Binance Square

hackers

355,243 visningar
124 diskuterar
Moon5labs
--
Tornado Cash: Roman Storm Rejects Hacker’s Money and Sends a Clear DeFi Ethics SignalIn a world where crypto walks a fine line between privacy protection and technological abuse, a dramatic twist has shaken the story of Tornado Cash. Its co-founder Roman Storm has become the center of attention after an anonymous crypto hacker sent a 10 ETH “donation”—just as Storm faces serious charges for allegedly laundering money through the controversial privacy protocol. But instead of quietly accepting the funds, Storm made a bold, public move: he rejected the money—and reignited a debate on morality, accountability, and the future of decentralized finance (DeFi). 💸 Hacker’s “Gift”: An Ethical Trap in Real Time It all began with an attack on Cork Protocol, where a hacker stole over 4,500 ETH (around $11 million) and anonymized the funds through Tornado Cash. Shortly after, 10 ETH landed in Roman Storm’s legal defense fund—apparently sent by the same attacker. With Storm currently facing U.S. charges for money laundering and sanction violations, accepting such funds could have been a fatal mistake—legally and publicly. But Storm didn’t hesitate. He took to X (formerly Twitter) and declared he would reject the money and return it directly to the Cork Protocol team, the victims of the hack. ⚖️ A Strong Statement Beyond Legal Defense Storm’s move is more than a smart legal play. It’s a clear ethical message: 🔹 He rejected tainted funds, even though he needs them for his defense. 🔹 He preserved his credibility while under intense legal scrutiny. 🔹 He condemned the misuse of Tornado Cash, proving that developers of decentralized tools care about their impact. 🌐 Privacy vs. Law: DeFi’s Ongoing Dilemma Storm’s case is a textbook example of the deep conflict dividing the crypto world: 🔹 Should developers be held responsible for how their code is used? 🔹 Can privacy be a crime when it also shields bad actors? 🔹 How can regulators protect people without killing innovation? Tornado Cash was created to offer financial privacy—not to launder stolen crypto. But criminals quickly found ways to exploit it. And that brought sanctions, charges, and arrests. 🧭 What Does It Mean for the Future of Blockchain? Storm’s choice may set a precedent. It sends a clear message: ethics matter, even in a decentralized world. Crypto isn’t just about code—it’s about trust. If DeFi wants to survive and thrive, it must be built on transparency, responsibility, and moral clarity. Storm’s action may help reinforce those pillars. 📌 Bottom Line: Code Isn’t Enough – It’s About Trust Roman Storm rejected money from a hacker—and in doing so, wrote one of the most pivotal chapters in DeFi history. This wasn’t just about ethics or courtroom strategy. It was a signal that even in decentralized systems, there are lines that must not be crossed. His decision could impact not only the outcome of his trial—but also the future of the entire crypto space. #TornadoCash , #defi , #hackers , #CryptoHack , #CryptoNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Tornado Cash: Roman Storm Rejects Hacker’s Money and Sends a Clear DeFi Ethics Signal

In a world where crypto walks a fine line between privacy protection and technological abuse, a dramatic twist has shaken the story of Tornado Cash. Its co-founder Roman Storm has become the center of attention after an anonymous crypto hacker sent a 10 ETH “donation”—just as Storm faces serious charges for allegedly laundering money through the controversial privacy protocol.
But instead of quietly accepting the funds, Storm made a bold, public move: he rejected the money—and reignited a debate on morality, accountability, and the future of decentralized finance (DeFi).

💸 Hacker’s “Gift”: An Ethical Trap in Real Time
It all began with an attack on Cork Protocol, where a hacker stole over 4,500 ETH (around $11 million) and anonymized the funds through Tornado Cash. Shortly after, 10 ETH landed in Roman Storm’s legal defense fund—apparently sent by the same attacker.
With Storm currently facing U.S. charges for money laundering and sanction violations, accepting such funds could have been a fatal mistake—legally and publicly.
But Storm didn’t hesitate. He took to X (formerly Twitter) and declared he would reject the money and return it directly to the Cork Protocol team, the victims of the hack.

⚖️ A Strong Statement Beyond Legal Defense
Storm’s move is more than a smart legal play. It’s a clear ethical message:
🔹 He rejected tainted funds, even though he needs them for his defense.

🔹 He preserved his credibility while under intense legal scrutiny.

🔹 He condemned the misuse of Tornado Cash, proving that developers of decentralized tools care about their impact.

🌐 Privacy vs. Law: DeFi’s Ongoing Dilemma
Storm’s case is a textbook example of the deep conflict dividing the crypto world:
🔹 Should developers be held responsible for how their code is used?

🔹 Can privacy be a crime when it also shields bad actors?

🔹 How can regulators protect people without killing innovation?
Tornado Cash was created to offer financial privacy—not to launder stolen crypto. But criminals quickly found ways to exploit it. And that brought sanctions, charges, and arrests.

🧭 What Does It Mean for the Future of Blockchain?
Storm’s choice may set a precedent. It sends a clear message: ethics matter, even in a decentralized world. Crypto isn’t just about code—it’s about trust.
If DeFi wants to survive and thrive, it must be built on transparency, responsibility, and moral clarity. Storm’s action may help reinforce those pillars.

📌 Bottom Line: Code Isn’t Enough – It’s About Trust
Roman Storm rejected money from a hacker—and in doing so, wrote one of the most pivotal chapters in DeFi history. This wasn’t just about ethics or courtroom strategy. It was a signal that even in decentralized systems, there are lines that must not be crossed.
His decision could impact not only the outcome of his trial—but also the future of the entire crypto space.

