Binance Square

hack

941,225 показвания
540 обсъждат
Topmode
·
--
CRYPTO WEEKEND WRAP: $11B Scandal, $2M Hack & A.I. News You Can’t MissGM, Square family! 🌅 If you checked out for the weekend, you missed a WILD 24 hours. Between geopolitical bombshells, bridge hacks, and a genius idea from Vitalik—here is everything you need to look smart on Monday. 1/ 🇷🇺 THE $11 BILLION SHADOW NETWORK Blockchain sleuths at Elliptic just dropped a nuke. They uncovered a network of Russian crypto exchanges helping sanctioned entities move money. One platform called ABCeX reportedly handled $11 Billion in transactions. This is the big one, guys. Regulators are watching. Is this the moment they crack down—or finally admit crypto is just a tool? Either way, volatility incoming. 2/ 🔓 IOTEX HACKED: $2M Gone Bridge exploits are back, and they are brutal. The IoTeX network was forced to halt after a private key leak let hackers drain $2 Million from the treasury (USDC, USDT, and IOTX). The team says they contained it and are working with cops/exchanges to recover funds. Moral of the story: Not your keys? Not your coins. Stay safe out there. 3/ 🤖 VITALIK’S BIG IDEA: A.I. VOTING Ethereum’s co-founder just gave us hope for the future. Vitalik proposed using Artificial Intelligence to help normal people vote in DAOs. Imagine an A.I. assistant that reads the fine print on those boring governance proposals for you, filters out scams, and lets YOU make the final call. This is how we scale decentralization. Bullish on A.I. x Crypto. 4/ 📉 THE MACRO CLOUD (Trump Edition) Let’s be real—prices are hurting. Bitcoin is hovering near $66k and "Extreme Fear" is back in the chat. 😱 Why? Trump Tariffs: Proposed tariffs jumped from 10% to 15%, spooking global markets.ETF Bleed: Spot Bitcoin ETFs have seen 4 weeks of straight outflows. Institutions are scared. But as Tim Draper says... that just means it's time to buy the dip? 💬 SQUARE TALK: Are these Russia sanctions the start of a new crypto war? Or just FUD before the weekend pump? Drop your hottest take below. 👇 And follow for more news that actually matters. #Bitcoin  #Ethereum  #CryptoNews  #Altcoin  #Hack {spot}(BNBUSDT) {spot}(ETHUSDT) {spot}(BTCUSDT)

CRYPTO WEEKEND WRAP: $11B Scandal, $2M Hack & A.I. News You Can’t Miss

GM, Square family! 🌅
If you checked out for the weekend, you missed a WILD 24 hours. Between geopolitical bombshells, bridge hacks, and a genius idea from Vitalik—here is everything you need to look smart on Monday.
1/ 🇷🇺 THE $11 BILLION SHADOW NETWORK
Blockchain sleuths at Elliptic just dropped a nuke.
They uncovered a network of Russian crypto exchanges helping sanctioned entities move money.
One platform called ABCeX reportedly handled $11 Billion in transactions.
This is the big one, guys. Regulators are watching. Is this the moment they crack down—or finally admit crypto is just a tool?
Either way, volatility incoming.
2/ 🔓 IOTEX HACKED: $2M Gone
Bridge exploits are back, and they are brutal.
The IoTeX network was forced to halt after a private key leak let hackers drain $2 Million from the treasury (USDC, USDT, and IOTX).
The team says they contained it and are working with cops/exchanges to recover funds.
Moral of the story: Not your keys? Not your coins. Stay safe out there.
3/ 🤖 VITALIK’S BIG IDEA: A.I. VOTING
Ethereum’s co-founder just gave us hope for the future.
Vitalik proposed using Artificial Intelligence to help normal people vote in DAOs.
Imagine an A.I. assistant that reads the fine print on those boring governance proposals for you, filters out scams, and lets YOU make the final call.
This is how we scale decentralization. Bullish on A.I. x Crypto.
4/ 📉 THE MACRO CLOUD (Trump Edition)
Let’s be real—prices are hurting.
Bitcoin is hovering near $66k and "Extreme Fear" is back in the chat. 😱
Why?
Trump Tariffs: Proposed tariffs jumped from 10% to 15%, spooking global markets.ETF Bleed: Spot Bitcoin ETFs have seen 4 weeks of straight outflows.
Institutions are scared. But as Tim Draper says... that just means it's time to buy the dip?
💬 SQUARE TALK:
Are these Russia sanctions the start of a new crypto war? Or just FUD before the weekend pump?
Drop your hottest take below. 👇
And follow for more news that actually matters.
#Bitcoin  #Ethereum  #CryptoNews  #Altcoin  #Hack
TREASURY DRAINED. $IOTX HOLDINGS WIPED OUT. Private key exploit. Over $4.3 million VANISHED. Attacker drained USDC, USDT, IOTX, WBTC, BUSD. Swapped for ETH, bridged to Bitcoin. 111 million CIOTX minted. This is a CATASTROPHE. Your assets are NOT safe. Disclaimer: This is not financial advice. #IoTeX #CryptoNews #Exploit #Hack 🚨 {future}(IOTXUSDT)
TREASURY DRAINED. $IOTX HOLDINGS WIPED OUT.

