Binance Square

BlockchainSecurity

389,712 visningar
255 diskuterar
Will Hodl
--
Pt.3: How to Prepare? Quantum-Resistant Cryptography and AdaptationTo defend against these threats, researchers and industry leaders are working on post-quantum cryptography (PQC). These are algorithms designed to withstand attacks from quantum computers while remaining secure and efficient for classical computers. Some of the most promising post-quantum algorithms include: CRYSTALS-Dilithium – a lattice-based digital signature algorithm.XMSS – a hash-based signature scheme.Lattice-based cryptography in general, which relies on mathematical structures believed to be resistant to quantum attacks. Implementing these quantum-resistant algorithms will likely require hard forks in blockchain networks, as well as consensus within the crypto community to ensure seamless transitions. What can crypto asset holders do today? Stay informed about quantum computing developments.Look for projects that are actively researching or adopting PQC solutions.Diversify your assets and consider using multi-signature or hardware wallets.Support community efforts to test and integrate PQC into existing blockchains. A particularly fascinating scenario is the future of Satoshi’s wallet and early Bitcoin addresses, which rely on older cryptographic schemes that would be among the first to be cracked if a powerful enough quantum computer becomes available. Looking Ahead While quantum computing is not an immediate threat, its rapid progress means that proactive measures are crucial to safeguard the crypto ecosystem. Collaboration between researchers, blockchain developers, and asset holders will be essential to ensure a smooth transition to a quantum-secure future. Whether Q Day is five, ten, or twenty years away, the time to prepare is now. If you missed the previous part, you can find it [here](https://www.binance.com/en/square/post/25032057750642). #CryptoSecurity #quantumcomputing #BlockchainSecurity #Hardfork #satoshiNakamato $BTC

Pt.3: How to Prepare? Quantum-Resistant Cryptography and Adaptation

To defend against these threats, researchers and industry leaders are working on post-quantum cryptography (PQC). These are algorithms designed to withstand attacks from quantum computers while remaining secure and efficient for classical computers.

Some of the most promising post-quantum algorithms include:
CRYSTALS-Dilithium – a lattice-based digital signature algorithm.XMSS – a hash-based signature scheme.Lattice-based cryptography in general, which relies on mathematical structures believed to be resistant to quantum attacks.

Implementing these quantum-resistant algorithms will likely require hard forks in blockchain networks, as well as consensus within the crypto community to ensure seamless transitions.

What can crypto asset holders do today?
Stay informed about quantum computing developments.Look for projects that are actively researching or adopting PQC solutions.Diversify your assets and consider using multi-signature or hardware wallets.Support community efforts to test and integrate PQC into existing blockchains.

A particularly fascinating scenario is the future of Satoshi’s wallet and early Bitcoin addresses, which rely on older cryptographic schemes that would be among the first to be cracked if a powerful enough quantum computer becomes available.

Looking Ahead
While quantum computing is not an immediate threat, its rapid progress means that proactive measures are crucial to safeguard the crypto ecosystem. Collaboration between researchers, blockchain developers, and asset holders will be essential to ensure a smooth transition to a quantum-secure future.
Whether Q Day is five, ten, or twenty years away, the time to prepare is now.

If you missed the previous part, you can find it here.

#CryptoSecurity #quantumcomputing #BlockchainSecurity #Hardfork #satoshiNakamato

$BTC
New Altcoin Feature Raises Security Concerns: Experts Warn of Potential Asset TheftA recent update in one of the leading altcoins — specifically Ethereum — has introduced an advanced yet potentially dangerous feature that has quickly become a tool for exploitation. Crypto trading firm Wintermute has issued a serious security alert regarding the misuse of EIP-7702, a new feature launched as part of the Pectra hard fork. 🔹 EIP-7702: Innovation or Exploitation Risk? The feature EIP-7702 introduces a concept called account abstraction, which allows regular wallets to temporarily function as smart contracts. Promoted by Ethereum co-founder Vitalik Buterin, the function is designed to enable users to: 🔹 batch multiple transactions, 🔹 let someone else pay for gas fees, 🔹 and use social authentication within a single transaction. However, this innovation has quickly turned into a security threat in the wrong hands. Wintermute: Over 80% of EIP-7702 Usage Is Malicious According to data analyzed via Dune Analytics, Wintermute revealed a troubling trend: More than 80% of EIP-7702 delegations are being exploited in “CrimeEnjoyor” attacks. The method is simple — a short, copy-pasted smart contract code is repeatedly deployed across different addresses. The contract automatically transfers assets from wallets (whose private keys have been leaked) to addresses controlled by the attacker. “The CrimeEnjoyor contract is short, simple, and widely used,” Wintermute reported. “This replicated bytecode now dominates EIP-7702 delegations. It’s darkly ironic.” Scam Sniffer and SlowMist Also Issue Warnings Other security firms have echoed Wintermute's concerns: 🔹 Scam Sniffer reported a malicious transaction linked to the notorious Inferno Drainer scam network, which led to losses of approximately $150,000. 🔹 SlowMist emphasized that wallet providers must support clear identification of destination addresses in smart contracts that users are prompted to sign. Experts are urging increased transparency and user education to prevent unsuspecting users from authorizing harmful transactions. ❗ Recommendations for Users 🔹 Carefully review smart contract content before signing 🔹 Avoid unverified or suspicious apps utilizing EIP-7702 🔹 Use wallets with enhanced security features and alerts 🔹 Follow tools like Scam Sniffer to detect threats early 💬 Question for readers: Do you believe features like EIP-7702 are the future of crypto wallets—or too risky for widespread adoption? #EthereumUpdate , #CyberSecurity , #CryptoScamAlert , #BlockchainSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

New Altcoin Feature Raises Security Concerns: Experts Warn of Potential Asset Theft

A recent update in one of the leading altcoins — specifically Ethereum — has introduced an advanced yet potentially dangerous feature that has quickly become a tool for exploitation. Crypto trading firm Wintermute has issued a serious security alert regarding the misuse of EIP-7702, a new feature launched as part of the Pectra hard fork.

🔹 EIP-7702: Innovation or Exploitation Risk?

The feature EIP-7702 introduces a concept called account abstraction, which allows regular wallets to temporarily function as smart contracts. Promoted by Ethereum co-founder Vitalik Buterin, the function is designed to enable users to:

🔹 batch multiple transactions,

🔹 let someone else pay for gas fees,

🔹 and use social authentication within a single transaction.
However, this innovation has quickly turned into a security threat in the wrong hands.

Wintermute: Over 80% of EIP-7702 Usage Is Malicious
According to data analyzed via Dune Analytics, Wintermute revealed a troubling trend:
More than 80% of EIP-7702 delegations are being exploited in “CrimeEnjoyor” attacks.
The method is simple — a short, copy-pasted smart contract code is repeatedly deployed across different addresses. The contract automatically transfers assets from wallets (whose private keys have been leaked) to addresses controlled by the attacker.
“The CrimeEnjoyor contract is short, simple, and widely used,” Wintermute reported. “This replicated bytecode now dominates EIP-7702 delegations. It’s darkly ironic.”

Scam Sniffer and SlowMist Also Issue Warnings
Other security firms have echoed Wintermute's concerns:
🔹 Scam Sniffer reported a malicious transaction linked to the notorious Inferno Drainer scam network, which led to losses of approximately $150,000.

🔹 SlowMist emphasized that wallet providers must support clear identification of destination addresses in smart contracts that users are prompted to sign.
Experts are urging increased transparency and user education to prevent unsuspecting users from authorizing harmful transactions.