#TornadoCash , #defi , #hackers , #CryptoHack , #CryptoNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
The Crypto Market Doesn't Care About Your Beliefs/EmotionsWatch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, unscammable, and FRUSTRATE HACKERS even WITH exposed seedphrases: U - T V B E ( @HackersFrustrator ) T ! |< t 0 |< ( @HackersFrustrator ) X ( @HACKERFRUSTRATE ) When the crypto market takes a downturn, some people might attribute it to various factors, including external forces beyond our control. One claim that often surfaces is that "God is annoyed." While beliefs and spirituality are personal and valid, let's take a closer look at this idea. The Market Moves on Its Own The crypto market operates based on supply and demand, driven by human actions, market sentiment, and economic principles. Prices rise and fall due to factors like: - Market Sentiment: How investors feel about the market can greatly influence price movements. - Economic Indicators: Factors like inflation, interest rates, and global economic health play a role. - Technological Developments: Advances in blockchain technology and adoption rates can impact prices. - Regulatory News: Government policies and regulations can cause significant market shifts. The Role of Human Decision-Making The crypto market is shaped by the collective actions of millions of individuals making decisions based on their own research, risk tolerance, and investment strategies. It's a system driven by human behavior, not divine intervention. A Rational Perspective When the market experiences volatility, it's essential to rely on data and logical analysis rather than attributing market movements to supernatural forces. By understanding the real factors at play, investors can make more informed decisions. In summary, the crypto market is a complex system influenced by human actions and economic principles. While personal beliefs are important, it's crucial to separate them from market analysis. By focusing on the factors that truly drive the market, investors can navigate the ups and downs with greater clarity and confidence. Stay ahead of the game and protect your digital assets from SCAMMERS & HACKERS. Remember, God doesn't give a fvck about your crypto portfolio – it's up to you to stay informed and secure. Watch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, and FRUSTRATE HACKERS: U - T V B E ( @HackersFrustrator ) T ! |< t 0 |< ( @HackersFrustrator ) X ( @HACKERFRUSTRATE ) #BinanceAlphaAlert #MarketRebound #SaylorBTCPurchase #hackers #Hack

The Crypto Market Doesn't Care About Your Beliefs/Emotions

Watch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, unscammable, and FRUSTRATE HACKERS even WITH exposed seedphrases:
U - T V B E ( @HackersFrustrator )
T ! |< t 0 |< ( @HackersFrustrator )
X ( @HACKERFRUSTRATE )

When the crypto market takes a downturn, some people might attribute it to various factors, including external forces beyond our control. One claim that often surfaces is that "God is annoyed." While beliefs and spirituality are personal and valid, let's take a closer look at this idea.

The Market Moves on Its Own
The crypto market operates based on supply and demand, driven by human actions, market sentiment, and economic principles. Prices rise and fall due to factors like:
- Market Sentiment: How investors feel about the market can greatly influence price movements.
- Economic Indicators: Factors like inflation, interest rates, and global economic health play a role.
- Technological Developments: Advances in blockchain technology and adoption rates can impact prices.
- Regulatory News: Government policies and regulations can cause significant market shifts.
The Role of Human Decision-Making
The crypto market is shaped by the collective actions of millions of individuals making decisions based on their own research, risk tolerance, and investment strategies. It's a system driven by human behavior, not divine intervention.
A Rational Perspective
When the market experiences volatility, it's essential to rely on data and logical analysis rather than attributing market movements to supernatural forces. By understanding the real factors at play, investors can make more informed decisions.
In summary, the crypto market is a complex system influenced by human actions and economic principles. While personal beliefs are important, it's crucial to separate them from market analysis. By focusing on the factors that truly drive the market, investors can navigate the ups and downs with greater clarity and confidence.
Stay ahead of the game and protect your digital assets from SCAMMERS & HACKERS. Remember, God doesn't give a fvck about your crypto portfolio – it's up to you to stay informed and secure.

Watch out for our new channels/handles for more videos on how to remain untouchable, UnHackable, and FRUSTRATE HACKERS:
U - T V B E ( @HackersFrustrator )
T ! |< t 0 |< ( @HackersFrustrator )
X ( @HACKERFRUSTRATE )
#BinanceAlphaAlert #MarketRebound #SaylorBTCPurchase #hackers #Hack
🚨 Hackers de Sombrero Blanco: Cuando los Piratas Salvan Millones en CriptoNo todos los hackers son delincuentes. En el mundo de las criptomonedas, existen los llamados “#hackers de sombrero blanco” (white hat hackers), expertos que encuentran vulnerabilidades… pero en lugar de robar fondos, alertan a los desarrolladores y, en muchos casos, evitan pérdidas multimillonarias. Aquí te contamos los casos más sorprendentes. 🛡️ ¿Qué es un hacker de sombrero blanco? Es un experto en ciberseguridad que prueba los sistemas en busca de fallos, pero lo hace de manera ética, informando los errores y, a veces, cobrando recompensas conocidas como “bug bounties”. 💥 Casos Reales donde los White Hats Salvaron el Día 1️⃣ Poly Network (2021): $610 millones devueltos Uno de los mayores hackeos de la historia. Un atacante robó $610 millones de la plataforma DeFi #poly Network… pero resultó ser un hacker ético. Tras demostrar la vulnerabilidad, devolvió todo el dinero, afirmando que su intención era exponer las fallas. 2️⃣ Wormhole Bridge (2022): Fuga de $320 millones evitada Un hacker descubrió una brecha crítica en el puente Wormhole, que conecta blockchains como $ETH y $SOL . Gracias a su reporte rápido, se corrigió el fallo antes de que los fondos fueran robados. 3️⃣ Aurora Protocol (2022): $200 millones protegidos El investigador de seguridad pwning.eth halló una vulnerabilidad en #AURORA que podría haber permitido un robo masivo. La plataforma lo recompensó con $6 millones, evitando una tragedia. 4️⃣ MakerDAO y múltiples rescates silenciosos MakerDAO y otros protocolos han pagado recompensas constantes a hackers éticos que descubren fallas antes de que los atacantes maliciosos las exploten. 🎯 ¿Por qué importan los hackers éticos? Protegen la infraestructura crítica de DeFi.Evitan que las personas pierdan sus fondos.Incentivan el desarrollo de sistemas más robustos.Son aliados invisibles en la seguridad del ecosistema cripto. 💬 Conclusión En el salvaje oeste de las criptomonedas, no todo es caos. Gracias a los hackers de sombrero blanco, los proyectos se fortalecen, y los usuarios están más protegidos. 👁️‍🗨️ En iniciativas como #BitValue , donde los datos se convierten en valor, la seguridad es una prioridad. La colaboración con la comunidad de expertos éticos garantiza que el ecosistema siga siendo confiable y accesible para todos.