Private key exploit. Over $4.3 million VANISHED. Attacker drained USDC, USDT, IOTX, WBTC, BUSD. Swapped for ETH, bridged to Bitcoin. 111 million CIOTX minted. This is a CATASTROPHE. Your assets are NOT safe.

Disclaimer: This is not financial advice.

#IoTeX #CryptoNews #Exploit #Hack 🚨
MOONWELL DEBACLE: $1.78M GONE IN SECONDS! Oracle error wiped out 1096.317 cbETH. Liquidators feasted on collateral. Protocol is reeling. Borrowing and supply caps slashed to zero. The damage is done. Disclaimer: This is not financial advice. #DeFi #Crypto #Hack #Moonwell #cbETH 🚨
MOONWELL DEBACLE: $1.78M GONE IN SECONDS!

Oracle error wiped out 1096.317 cbETH. Liquidators feasted on collateral. Protocol is reeling. Borrowing and supply caps slashed to zero. The damage is done.

Disclaimer: This is not financial advice.

#DeFi #Crypto #Hack #Moonwell #cbETH 🚨
DATA BREACH EXPOSES $COW CUSTOMERS! $COW insiders hacked. 2.5GB of data leaked. Names, addresses, phone numbers compromised. Figure refused ransom. Users notified. Fallout contained. This is a critical security event. Stay vigilant. Disclaimer: This is not financial advice. #crypto #hack #security #datacrime 🚨 {future}(COWUSDT)
DATA BREACH EXPOSES $COW CUSTOMERS!

$COW insiders hacked. 2.5GB of data leaked. Names, addresses, phone numbers compromised. Figure refused ransom. Users notified. Fallout contained.

This is a critical security event. Stay vigilant.

Disclaimer: This is not financial advice.

#crypto #hack #security #datacrime 🚨
·
--
Бичи
🚨🚨Balancer DeFi Protocol Hit by Suspected $70M Hacker Attack🚨🚨 Today, Balancer, a decentralized finance (DeFi) protocol, has reportedly suffered a significant suspected hacker attack resulting in asset losses exceeding $70 million. On-chain data and monitoring by blockchain analytics firms indicate that over $70 million worth of assets were transferred from Balancer's vault to new addresses. The stolen assets include large quantities of WETH, Staked ETH (stETH), and wrapped stETH (wstETH), among other ERC-20 tokens. The exact nature and method of the attack remain under investigation, but it aligns with a broader trend of sophisticated DeFi exploits involving flash loans and manipulation of protocol vulnerabilities. Additionally, the attack on Balancer appears to be ongoing or evolving, with some reports putting total losses across Balancer and its multiple forked protocols at around $83 to $88 million, including other chains such as Base, Polygon, Arbitrum, and Sonic. This incident highlights the increasing security challenges faced by DeFi platforms, where smart contract vulnerabilities and complex on-chain mechanisms are exploited by attackers, often via flash loan attacks that allow temporary liquidity to orchestrate exploits without upfront capital. Such high-profile attacks underline the critical need for improved security measures in DeFi, including robust smart contract audits, better real-time monitoring, and more secure oracle systems to prevent price manipulation. Balancer has not yet issued an official statement but investigations and further security reviews are expected as the community works to understand the full scope and impact of the attack. #Hack $ETH
🚨🚨Balancer DeFi Protocol Hit by Suspected $70M Hacker Attack🚨🚨

Today, Balancer, a decentralized finance (DeFi) protocol, has reportedly suffered a significant suspected hacker attack resulting in asset losses exceeding $70 million. On-chain data and monitoring by blockchain analytics firms indicate that over $70 million worth of assets were transferred from Balancer's vault to new addresses. The stolen assets include large quantities of WETH, Staked ETH (stETH), and wrapped stETH (wstETH), among other ERC-20 tokens. The exact nature and method of the attack remain under investigation, but it aligns with a broader trend of sophisticated DeFi exploits involving flash loans and manipulation of protocol vulnerabilities.

Additionally, the attack on Balancer appears to be ongoing or evolving, with some reports putting total losses across Balancer and its multiple forked protocols at around $83 to $88 million, including other chains such as Base, Polygon, Arbitrum, and Sonic. This incident highlights the increasing security challenges faced by DeFi platforms, where smart contract vulnerabilities and complex on-chain mechanisms are exploited by attackers, often via flash loan attacks that allow temporary liquidity to orchestrate exploits without upfront capital.

Such high-profile attacks underline the critical need for improved security measures in DeFi, including robust smart contract audits, better real-time monitoring, and more secure oracle systems to prevent price manipulation. Balancer has not yet issued an official statement but investigations and further security reviews are expected as the community works to understand the full scope and impact of the attack.

#Hack $ETH
💀 BALANCER АТАКОВАН: УЩЕРБ $128M! Один из старейших AMM-протоколов в Ethereum стал жертвой масштабного взлома. Balancer, запущенный ещё в 2020 году, столкнулся с атакой на wrapped-версии $ETH . Это жёсткое напоминание: даже проверенные временем проекты уязвимы. Безопасность в DeFi остаётся критически важной. Всегда проверяйте риски и диверсифицируйте активы! #Balancer #DeFi #Hack #Security #CryptoNews {spot}(ETHUSDT)
💀 BALANCER АТАКОВАН: УЩЕРБ $128M!

Один из старейших AMM-протоколов в Ethereum стал жертвой масштабного взлома. Balancer, запущенный ещё в 2020 году, столкнулся с атакой на wrapped-версии $ETH .

Это жёсткое напоминание: даже проверенные временем проекты уязвимы. Безопасность в DeFi остаётся критически важной.

Всегда проверяйте риски и диверсифицируйте активы!

#Balancer #DeFi #Hack #Security #CryptoNews
🚨 BALANCER ПОД АТАКОЙ — $70M УЩЕРБА! DeFi-протокол Balancer стал жертвой хакерской атаки. Украдены wrapped-версии $ETH на сумму ~$70 млн. Это жёсткое напоминание: безопасность в DeFi всё ещё остается уязвимым местом. Даже крупные проекты не застрахованы от рисков. Оставайтесь бдительными и всегда проверяйте безопасность своих активов! #Balancer #DeFi #Hack #Security #CryptoNews {spot}(ETHUSDT)
🚨 BALANCER ПОД АТАКОЙ — $70M УЩЕРБА!

DeFi-протокол Balancer стал жертвой хакерской атаки. Украдены wrapped-версии $ETH на сумму ~$70 млн.

Это жёсткое напоминание: безопасность в DeFi всё ещё остается уязвимым местом. Даже крупные проекты не застрахованы от рисков.

Оставайтесь бдительными и всегда проверяйте безопасность своих активов!

#Balancer #DeFi #Hack #Security #CryptoNews
Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥 Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥 📰 Summary The $2.3 million Shibarium Bridge hack has taken a dramatic twist! Developer Kaal Dhairya sarcastically challenged the hacker who drained millions through a flash loan exploit, saying: > “Yo, Shibarium bridge attacker, wake up — grab free cash before the offer expires this time and do something right.” 😏 Meanwhile, K9 Finance, Shibarium’s staking partner, raised its bounty from 5 ETH to 20 ETH if the hacker returns 248 billion stolen KNINE tokens, which are now worthless after being blacklisted on-chain. --- 💡 What is a Flash Loan Exploit? A flash loan lets users borrow massive amounts of crypto instantly — as long as they repay it within the same transaction. Hackers exploit this feature by manipulating system logic or token prices to trick protocols into sending them funds. In this case, the attacker gained control of 10 out of 12 validator keys, fooling the bridge into withdrawing $2.3M in $ETH , SHIB, ROAR, and KNINE tokens. --- {future}(ETHUSDT) ⚙️ What Happened Next To protect the network and investors, the Shibarium team introduced new security measures, including: 🚫 Suspicious wallet blocking to stop blacklisted tokens from moving ⏳ 7-day withdrawal delay for BONE tokens 🤝 Partnership with dRPC.org for secure and reliable RPC systems 🧩 Incident response template to handle future attacks quickly K9 Finance also increased its bounty to 20 ETH, hoping to recover the stolen tokens. --- 📉 Market Impact The hack caused short-term volatility in the SHIB ecosystem. Prices dipped briefly as panic selling hit, but quick action and better security restored investor confidence. Analysts believe that if the hacker returns the KNINE tokens or accepts the bounty, it could improve sentiment and spark a mild price recovery for SHIB. --- 🧠 What This Means for Investors Always verify official announcements before reacting to rumors. Avoid suspicious wallets or tokens recently blacklisted on-chain. Stay informed — transparency and security updates are key to DeFi survival. A hack may shake trust, but redemption can rebuild it. 🐾💸 --- 📊 Key Stats Event Detail Hack Amount $2.3 Million Stolen Tokens $ETH , SHIB, ROAR, KNINE Validator Keys Compromised 10 of 12 Bounty Raised 5 ETH → 20 ETH Attack Date September 12, 2025 Flash Loan Type Instant Borrow & Repay Exploit --- 🔍 Image Search Keywords (for Google) Use these exact phrases to find matching charts or infographics for your article: “Shibarium bridge hack 2025 infographic” “Shibarium flash loan exploit diagram” “SHIB $2.3M hack timeline” “K9 Finance 20 ETH bounty poster” “Validator keys Shibarium hack graphic” “KNINE token blacklist chart” --- 🧩 SEO-Friendly Tags #Shibarium #SHİB #crypto #Hack #DeFi

Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥


Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥
📰 Summary
The $2.3 million Shibarium Bridge hack has taken a dramatic twist!
Developer Kaal Dhairya sarcastically challenged the hacker who drained millions through a flash loan exploit, saying:
> “Yo, Shibarium bridge attacker, wake up — grab free cash before the offer expires this time and do something right.” 😏
Meanwhile, K9 Finance, Shibarium’s staking partner, raised its bounty from 5 ETH to 20 ETH if the hacker returns 248 billion stolen KNINE tokens, which are now worthless after being blacklisted on-chain.
---
💡 What is a Flash Loan Exploit?
A flash loan lets users borrow massive amounts of crypto instantly — as long as they repay it within the same transaction.
Hackers exploit this feature by manipulating system logic or token prices to trick protocols into sending them funds.
In this case, the attacker gained control of 10 out of 12 validator keys, fooling the bridge into withdrawing $2.3M in $ETH , SHIB, ROAR, and KNINE tokens.
---
⚙️ What Happened Next
To protect the network and investors, the Shibarium team introduced new security measures, including:
🚫 Suspicious wallet blocking to stop blacklisted tokens from moving
⏳ 7-day withdrawal delay for BONE tokens
🤝 Partnership with dRPC.org for secure and reliable RPC systems
🧩 Incident response template to handle future attacks quickly
K9 Finance also increased its bounty to 20 ETH, hoping to recover the stolen tokens.
---
📉 Market Impact
The hack caused short-term volatility in the SHIB ecosystem.
Prices dipped briefly as panic selling hit, but quick action and better security restored investor confidence.
Analysts believe that if the hacker returns the KNINE tokens or accepts the bounty, it could improve sentiment and spark a mild price recovery for SHIB.
---
🧠 What This Means for Investors
Always verify official announcements before reacting to rumors.
Avoid suspicious wallets or tokens recently blacklisted on-chain.
Stay informed — transparency and security updates are key to DeFi survival.
A hack may shake trust, but redemption can rebuild it. 🐾💸
---
📊 Key Stats
Event Detail
Hack Amount $2.3 Million
Stolen Tokens $ETH , SHIB, ROAR, KNINE
Validator Keys Compromised 10 of 12
Bounty Raised 5 ETH → 20 ETH
Attack Date September 12, 2025
Flash Loan Type Instant Borrow & Repay Exploit
---
🔍 Image Search Keywords (for Google)
Use these exact phrases to find matching charts or infographics for your article:
“Shibarium bridge hack 2025 infographic”
“Shibarium flash loan exploit diagram”
“SHIB $2.3M hack timeline”
“K9 Finance 20 ETH bounty poster”
“Validator keys Shibarium hack graphic”
“KNINE token blacklist chart”
---
🧩 SEO-Friendly Tags
#Shibarium #SHİB #crypto #Hack #DeFi
·
--
Мечи
MỚI NHẤT⚡️: Sàn giao dịch @GMX_IO đang đề xuất với tin tặc khoản tiền thưởng 10% để trả lại số $GMX bị đánh cắp Nghe có vẻ còn cái nịt rồi anh em ạ😂 Xong cuối cùng vẫn là hacker Triền Tiên -> Tốt nhất cứ short $GMX cho chắc các bác ạ {future}(GMXUSDT) #gmx #Hack #TrendingTopic
MỚI NHẤT⚡️: Sàn giao dịch @GMX_IO đang đề xuất với tin tặc khoản tiền thưởng 10% để trả lại số $GMX bị đánh cắp

Nghe có vẻ còn cái nịt rồi anh em ạ😂

Xong cuối cùng vẫn là hacker Triền Tiên -> Tốt nhất cứ short $GMX cho chắc các bác ạ

#gmx #Hack #TrendingTopic
Ghost Writer
·
--
Мечи
🔥Má thị trường cứ bull lên tí là lại có tin FUD -> Lần này thì là sàn @GMX_IO bị hacker ghé thăm

Thiệt hại ước tính ban đầu là gần $40,000,000 $GMX

Hacker đã đổi sang $ETH trước khi gửi tới nhiều địa chỉ ví khác nhau
{future}(ETHUSDT)

{future}(GMXUSDT)

#gmx #HackerAlert #TrendingTopic
Balancer Hack: $128M Lost, DeFi Shaken Balancer suffered a $128.6M exploit, triggering fear across the DeFi space. Liquidity pools, LP tokens, and yield strategies are under stress. ShadowCrown Hint: DeFi isn’t dead — but risk management matters more than ever. Avoid overexposure to vulnerable protocols until audits and fixes are confirmed. Follow ShadowCrown | DYOR #DeFi #Hack #Exploit #CryptoSecurity #ShadowCrown
Balancer Hack: $128M Lost, DeFi Shaken

Balancer suffered a $128.6M exploit, triggering fear across the DeFi space.

Liquidity pools, LP tokens, and yield strategies are under stress.

ShadowCrown Hint:
DeFi isn’t dead — but risk management matters more than ever.

Avoid overexposure to vulnerable protocols until audits and fixes are confirmed.

Follow ShadowCrown | DYOR

#DeFi #Hack #Exploit #CryptoSecurity #ShadowCrown
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk. The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance. 72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical. Disclaimer: This is not financial advice. #CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk.

The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance.

72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical.

Disclaimer: This is not financial advice.

#CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
🚨 BREAKING: India-based crypto exchange CoinDCX has reportedly suffered a major security breach, with ~$44.2M drained, per on-chain sleuth zachxbt Details are still unfolding, but initial signs point to a serious exploit. Stay safe out there. More updates soon. #CoinDCX #CryptoNews #Hack #ZachXBT
🚨 BREAKING: India-based crypto exchange CoinDCX has reportedly suffered a major security breach, with ~$44.2M drained, per on-chain sleuth zachxbt

Details are still unfolding, but initial signs point to a serious exploit.

Stay safe out there. More updates soon.

#CoinDCX #CryptoNews #Hack #ZachXBT
💥 Хак Balancer: як дрібна похибка в коді коштувала мільйониDeFi-світ знову отримав урок із безпеки. 3 листопада Balancer, один із найстаріших DeFi-протоколів, зазнав масштабного зламу через помилку в своєму модулі Composable Stable Pools. 🔍 Що сталося: Вразливість у механізмі відкладених розрахунків дозволила хакерам маніпулювати балансами пулів. Через неточні коефіцієнти масштабування під час операцій EXACT_OUT відбувалося округлення “в менший бік”, і ліквідність тимчасово падала нижче мінімального порогу — цього вистачило, щоб вивести кошти з пулів. Спочатку активи рухалися через внутрішні сховища Balancer v2, після чого зловмисники розбивали вивід на низку транзакцій, щоб ускладнити відстеження. 🎯 Хто постраждав: Удар припав на Composable Stable v5, де вже сплив захисний період.Пули v6 встояли — завдяки системі Hypernative, яка автоматично призупинила роботу після виявлення аномалій. Команда підтвердила: атака не торкнулася Balancer v3 та інших типів пулів. Але копії протоколу у BEX і Beets також постраждали. ⚙️ Як рятували ситуацію: StakeWise DAO повернула $19 млн в osETH і $1,7 млн в osGNO (≈73,5% втрат);Berachain призупинив мережу для хардфорка;Sonic Labs заморозила гаманці зловмисників;Gnosis тимчасово обмежила роботу мосту;Monerium заблокувала 1,3 млн EURe;BitFinding і MEV-боти Base повернули ще ≈$750 тис. 🧩 У Balancer зазначають, що попередньо ухвалена структура Safe Harbor (BIP-726) допомогла швидко координувати дії між командами й партнерами. Наразі точна сума збитків невідома — остаточний звіт оприлюднять після аудиту. Але головний висновок очевидний: навіть найрозумніші смарт-контракти залишаються вразливими, якщо в них є одна непомічена кома. 📚 Хочете розуміти, як DeFi працює всередині — і як уникнути таких пасток? Підписуйтесь, щоб не пропустити розбір найважливіших кейсів безпеки у світі Web3. #balancer #defi #Hack #security #crypto

💥 Хак Balancer: як дрібна похибка в коді коштувала мільйони

DeFi-світ знову отримав урок із безпеки. 3 листопада Balancer, один із найстаріших DeFi-протоколів, зазнав масштабного зламу через помилку в своєму модулі Composable Stable Pools.

🔍 Що сталося:
Вразливість у механізмі відкладених розрахунків дозволила хакерам маніпулювати балансами пулів. Через неточні коефіцієнти масштабування під час операцій EXACT_OUT відбувалося округлення “в менший бік”, і ліквідність тимчасово падала нижче мінімального порогу — цього вистачило, щоб вивести кошти з пулів.
Спочатку активи рухалися через внутрішні сховища Balancer v2, після чого зловмисники розбивали вивід на низку транзакцій, щоб ускладнити відстеження.
🎯 Хто постраждав:
Удар припав на Composable Stable v5, де вже сплив захисний період.Пули v6 встояли — завдяки системі Hypernative, яка автоматично призупинила роботу після виявлення аномалій.
Команда підтвердила: атака не торкнулася Balancer v3 та інших типів пулів. Але копії протоколу у BEX і Beets також постраждали.
⚙️ Як рятували ситуацію:
StakeWise DAO повернула $19 млн в osETH і $1,7 млн в osGNO (≈73,5% втрат);Berachain призупинив мережу для хардфорка;Sonic Labs заморозила гаманці зловмисників;Gnosis тимчасово обмежила роботу мосту;Monerium заблокувала 1,3 млн EURe;BitFinding і MEV-боти Base повернули ще ≈$750 тис.
🧩 У Balancer зазначають, що попередньо ухвалена структура Safe Harbor (BIP-726) допомогла швидко координувати дії між командами й партнерами.
Наразі точна сума збитків невідома — остаточний звіт оприлюднять після аудиту. Але головний висновок очевидний:
навіть найрозумніші смарт-контракти залишаються вразливими, якщо в них є одна непомічена кома.
📚 Хочете розуміти, як DeFi працює всередині — і як уникнути таких пасток?
Підписуйтесь, щоб не пропустити розбір найважливіших кейсів безпеки у світі Web3.
#balancer #defi #Hack #security #crypto
·
--
Бичи
🚨MILLION DOLLAR MISTAKE:😭$ETH A victim (0xd674) lost 4556 $ETH ($12.4M) due to a copy-paste address mistake. Victim 0xd674 frequently transfers funds to Galaxy Digital via 0x6D90CC...dD2E48. The attacker generated a poison address with the same first and last 4 characters as Galaxy Digital's deposit address and repeatedly sent dust transactions. 11 hours ago, the victim copied an address directly from transaction history to deposit into Galaxy Digital but copied the poison address instead. As a result, 4,556 $ETH ($12.4M) was sent to the attacker. 💢A painful lesson! Always double-check the address before making a transfer. Don't copy addresses from your transaction history for convenience. Victim address: 0xd6741220a947941bF290799811FcDCeA8AE4A7Da #Mistake #crypto #Hack #HackerAlert #hackers
🚨MILLION DOLLAR MISTAKE:😭$ETH

A victim (0xd674) lost 4556 $ETH ($12.4M) due to a copy-paste address mistake.

Victim 0xd674 frequently transfers funds to Galaxy Digital via
0x6D90CC...dD2E48.

The attacker generated a poison address with the same first and last 4 characters as Galaxy Digital's deposit address and repeatedly sent dust transactions.

11 hours ago, the victim copied an address directly from transaction history to deposit into Galaxy Digital but copied the poison address instead.

As a result, 4,556 $ETH ($12.4M) was sent to the attacker.

💢A painful lesson!

Always double-check the address before making a transfer.

Don't copy addresses from your transaction history for convenience.

Victim address:
0xd6741220a947941bF290799811FcDCeA8AE4A7Da

#Mistake #crypto #Hack #HackerAlert #hackers
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
$SUI i Backs Users After $223M Cetus Exploit A $223 million exploit hit the Cetus decentralized exchange on the Sui network, prompting an unusual rescue effort. The Sui Foundation is extending a loan to fully reimburse affected users, with repayment contingent on an upcoming on-chain community vote. This intervention aims to cover massive losses and signals the network’s commitment to user protection. The incident and bailout are making waves as a rare case of a blockchain stepping in to backstop a DeFi failure, sparking debate about decentralization versus user safety. #SUİ #Cetus #Hack #cyberduck #DEFİ
$SUI i Backs Users After $223M Cetus Exploit

A $223 million exploit hit the Cetus decentralized exchange on the Sui network, prompting an unusual rescue effort. The Sui Foundation is extending a loan to fully reimburse affected users, with repayment contingent on an upcoming on-chain community vote.

This intervention aims to cover massive losses and signals the network’s commitment to user protection. The incident and bailout are making waves as a rare case of a blockchain stepping in to backstop a DeFi failure, sparking debate about decentralization versus user safety.

#SUİ #Cetus #Hack #cyberduck #DEFİ
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
·
--
Stay #SAFU on X and other socials. @JasonYanowitz on X narrates his #hack odeal. I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked. Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole. I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed. This was the real hack. I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address. But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it. Some takeaways: - Don't click links - If you do click a link, review the actual email address - Set up non-text 2FA on everything - If you've done that, trust your own security process - If you think you've been hacked, slow down and think about how this could have happened Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly. If you're still reading, go read the self-audit series from @samczsun. And this best practices from @bobbyong. Lot more you can do but start there. #phishing
Stay #SAFU on X and other socials.

@JasonYanowitz on X narrates his #hack odeal.

I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked.
Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole.
I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed.

This was the real hack.

I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address.
But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it.

Some takeaways:
- Don't click links
- If you do click a link, review the actual email address
- Set up non-text 2FA on everything
- If you've done that, trust your own security process
- If you think you've been hacked, slow down and think about how this could have happened
Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly.
If you're still reading, go read the self-audit series from @samczsun.
And this best practices from @bobbyong.
Lot more you can do but start there. #phishing
Влезте, за да разгледате още съдържание
Разгледайте най-новите крипто новини
⚡️ Бъдете част от най-новите дискусии в криптовалутното пространство
💬 Взаимодействайте с любимите си създатели
👍 Насладете се на съдържание, което ви интересува
Имейл/телефонен номер