❗ Recommendations for Users
🔹 Carefully review smart contract content before signing

🔹 Avoid unverified or suspicious apps utilizing EIP-7702

🔹 Use wallets with enhanced security features and alerts

🔹 Follow tools like Scam Sniffer to detect threats early

💬 Question for readers: Do you believe features like EIP-7702 are the future of crypto wallets—or too risky for widespread adoption?

#EthereumUpdate , #CyberSecurity , #CryptoScamAlert , #BlockchainSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Exchange Hack Alert! Millions Vanish! 🚨 A crypto exchange called BitoPro got hit with a security breach 💥losing over $11.5 million in digital assets. The hack happened on May 8, but wasn't disclosed until recently. On-chain data sleuths noticed funds moving to decentralized exchanges (DEXs) and then being cashed out. Some of the stolen crypto was funneled through Tornado Cash and even bridged to Bitcoin via THORChain – classic hacker moves to cover their tracks. The exchange claims user withdrawals are unaffected and that they're tracking the stolen funds with a third-party security firm. DeFi protocols remain a prime target for hackers 🎯, with recent exploits hitting Cetus and Nervos. Security analysts are emphasizing the importance of access control to prevent future attacks. What do you think of this growing threat? Follow for exclusive analysis! #CryptoHack #DeFiSecurity #BlockchainSecurity #TornadoCash #CryptoNews
🚨 Exchange Hack Alert! Millions Vanish! 🚨

A crypto exchange called BitoPro got hit with a security breach 💥losing over $11.5 million in digital assets.

The hack happened on May 8, but wasn't disclosed until recently. On-chain data sleuths noticed funds moving to decentralized exchanges (DEXs) and then being cashed out. Some of the stolen crypto was funneled through Tornado Cash and even bridged to Bitcoin via THORChain – classic hacker moves to cover their tracks.

The exchange claims user withdrawals are unaffected and that they're tracking the stolen funds with a third-party security firm. DeFi protocols remain a prime target for hackers 🎯, with recent exploits hitting Cetus and Nervos.

Security analysts are emphasizing the importance of access control to prevent future attacks.

What do you think of this growing threat?
Follow for exclusive analysis!
#CryptoHack #DeFiSecurity #BlockchainSecurity #TornadoCash #CryptoNews
⚠️ Part 2 of our quantum series is live! 💣 Discover why quantum computing poses a serious threat to your crypto assets. 🔓 From private key cracking and mining domination to smart contract breaches and trust erosion – we break down the four key risks that quantum computers bring to the blockchain. 🔢 Find out exactly how many qubits it takes to compromise today's cryptography and the status of IBM Condor and Google's latest quantum advances. 👉 Read the second article here: [Pt.2: The Quantum Threat to Crypto Assets](https://www.binance.com/en/square/post/25032057750642) Don't miss the next installment on how to protect yourself! #CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat $BTC
⚠️ Part 2 of our quantum series is live!

💣 Discover why quantum computing poses a serious threat to your crypto assets.

🔓 From private key cracking and mining domination to smart contract breaches and trust erosion – we break down the four key risks that quantum computers bring to the blockchain.

🔢 Find out exactly how many qubits it takes to compromise today's cryptography and the status of IBM Condor and Google's latest quantum advances.

👉 Read the second article here: Pt.2: The Quantum Threat to Crypto Assets

Don't miss the next installment on how to protect yourself!

#CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat

$BTC
Pt.2: The Quantum Threat to Crypto AssetsQuantum computers pose a significant challenge to the security of cryptocurrencies and blockchain-based assets. Current cryptographic systems rely on mathematical problems that are extremely hard for classical computers to solve, like factoring large prime numbers. However, quantum algorithms such as Shor’s algorithm can solve these problems exponentially faster. Here are the four main risks posed by quantum computing to crypto assets: Breaking Private Keys Quantum computers can break the cryptographic schemes protecting private keys, making it possible to steal funds from wallets. It’s estimated that around 4,000 logical qubits would be needed to break widely used public-key cryptography, such as RSA and ECC (Elliptic Curve Cryptography). Dominating Mining Quantum computers could outperform classical miners, monopolizing block creation and disrupting the network’s fair distribution of rewards.Smart Contract Vulnerabilities Quantum attacks can target smart contracts and decentralized applications, potentially changing their behavior or bypassing security measures. Loss of Trust If quantum attacks become feasible, trust in blockchain networks could erode, leading to a collapse in confidence and the value of digital assets. Currently, the IBM Condor chip – with 1,121 qubits – represents a major milestone. Google’s research suggests that millions of physical qubits would be needed for large-scale quantum error correction, so we’re not yet at the point of quantum supremacy in breaking crypto, but progress is accelerating. Stay tuned – more insights coming in the next parts! If you missed the previous part, you can find it [here](https://www.binance.com/en/square/post/24960332519193). #CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat $BTC

Pt.2: The Quantum Threat to Crypto Assets

Quantum computers pose a significant challenge to the security of cryptocurrencies and blockchain-based assets. Current cryptographic systems rely on mathematical problems that are extremely hard for classical computers to solve, like factoring large prime numbers. However, quantum algorithms such as Shor’s algorithm can solve these problems exponentially faster.

Here are the four main risks posed by quantum computing to crypto assets:
Breaking Private Keys

Quantum computers can break the cryptographic schemes protecting private keys, making it possible to steal funds from wallets. It’s estimated that around 4,000 logical qubits would be needed to break widely used public-key cryptography, such as RSA and ECC (Elliptic Curve Cryptography).
Dominating Mining

Quantum computers could outperform classical miners, monopolizing block creation and disrupting the network’s fair distribution of rewards.Smart Contract Vulnerabilities

Quantum attacks can target smart contracts and decentralized applications, potentially changing their behavior or bypassing security measures.
Loss of Trust

If quantum attacks become feasible, trust in blockchain networks could erode, leading to a collapse in confidence and the value of digital assets.

Currently, the IBM Condor chip – with 1,121 qubits – represents a major milestone. Google’s research suggests that millions of physical qubits would be needed for large-scale quantum error correction, so we’re not yet at the point of quantum supremacy in breaking crypto, but progress is accelerating.

Stay tuned – more insights coming in the next parts!
If you missed the previous part, you can find it here.

#CryptoSecurity #quantumcomputing #BlockchainSecurity #QuantumThreat

$BTC
⚠️ The Day Bitcoin Almost Died: The 184 Billion BTC Bug August 15, 2010 — The Forgotten Fork That Saved Bitcoin Before Bitcoin hit $70,000… Before it was called “digital gold”… Before institutions adopted it… Bitcoin nearly vanished forever. On August 15, 2010, a single transaction appeared on the blockchain that credited 184,467,440,737 BTC to one wallet — over 8,800 times more than Bitcoin’s total supply of 21 million. This wasn’t a scam — it was a critical software bug known as an integer overflow. It allowed the attacker to generate near-infinite BTC, violating Bitcoin’s core principle of scarcity. Panic set in. Bitcoin’s future hung by a thread. But just hours later, Satoshi Nakamoto and a few early developers sprang into action: • They released a patch (v0.3.10) • Coordinated a hard fork to erase the invalid transaction • Rolled back the chain to restore consensus It remains the only time in Bitcoin history that a transaction was removed from the blockchain. This bug showed the world that Bitcoin was not invincible. It was software — and software can fail. Still, Bitcoin didn’t die. In fact, it came back stronger. Today, Bitcoin is secured by global infrastructure, robust audits, and a decentralized community. While a bug of this scale is unlikely now, the lesson remains: Bitcoin is resilient, not untouchable. This event reminds us that trust in code is earned. It takes vigilance, transparency, and a global effort to protect decentralized systems. So next time someone says, “Bitcoin can’t fail,” remember — it almost did. 🔍 Want more untold crypto stories? Visit Binance Academy to explore the past, understand the present, and prepare for the future of blockchain. #Bitcoin #CryptoFlashback #BinanceAcademy #BlockchainSecurity #184BillionBug
⚠️ The Day Bitcoin Almost Died: The 184 Billion BTC Bug

August 15, 2010 — The Forgotten Fork That Saved Bitcoin

Before Bitcoin hit $70,000…
Before it was called “digital gold”…
Before institutions adopted it…
Bitcoin nearly vanished forever.