🚨 Hackers de Sombrero Blanco: Cuando los Piratas Salvan Millones en Cripto

No todos los hackers son delincuentes. En el mundo de las criptomonedas, existen los llamados “#hackers de sombrero blanco” (white hat hackers), expertos que encuentran vulnerabilidades… pero en lugar de robar fondos, alertan a los desarrolladores y, en muchos casos, evitan pérdidas multimillonarias.
Aquí te contamos los casos más sorprendentes.
🛡️ ¿Qué es un hacker de sombrero blanco?
Es un experto en ciberseguridad que prueba los sistemas en busca de fallos, pero lo hace de manera ética, informando los errores y, a veces, cobrando recompensas conocidas como “bug bounties”.
💥 Casos Reales donde los White Hats Salvaron el Día

1️⃣ Poly Network (2021): $610 millones devueltos
Uno de los mayores hackeos de la historia. Un atacante robó $610 millones de la plataforma DeFi #poly Network… pero resultó ser un hacker ético. Tras demostrar la vulnerabilidad, devolvió todo el dinero, afirmando que su intención era exponer las fallas.
2️⃣ Wormhole Bridge (2022): Fuga de $320 millones evitada
Un hacker descubrió una brecha crítica en el puente Wormhole, que conecta blockchains como $ETH y $SOL . Gracias a su reporte rápido, se corrigió el fallo antes de que los fondos fueran robados.
3️⃣ Aurora Protocol (2022): $200 millones protegidos
El investigador de seguridad pwning.eth halló una vulnerabilidad en #AURORA que podría haber permitido un robo masivo. La plataforma lo recompensó con $6 millones, evitando una tragedia.
4️⃣ MakerDAO y múltiples rescates silenciosos
MakerDAO y otros protocolos han pagado recompensas constantes a hackers éticos que descubren fallas antes de que los atacantes maliciosos las exploten.

🎯 ¿Por qué importan los hackers éticos?
Protegen la infraestructura crítica de DeFi.Evitan que las personas pierdan sus fondos.Incentivan el desarrollo de sistemas más robustos.Son aliados invisibles en la seguridad del ecosistema cripto.

💬 Conclusión
En el salvaje oeste de las criptomonedas, no todo es caos. Gracias a los hackers de sombrero blanco, los proyectos se fortalecen, y los usuarios están más protegidos.

👁️‍🗨️ En iniciativas como #BitValue , donde los datos se convierten en valor, la seguridad es una prioridad. La colaboración con la comunidad de expertos éticos garantiza que el ecosistema siga siendo confiable y accesible para todos.
CHC_07:
La naturaleza humana dominada por las tendencias oscuras es manifesta en donde halla codicia.
ALERT: Even #CoinMarketCap got hit! #Hackers injected a fake wallet verification pop-up on the site - tricking users into giving away their private keys. 🪤💀 Phishing just leveled up. Always double-check wallet prompts.
ALERT: Even #CoinMarketCap got hit!

#Hackers injected a fake wallet verification pop-up on the site - tricking users into giving away their private keys. 🪤💀

Phishing just leveled up.

Always double-check wallet prompts.
🚨 16 BILLION Passwords Leaked — The Biggest Hack in Internet History! 😱 A record-breaking cyberattack just shook the internet like never before! 👉 16 BILLION+ freshly stolen credentials have been leaked online. Not old data — newly hacked passwords stolen via malware directly from users’ devices. 🔥 Major platforms hit: Apple Google Facebook Telegram GitHub Even government websites 😨 Hackers now have access to: Emails Bank Accounts Crypto Wallets And much more! --- ⚠️ What You MUST Do Right Now: ✅ Change all your passwords immediately ✅ Enable Two-Factor Authentication (2FA) everywhere ✅ Never click on unknown links or open random files ✅ Use a trusted password manager ✅ Share this alert with your friends & family — help them stay safe too! --- This breach is 100x bigger than the last 184M record leak in May. It’s not just a data breach — it’s a full-on cyber crisis! 💻 Are YOU at risk? Better check now! #CyberAlert #DataLeak #Hackers #OnlineSecurity #StaySafe
🚨 16 BILLION Passwords Leaked — The Biggest Hack in Internet History! 😱

A record-breaking cyberattack just shook the internet like never before!
👉 16 BILLION+ freshly stolen credentials have been leaked online.

Not old data — newly hacked passwords stolen via malware directly from users’ devices.

🔥 Major platforms hit:

Apple

Google

Facebook

Telegram

GitHub

Even government websites 😨

Hackers now have access to:

Emails

Bank Accounts

Crypto Wallets

And much more!

---

⚠️ What You MUST Do Right Now:

✅ Change all your passwords immediately
✅ Enable Two-Factor Authentication (2FA) everywhere
✅ Never click on unknown links or open random files
✅ Use a trusted password manager
✅ Share this alert with your friends & family — help them stay safe too!

---

This breach is 100x bigger than the last 184M record leak in May.
It’s not just a data breach — it’s a full-on cyber crisis!

💻 Are YOU at risk? Better check now!

