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token.

✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC.

✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million.

✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million.

✔️ BTC open interest set a new record at $20 billion. 🤑

✔️ Hamster Kombat promises the upcoming launch of its second season.
#btc #kraken #hacking #etf #news
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number