On August 15, 2010, a single transaction appeared on the blockchain that credited 184,467,440,737 BTC to one wallet — over 8,800 times more than Bitcoin’s total supply of 21 million.

This wasn’t a scam — it was a critical software bug known as an integer overflow. It allowed the attacker to generate near-infinite BTC, violating Bitcoin’s core principle of scarcity.

Panic set in. Bitcoin’s future hung by a thread.

But just hours later, Satoshi Nakamoto and a few early developers sprang into action:
• They released a patch (v0.3.10)
• Coordinated a hard fork to erase the invalid transaction
• Rolled back the chain to restore consensus

It remains the only time in Bitcoin history that a transaction was removed from the blockchain.

This bug showed the world that Bitcoin was not invincible. It was software — and software can fail.

Still, Bitcoin didn’t die. In fact, it came back stronger.

Today, Bitcoin is secured by global infrastructure, robust audits, and a decentralized community. While a bug of this scale is unlikely now, the lesson remains:

Bitcoin is resilient, not untouchable.

This event reminds us that trust in code is earned. It takes vigilance, transparency, and a global effort to protect decentralized systems.

So next time someone says, “Bitcoin can’t fail,” remember — it almost did.

🔍 Want more untold crypto stories?
Visit Binance Academy to explore the past, understand the present, and prepare for the future of blockchain.

#Bitcoin #CryptoFlashback #BinanceAcademy #BlockchainSecurity #184BillionBug
The Day Bitcoin Almost Died: The 184 Billion BTC Bug That Nearly Erased EverythingBy Binance Editorial Team | Crypto Flashback | August 15, 2010 – The Forgotten Fork That Saved It All Before #Bitcoin2025 $BTC {spot}(BTCUSDT) Bitcoin ($BTC) reached $70,000… Before institutions called it an asset class… Before the world hailed it as digital gold — it almost vanished. On August 15, 2010, Bitcoin came seconds from self-destruction. One transaction, one bug, and one obscure line of code brought the entire Bitcoin network to its knees. It's a story rarely told — but it’s one every crypto investor should know. 💥 The Transaction That Broke the Rules In 2010, Bitcoin was in its infancy. One BTC traded for just 7 cents. Mining was done on laptops. The whitepaper was still fresh. Then, out of nowhere, a transaction appeared on the blockchain that sent 184,467,440,737 BTC to a single wallet. Yes — that’s over 184 billion BTC. More than 8,800 times Bitcoin’s hard-coded supply cap of 21 million. It shouldn’t have been possible. But it happened. 🐛 The Bug in the Code The culprit? A critical integer overflow bug in Bitcoin's codebase — a software flaw that caused the system to mishandle large numerical values. The attacker exploited it to create a near-infinite number of bitcoins from thin air. For a few terrifying hours, the unthinkable became reality. Bitcoin’s core principle — scarcity — was broken. Had this continued unnoticed, Bitcoin could have collapsed entirely. 🧑‍💻 Satoshi Responds Bitcoin’s anonymous creator, Satoshi Nakamoto, acted fast. Detected the exploit within hoursPublished a patch in Bitcoin version 0.3.10Coordinated a hard fork to invalidate the exploitRewrote the blockchain to erase the fraudulent transactionIt marked the only time in Bitcoin’s history that a transaction was manually removed and the chain was rolled back. The network split. Honest nodes rejected the corrupted chain. Consensus returned. Bitcoin survived. 🔁 The Fork That Changed Everything This emergency fork — known to some as the day Bitcoin almost died — serves as a sobering reminder: Bitcoin is software. And software can fail. The 184 billion BTC bug shattered the illusion of invincibility. It exposed how dependent early Bitcoin was on a small group of developers — and just how fragile the system was before global adoption, hashpower, and decentralized infrastructure took root. ❓Could It Happen Again? Today, Bitcoin has matured. It’s undergone audits, core rewrites, and network upgrades. The odds of such a catastrophic bug slipping through again are dramatically lower. But no system is entirely immune. Bitcoin’s strength lies in its open-source nature, community vigilance, and the transparency of its code. 🧠 Lessons from the Brink Bitcoin is resilient, not invulnerableTrust in the network is built — and can be brokenDecentralized communities must remain alertSo the next time someone says “Bitcoin can’t fail”, remember: it almost did. And it’s only because of fast thinking, open collaboration, and a handful of anonymous heroes that we still have it today. #Bitcoin #CryptoHistoryMade story #BinanceAcademy #BlockchainSecurity ity Want to learn more about Bitcoin's early challenges? Explore [Binance Academy](https://academy.binance.com) for deep dives, tutorials, and history-defining moments that shaped the future of crypto. Would you like this formatted for publishing on Binance Blog or social media platforms too?

The Day Bitcoin Almost Died: The 184 Billion BTC Bug That Nearly Erased Everything

By Binance Editorial Team | Crypto Flashback | August 15, 2010 – The Forgotten Fork That Saved It All

Before #Bitcoin2025 $BTC
Bitcoin ($BTC ) reached $70,000…

Before institutions called it an asset class…

Before the world hailed it as digital gold — it almost vanished.
On August 15, 2010, Bitcoin came seconds from self-destruction. One transaction, one bug, and one obscure line of code brought the entire Bitcoin network to its knees. It's a story rarely told — but it’s one every crypto investor should know.
💥 The Transaction That Broke the Rules
In 2010, Bitcoin was in its infancy. One BTC traded for just 7 cents. Mining was done on laptops. The whitepaper was still fresh.
Then, out of nowhere, a transaction appeared on the blockchain that sent 184,467,440,737 BTC to a single wallet.
Yes — that’s over 184 billion BTC.

More than 8,800 times Bitcoin’s hard-coded supply cap of 21 million.

It shouldn’t have been possible. But it happened.

🐛 The Bug in the Code

The culprit? A critical integer overflow bug in Bitcoin's codebase — a software flaw that caused the system to mishandle large numerical values. The attacker exploited it to create a near-infinite number of bitcoins from thin air.

For a few terrifying hours, the unthinkable became reality.

Bitcoin’s core principle — scarcity — was broken.

Had this continued unnoticed, Bitcoin could have collapsed entirely.

🧑‍💻 Satoshi Responds
Bitcoin’s anonymous creator, Satoshi Nakamoto, acted fast.

Detected the exploit within hoursPublished a patch in Bitcoin version 0.3.10Coordinated a hard fork to invalidate the exploitRewrote the blockchain to erase the fraudulent transactionIt marked the only time in Bitcoin’s history that a transaction was manually removed and the chain was rolled back.
The network split. Honest nodes rejected the corrupted chain. Consensus returned. Bitcoin survived.

🔁 The Fork That Changed Everything
This emergency fork — known to some as the day Bitcoin almost died — serves as a sobering reminder:

Bitcoin is software. And software can fail.

The 184 billion BTC bug shattered the illusion of invincibility. It exposed how dependent early Bitcoin was on a small group of developers — and just how fragile the system was before global adoption, hashpower, and decentralized infrastructure took root.

❓Could It Happen Again?

Today, Bitcoin has matured. It’s undergone audits, core rewrites, and network upgrades. The odds of such a catastrophic bug slipping through again are dramatically lower.

But no system is entirely immune. Bitcoin’s strength lies in its open-source nature, community vigilance, and the transparency of its code.

🧠 Lessons from the Brink
Bitcoin is resilient, not invulnerableTrust in the network is built — and can be brokenDecentralized communities must remain alertSo the next time someone says “Bitcoin can’t fail”, remember: it almost did.
And it’s only because of fast thinking, open collaboration, and a handful of anonymous heroes that we still have it today.
#Bitcoin #CryptoHistoryMade story #BinanceAcademy #BlockchainSecurity ity
Want to learn more about Bitcoin's early challenges? Explore Binance Academy for deep dives, tutorials, and history-defining moments that shaped the future of crypto.

Would you like this formatted for publishing on Binance Blog or social media platforms too?
BiyaPay不冻卡出金:
蘑菇吃多了
🤯 $68M Gone in a Crypto Blink?! 🚨 Address poisoning is hitting hard, folks. Imagine thinking you're sending crypto to the right place, but a sneaky scammer swaps the address at the last second. 😱 It's like a digital pickpocket! They create fake addresses that LOOK almost identical to yours. These attacks aren't just small-time stuff. One trader lost a WHOPPING $68 million in WBTC! 💥 Over $83 million has been confirmed stolen through these scams. They're getting smarter with phishing, fake QR codes, and even hacking your clipboard. So how do you stay safe? Rotate your Binance addresses, use a hardware wallet, and double-check EVERYTHING. Whitelisting trusted addresses is also a pro move. Let's stay vigilant out there! Stay tuned for the latest updates! #CryptoSecurity #AddressPoisoning #DeFiSafety #Bitcoin #BlockchainSecurity
🤯 $68M Gone in a Crypto Blink?! 🚨

Address poisoning is hitting hard, folks. Imagine thinking you're sending crypto to the right place, but a sneaky scammer swaps the address at the last second. 😱 It's like a digital pickpocket! They create fake addresses that LOOK almost identical to yours.

These attacks aren't just small-time stuff. One trader lost a WHOPPING $68 million in WBTC! 💥 Over $83 million has been confirmed stolen through these scams. They're getting smarter with phishing, fake QR codes, and even hacking your clipboard.

So how do you stay safe? Rotate your Binance addresses, use a hardware wallet, and double-check EVERYTHING. Whitelisting trusted addresses is also a pro move. Let's stay vigilant out there!

Stay tuned for the latest updates!
#CryptoSecurity #AddressPoisoning #DeFiSafety #Bitcoin #BlockchainSecurity
Pt.1: What is Quantum Computing and How Does It Work?Quantum computing is a cutting-edge field that leverages the unique properties of quantum mechanics to perform computations far beyond the reach of classical computers. At its core, quantum computing uses qubits (quantum bits) instead of traditional bits (0s and 1s). Qubits can exist in a state of superposition, meaning they can represent both 0 and 1 simultaneously. This allows quantum computers to process an enormous amount of information in parallel. Another crucial phenomenon is entanglement. When qubits are entangled, the state of one qubit instantly affects the state of another, regardless of distance. This enables quantum computers to perform complex calculations with unprecedented speed and efficiency. Classical computers process data sequentially, using binary logic. Quantum computers, in contrast, harness the probabilistic nature of quantum mechanics to explore multiple solutions at once, promising breakthroughs in fields like materials science, cryptography, and finance. Currently, quantum technology is still in its early stages, with researchers working on stabilizing qubits and scaling up the number of usable qubits in quantum processors. Major players like IBM, Google, and Rigetti are pushing the boundaries of what’s possible. A term that has gained traction in the quantum community is Q Day – the moment when quantum computers become powerful enough to break existing cryptographic systems. While we’re not there yet, it’s a looming event that drives much of the current research and preparation. Stay tuned – more insights coming in the next parts! #CryptoSecurity #quantumcomputing #BlockchainSecurity $BTC

Pt.1: What is Quantum Computing and How Does It Work?

Quantum computing is a cutting-edge field that leverages the unique properties of quantum mechanics to perform computations far beyond the reach of classical computers.
At its core, quantum computing uses qubits (quantum bits) instead of traditional bits (0s and 1s). Qubits can exist in a state of superposition, meaning they can represent both 0 and 1 simultaneously. This allows quantum computers to process an enormous amount of information in parallel.
Another crucial phenomenon is entanglement. When qubits are entangled, the state of one qubit instantly affects the state of another, regardless of distance. This enables quantum computers to perform complex calculations with unprecedented speed and efficiency.
Classical computers process data sequentially, using binary logic. Quantum computers, in contrast, harness the probabilistic nature of quantum mechanics to explore multiple solutions at once, promising breakthroughs in fields like materials science, cryptography, and finance.
Currently, quantum technology is still in its early stages, with researchers working on stabilizing qubits and scaling up the number of usable qubits in quantum processors. Major players like IBM, Google, and Rigetti are pushing the boundaries of what’s possible.
A term that has gained traction in the quantum community is Q Day – the moment when quantum computers become powerful enough to break existing cryptographic systems. While we’re not there yet, it’s a looming event that drives much of the current research and preparation.

Stay tuned – more insights coming in the next parts!
#CryptoSecurity #quantumcomputing #BlockchainSecurity
$BTC
The 184 Billion Bitcoin Bug: A Lesson in Blockchain Security In 2010, a bug in Bitcoin’s code led to the accidental creation of 184 billion BTC in a single block, threatening the integrity of the entire network. Known as the "Value Overflow Incident," this flaw was quickly identified and fixed by core developers. The event became a defining moment in crypto history, showcasing the importance of rapid response and robust security in blockchain systems. It also reinforced Bitcoin’s resilience and the critical need for ongoing vigilance in code development. #Bitcoin #CryptoHistory #BlockchainSecurity #BTCBug #BitcoinResilienc #CryptoNews
The 184 Billion Bitcoin Bug: A Lesson in Blockchain Security

In 2010, a bug in Bitcoin’s code led to the accidental creation of 184 billion BTC in a single block, threatening the integrity of the entire network. Known as the "Value Overflow Incident," this flaw was quickly identified and fixed by core developers. The event became a defining moment in crypto history, showcasing the importance of rapid response and robust security in blockchain systems. It also reinforced Bitcoin’s resilience and the critical need for ongoing vigilance in code development.

#Bitcoin #CryptoHistory #BlockchainSecurity #BTCBug #BitcoinResilienc #CryptoNews
North Korean Hackers Strike Again – This Time It's PersonalIndividual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24. 🔎 Victims included: – >🏦 Exchange wallets –> 🔐 Multi-sig wallets – >📤 External accounts 👁‍🗨 On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate. 🔐 Protect yourself before you’re next: 🔸 Switch to cold storage 🔸 Enable 2FA everywhere 🔸 NEVER click unknown links 🔸 Keep wallets & devices updated 🔸 Audit your wallet activity regularly ⚠️ This isn’t just another hack—this is a wake-up call for every investor in crypto. 🧠 Be smart. Be safe. Your keys, your coins. #CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly

North Korean Hackers Strike Again – This Time It's Personal

Individual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24.
🔎 Victims included:
– >🏦 Exchange wallets
–> 🔐 Multi-sig wallets
– >📤 External accounts
👁‍🗨 On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate.
🔐 Protect yourself before you’re next:
🔸 Switch to cold storage
🔸 Enable 2FA everywhere
🔸 NEVER click unknown links
🔸 Keep wallets & devices updated
🔸 Audit your wallet activity regularly
⚠️ This isn’t just another hack—this is a wake-up call for every investor in crypto.
🧠 Be smart. Be safe. Your keys, your coins.
#CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly
“Bitcoin is a very exciting development, it might lead to a world currency.” – Kim Dotcom. $ZEC $DASH {spot}(DASHUSDT) {spot}(ZECUSDT) Monero, Zcash, and Dash prioritize privacy. Monero’s untraceable transactions protect user anonymity. Zcash offers optional privacy with zero-knowledge proofs. Dash focuses on fast, private payments. These coins cater to users valuing financial privacy, a growing concern in the digital age. Understand their tech to appreciate their value.$MASK {spot}(MASKUSDT) #Monero #Zcash #Dash #CryptoPrivacy #BlockchainSecurity
“Bitcoin is a very exciting development, it might lead to a world currency.” – Kim Dotcom.
$ZEC $DASH

Monero, Zcash, and Dash prioritize privacy. Monero’s untraceable transactions protect user anonymity. Zcash offers optional privacy with zero-knowledge proofs. Dash focuses on fast, private payments. These coins cater to users valuing financial privacy, a growing concern in the digital age. Understand their tech to appreciate their value.$MASK
#Monero #Zcash #Dash #CryptoPrivacy #BlockchainSecurity
--
Baisse (björn)
🚨💰 North Korean Hackers Strike Again – This Time It's Personal! 💻⚠️ 🎯 Individual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24. 🔎 Victims included: – >🏦 Exchange wallets –> 🔐 Multi-sig wallets – >📤 External accounts 👁‍🗨 On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate. 🔐 Protect yourself before you’re next: 🔸 Switch to cold storage 🔸 Enable 2FA everywhere 🔸 NEVER click unknown links 🔸 Keep wallets & devices updated 🔸 Audit your wallet activity regularly ⚠️ This isn’t just another hack—this is a wake-up call for every investor in crypto. 🧠 Be smart. Be safe. Your keys, your coins. #CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly
🚨💰 North Korean Hackers Strike Again – This Time It's Personal! 💻⚠️

🎯 Individual crypto investors are the new targets. The notorious Lazarus Group just pulled off a $5.2 million heist by infecting wallets with stealth malware on May 24.

🔎 Victims included:
– >🏦 Exchange wallets
–> 🔐 Multi-sig wallets
– >📤 External accounts

👁‍🗨 On-chain investigator @ZachXBT tracked ~1,000 ETH being laundered via Tornado Cash, making this one of the boldest moves yet from the cybercrime syndicate.

🔐 Protect yourself before you’re next:
🔸 Switch to cold storage
🔸 Enable 2FA everywhere
🔸 NEVER click unknown links
🔸 Keep wallets & devices updated
🔸 Audit your wallet activity regularly

⚠️ This isn’t just another hack—this is a wake-up call for every investor in crypto.

🧠 Be smart. Be safe. Your keys, your coins.
#CryptoAlert #LazarusHack #BlockchainSecurity #Web3News #CryptoSafety #HODLwithCare #DecentralizeResponsibly
Julie Censori:
It’s more than coins. It’s a whole new way of seeing money.
ALERTA CRYPTOGRAMA: Sua Riqueza Cripto Está Segura no Mundo Real?Saudações comudidade Glogal Cryptograma! Percebemos que com a recente euforia e as altas do mercado cripto, um assunto crucial tem emergegido das sombras e exige nossa atenção: a segurança física de quem detém ativos digitais. Não é alarmismo, é preparo estratégico. O artigo recente da Equipe de Segurança Física da Binance (que você pode conferir no blog da Binance) joga luz sobre uma tendência preocupante: embora ainda raros comparados a crimes comuns, os ataques físicos direcionados a investidores e profissionais de cripto estão aumentando, especialmente em períodos de alta do mercado. Por Que Isso Importa AGORA? Criminosos estão cada vez mais sofisticados. Se as defesas digitais se fortalecem, eles buscam o "elo mais fraco", que muitas vezes pode ser o próprio indivíduo no mundo físico. Casos de sequestro e coação para transferência de fundos, como o do cofundador da Ledger em janeiro de 2025, são um duro lembrete de que a segurança 360º é vital. Onde Mora o Perigo? Regiões em Foco: América do Norte, Europa Ocidental e Sudeste Asiático têm visto um número maior desses incidentes. Quem é o Alvo? Indivíduos com exposição pública (influenciadores, empresários do setor, traders conhecidos) ou aqueles que se presume terem acesso direto a grandes volumes de criptoativos. Blindando Sua Fortaleza Cripto (Além do Digital): 5 Pilares Essenciais Discrição é Poder: Evite ostentar seus holdings ou ganhos em plataformas públicas. Sua "identidade cripto" online não precisa gritar riqueza. Menos holofotes, menos alvos. Privacidade Digital Reforçada: Suas redes sociais podem ser um mapa para criminosos. Desative geotags, evite compartilhar planos de viagem em tempo real e configure suas contas para o modo privado. Ofusque a Propriedade de Carteiras: Não vincule publicamente seu nome a endereços de carteiras. Explore ferramentas e carteiras que priorizem a privacidade em suas transações on-chain. Consciência Situacional Aguçada: Sua rotina pode ser seu calcanhar de Aquiles. Varie trajetos, seja discreto em eventos cripto e, se necessário, considere auditorias de segurança para sua residência ou escritório. Planos de Contingência Robustos: Tenha um plano de crise. Carteiras multi-assinatura (multisig) ou módulos de segurança de hardware (HSMs) podem impedir transferências forçadas. Em caso de ameaça, contate as autoridades IMEDIATAMENTE. A Binance tem trabalhado ativamente com autoridades para combater esses crimes, mas a primeira linha de defesa é VOCÊ. Para Reflexão, Cryptograma: Você já parou para pensar na sua segurança física no contexto dos seus investimentos cripto? Quais medidas você já adota ou pretende adotar? Compartilhe suas estratégias e dúvidas nos comentários! Vamos fortalecer nossa comunidade com conhecimento e precaução. #BinanceSecurity #Cryptograma #BlockchainSecurity

ALERTA CRYPTOGRAMA: Sua Riqueza Cripto Está Segura no Mundo Real?

Saudações comudidade Glogal Cryptograma!
Percebemos que com a recente euforia e as altas do mercado cripto, um assunto crucial tem emergegido das sombras e exige nossa atenção: a segurança física de quem detém ativos digitais. Não é alarmismo, é preparo estratégico.
O artigo recente da Equipe de Segurança Física da Binance (que você pode conferir no blog da Binance) joga luz sobre uma tendência preocupante: embora ainda raros comparados a crimes comuns, os ataques físicos direcionados a investidores e profissionais de cripto estão aumentando, especialmente em períodos de alta do mercado.
Por Que Isso Importa AGORA?
Criminosos estão cada vez mais sofisticados. Se as defesas digitais se fortalecem, eles buscam o "elo mais fraco", que muitas vezes pode ser o próprio indivíduo no mundo físico. Casos de sequestro e coação para transferência de fundos, como o do cofundador da Ledger em janeiro de 2025, são um duro lembrete de que a segurança 360º é vital.
Onde Mora o Perigo?
Regiões em Foco: América do Norte, Europa Ocidental e Sudeste Asiático têm visto um número maior desses incidentes.
Quem é o Alvo? Indivíduos com exposição pública (influenciadores, empresários do setor, traders conhecidos) ou aqueles que se presume terem acesso direto a grandes volumes de criptoativos.

Blindando Sua Fortaleza Cripto (Além do Digital): 5 Pilares Essenciais
Discrição é Poder: Evite ostentar seus holdings ou ganhos em plataformas públicas. Sua "identidade cripto" online não precisa gritar riqueza. Menos holofotes, menos alvos.
Privacidade Digital Reforçada: Suas redes sociais podem ser um mapa para criminosos. Desative geotags, evite compartilhar planos de viagem em tempo real e configure suas contas para o modo privado.
Ofusque a Propriedade de Carteiras: Não vincule publicamente seu nome a endereços de carteiras. Explore ferramentas e carteiras que priorizem a privacidade em suas transações on-chain.
Consciência Situacional Aguçada: Sua rotina pode ser seu calcanhar de Aquiles. Varie trajetos, seja discreto em eventos cripto e, se necessário, considere auditorias de segurança para sua residência ou escritório.
Planos de Contingência Robustos: Tenha um plano de crise. Carteiras multi-assinatura (multisig) ou módulos de segurança de hardware (HSMs) podem impedir transferências forçadas. Em caso de ameaça, contate as autoridades IMEDIATAMENTE.
A Binance tem trabalhado ativamente com autoridades para combater esses crimes, mas a primeira linha de defesa é VOCÊ.
Para Reflexão, Cryptograma:
Você já parou para pensar na sua segurança física no contexto dos seus investimentos cripto? Quais medidas você já adota ou pretende adotar? Compartilhe suas estratégias e dúvidas nos comentários! Vamos fortalecer nossa comunidade com conhecimento e precaução.
#BinanceSecurity #Cryptograma #BlockchainSecurity
⚠️ North Korean Hackers Strike Again: $5.2M+ in Crypto Vanishes! 🧨🪙 According to PANews and blockchain sleuth ZachXBT, a major crypto heist has unfolded. Suspected DPRK hackers allegedly drained $5.2 million+ from multiple wallets and exchange accounts on May 24. The Breakdown: 🔓 Multi-signature wallets & regular accounts compromised 🕳️ Funds funneled into Tornado Cash to cover tracks 💰 1,000 ETH laundered yesterday alone 🔍 Traced wallet addresses: ▫️ 0x9d42...bea ▫️ 0x4be5...5c3 ▫️ 0x3108...8a3 This is a wake-up call for the crypto community: Cyber threats are evolving—make sure your security is too. #CryptoHack #DPRKHackers #TornadoCash #BlockchainSecurity #ZachXBT #cybercrime #CryptoNews #DeFiRisks Suspected
⚠️ North Korean Hackers Strike Again: $5.2M+ in Crypto Vanishes! 🧨🪙

According to PANews and blockchain sleuth ZachXBT, a major crypto heist has unfolded.
Suspected DPRK hackers allegedly drained $5.2 million+ from multiple wallets and exchange accounts on May 24.

The Breakdown:
🔓 Multi-signature wallets & regular accounts compromised
🕳️ Funds funneled into Tornado Cash to cover tracks
💰 1,000 ETH laundered yesterday alone
🔍 Traced wallet addresses:
▫️ 0x9d42...bea
▫️ 0x4be5...5c3
▫️ 0x3108...8a3

This is a wake-up call for the crypto community:
Cyber threats are evolving—make sure your security is too.

#CryptoHack #DPRKHackers #TornadoCash #BlockchainSecurity #ZachXBT #cybercrime #CryptoNews #DeFiRisks

Suspected
Massive Hack Hits Cetus: Overflow Bug Leads to $223 Million LossA seemingly minor yet critical bug in the code of the decentralized protocol Cetus has cost users a staggering $223 million. A detailed analysis by the cybersecurity firm Dedaub revealed a serious flaw in the logic of Cetus' automated market maker (AMM), which hackers were able to exploit on a massive scale. ⚠️ Subtle Bug, Devastating Consequences According to Dedaub, the main cause of the exploit was an "overflow" bug—a technical vulnerability that arises when a system fails to handle large numerical inputs correctly during mathematical operations. Instead of rejecting these oversized values, the system improperly truncated them, which made the resulting output appear far smaller than it actually should have been. The attacker exploited this flaw by depositing only a single token, yet the protocol mistakenly credited them with a massive liquidity position. That position was then used to withdraw substantial real assets from liquidity pools. 💻 The Bug Survived Migration to Sui Network Even after the Cetus codebase was migrated to the Sui blockchain, the critical vulnerability remained intact. Developers did attempt to implement security checks, but the overflow protection was flawed, allowing the same type of exploit to slip through unnoticed once again. “This incident highlights why edge cases in DeFi cannot be overlooked,” Dedaub warned, emphasizing that the complex math behind decentralized finance systems requires rigorous manual auditing and extreme caution. 📉 Fallout: Token Crash and Market Panic The Cetus exploit occurred in the early hours of May 22, marking one of the largest financial losses ever recorded within the Sui ecosystem. Initial reports pointed to a potential Oracle error, but deeper investigation revealed that the core issue was much more serious. The exploit led to over $223 million in losses across various liquidity pools. The breach immediately triggered a massive token sell-off, with SUI and CETUS tokens plummeting over 40% in just a few hours. Smaller memecoins and low-cap tokens suffered even more dramatic drops—some losing more than 90% of their value. 🔒 Response: Freezing Funds and Bounty Offer In a coordinated response, the Sui Foundation worked with validators in an attempt to freeze approximately $163 million of the stolen assets. Cetus also announced a $5 million bounty for information that could lead to identifying the attacker. 📌 Summary 🔹 A simple code bug caused one of the biggest DeFi thefts 🔹 The attacker exploited an overflow bug to gain a huge liquidity position 🔹 Token prices plunged as panic spread across the market 🔹 Efforts are underway to freeze stolen funds and track the perpetrator What’s your take on this? Are DeFi protocols still too vulnerable to replace traditional financial systems? #defi , #CryptoNewss , #BlockchainSecurity , #CryptoSecurity , #CyberSecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Massive Hack Hits Cetus: Overflow Bug Leads to $223 Million Loss

A seemingly minor yet critical bug in the code of the decentralized protocol Cetus has cost users a staggering $223 million. A detailed analysis by the cybersecurity firm Dedaub revealed a serious flaw in the logic of Cetus' automated market maker (AMM), which hackers were able to exploit on a massive scale.

⚠️ Subtle Bug, Devastating Consequences
According to Dedaub, the main cause of the exploit was an "overflow" bug—a technical vulnerability that arises when a system fails to handle large numerical inputs correctly during mathematical operations.
Instead of rejecting these oversized values, the system improperly truncated them, which made the resulting output appear far smaller than it actually should have been. The attacker exploited this flaw by depositing only a single token, yet the protocol mistakenly credited them with a massive liquidity position. That position was then used to withdraw substantial real assets from liquidity pools.

💻 The Bug Survived Migration to Sui Network
Even after the Cetus codebase was migrated to the Sui blockchain, the critical vulnerability remained intact. Developers did attempt to implement security checks, but the overflow protection was flawed, allowing the same type of exploit to slip through unnoticed once again.
“This incident highlights why edge cases in DeFi cannot be overlooked,” Dedaub warned, emphasizing that the complex math behind decentralized finance systems requires rigorous manual auditing and extreme caution.

📉 Fallout: Token Crash and Market Panic
The Cetus exploit occurred in the early hours of May 22, marking one of the largest financial losses ever recorded within the Sui ecosystem. Initial reports pointed to a potential Oracle error, but deeper investigation revealed that the core issue was much more serious.
The exploit led to over $223 million in losses across various liquidity pools. The breach immediately triggered a massive token sell-off, with SUI and CETUS tokens plummeting over 40% in just a few hours. Smaller memecoins and low-cap tokens suffered even more dramatic drops—some losing more than 90% of their value.

🔒 Response: Freezing Funds and Bounty Offer
In a coordinated response, the Sui Foundation worked with validators in an attempt to freeze approximately $163 million of the stolen assets. Cetus also announced a $5 million bounty for information that could lead to identifying the attacker.

📌 Summary
🔹 A simple code bug caused one of the biggest DeFi thefts

🔹 The attacker exploited an overflow bug to gain a huge liquidity position

🔹 Token prices plunged as panic spread across the market

🔹 Efforts are underway to freeze stolen funds and track the perpetrator

What’s your take on this? Are DeFi protocols still too vulnerable to replace traditional financial systems?

#defi , #CryptoNewss , #BlockchainSecurity , #CryptoSecurity , #CyberSecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Coinbase Faces Lawsuit: Investor Alleges Data Breach Cover-Up and Regulatory ViolationsU.S. cryptocurrency exchange Coinbase is under fire—this time in the form of a class action lawsuit. Investor Brady Nessler claims the company withheld crucial information about a serious data breach and failed to disclose regulatory issues in the UK, ultimately harming shareholders. According to the lawsuit, Coinbase deliberately delayed disclosing a security incident that compromised customer data and failed to properly inform investors about a $4.5 million fine imposed by the UK’s Financial Conduct Authority (FCA). Both events allegedly had a negative impact on stock value and investor trust. Data breach and extortion: details emerged too late Coinbase reportedly fell victim to a sophisticated cyberattack during which hackers obtained sensitive client data, including names, addresses, and identification information. The attackers allegedly bribed foreign support staff to gain access. More troubling, the lawsuit states Coinbase kept this incident hidden from the public. It wasn’t until May 15, 2025—months after the breach—that the company confirmed a $20 million extortion attempt. On that same day, Coinbase stock dropped sharply by 7.2%, closing at $244 per share. “By keeping this hidden, investors lost millions. Coinbase breached its duty to inform shareholders and caused serious harm,” the lawsuit claims. Second blow: fine from UK regulators The lawsuit also references a July 2024 fine from the FCA, imposed on Coinbase’s British subsidiary, CB Payments Ltd. The regulator found that CBPL allowed access to over 13,000 high-risk users in violation of a 2020 agreement banning such onboarding. As a result, nearly $226 million in crypto transactions were processed illegally. When this fine was announced, Coinbase’s stock fell 5.52% to $231.52 per share. Lawsuit demands: compensation and a trial Nessler is requesting class action status for the suit and is seeking financial compensation for all shareholders who purchased COIN stock between April 2021 and May 2025. He is also asking for legal fees to be covered and for the case to go to jury trial. Coinbase has not yet issued a public response. Since the disclosure, COIN shares have partially recovered but still dropped 3.23% on May 23, closing at $263.10, according to Yahoo Finance. #coinbase , #CryptoNewss , #Regulation , #BlockchainSecurity , #DigitalAssets Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Coinbase Faces Lawsuit: Investor Alleges Data Breach Cover-Up and Regulatory Violations

U.S. cryptocurrency exchange Coinbase is under fire—this time in the form of a class action lawsuit. Investor Brady Nessler claims the company withheld crucial information about a serious data breach and failed to disclose regulatory issues in the UK, ultimately harming shareholders.
According to the lawsuit, Coinbase deliberately delayed disclosing a security incident that compromised customer data and failed to properly inform investors about a $4.5 million fine imposed by the UK’s Financial Conduct Authority (FCA). Both events allegedly had a negative impact on stock value and investor trust.

Data breach and extortion: details emerged too late
Coinbase reportedly fell victim to a sophisticated cyberattack during which hackers obtained sensitive client data, including names, addresses, and identification information. The attackers allegedly bribed foreign support staff to gain access.
More troubling, the lawsuit states Coinbase kept this incident hidden from the public. It wasn’t until May 15, 2025—months after the breach—that the company confirmed a $20 million extortion attempt. On that same day, Coinbase stock dropped sharply by 7.2%, closing at $244 per share.
“By keeping this hidden, investors lost millions. Coinbase breached its duty to inform shareholders and caused serious harm,” the lawsuit claims.

Second blow: fine from UK regulators
The lawsuit also references a July 2024 fine from the FCA, imposed on Coinbase’s British subsidiary, CB Payments Ltd. The regulator found that CBPL allowed access to over 13,000 high-risk users in violation of a 2020 agreement banning such onboarding.
As a result, nearly $226 million in crypto transactions were processed illegally. When this fine was announced, Coinbase’s stock fell 5.52% to $231.52 per share.

Lawsuit demands: compensation and a trial
Nessler is requesting class action status for the suit and is seeking financial compensation for all shareholders who purchased COIN stock between April 2021 and May 2025. He is also asking for legal fees to be covered and for the case to go to jury trial.
Coinbase has not yet issued a public response. Since the disclosure, COIN shares have partially recovered but still dropped 3.23% on May 23, closing at $263.10, according to Yahoo Finance.

#coinbase , #CryptoNewss , #Regulation , #BlockchainSecurity , #DigitalAssets

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
$223M HEIST on Sui Network! The DeFi world just got rocked Cetus DEX was hacked for over $223,000,000 in minutes. But here’s the INSANE part Sui validators FROZE $162M of the stolen crypto! Yes mid hack. LIVE. ON-CHAIN. Is this next-level blockchain security? Or the start of chain-level control that kills decentralization? Think fast: If a network can freeze YOUR funds to stop a hacker. can it also freeze YOU? Drop your take. This changes everything. {spot}(SUIUSDT) #cetushack #SuiNetwork #CryptoScandal #BlockchainSecurity #thecryptoheadquarters
$223M HEIST on Sui Network!

The DeFi world just got rocked
Cetus DEX was hacked for over $223,000,000 in minutes.

But here’s the INSANE part
Sui validators FROZE $162M of the stolen crypto!
Yes mid hack. LIVE. ON-CHAIN.

Is this next-level blockchain security?
Or the start of chain-level control that kills decentralization?

Think fast:
If a network can freeze YOUR funds to stop a hacker.
can it also freeze YOU?
Drop your take. This changes everything.

#cetushack #SuiNetwork #CryptoScandal #BlockchainSecurity #thecryptoheadquarters
SUI bị hack $223 triệu: Cú sốc lớn, phản ứng nhanh, nhưng drama vẫn chưa hết” Ngày 22/5/2025, Cetus Protocol – sàn DEX lớn nhất trên mạng lưới Sui – bị hack mất $223 triệu, gây chấn động cộng đồng. Ngay sau đó, các validator của Sui đã đóng băng $162 triệu tài sản bị đánh cắp, thể hiện khả năng phản ứng nhanh và hiệu quả của mạng lưới.   Tuy nhiên, quyết định này cũng gây tranh cãi khi một số người cho rằng việc đóng băng tài sản có thể ảnh hưởng đến tính bất biến của blockchain.  Để khuyến khích hacker trả lại tài sản, Cetus đã đưa ra đề nghị thưởng $6 triệu nếu hacker hợp tác.  Hiện tại, giá SUI đang dao động quanh mức $3.62, giảm nhẹ so với trước vụ tấn công. Vụ việc này là lời nhắc nhở về tầm quan trọng của bảo mật trong DeFi và khả năng ứng phó nhanh chóng của các mạng lưới blockchain. #SUİ #cetushack k #BlockchainSecurity y #defi #CryptoNews $SUI {spot}(SUIUSDT)
SUI bị hack $223 triệu: Cú sốc lớn, phản ứng nhanh, nhưng drama vẫn chưa hết”

Ngày 22/5/2025, Cetus Protocol – sàn DEX lớn nhất trên mạng lưới Sui – bị hack mất $223 triệu, gây chấn động cộng đồng. Ngay sau đó, các validator của Sui đã đóng băng $162 triệu tài sản bị đánh cắp, thể hiện khả năng phản ứng nhanh và hiệu quả của mạng lưới.  

Tuy nhiên, quyết định này cũng gây tranh cãi khi một số người cho rằng việc đóng băng tài sản có thể ảnh hưởng đến tính bất biến của blockchain. 

Để khuyến khích hacker trả lại tài sản, Cetus đã đưa ra đề nghị thưởng $6 triệu nếu hacker hợp tác. 

Hiện tại, giá SUI đang dao động quanh mức $3.62, giảm nhẹ so với trước vụ tấn công.

Vụ việc này là lời nhắc nhở về tầm quan trọng của bảo mật trong DeFi và khả năng ứng phó nhanh chóng của các mạng lưới blockchain.

#SUİ #cetushack k #BlockchainSecurity y #defi #CryptoNews $SUI
$230 Million DeFi Exploit Shakes SUI Ecosystemاختراق DeFi يهز نظام SUI بخسائر تتجاوز 230 مليون دولار! On May 22, 2025, Cetus, a major liquidity provider on the $SUI blockchain, was exploited, resulting in a massive $230M loss. The exploit was due to a vulnerability in the checked_shlw mathematical function, allowing an attacker to convert assets at almost no cost. في 22 مايو 2025، تعرض بروتوكول Cetus على شبكة SUI لاختراق أمني خطير أدى إلى خسارة 230 مليون دولار. تم استغلال ثغرة في دالة رياضية ضمن العقود الذكية سمحت بتحويل الأصول بتكلفة شبه معدومة. ✨✨Key Findings | أبرز التفاصيل✨✨ Exploit Trigger: Malicious use of a math function overflow.Immediate Action: Cetus suspended smart contract operations.Security Report: SlowMist confirmed the flaw and urged stricter validation.Market Impact: Multiple token pairs affected, draining liquidity pools.SUI Price: Slight dip to $3.64 but remains up 47.8% in the last 60 days.Community Response: Calls for tighter security and audit protocols. تفاصيل فنية: تم استغلال خطأ في دالة حسابية تُدعى checked_shlwتم تعليق العقود الذكية مؤقتاً لاحتواء الهجومتقرير SlowMist حذّر من تجاهل حدود الدوال الحسابيةتراجعت السيولة في عدة أزواج تداولسعر $SUI انخفض بشكل طفيف لكنه لا يزال مرتفعاً بنسبة 47.8٪ خلال الشهرين الماضيين ✨✨Why It Matters | لماذا هذا مهم؟✨✨ This incident exposes the fragility of DeFi platforms and the risks from overlooked technical boundaries in smart contracts. It also highlights the growing need for thorough security audits in rapidly scaling ecosystems like SUI. هذا الهجوم يسلط الضوء على الهشاشة الأمنية في قطاع DeFi، وضرورة إجراء مراجعات دقيقة للكود البرمجي، خصوصاً مع توسع شبكات مثل SUI. ✨✨Looking Ahead | نظرة مستقبلية✨✨ Cetus is working with SUI and SlowMist to recover assets and secure user funds.This may trigger regulatory scrutiny on how DeFi protocols handle smart contract safety.Positive outcome? Many past hacks have accelerated security upgrades and industry maturity. تعمل Cetus بالتعاون مع فريق SUI وخبراء الأمن لاستعادة الأموال. وقد يؤدي هذا الاختراق إلى زيادة رقابة الجهات التنظيمية على منصات DeFi. في المقابل، مثل هذه الحوادث دفعت العديد من البروتوكولات لتحسين مستوى الأمان وتطوير حلول حماية أقوى. ✨✨DeFi is powerful but not without risk — secure coding matters✨✨ DeFi قوي لكن لا يخلو من المخاطر — الأمان البرمجي أمر حاسم. #Cetus #SUI #DeFi #CryptoNews #BlockchainSecurity @Flicky123Nohawn

$230 Million DeFi Exploit Shakes SUI Ecosystem

اختراق DeFi يهز نظام SUI بخسائر تتجاوز 230 مليون دولار!
On May 22, 2025, Cetus, a major liquidity provider on the $SUI blockchain, was exploited, resulting in a massive $230M loss. The exploit was due to a vulnerability in the checked_shlw mathematical function, allowing an attacker to convert assets at almost no cost.
في 22 مايو 2025، تعرض بروتوكول Cetus على شبكة SUI لاختراق أمني خطير أدى إلى خسارة 230 مليون دولار. تم استغلال ثغرة في دالة رياضية ضمن العقود الذكية سمحت بتحويل الأصول بتكلفة شبه معدومة.

✨✨Key Findings | أبرز التفاصيل✨✨
Exploit Trigger: Malicious use of a math function overflow.Immediate Action: Cetus suspended smart contract operations.Security Report: SlowMist confirmed the flaw and urged stricter validation.Market Impact: Multiple token pairs affected, draining liquidity pools.SUI Price: Slight dip to $3.64 but remains up 47.8% in the last 60 days.Community Response: Calls for tighter security and audit protocols.

تفاصيل فنية:
تم استغلال خطأ في دالة حسابية تُدعى checked_shlwتم تعليق العقود الذكية مؤقتاً لاحتواء الهجومتقرير SlowMist حذّر من تجاهل حدود الدوال الحسابيةتراجعت السيولة في عدة أزواج تداولسعر $SUI انخفض بشكل طفيف لكنه لا يزال مرتفعاً بنسبة 47.8٪ خلال الشهرين الماضيين

✨✨Why It Matters | لماذا هذا مهم؟✨✨
This incident exposes the fragility of DeFi platforms and the risks from overlooked technical boundaries in smart contracts. It also highlights the growing need for thorough security audits in rapidly scaling ecosystems like SUI.
هذا الهجوم يسلط الضوء على الهشاشة الأمنية في قطاع DeFi، وضرورة إجراء مراجعات دقيقة للكود البرمجي، خصوصاً مع توسع شبكات مثل SUI.

✨✨Looking Ahead | نظرة مستقبلية✨✨
Cetus is working with SUI and SlowMist to recover assets and secure user funds.This may trigger regulatory scrutiny on how DeFi protocols handle smart contract safety.Positive outcome? Many past hacks have accelerated security upgrades and industry maturity.
تعمل Cetus بالتعاون مع فريق SUI وخبراء الأمن لاستعادة الأموال.

وقد يؤدي هذا الاختراق إلى زيادة رقابة الجهات التنظيمية على منصات DeFi.

في المقابل، مثل هذه الحوادث دفعت العديد من البروتوكولات لتحسين مستوى الأمان وتطوير حلول حماية أقوى.

✨✨DeFi is powerful but not without risk — secure coding matters✨✨

DeFi قوي لكن لا يخلو من المخاطر — الأمان البرمجي أمر حاسم.

#Cetus #SUI #DeFi #CryptoNews #BlockchainSecurity
@Nohawn
Logga in för att utforska mer innehåll
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer