Binance Square
#hacked

hacked

512,093 views
300 Discussing
三月—March
·
--
Article
THORChain Hit Again: A $10.8M Exploit That Shouldn't Surprise AnyoneFriday, May 15, 2026, decentralized cross-chain liquidity protocol THORChain was exploited for approximately $10.8 million, with the attack spanning four separate blockchains simultaneously. A wallet labeled by Arkham as the THORChain exploiter showed $10.8 million in holdings, transferred across several smaller transactions in the 30 minutes before 10:11 AM UTC. Wallets linked to the attacker currently hold roughly 3,443 ETH, 36.85 BTC, and 96.6 BNB. The incident was first flagged by on-chain investigator ZachXBT on Telegram, prompting the protocol to immediately halt all trading and signing operations. $RUNE dropped over 6% after the initial alert, trading near $0.50, and ultimately fell around 13% following the suspected exploit, also now down 72% over the past year. As of this writing, THORChain has yet to publish a post-mortem identifying the specific attack vector {future}(RUNEUSDT) This is far from THORChain's first rodeo with exploits. Cross-chain bridges and liquidity protocols have historically been the most exploited category in DeFi, with over $2.8 billion in cumulative bridge-related theft since 2021 per Chainalysis. Today's breach is at least the third security incident for the protocol in recent years. The protocol's security troubles are compounded by its growing reputation as a conduit for illicit funds — the majority of the $1.4 billion stolen during the Bybit hack, or about $1.2 billion, was moved through THORChain by hackers, who swapped it from Ether to Bitcoin. Earlier in April, the attacker behind the $293 million Kelp DAO exploit swapped 75,700 ETH through THORChain, generating about $910,000 in revenue for the protocol itself. This creates a deeply uncomfortable reality: THORChain profits from crime, even when it isn't the direct target. Personally, this exploit is hard to be shocked by but it's still frustrating to watch. THORChain's core idea, native cross-chain swaps without bridges or centralized intermediaries, remains genuinely valuable and technically ambitious. Just weeks ago, the protocol burned 64.4 million RUNE and launched a major v3.17.0 network upgrade with over 100 improvements focused on security, swaps, and cross-chain reliability. There's clearly a committed team building here. But the pattern is becoming undeniable: every time THORChain gains momentum, a new exploit drags it back down. At some point, "decentralized" can't be an excuse for "insecure." The lack of a post-mortem hours after the attack is also telling transparency should be the first response, not an afterthought. If THORChain wants to be taken seriously as infrastructure for the broader DeFi ecosystem, it needs to treat security with the same urgency it treats innovation.$RIVER #VitalikMovesETHviaPrivacyPools I #SolanaTreasuryQ1SPSUp108 I #PredictionMarketRisingCompetition I #StriveQ1Results15009BTCHoldings I #Hacked

THORChain Hit Again: A $10.8M Exploit That Shouldn't Surprise Anyone

Friday, May 15, 2026, decentralized cross-chain liquidity protocol THORChain was exploited for approximately $10.8 million, with the attack spanning four separate blockchains simultaneously. A wallet labeled by Arkham as the THORChain exploiter showed $10.8 million in holdings, transferred across several smaller transactions in the 30 minutes before 10:11 AM UTC.
Wallets linked to the attacker currently hold roughly 3,443 ETH, 36.85 BTC, and 96.6 BNB. The incident was first flagged by on-chain investigator ZachXBT on Telegram, prompting the protocol to immediately halt all trading and signing operations. $RUNE dropped over 6% after the initial alert, trading near $0.50, and ultimately fell around 13% following the suspected exploit, also now down 72% over the past year. As of this writing, THORChain has yet to publish a post-mortem identifying the specific attack vector
This is far from THORChain's first rodeo with exploits. Cross-chain bridges and liquidity protocols have historically been the most exploited category in DeFi, with over $2.8 billion in cumulative bridge-related theft since 2021 per Chainalysis. Today's breach is at least the third security incident for the protocol in recent years. The protocol's security troubles are compounded by its growing reputation as a conduit for illicit funds — the majority of the $1.4 billion stolen during the Bybit hack, or about $1.2 billion, was moved through THORChain by hackers, who swapped it from Ether to Bitcoin. Earlier in April, the attacker behind the $293 million Kelp DAO exploit swapped 75,700 ETH through THORChain, generating about $910,000 in revenue for the protocol itself. This creates a deeply uncomfortable reality: THORChain profits from crime, even when it isn't the direct target. Personally, this exploit is hard to be shocked by but it's still frustrating to watch. THORChain's core idea, native cross-chain swaps without bridges or centralized intermediaries, remains genuinely valuable and technically ambitious.
Just weeks ago, the protocol burned 64.4 million RUNE and launched a major v3.17.0 network upgrade with over 100 improvements focused on security, swaps, and cross-chain reliability. There's clearly a committed team building here. But the pattern is becoming undeniable: every time THORChain gains momentum, a new exploit drags it back down. At some point, "decentralized" can't be an excuse for "insecure."
The lack of a post-mortem hours after the attack is also telling transparency should be the first response, not an afterthought. If THORChain wants to be taken seriously as infrastructure for the broader DeFi ecosystem, it needs to treat security with the same urgency it treats innovation.$RIVER
#VitalikMovesETHviaPrivacyPools I #SolanaTreasuryQ1SPSUp108 I #PredictionMarketRisingCompetition I #StriveQ1Results15009BTCHoldings I #Hacked
Article
AI agent hacked using Morse CodeThis is the first recorded large-scale bot-on-bot attack in history. The incident took place on the Base network. It demonstrated that AI agents are completely vulnerable to classic text manipulation when real money is on the line. An attack was carried out by a user on social network X with the handle @ilhamrafli.base.eth. The victims were the Grok model and the automated financial bot Bankrbot.

AI agent hacked using Morse Code

This is the first recorded large-scale bot-on-bot attack in history. The incident took place on the Base network. It demonstrated that AI agents are completely vulnerable to classic text manipulation when real money is on the line.
An attack was carried out by a user on social network X with the handle @ilhamrafli.base.eth. The victims were the Grok model and the automated financial bot Bankrbot.
#Hacked 🚨 $6.7 million heist: TrustedVolumes hacker starts laundering money The cybercriminal who hacked liquidity provider TrustedVolumes on May 7 has moved into the active phase of legalizing the stolen assets. According to PeckShield, the first $278,000 has already passed through mixers and cross-chain protocols. How is the money moving? • Tornado Cash: the first 10.2 $ETH were sent there. • THORChain: 110 ETH ($250,000) were converted to $BTC via this protocol. • Railgun: a deposit was attempted, but the hacker changed his mind and returned 0.5 ETH to the wallet. Why did this happen? The hack was possible due to a critical error in the RFQ (request for quotation) system. The hacker was able to bypass three layers of protection at once: signature authentication, order replay protection, and token source verification. The TrustedVolumes protocol itself calls on the hacker to engage in dialogue and offers a bug bounty in exchange for the return of the remaining funds ($6.4 million is still in known wallets). {future}(BTCUSDT) {future}(ETHUSDT)
#Hacked
🚨 $6.7 million heist: TrustedVolumes hacker starts laundering money

The cybercriminal who hacked liquidity provider TrustedVolumes on May 7 has moved into the active phase of legalizing the stolen assets. According to PeckShield, the first $278,000 has already passed through mixers and cross-chain protocols.

How is the money moving?
• Tornado Cash: the first 10.2 $ETH were sent there.
• THORChain: 110 ETH ($250,000) were converted to $BTC via this protocol.
• Railgun: a deposit was attempted, but the hacker changed his mind and returned 0.5 ETH to the wallet.

Why did this happen?
The hack was possible due to a critical error in the RFQ (request for quotation) system. The hacker was able to bypass three layers of protection at once: signature authentication, order replay protection, and token source verification.

The TrustedVolumes protocol itself calls on the hacker to engage in dialogue and offers a bug bounty in exchange for the return of the remaining funds ($6.4 million is still in known wallets).
#ScrollCoFounderXAccountHacked Bigger Lesson for Web3 Founders 🔐 #ScrollCoFounderXAccountHacked This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels #Hack #HackerAlert #Hacked
#ScrollCoFounderXAccountHacked
Bigger Lesson for Web3 Founders
🔐 #ScrollCoFounderXAccountHacked
This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels
#Hack #HackerAlert #Hacked
🚨OKX #SLAPS BACK AT JUSTIN SUN OVER #STOLEN FUNDS FREEZE DRAMA 🔹Tron’s X account #hacked ; malicious contract posted, DMs sent. 🔹Justin Sun claims OKX ignored a law enforcement freeze notice. 🔹OKX #CEO Star Xu denies receiving any such request—even checked spam folder. 🔹Xu: “We need legal process, not personal posts or oral requests.” 🔹OKX demands proof of request, while Sun deletes key posts. 🔹Part of ongoing trend of high-profile crypto X hacks (e.g., Kaito AI, Pump.fun). $TRX {spot}(TRXUSDT)
🚨OKX #SLAPS BACK AT JUSTIN SUN OVER #STOLEN FUNDS FREEZE DRAMA

🔹Tron’s X account #hacked ; malicious contract posted, DMs sent.

🔹Justin Sun claims OKX ignored a law enforcement freeze notice.

🔹OKX #CEO Star Xu denies receiving any such request—even checked spam folder.

🔹Xu: “We need legal process, not personal posts or oral requests.”

🔹OKX demands proof of request, while Sun deletes key posts.

🔹Part of ongoing trend of high-profile crypto X hacks (e.g., Kaito AI, Pump.fun).
$TRX
Bybit Hackers Identified – North Korean Cybercriminals Behind $1.5B Theft! 🚨 Investigations confirm that Park Jin Hyok, a North Korean computer engineer linked to the Lazarus Group, played a key role in the $1.5 billion Bybit hack. The notorious cybercrime syndicate has been responsible for some of the biggest crypto heists in history! 🔎 Key Findings: • Blockchain analyst ZachXBT, in collaboration with Arkham Intelligence, traced stolen funds back to Lazarus-linked wallets. • The same group was previously linked to the $70M Phemex attack in January 2025. • Lazarus continues to exploit crypto exchanges, DeFi platforms, and bridge protocols, targeting weak security systems. 🔥 What This Means for Crypto? With North Korean state-sponsored hackers intensifying their attacks, crypto traders and exchanges must prioritize security to prevent future breaches. Regulators are closely watching! 💡 Pro Tip: Always use hardware wallets, enable 2FA, and avoid interacting with unknown smart contracts to keep your assets safe! #BinanceAirdropAlert #Hacked
Bybit Hackers Identified – North Korean Cybercriminals Behind $1.5B Theft! 🚨
Investigations confirm that Park Jin Hyok, a North Korean computer engineer linked to the Lazarus Group, played a key role in the $1.5 billion Bybit hack. The notorious cybercrime syndicate has been responsible for some of the biggest crypto heists in history!
🔎 Key Findings:
• Blockchain analyst ZachXBT, in collaboration with Arkham Intelligence, traced stolen funds back to Lazarus-linked wallets.
• The same group was previously linked to the $70M Phemex attack in January 2025.
• Lazarus continues to exploit crypto exchanges, DeFi platforms, and bridge protocols, targeting weak security systems.
🔥 What This Means for Crypto?
With North Korean state-sponsored hackers intensifying their attacks, crypto traders and exchanges must prioritize security to prevent future breaches. Regulators are closely watching!
💡 Pro Tip: Always use hardware wallets, enable 2FA, and avoid interacting with unknown smart contracts to keep your assets safe!
#BinanceAirdropAlert
#Hacked
Article
North Korea legalizes stolen cryptocurrency through Russia and Asia OOHNorth Korean hackers have stolen cryptocurrency worth $2.837 billion from January 2024 to September 2025. Most of the funds are laundered through intermediaries in Russia, Hong Kong, and Cambodia, experts from the Multilateral Sanctions Monitoring Group on North Korea (MSMT) at the UN reported. The main goal of hackers from North Korea, experts from the United Nations stated, is large centralized cryptocurrency exchanges. Cybercriminals have established close ties with Russian groups that are involved in the development of ransomware, representatives of MSMT said.

North Korea legalizes stolen cryptocurrency through Russia and Asia OOH

North Korean hackers have stolen cryptocurrency worth $2.837 billion from January 2024 to September 2025. Most of the funds are laundered through intermediaries in Russia, Hong Kong, and Cambodia, experts from the Multilateral Sanctions Monitoring Group on North Korea (MSMT) at the UN reported.
The main goal of hackers from North Korea, experts from the United Nations stated, is large centralized cryptocurrency exchanges. Cybercriminals have established close ties with Russian groups that are involved in the development of ransomware, representatives of MSMT said.
·
--
A known contact on TG reached out to me to ask for a chat. Scheduled a Zoom call. When I got on the Zoom, it asked me for camera access which I found a bit odd because I have used Zoom many times. Even crazier, the team members had their cameras on. I could see their legit faces. Everything looked very real. But I couldn’t hear them. It said my Zoom needs an update. But it asked me to download a script file. I immediately left. Messaged the guy on Telegram and told him to call me on TG to verify him. He then proceeded to erase all the messages and block me. #Hacked #HackerAlert
A known contact on TG reached out to me to ask for a chat. Scheduled a Zoom call. When I got on the Zoom, it asked me for camera access which I found a bit odd because I have used Zoom many times.

Even crazier, the team members had their cameras on. I could see their legit faces. Everything looked very real. But I couldn’t hear them. It said my Zoom needs an update. But it asked me to download a script file.

I immediately left. Messaged the guy on Telegram and told him to call me on TG to verify him. He then proceeded to erase all the messages and block me.

#Hacked #HackerAlert
🚨 Just In: Eric Council Jr Sentenced to 14 Months For US SEC X Hack Eric Council Jr., 26, of Athens, Alabama, has been sentenced to 14 months in federal prison for his involvement in a cybercrime conspiracy. The case involved the hacking of the U.S. Securities and Exchange Commission’s (SEC) official X (formerly Twitter) account. According to a statement from federal authorities, Eric Council Jr conspired with others to gain access to the US SEC’s X account by carrying out a SIM swap. On January 9, 2024, a false post was published from the account, falsely claiming the SEC had approved Bitcoin Exchange Traded Funds (ETFs). Bitcoin’s price rose quickly by more than $1,000 before falling after the SEC confirmed the post was not legitimate. Eric Council Jr pleaded guilty in February 2025 to conspiracy to commit aggravated identity theft. U.S. District Judge Amy Berman Jackson sentenced him to 14 months in prison, ordered the forfeiture of $50,000, and imposed three years of supervised release. He is prohibited from accessing the dark web or engaging in any activity involving identity fraud during the supervision period. #SEC #Hacked #HackerAlert #US
🚨 Just In: Eric Council Jr Sentenced to 14 Months For US SEC X Hack

Eric Council Jr., 26, of Athens, Alabama, has been sentenced to 14 months in federal prison for his involvement in a cybercrime conspiracy.

The case involved the hacking of the U.S. Securities and Exchange Commission’s (SEC) official X (formerly Twitter) account.

According to a statement from federal authorities, Eric Council Jr conspired with others to gain access to the US SEC’s X account by carrying out a SIM swap.

On January 9, 2024, a false post was published from the account, falsely claiming the SEC had approved Bitcoin Exchange Traded Funds (ETFs).

Bitcoin’s price rose quickly by more than $1,000 before falling after the SEC confirmed the post was not legitimate.

Eric Council Jr pleaded guilty in February 2025 to conspiracy to commit aggravated identity theft. U.S. District Judge Amy Berman Jackson sentenced him to 14 months in prison, ordered the forfeiture of $50,000, and imposed three years of supervised release.

He is prohibited from accessing the dark web or engaging in any activity involving identity fraud during the supervision period.

#SEC #Hacked #HackerAlert #US
·
--
Gemini and Coinbase face wave of crypto scams Users are receiving mass phishing emails falsely claiming that Gemini has filed for bankruptcy, urging them to withdraw assets to a “safe” wallet. Scammers requested users to provide their seed phrase, allowing them full access to victims’ funds. ✍️ At the same time, Coinbase confirmed that one of its employees accessed customer account data without authorization. The exchange stated that user funds remain secure. #TrumpTariffs #HackerAlert #Hacked
Gemini and Coinbase face wave of crypto scams
Users are receiving mass phishing emails falsely claiming that Gemini has filed for bankruptcy, urging them to withdraw assets to a “safe” wallet.
Scammers requested users to provide their seed phrase, allowing them full access to victims’ funds.

✍️ At the same time, Coinbase confirmed that one of its employees accessed customer account data without authorization. The exchange stated that user funds remain secure.
#TrumpTariffs #HackerAlert #Hacked
Stop to Taiwan against scammers who abused cryptocurrencies to launder 72 million $ Laundering definitively shut down. Scammers and fraudsters of all kinds know that the keen enthusiasm for the Bitcoin (BTC) and cryptocurrency sector sometimes causes a lack of vigilance among some investors who are too hasty or too naive. But fortunately, crime does not pay forever. In Taiwan, 14 people have just been indicted in a case that has allegedly affected more than 1,500 victims. The total amount of laundered funds is said to be 72 million dollars. #CryptoRally #Hacked #CryptoNewss #crypto
Stop to Taiwan against scammers who abused cryptocurrencies to launder 72 million $

Laundering definitively shut down. Scammers and fraudsters of all kinds know that the keen enthusiasm for the Bitcoin (BTC) and cryptocurrency sector sometimes causes a lack of vigilance among some investors who are too hasty or too naive. But fortunately, crime does not pay forever. In Taiwan, 14 people have just been indicted in a case that has allegedly affected more than 1,500 victims. The total amount of laundered funds is said to be 72 million dollars.
#CryptoRally #Hacked #CryptoNewss #crypto
$ETH what is Going on my official Finance balance was about Above 10k-20k+ now i can seee someone transferred my all usdt to a mexc wallet🥲 myyyyy god what is Going on here i am in serious Travel ⚠️⚠️⚠️⚠️ now look at my waller balance @Coolest1923 $BTC $SOL #hacked
$ETH what is Going on
my official Finance balance was about Above 10k-20k+
now i can seee someone transferred my all usdt
to a mexc wallet🥲
myyyyy god what is Going on here i am in serious Travel ⚠️⚠️⚠️⚠️
now look at my waller balance
@coolest
$BTC
$SOL
#hacked
👾The DAO Hack👾 – When Ethereum Split in Two Back in 2016, the Ethereum community was riding high. The DAO—short for Decentralized Autonomous Organization—was one of the biggest experiments in crypto history. A community-run investment fund. No CEOs. No banks. Just code. Investors poured over $150 million in ETH into it. It was revolutionary. And then… disaster. A hacker exploited a vulnerability in the DAO smart contract and drained around $60 million in ETH. The Ethereum network itself wasn’t hacked—the DAO contract was flawed. But that was enough to send shockwaves through the ecosystem. Here’s the problem: blockchains are immutable. You can’t undo transactions. Unless… you fork the chain. The Ethereum community split in two. One side created a new version of Ethereum ($ETH ) by reversing the hack. The other side refused, sticking to the original “code is law” philosophy—thus creating Ethereum Classic (ETC). What does this teach us? Technology is one thing. Values are another. You can have the smartest code in the world, but it won’t make the hard moral decisions for you. #Hacked #ETH
👾The DAO Hack👾 – When Ethereum Split in Two

Back in 2016, the Ethereum community was riding high. The DAO—short for Decentralized Autonomous Organization—was one of the biggest experiments in crypto history. A community-run investment fund. No CEOs. No banks. Just code.

Investors poured over $150 million in ETH into it. It was revolutionary.

And then… disaster.

A hacker exploited a vulnerability in the DAO smart contract and drained around $60 million in ETH. The Ethereum network itself wasn’t hacked—the DAO contract was flawed. But that was enough to send shockwaves through the ecosystem.

Here’s the problem: blockchains are immutable. You can’t undo transactions. Unless… you fork the chain.

The Ethereum community split in two. One side created a new version of Ethereum ($ETH ) by reversing the hack. The other side refused, sticking to the original “code is law” philosophy—thus creating Ethereum Classic (ETC).

What does this teach us?
Technology is one thing. Values are another.
You can have the smartest code in the world, but it won’t make the hard moral decisions for you.
#Hacked #ETH
·
--
#bybit Bybit Hack On February 21, 2025 , Bybit, a major cryptocurrency exchange, suffered a significant hack that resulted in the theft of approximately $1.5 billion in digital assets, primarily Ethereum and related tokens. The hackers exploited a cold wallet, leading to massive withdrawals and a sell-off of Ethereum, with trading volume surging 60%.  Details of the Hack: Amount Stolen:  Approximately $1.5 billion in ETH and related tokens. Method:  The hackers used a deceptive interface to trick Bybit’s team into authorizing a malicious transaction, which altered the smart contract logic of the cold wallet. Impact:  Bybit confirmed the hack and assured users that their assets are secure and will be covered. Investigation:  On-chain analyst ZachXBT provided evidence linking the hack to the Lazarus Group, a North Korean hacker collective, and confirmed that the same wallets used in the Bybit hack were also involved in the recent Phemex breach. Market Reaction:  The crypto market reacted negatively, with Bitcoin, XRP, and Dogecoin experiencing significant drops in value. Recovery Efforts: Bybit CEO Ben Zhou stated that the exchange is solvent and can cover the loss, as all client assets are 1 to 1 backed. Efforts to recover the stolen funds are unlikely due to the nature of the hack and the rapid dispersal of assets across multiple wallets. Further Developments: The incident has raised concerns about the security of cold wallets and the potential for future attacks. Crypto exchanges and users are advised to remain vigilant and implement robust security measures. #Write2Earn #bybit #TopVoices #Hacked
#bybit

Bybit Hack

On February 21, 2025

, Bybit,

a major cryptocurrency exchange, suffered a

significant hack that resulted in the theft of approximately

$1.5 billion

in digital assets, primarily Ethereum and related tokens.

The hackers exploited a cold wallet, leading to massive withdrawals and a

sell-off of Ethereum, with trading volume surging 60%.

Details of the Hack:

Amount Stolen:

Approximately $1.5 billion in ETH and related tokens.

Method:

The hackers used a deceptive interface to trick Bybit’s team into

authorizing a malicious transaction, which altered the smart contract logic

of the cold wallet.

Impact:

Bybit confirmed the hack and assured users that their assets are

secure and will be covered.

Investigation:

On-chain analyst ZachXBT provided evidence linking the hack to the

Lazarus Group, a North Korean hacker collective, and confirmed that the

same wallets used in the Bybit hack were also involved in the recent

Phemex breach.

Market Reaction:

The crypto market reacted negatively, with Bitcoin, XRP, and Dogecoin

experiencing significant drops in value.

Recovery Efforts:

Bybit CEO Ben Zhou stated that the exchange is solvent and can cover the

loss, as all client assets are 1 to 1 backed.

Efforts to recover the stolen funds are unlikely due to the nature of the hack

and the rapid dispersal of assets across multiple wallets.

Further Developments:

The incident has raised concerns about the security of cold wallets and the

potential for future attacks.

Crypto exchanges and users are advised to remain vigilant and

implement robust security measures.

#Write2Earn
#bybit
#TopVoices
#Hacked
🚨 Chinese hackers hijacked a Dalai Lama birthday tribute site to spy on Tibetans. Victims downloaded a fake encrypted chat app—actually a backdoored version of Element laced with Gh0st RAT. It stole IPs, keystrokes, and even webcam feeds. CheckDot is SAFU #dyor on CheckDot. #Hacked
🚨 Chinese hackers hijacked a Dalai Lama birthday tribute site to spy on Tibetans.

Victims downloaded a fake encrypted chat app—actually a backdoored version of Element laced with Gh0st RAT.

It stole IPs, keystrokes, and even webcam feeds.

CheckDot is SAFU #dyor on CheckDot.

#Hacked
ByBit hack confirmed by its founder? 🤯📈 Keep your funds safe folks! #Hacked #Bybit
ByBit hack confirmed by its founder? 🤯📈

Keep your funds safe folks!

#Hacked #Bybit
·
--
#BTC #ETH #solana ⁉️💸⬇️⁉️ Don't believe the indicators are green! Mathematical analysis cannot be done in the crypto market.The market is driven by their manipulation. The #Hacked incident is a lie ... Be Careful !!! Redirection(down) continues.⁉️ Coins that I have observed and have strong indicators: ⬇️⬇️⬇️ $LTC {spot}(LTCUSDT) $PROM {spot}(PROMUSDT) $TRX {spot}(TRXUSDT) Crypto is DECENTRALIZED !!! (This is a Joke) #Decentralized #CryptoisDecentralized *Is not investment advice! The above analysis and strategies are for reference only. Please bear the risk yourself. *
#BTC #ETH #solana
⁉️💸⬇️⁉️
Don't believe the indicators are green!
Mathematical analysis cannot be done in the crypto market.The market is driven by their manipulation. The #Hacked incident is a lie ...

Be Careful !!! Redirection(down) continues.⁉️

Coins that I have observed and have strong indicators: ⬇️⬇️⬇️
$LTC
$PROM
$TRX

Crypto is DECENTRALIZED !!! (This is a Joke)

#Decentralized
#CryptoisDecentralized

*Is not investment advice! The above analysis and strategies are for reference only. Please bear the risk yourself. *
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number