#CyberAlert #DataLeak #Hackers #OnlineSecurity #StaySafe
Un nuevo hackeo sucede mientras siguen los conflictos en el medio orienteEl Exchange de criptomonedas Nobitex, con sede en Irán, ha sido hackeado, perdiendo más de $ 80 millones de dólares en activos digitales, esto según publicó en sus redes el investigador ZachXBT. Pero aquí no queda la cosa, y es que este ataque pasaría desapercibido si no fuera porque los hackers que perpetraron este hecho son "proisrael", mandando un fuerte mensaje mientras se expande la guerra en el medio oriente ¿Cómo sucedió este ataque y quiénes son estos hackers? Exploremos. A tempranas horas del 18 de junio, el investigador en cadena ZachXBT publicó en su canal oficial de telegram. que el exchange de #Criptomonedas iraní “nobitex” había sido víctima de #hackers , quienes sustrajeron fondos por un valor total de $ 81.7 millones de dólares. Según el investigador, de alguna manera el grupo de hackers logró tener acceso a las billeteras calientes del Exchange de criptomonedas y pudieron retirar varios activos digitales a través de la red de tron y blockchains compatibles con la #Ethereum virtual Machine (EVM). Una vez que el Exchange detectó estos movimientos no autorizados, procedieron a suspender todo uso de esas billeteras. Lo interesante y que llama la atención en la comunidad es que estos hackers usaron “direcciones vanity” para poder retirar los activos digitales. Para conocimiento general, una "dirección vanity" es una secuencia de caracteres específicas definidas por el usuario. En pocas palabras, es una dirección donde tú puedes ponerle las palabras que quieras. Y como se observa, no perdieron la oportunidad para llamar la atención y enviar fuertes mensajes a través de este hecho. Lo que hace más interesante, es que al parecer estas direcciones serían direcciones de quema, es decir, direcciones las cuáles el grupo de hackers no tiene acceso alguno (no tienen las llaves privadas), por lo que en verdad esos $ 81.7 millones de dólares estarían técnicamente “quemados”. Los autores detrás de estos hechos se autodenominan “Gonjeshkedarande”, quienes son un grupo de hackers pro israelí. Luego de estos hechos, el grupo de hackers envió un mensaje a través de sus redes, haciendo fuertes acusaciones al Exchange Nobitex y su cercanía a grupos armados. Además, insta a sus usuarios a reirar todos sus fondos cuanto antes porque publicaría archivos internos del Exchange. Mientras tanto, Nobitex menciona que todos los fondos de los usuarios están seguros en su billetera fría, y que los daños serían compensados a cada usuario afectado. 👉Mas actualizaciones cripto ... Comparte y sigueme para más 👈😎 $ETH {spot}(ETHUSDT)

Un nuevo hackeo sucede mientras siguen los conflictos en el medio oriente

El Exchange de criptomonedas Nobitex, con sede en Irán, ha sido hackeado, perdiendo más de $ 80 millones de dólares en activos digitales, esto según publicó en sus redes el investigador ZachXBT. Pero aquí no queda la cosa, y es que este ataque pasaría desapercibido si no fuera porque los hackers que perpetraron este hecho son "proisrael", mandando un fuerte mensaje mientras se expande la guerra en el medio oriente ¿Cómo sucedió este ataque y quiénes son estos hackers? Exploremos.

A tempranas horas del 18 de junio, el investigador en cadena ZachXBT publicó en su canal oficial de telegram. que el exchange de #Criptomonedas iraní “nobitex” había sido víctima de #hackers , quienes sustrajeron fondos por un valor total de $ 81.7 millones de dólares.

Según el investigador, de alguna manera el grupo de hackers logró tener acceso a las billeteras calientes del Exchange de criptomonedas y pudieron retirar varios activos digitales a través de la red de tron y blockchains compatibles con la #Ethereum virtual Machine (EVM).

Una vez que el Exchange detectó estos movimientos no autorizados, procedieron a suspender todo uso de esas billeteras.
Lo interesante y que llama la atención en la comunidad es que estos hackers usaron “direcciones vanity” para poder retirar los activos digitales. Para conocimiento general, una "dirección vanity" es una secuencia de caracteres específicas definidas por el usuario. En pocas palabras, es una dirección donde tú puedes ponerle las palabras que quieras.

Y como se observa, no perdieron la oportunidad para llamar la atención y enviar fuertes mensajes a través de este hecho.

Lo que hace más interesante, es que al parecer estas direcciones serían direcciones de quema, es decir, direcciones las cuáles el grupo de hackers no tiene acceso alguno (no tienen las llaves privadas), por lo que en verdad esos $ 81.7 millones de dólares estarían técnicamente “quemados”.

Los autores detrás de estos hechos se autodenominan “Gonjeshkedarande”, quienes son un grupo de hackers pro israelí.

Luego de estos hechos, el grupo de hackers envió un mensaje a través de sus redes, haciendo fuertes acusaciones al Exchange Nobitex y su cercanía a grupos armados. Además, insta a sus usuarios a reirar todos sus fondos cuanto antes porque publicaría archivos internos del Exchange.

Mientras tanto, Nobitex menciona que todos los fondos de los usuarios están seguros en su billetera fría, y que los daños serían compensados a cada usuario afectado.

👉Mas actualizaciones cripto ...
Comparte y sigueme para más 👈😎
$ETH
On January 9, the US Securities and Exchange Commission (SEC) suffered a significant breach of cybersecurity and a loss of public confidence as a result of a social media account hack that led to a fake announcement about the approval of spot Bitcoin exchange-traded funds (ETFs). For a short while, hackers gained access to the SEC's X account and released a statement purporting the organisation had approved the much anticipated products, which momentarily raised the price of Bitcoin. US officials launched a probe into the incident, and the SEC's cybersecurity and position on cryptocurrency came under fresh fire. #ETFApprovalDreams #hackers #SEC #CryptoniteUae #BTCETFSPOT
On January 9, the US Securities and Exchange Commission (SEC) suffered a significant breach of cybersecurity and a loss of public confidence as a result of a social media account hack that led to a fake announcement about the approval of spot Bitcoin exchange-traded funds (ETFs).

For a short while, hackers gained access to the SEC's X account and released a statement purporting the organisation had approved the much anticipated products, which momentarily raised the price of Bitcoin. US officials launched a probe into the incident, and the SEC's cybersecurity and position on cryptocurrency came under fresh fire.

#ETFApprovalDreams #hackers #SEC #CryptoniteUae #BTCETFSPOT
🚨I Lost My Whole Capital! Now Let’s Talk About Bybit Wallet Security! 🔐😂I'm 💯 sure you didn't read any post or article like my article, it will blow your mind. Ok let's start discussing So, imagine waking up one day, logging into your wallet, and BAM 💥—your ETH is gone! Just like that! Vanished into the abyss! 😭 Well, after experiencing this nightmare (hypothetically... hopefully), I decided it's time to talk about Bybit Wallet Security and how hackers steal ETH! 🕵️‍♂️ 👾 How Hackers Steal Your ETH? Hackers don’t just wave a magic wand and steal your crypto (I wish it was that simple 😅). Instead, they use tricks like: 🔹 Phishing Attacks – Fake websites that look EXACTLY like Bybit, waiting for you to enter your details. 🤦‍♂️ 🔹 Malware & Keyloggers – That "free airdrop" you clicked on? Yeah, that just gave someone access to your private keys. 🤷‍♂️ 🔹 Smart Contract Exploits – Ever heard of those "too-good-to-be-true" DeFi projects? Well, hackers use dodgy contracts to drain your funds. 🚀💀 🔹 SIM Swapping & Social Engineering – If your 2FA is linked to your phone number, hackers might just "convince" your mobile provider to hand over your SIM. 🧐 💀 So… Can Hackers Even Use Stolen ETH? Short answer: NO! ❌ Once ETH is stolen, it’s tracked on every exchange like a wanted criminal! 🚔 Most exchanges, including Bybit, Binance, OKX, and others, mark stolen ETH as “tainted”—making it IMPOSSIBLE to cash out. Every transaction gets flagged like 🚨 "SPAM ALERT!" 🚨 But wait… there’s a catch! 😨 🐍 The BTC Loophole Hackers can use mixers like Tornado Cash (until regulators shut it down) or simply convert ETH into BTC! Why? Because Bitcoin’s blockchain doesn’t have a built-in "spam" or "blacklist" system. So, if they swap ETH → BTC, they might just get away with it. 😱 (Don't tell that f**** trick to hacker's 😁 ✅ How to Secure Your Wallet? Alright, enough scary talk—let's make sure YOU don’t end up like me (hypothetically, of course 😜): 🔹 Enable 2FA! Don’t be lazy. Google Authenticator > SMS (Always!) 🔑 🔹 Use a Hardware Wallet (Ledger/Trezor) to store large amounts. 🏦 🔹 NEVER click random links! Even if it’s from "Bybit Support" (Spoiler: It’s NOT). 🚫 🔹 Check Contract Approvals – Use tools like revoke.cash to remove unnecessary permissions. 🧐 🔹 Stay Updated! Follow Bybit’s official security alerts and crypto security news. 📰 Final Words: Don’t Learn the Hard Way! 😅 If I had secured my Bybit wallet better, maybe I wouldn’t be writing this post with tears in my eyes. 😭😂 So, be smart, stay safe, and don’t let hackers enjoy your hard-earned crypto! 🚀🔒 #Bybit #CryptoSecurity #Ethereum #Hackers #StaySafe

🚨I Lost My Whole Capital! Now Let’s Talk About Bybit Wallet Security! 🔐😂

I'm 💯 sure you didn't read any post or article like my article, it will blow your mind.
Ok let's start discussing
So, imagine waking up one day, logging into your wallet, and BAM 💥—your ETH is gone! Just like that! Vanished into the abyss! 😭 Well, after experiencing this nightmare (hypothetically... hopefully), I decided it's time to talk about Bybit Wallet Security and how hackers steal ETH! 🕵️‍♂️

👾 How Hackers Steal Your ETH?

Hackers don’t just wave a magic wand and steal your crypto (I wish it was that simple 😅). Instead, they use tricks like:

🔹 Phishing Attacks – Fake websites that look EXACTLY like Bybit, waiting for you to enter your details. 🤦‍♂️
🔹 Malware & Keyloggers – That "free airdrop" you clicked on? Yeah, that just gave someone access to your private keys. 🤷‍♂️
🔹 Smart Contract Exploits – Ever heard of those "too-good-to-be-true" DeFi projects? Well, hackers use dodgy contracts to drain your funds. 🚀💀
🔹 SIM Swapping & Social Engineering – If your 2FA is linked to your phone number, hackers might just "convince" your mobile provider to hand over your SIM. 🧐

💀 So… Can Hackers Even Use Stolen ETH?

Short answer: NO! ❌

Once ETH is stolen, it’s tracked on every exchange like a wanted criminal! 🚔 Most exchanges, including Bybit, Binance, OKX, and others, mark stolen ETH as “tainted”—making it IMPOSSIBLE to cash out. Every transaction gets flagged like 🚨 "SPAM ALERT!" 🚨

But wait… there’s a catch! 😨

🐍 The BTC Loophole

Hackers can use mixers like Tornado Cash (until regulators shut it down) or simply convert ETH into BTC! Why? Because Bitcoin’s blockchain doesn’t have a built-in "spam" or "blacklist" system. So, if they swap ETH → BTC, they might just get away with it. 😱
(Don't tell that f**** trick to hacker's 😁
✅ How to Secure Your Wallet?

Alright, enough scary talk—let's make sure YOU don’t end up like me (hypothetically, of course 😜):

🔹 Enable 2FA! Don’t be lazy. Google Authenticator > SMS (Always!) 🔑
🔹 Use a Hardware Wallet (Ledger/Trezor) to store large amounts. 🏦
🔹 NEVER click random links! Even if it’s from "Bybit Support" (Spoiler: It’s NOT). 🚫
🔹 Check Contract Approvals – Use tools like revoke.cash to remove unnecessary permissions. 🧐
🔹 Stay Updated! Follow Bybit’s official security alerts and crypto security news. 📰

Final Words: Don’t Learn the Hard Way! 😅

If I had secured my Bybit wallet better, maybe I wouldn’t be writing this post with tears in my eyes. 😭😂 So, be smart, stay safe, and don’t let hackers enjoy your hard-earned crypto! 🚀🔒

#Bybit #CryptoSecurity #Ethereum #Hackers #StaySafe
U.S. Agency Warns About the Dangerous Trinity RansomwareThe Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure. The Threat of Trinity Ransomware and How It Works A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities. Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key. Hackers’ Demands: 24-Hour Deadline for Payment In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery. "Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers. Attacks on Healthcare Institutions The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector. Crypto Ransom Payments Reached $1 Billion in 2023 According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates. The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks. #cyberattacks Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“  

U.S. Agency Warns About the Dangerous Trinity Ransomware

The Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure.
The Threat of Trinity Ransomware and How It Works
A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities.
Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key.
Hackers’ Demands: 24-Hour Deadline for Payment
In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery.
"Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers.
Attacks on Healthcare Institutions
The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector.
Crypto Ransom Payments Reached $1 Billion in 2023
According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates.
The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks.
#cyberattacks

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

 
Crypto Scams: Beware! ‼️🚨‼️🚨‼️🚨‼️🚨‼️🚨 - FTX: Collapsed in 2022, $ billions missing - Luna/TerraUSD: $60 billion loss, founder arrested - QuadrigaCX: $215 million inaccessible after founder's death - Africrypt: 70,000 BTC stolen, founders investigated - SafeMoon: Executives withdrew $200 million, SEC charges - Pro-deum: Exit scam, investors lost all funds - Pincoin/iFan: $660 million Ponzi scheme - Celsius Network: Bankruptcy, $4.7 billion owed - Centra Tech: Fraudulent promises, founders jailed - Mining Max: $250 million scam, 18,000 investors affected Protect yourself: 🫵🫵🫵🫵 research, verify, diversify, and stay informed. Watch for red flags: ‼️‼️‼️‼️‼️‼️ unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market! $BTC $ETH $BNB #Write2Earn! #scamriskwarning #hackers #Alert🔴 #CPI_BTC_Watch
Crypto Scams: Beware! ‼️🚨‼️🚨‼️🚨‼️🚨‼️🚨

- FTX: Collapsed in 2022, $ billions missing
- Luna/TerraUSD: $60 billion loss, founder arrested
- QuadrigaCX: $215 million inaccessible after founder's death
- Africrypt: 70,000 BTC stolen, founders investigated
- SafeMoon: Executives withdrew $200 million, SEC charges
- Pro-deum: Exit scam, investors lost all funds
- Pincoin/iFan: $660 million Ponzi scheme
- Celsius Network: Bankruptcy, $4.7 billion owed
- Centra Tech: Fraudulent promises, founders jailed
- Mining Max: $250 million scam, 18,000 investors affected

Protect yourself: 🫵🫵🫵🫵
research, verify, diversify, and stay informed.

Watch for red flags: ‼️‼️‼️‼️‼️‼️

unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market!
$BTC $ETH $BNB
#Write2Earn! #scamriskwarning #hackers #Alert🔴 #CPI_BTC_Watch
--
Hausse
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code. #northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code.

#northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
El misterio del hackeo de FTX posiblemente resuelto: EE.UU. acusa a un trío de robo, incluido un infame ataque a un intercambio de #criptomonedas La acusación federal no identifica a FTX de Sam Bankman-Fried como la compañía robada, pero Bloomberg informó de que se trataba de ella. El gobierno federal de EE. UU. acusó el miércoles a tres personas de una conspiración de piratería telefónica que duró un año y que culminó con el infame robo de 400 millones de dólares de FTX mientras el intercambio de criptomonedas de Sam Bankman-Fried colapsaba. En una acusación de 18 páginas presentada en un tribunal de DC, los fiscales acusaron a Robert Powell, Carter Rohn y Emily Hernandez de conspiración para cometer fraude electrónico y robo de identidad en su operación de una red de intercambio de SIM que apuntaba a cincuenta víctimas entre marzo de 2021 y abril de 2023. Su atraco más notable se produjo el 11 de noviembre de 2022, cuando el trío desvió 400 millones de dólares de una empresa no identificada. Bloomberg, citando fuentes familiarizadas con el asunto, dijo que esa empresa era FTX. Obtuvieron acceso a un empleado del intercambio de criptomonedas a través de AT&T y transfirieron cientos de millones de dólares en criptomonedas. #ftx #hacks #hackers #FTXUpdate #ftt
El misterio del hackeo de FTX posiblemente resuelto: EE.UU. acusa a un trío de robo, incluido un infame ataque a un intercambio de #criptomonedas

La acusación federal no identifica a FTX de Sam Bankman-Fried como la compañía robada, pero Bloomberg informó de que se trataba de ella.

El gobierno federal de EE. UU. acusó el miércoles a tres personas de una conspiración de piratería telefónica que duró un año y que culminó con el infame robo de 400 millones de dólares de FTX mientras el intercambio de criptomonedas de Sam Bankman-Fried colapsaba.

En una acusación de 18 páginas presentada en un tribunal de DC, los fiscales acusaron a Robert Powell, Carter Rohn y Emily Hernandez de conspiración para cometer fraude electrónico y robo de identidad en su operación de una red de intercambio de SIM que apuntaba a cincuenta víctimas entre marzo de 2021 y abril de 2023.

Su atraco más notable se produjo el 11 de noviembre de 2022, cuando el trío desvió 400 millones de dólares de una empresa no identificada. Bloomberg, citando fuentes familiarizadas con el asunto, dijo que esa empresa era FTX.

Obtuvieron acceso a un empleado del intercambio de criptomonedas a través de AT&T y transfirieron cientos de millones de dólares en criptomonedas.
#ftx #hacks #hackers #FTXUpdate #ftt
تزايدت سرقة العملات المشفرة مع قيام القراصنة ببيع هواتف مزيفة مزودة ببرامج ضارة كشفت شركة كاسبرسكي للأمن السيبراني أن قراصنة يستخدمون برمجيات خبيثة مثبتة في أجهزة أندرويد لسرقة العملات المشفرة. ونصحت الشركة المستخدمين بتوخي الحذر. مع تطور عالم العملات المشفرة، يبتكر المخترقون طرقًا جديدة لسرقة الأصول الرقمية للمستخدمين. كشف خبراء كاسبرسكي لاب أن المخترقين يستخدمون هواتف أندرويد الذكية المزيفة لسرقة العملات المشفرة. ووفقًا لشركة كاسبرسكي للأمن السيبراني، فقد اكتشفت آلاف أجهزة أندرويد المصابة ببرامج ضارة، والمطورة خصيصًا لسرقة بيانات المستخدمين والعملات المشفرة. وغالبًا ما تُباع هذه الأجهزة بأسعار منخفضة لجذب المشترين. وأحدث البرامج الضارة هي نسخة معدلة من تريادا، وهو برنامج خبيث من نوع حصان طروادة للوصول عن بُعد يُستخدم لاختراق أجهزة أندرويد. وأفادت شركات الأمن أنها عثرت على أكثر من 2600 مستخدم متأثر بالإصدار الجديد من تريادا. وينتمي هؤلاء المستخدمون إلى مناطق مختلفة حول العالم، لكن غالبيتهم من روسيا. #russia #HackerAlert #hackers #Malwareattack #kaspersky
تزايدت سرقة العملات المشفرة مع قيام القراصنة ببيع هواتف مزيفة مزودة ببرامج ضارة

كشفت شركة كاسبرسكي للأمن السيبراني أن قراصنة يستخدمون برمجيات خبيثة مثبتة في أجهزة أندرويد لسرقة العملات المشفرة.
ونصحت الشركة المستخدمين بتوخي الحذر.
مع تطور عالم العملات المشفرة، يبتكر المخترقون طرقًا جديدة لسرقة الأصول الرقمية للمستخدمين. كشف خبراء كاسبرسكي لاب أن المخترقين يستخدمون هواتف أندرويد الذكية المزيفة لسرقة العملات المشفرة.

ووفقًا لشركة كاسبرسكي للأمن السيبراني، فقد اكتشفت آلاف أجهزة أندرويد المصابة ببرامج ضارة، والمطورة خصيصًا لسرقة بيانات المستخدمين والعملات المشفرة. وغالبًا ما تُباع هذه الأجهزة بأسعار منخفضة لجذب المشترين.

وأحدث البرامج الضارة هي نسخة معدلة من تريادا، وهو برنامج خبيث من نوع حصان طروادة للوصول عن بُعد يُستخدم لاختراق أجهزة أندرويد. وأفادت شركات الأمن أنها عثرت على أكثر من 2600 مستخدم متأثر بالإصدار الجديد من تريادا. وينتمي هؤلاء المستخدمون إلى مناطق مختلفة حول العالم، لكن غالبيتهم من روسيا.
#russia #HackerAlert #hackers #Malwareattack
#kaspersky
This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto HacksCrypto hackers have stolen $4+ billion in the last 2 years. If you are not careful, you'll be next. This article shares 8 security practices that everyone should be using. If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen. Then you won’t need this guide, For everyone else let's begin. 1. Crypto Storage Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time. Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal. 2. Emails Old emails with weak passwords are a common point of entry for hackers. If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it. 3. VPN Most main providers are good enough (nord / express). You can take your privacy even further and try something like Mullvad. 4. 2FA 2FA everything. Cold 2fa Device (Tier 1) - Yubikey or Google Titan Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever. Note: 2FA can be circumvented, it is not an absolute defence.\ 5. Passwords This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself. There are two tiers of data. Level 1 Data Level 2 Data Level 1 Data To determine if your data is level 1 ask yourself this. "If a hacker had access to only this information, would they be able to attack me?" For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency. Level 1 Data Rules - Keep offline - Never be stored on your laptop - When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard - These passwords will be a minimum of 15 keys long and as complex as possible - Have back ups Level 2 Data Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2. This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable. Level 2 Data Rules You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged. 6. EXCHANGES Don't trust any sketchy exchanges with your crypto. -Deposit only what you need to buy/sell. -Use reputable exchanges like Binance. - Use 2FA -Set a global lock that requires a minimum wait time before settings are changed -Whitelist your addresses and set a lock on adding new addresses -Use leverage to reduce counterparty risk 7. Advanced: Separate computers Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets. -High Security Computer -Low Security Computer High Security Computer Used only for handling crypto, banking, trading and other sensitive activities. Your high security device is never to deviate from essential websites or click on any links. All it takes is one mistake to compromise your security. Low Security Computer For all other activities, you can use your low security device. There should never be crossover between these two devices. 8. PROTECT OTHERS Someone you care about getting attacked can be leveraged against you. Share this with others and make sure they are as protected as you. #hackers #BitEagleNews

This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto Hacks

Crypto hackers have stolen $4+ billion in the last 2 years.
If you are not careful, you'll be next.
This article shares 8 security practices that everyone should be using.
If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen.
Then you won’t need this guide,
For everyone else let's begin.

1. Crypto Storage
Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor
Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time.
Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal.

2. Emails
Old emails with weak passwords are a common point of entry for hackers.
If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it.

3. VPN
Most main providers are good enough (nord / express).
You can take your privacy even further and try something like Mullvad.

4. 2FA
2FA everything.
Cold 2fa Device (Tier 1) - Yubikey or Google Titan
Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever.
Note: 2FA can be circumvented, it is not an absolute defence.\

5. Passwords
This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself.
There are two tiers of data.
Level 1 Data
Level 2 Data

Level 1 Data
To determine if your data is level 1 ask yourself this.
"If a hacker had access to only this information, would they be able to attack me?"
For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency.

Level 1 Data Rules
- Keep offline
- Never be stored on your laptop
- When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard
- These passwords will be a minimum of 15 keys long and as complex as possible
- Have back ups

Level 2 Data
Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2.
This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable.

Level 2 Data Rules
You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged.

6. EXCHANGES
Don't trust any sketchy exchanges with your crypto.
-Deposit only what you need to buy/sell.
-Use reputable exchanges like Binance.
- Use 2FA
-Set a global lock that requires a minimum wait time before settings are changed
-Whitelist your addresses and set a lock on adding new addresses
-Use leverage to reduce counterparty risk

7. Advanced: Separate computers
Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets.
-High Security Computer
-Low Security Computer

High Security Computer
Used only for handling crypto, banking, trading and other sensitive activities.
Your high security device is never to deviate from essential websites or click on any links.
All it takes is one mistake to compromise your security.

Low Security Computer
For all other activities, you can use your low security device.
There should never be crossover between these two devices.

8. PROTECT OTHERS
Someone you care about getting attacked can be leveraged against you.
Share this with others and make sure they are as protected as you.

#hackers #BitEagleNews
--
Hausse
Schrödinger's Vulnerability: Why Hackers Invent WordPress Security Problems An unusual strategy by cybercriminals is leading to massive infections of websites with malicious code. WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly being tracked under the ID CVE-2023-45124 . The purpose of the attack is to infect websites with a malicious plugin. The emails, masquerading as official messages from WordPress, talk about a critical remote code execution ( RCE ) vulnerability discovered on the administrator's site. WordPress users are being persuaded to install a plugin that claims to solve a security problem. Clicking the “Download plugin” button leads to a fake page “en-gb-wordpress[.]org”, outwardly indistinguishable from the official site “wordpress.com”. The page indicates an inflated number of downloads of the plugin at 500 thousand downloads, as well as fake user reviews. makes it difficult to detect and remove. At the moment, the purpose of the plugin is unknown, but experts suggest that it can be used to inject advertising on compromised sites, redirect visitors, steal confidential information, or even blackmail site owners with the threat of leaking database contents. WordPress security experts from Wordfence and PatchStack have posted warnings on their sites to raise awareness among administrators and users about this threat. It is extremely important to be careful when installing unknown plugins and to pay attention to suspicious emails. #cyborg #BinanceTournament #hackers #News #BTC $BTC $ETH $BNB
Schrödinger's Vulnerability: Why Hackers Invent WordPress Security Problems
An unusual strategy by cybercriminals is leading to massive infections of websites with malicious code.
WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly being tracked under the ID CVE-2023-45124 . The purpose of the attack is to infect websites with a malicious plugin.
The emails, masquerading as official messages from WordPress, talk about a critical remote code execution ( RCE ) vulnerability discovered on the administrator's site. WordPress users are being persuaded to install a plugin that claims to solve a security problem.
Clicking the “Download plugin” button leads to a fake page “en-gb-wordpress[.]org”, outwardly indistinguishable from the official site “wordpress.com”. The page indicates an inflated number of downloads of the plugin at 500 thousand downloads, as well as fake user reviews.
makes it difficult to detect and remove. At the moment, the purpose of the plugin is unknown, but experts suggest that it can be used to inject advertising on compromised sites, redirect visitors, steal confidential information, or even blackmail site owners with the threat of leaking database contents.
WordPress security experts from Wordfence and PatchStack have posted warnings on their sites to raise awareness among administrators and users about this threat. It is extremely important to be careful when installing unknown plugins and to pay attention to suspicious emails.
#cyborg #BinanceTournament #hackers #News #BTC
$BTC $ETH $BNB
🚨#LOOPSCALE RECAPTURES #STOLEN FUNDS, SET TO RESTART SERVICES POST-HACK 🔹Exploit Details: #Hackers drained 5.73M USDC and 1,211.4 SOL via a pricing logic flaw 🔹All stolen funds have been recovered 🔹Service Restoration: Refinancing function will restart soon, full rollout in phases 🔹Borrower Update: 3-day grace period extended; users urged to manage positions proactively 🔹Rewards: Vault/Advanced Lend balances (Apr 26–Jun 7) get 12x points boost --- $SOL
🚨#LOOPSCALE RECAPTURES #STOLEN FUNDS, SET TO RESTART SERVICES POST-HACK

🔹Exploit Details: #Hackers drained 5.73M USDC and 1,211.4 SOL via a pricing logic flaw

🔹All stolen funds have been recovered

🔹Service Restoration: Refinancing function will restart soon, full rollout in phases

🔹Borrower Update: 3-day grace period extended; users urged to manage positions proactively

🔹Rewards: Vault/Advanced Lend balances (Apr 26–Jun 7) get 12x points boost
---
$SOL
Ek San
--
🚨LOOPscale #HACKER AGREES TO#RETURN FUNDS FOR BOUNTY

🔹Loopscale Labs said hackers agreed to return stolen funds via bounty negotiation.

🔹Hack involved 5.7M$USDC and 1,200$SOL theft.

🔹Withdrawal recovery plan and incident report postponed, expected in a few days.
📢Hacker use macdonald's insta to promote the meme coin 🪙On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called “GRIMACE.” This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts. The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.# The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards

📢Hacker use macdonald's insta to promote the meme coin 🪙

On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called “GRIMACE.” This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts.
The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.#
The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards
Logga in för att utforska mer innehåll
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer