Binance Square
#hackeralert

hackeralert

1.7M views
905 Discussing
BTC VIVA
·
--
Jaguar Land Rover's profits plunged by 99% due to Trump's tariffs and a massive cyberattack. The British automaker earned just £14 million in profit for the year, down from £2.5 billion a year earlier. Among the main reasons: ➡️ US tariffs on car imports. ➡️ Falling demand for luxury cars in China. ➡️ A massive cyberattack that paralyzed the company's factories and internal systems for several weeks. Due to the problems, Jaguar Land Rover's revenue fell by more than 20% to £22.9 billion. The company also said that it lost about £2.2 billion in cash for the year due to production shutdowns and recovery costs after the hacker attack. Despite this, Jaguar Land Rover plans to launch a new electric Range Rover and introduce the Jaguar Type 01 electric car this year. #Tramp #HackerAlert #USTarrifs $BNB {future}(BNBUSDT)
Jaguar Land Rover's profits plunged by 99% due to Trump's tariffs and a massive cyberattack.

The British automaker earned just £14 million in profit for the year, down from £2.5 billion a year earlier.

Among the main reasons:
➡️ US tariffs on car imports.
➡️ Falling demand for luxury cars in China.
➡️ A massive cyberattack that paralyzed the company's factories and internal systems for several weeks.

Due to the problems, Jaguar Land Rover's revenue fell by more than 20% to £22.9 billion.

The company also said that it lost about £2.2 billion in cash for the year due to production shutdowns and recovery costs after the hacker attack.

Despite this, Jaguar Land Rover plans to launch a new electric Range Rover and introduce the Jaguar Type 01 electric car this year.
#Tramp #HackerAlert #USTarrifs

$BNB
🚨 THORNODE ALERT: Another exploit hitting for ~$7.5M. Trading is paused while the team digs into these wallets. Stay safe out there and watch the chains. It’s a gut punch for sure, but security has to come first. 🕵️‍♂️💸 Hacker Wallet: bc1ql4u94klk265lnfur2ujk9p6uh52f2a8jhf6f37 0x82fc0d5150f3548027e971ec04c065f3c93154eb #HackerAlert #rsshanto $RUNE #RUNE {future}(RUNEUSDT)
🚨 THORNODE ALERT: Another exploit hitting for ~$7.5M.

Trading is paused while the team digs into these wallets. Stay safe out there and watch the chains.

It’s a gut punch for sure, but security has to come first. 🕵️‍♂️💸

Hacker Wallet:

bc1ql4u94klk265lnfur2ujk9p6uh52f2a8jhf6f37
0x82fc0d5150f3548027e971ec04c065f3c93154eb

#HackerAlert #rsshanto $RUNE #RUNE
Angélica9621:
Padre santo
Article
The Rise of State-Level Crypto Warfare: How North Korea Built a Billion-Dollar Digital Theft MachineWhat was once considered isolated cybercrime has evolved into something far more dangerous. Blockchain security researchers are now warning that North Korea-linked hacking operations have transformed into a highly sophisticated financial network capable of stealing, moving, and laundering billions of dollars through the global crypto ecosystem. This is no longer just about hacked wallets. It’s about the industrialization of cyber finance. 🚨 A new era of organized crypto attacks Investigators say state-backed cyber groups connected to North Korea are operating with increasing precision and long-term coordination. Their targets are no longer limited to vulnerable retail users. Instead, attacks are now focused on: Major centralized exchanges Cross-chain infrastructure Smart contract ecosystems Internal corporate systems Employee access points and social engineering Rather than relying on brute-force theft, these groups reportedly combine technical exploits with psychological manipulation, insider infiltration, and advanced laundering strategies. 💰 Crypto theft at industrial scale According to blockchain intelligence estimates, billions of dollars in digital assets have been funneled through complex laundering channels tied to these operations over recent years. Security analysts describe the process as increasingly professionalized: Large-scale exploit or breach Rapid movement across multiple wallets Fragmentation through mixers and bridges Cross-chain obfuscation Gradual liquidity extraction through OTC channels The sophistication of these flows has made tracking and recovery significantly more difficult for exchanges and investigators. 🧠 Why this changes the crypto landscape The implications go far beyond stolen funds. This trend is reshaping how governments, institutions, and investors view the crypto sector itself. The market is entering a phase where: Security infrastructure matters as much as innovation Operational weaknesses can destroy entire platforms overnight Regulatory scrutiny is likely to intensify globally For institutional participants, cybersecurity is rapidly becoming a core investment factor — not just a technical issue. ⚠️ Pressure is building on the industry As attacks grow more sophisticated, crypto companies are facing increasing pressure to strengthen: Internal security systems Employee verification processes Custody architecture Cross-chain monitoring tools Real-time threat detection Projects unable to adapt may struggle to maintain user trust in an environment where a single breach can erase years of growth. 🌐 Bigger than hacking Analysts increasingly view these operations as part of a broader geopolitical strategy rather than ordinary financial crime. Crypto has effectively become a parallel battlefield where cyber operations, sanctions pressure, and financial infrastructure intersect. That reality is changing the role of blockchain technology in global economics and international security. 🔥 Bottom line The crypto market is evolving rapidly — but so are the threats surrounding it. The next phase of the industry may not be defined only by adoption, ETFs, or price rallies… But by which platforms can survive in an era of industrial-scale cyber warfare. $BTC $USDC {future}(BTCUSDT) #cybercrime #HackerAlert #phishing #scam #scamriskwarning

The Rise of State-Level Crypto Warfare: How North Korea Built a Billion-Dollar Digital Theft Machine

What was once considered isolated cybercrime has evolved into something far more dangerous.
Blockchain security researchers are now warning that North Korea-linked hacking operations have transformed into a highly sophisticated financial network capable of stealing, moving, and laundering billions of dollars through the global crypto ecosystem.
This is no longer just about hacked wallets.
It’s about the industrialization of cyber finance.
🚨 A new era of organized crypto attacks
Investigators say state-backed cyber groups connected to North Korea are operating with increasing precision and long-term coordination.
Their targets are no longer limited to vulnerable retail users.
Instead, attacks are now focused on:
Major centralized exchanges
Cross-chain infrastructure
Smart contract ecosystems
Internal corporate systems
Employee access points and social engineering
Rather than relying on brute-force theft, these groups reportedly combine technical exploits with psychological manipulation, insider infiltration, and advanced laundering strategies.
💰 Crypto theft at industrial scale
According to blockchain intelligence estimates, billions of dollars in digital assets have been funneled through complex laundering channels tied to these operations over recent years.
Security analysts describe the process as increasingly professionalized:
Large-scale exploit or breach
Rapid movement across multiple wallets
Fragmentation through mixers and bridges
Cross-chain obfuscation
Gradual liquidity extraction through OTC channels
The sophistication of these flows has made tracking and recovery significantly more difficult for exchanges and investigators.
🧠 Why this changes the crypto landscape
The implications go far beyond stolen funds.
This trend is reshaping how governments, institutions, and investors view the crypto sector itself.
The market is entering a phase where:
Security infrastructure matters as much as innovation
Operational weaknesses can destroy entire platforms overnight
Regulatory scrutiny is likely to intensify globally
For institutional participants, cybersecurity is rapidly becoming a core investment factor — not just a technical issue.
⚠️ Pressure is building on the industry
As attacks grow more sophisticated, crypto companies are facing increasing pressure to strengthen:
Internal security systems
Employee verification processes
Custody architecture
Cross-chain monitoring tools
Real-time threat detection
Projects unable to adapt may struggle to maintain user trust in an environment where a single breach can erase years of growth.
🌐 Bigger than hacking
Analysts increasingly view these operations as part of a broader geopolitical strategy rather than ordinary financial crime.
Crypto has effectively become a parallel battlefield where cyber operations, sanctions pressure, and financial infrastructure intersect.
That reality is changing the role of blockchain technology in global economics and international security.
🔥 Bottom line
The crypto market is evolving rapidly — but so are the threats surrounding it.
The next phase of the industry may not be defined only by adoption, ETFs, or price rallies…
But by which platforms can survive in an era of industrial-scale cyber warfare.
$BTC $USDC
#cybercrime #HackerAlert #phishing #scam #scamriskwarning
#LayerZero #HackerAlert 🚨 LayerZero Admits Guilt: Public Apology for $292M Kelp DAO Hack After three weeks of silence and claims that “the protocol worked as intended,” LayerZero Labs has finally changed its tune. The company issued a formal apology for the incident on April 18, acknowledging critical architectural and communication errors. 📉 What Really Happened? The hack was the result of a sophisticated attack by the North Korean Lazarus Group: • Node Compromise: Hackers compromised LayerZero’s internal RPC nodes. • DDoS Attack: External security was also “downed,” forcing the system to switch to the compromised infrastructure. • Fake signatures: Because Kelp DAO used a 1-of-1 DVN (single verifier) ​​configuration, attackers were able to sign non-existent transactions and withdraw $292 million in rsETH. ⚠️ Key confession: The 1-of-1 bug LayerZero previously accused Kelp DAO of choosing unsafe settings. Now they admit: it was their fault. • LayerZero’s documentation and guides suggested a single verifier as the standard. • Dune analysis showed that 47% of all active LayerZero contracts used the same vulnerable scheme. 🛠 What’s changing right now? To restore trust (which was noticeably shaken after Kelp DAO and Solv Protocol migrated to Chainlink CCIP), LayerZero is implementing: 1. Minimum 3-5 verifiers: Single DVN configurations are no longer supported. 2. Multisig Update: Signature threshold increased from 3/5 to 7/10. 3. Rust Client: Development of a second client for code diversification. 4. Console Platform: New tool for real-time security monitoring. 💰 Damage Compensation LayerZero has already allocated 10,000 ETH to save the ecosystem (5k as a donation and 5k as a loan to Aave). Together with the help of Arbitrum DAO and the DeFi United initiative, the recovery fund has already exceeded $300 million.
#LayerZero #HackerAlert
🚨 LayerZero Admits Guilt: Public Apology for $292M Kelp DAO Hack

After three weeks of silence and claims that “the protocol worked as intended,” LayerZero Labs has finally changed its tune. The company issued a formal apology for the incident on April 18, acknowledging critical architectural and communication errors.

📉 What Really Happened?
The hack was the result of a sophisticated attack by the North Korean Lazarus Group:
• Node Compromise: Hackers compromised LayerZero’s internal RPC nodes.
• DDoS Attack: External security was also “downed,” forcing the system to switch to the compromised infrastructure.
• Fake signatures: Because Kelp DAO used a 1-of-1 DVN (single verifier) ​​configuration, attackers were able to sign non-existent transactions and withdraw $292 million in rsETH.

⚠️ Key confession: The 1-of-1 bug
LayerZero previously accused Kelp DAO of choosing unsafe settings. Now they admit: it was their fault.
• LayerZero’s documentation and guides suggested a single verifier as the standard.
• Dune analysis showed that 47% of all active LayerZero contracts used the same vulnerable scheme.

🛠 What’s changing right now?
To restore trust (which was noticeably shaken after Kelp DAO and Solv Protocol migrated to Chainlink CCIP), LayerZero is implementing:
1. Minimum 3-5 verifiers: Single DVN configurations are no longer supported.
2. Multisig Update: Signature threshold increased from 3/5 to 7/10.
3. Rust Client: Development of a second client for code diversification.
4. Console Platform: New tool for real-time security monitoring.

💰 Damage Compensation
LayerZero has already allocated 10,000 ETH to save the ecosystem (5k as a donation and 5k as a loan to Aave). Together with the help of Arbitrum DAO and the DeFi United initiative, the recovery fund has already exceeded $300 million.
Article
North Korea's Lazarus Group Just Made Job Hunting Dangerous for Crypto DevelopersThe most dangerous place in crypto right now is not a DeFi protocol or a centralized exchange. It is a job interview. North Korea's Lazarus Group has completely evolved its attack strategy and the new method is genuinely disturbing in how simple and effective it is. Researchers at OpenSourceMalware confirmed on May 6 that Lazarus is now hiding second-stage malware loaders directly inside Git Hooks — specifically in pre-commit scripts of repositories that developers are asked to clone as part of fake job interviews. Here is exactly how the attack works. A developer gets approached on LinkedIn or a job platform by what looks like a legitimate recruiter from a crypto or DeFi company. The developer is invited to complete a technical assessment. They clone a repository. The moment they run a routine git command — something as standard as a git merge or a git pull — a pre-commit script fires silently in the background. That script fetches BeaverTail, a JavaScript infostealer built by Lazarus. BeaverTail then installs InvisibleFerret, a Python backdoor that gives attackers persistent remote access to the entire machine. No suspicious binary. No install prompt. No warning. The machine is fully compromised before the developer finishes the assessment. This is not a new group finding its footing. This is a state-sponsored operation that has stolen over five billion dollars in cryptocurrency between 2021 and 2025. In February 2025 they stole 1.5 billion dollars from Bybit in a single attack — the largest single crypto heist in history. In April 2026, just three weeks ago, they were linked to the 290 million dollar KelpDAO exploit. The US, Japan, and South Korea officially confirmed Lazarus stole 660 million dollars in crypto in 2024 alone. North Korea uses every dollar to fund its nuclear weapons program. The April 2026 Mach-O Man campaign showed they are also targeting executives at crypto and fintech firms through fake online meetings on macOS. The GitHub C2 campaign discovered in April uses GitHub itself as the command and control server — routing malicious traffic through one of the most trusted platforms on the internet so firewalls never flag it. The researchers have one clear recommendation. Never clone a repository you received through a job offer or recruitment process without running it in a completely isolated environment. Keep your SSH keys, browser credentials, and crypto wallet seed phrases on a machine that never touches unsolicited code. If a recruiter sends you a repo to test, treat it as a loaded weapon until proven otherwise. The job market in crypto is real. So are the people hunting inside it. Stay sharp. $BTC $ETH $BNB #CryptoSecurity #LazarusGroup #HackerAlert #Web3Security #dyor {future}(BTCUSDT) {future}(BNBUSDT)

North Korea's Lazarus Group Just Made Job Hunting Dangerous for Crypto Developers

The most dangerous place in crypto right now is not a DeFi protocol or a centralized exchange. It is a job interview.
North Korea's Lazarus Group has completely evolved its attack strategy and the new method is genuinely disturbing in how simple and effective it is. Researchers at OpenSourceMalware confirmed on May 6 that Lazarus is now hiding second-stage malware loaders directly inside Git Hooks — specifically in pre-commit scripts of repositories that developers are asked to clone as part of fake job interviews.
Here is exactly how the attack works. A developer gets approached on LinkedIn or a job platform by what looks like a legitimate recruiter from a crypto or DeFi company. The developer is invited to complete a technical assessment. They clone a repository. The moment they run a routine git command — something as standard as a git merge or a git pull — a pre-commit script fires silently in the background. That script fetches BeaverTail, a JavaScript infostealer built by Lazarus. BeaverTail then installs InvisibleFerret, a Python backdoor that gives attackers persistent remote access to the entire machine. No suspicious binary. No install prompt. No warning. The machine is fully compromised before the developer finishes the assessment.
This is not a new group finding its footing. This is a state-sponsored operation that has stolen over five billion dollars in cryptocurrency between 2021 and 2025. In February 2025 they stole 1.5 billion dollars from Bybit in a single attack — the largest single crypto heist in history. In April 2026, just three weeks ago, they were linked to the 290 million dollar KelpDAO exploit. The US, Japan, and South Korea officially confirmed Lazarus stole 660 million dollars in crypto in 2024 alone. North Korea uses every dollar to fund its nuclear weapons program.
The April 2026 Mach-O Man campaign showed they are also targeting executives at crypto and fintech firms through fake online meetings on macOS. The GitHub C2 campaign discovered in April uses GitHub itself as the command and control server — routing malicious traffic through one of the most trusted platforms on the internet so firewalls never flag it.
The researchers have one clear recommendation. Never clone a repository you received through a job offer or recruitment process without running it in a completely isolated environment. Keep your SSH keys, browser credentials, and crypto wallet seed phrases on a machine that never touches unsolicited code. If a recruiter sends you a repo to test, treat it as a loaded weapon until proven otherwise.
The job market in crypto is real. So are the people hunting inside it.
Stay sharp.
$BTC $ETH $BNB #CryptoSecurity #LazarusGroup #HackerAlert #Web3Security #dyor
Daily Free Earn:
👉BP8GTWK78N👈 $10 USDT Red Packet Code Claim Fast 🤑
·
--
Bearish
#ScrollCoFounderXAccountHacked Bigger Lesson for Web3 Founders 🔐 #ScrollCoFounderXAccountHacked This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels #Hack #HackerAlert #Hacked
#ScrollCoFounderXAccountHacked
Bigger Lesson for Web3 Founders
🔐 #ScrollCoFounderXAccountHacked
This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels
#Hack #HackerAlert #Hacked
·
--
Bearish
🚨 Why is SUI Dumping? Analyzing the Plunge Amid Cetus Protocol Exploit 🚨 The SUI token has seen a sharp decline recently, with growing concerns tied to an apparent $260M exploit targeting Cetus Protocol—Sui’s largest liquidity provider and decentralized exchange (DEX). Here’s a breakdown of the key factors behind the sell-off: ➡️ Cetus Protocol Exploit Spooks Investors - Reports confirm Cetus, a cornerstone of Sui’s DeFi ecosystem, was hacked, causing Sui-based tokens to plummet ~90%. - The breach has eroded confidence in Sui’s security infrastructure, especially since Cetus was a major hub for liquidity and trading activity. ➡️ Liquidity Crisis and TVL Impact - Prior to the exploit, Sui’s Total Value Locked (TVL) hit a record $1.835B, but the attack may trigger mass withdrawals. - Protocols like Suilend, which dominate Sui’s DeFi TVL, could face collateral damage if users flee to safer chains. #sui #SUI🔥 #HackerAlert $SUI {spot}(SUIUSDT)
🚨 Why is SUI Dumping? Analyzing the Plunge Amid Cetus Protocol Exploit 🚨

The SUI token has seen a sharp decline recently, with growing concerns tied to an apparent $260M exploit targeting Cetus Protocol—Sui’s largest liquidity provider and decentralized exchange (DEX). Here’s a breakdown of the key factors behind the sell-off:

➡️ Cetus Protocol Exploit Spooks Investors
- Reports confirm Cetus, a cornerstone of Sui’s DeFi ecosystem, was hacked, causing Sui-based tokens to plummet ~90%.
- The breach has eroded confidence in Sui’s security infrastructure, especially since Cetus was a major hub for liquidity and trading activity.

➡️ Liquidity Crisis and TVL Impact
- Prior to the exploit, Sui’s Total Value Locked (TVL) hit a record $1.835B, but the attack may trigger mass withdrawals.
- Protocols like Suilend, which dominate Sui’s DeFi TVL, could face collateral damage if users flee to safer chains.
#sui #SUI🔥 #HackerAlert $SUI
·
--
Bearish
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨 Another major blow to DeFi security! The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol. 🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi. 📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations! 🔐 This is a harsh reminder to: — Stay updated on security risks — Use cold wallets for long-term holdings — Never go all-in on unverified protocols 👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem. #gmx #defi #HackerAlert #CryptoNewss
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨

Another major blow to DeFi security!

The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol.

🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi.

📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations!

🔐 This is a harsh reminder to: — Stay updated on security risks
— Use cold wallets for long-term holdings
— Never go all-in on unverified protocols

👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem.

#gmx #defi
#HackerAlert
#CryptoNewss
·
--
Bullish
#HackerAlert JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report. $BTC $ETH $TRX
#HackerAlert
JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report.
$BTC $ETH $TRX
#HackedFunds #HackerAlert follow like share The AI agent protocol swarms community Discord account was hacked, the attacker deleted channels and kicked out over 300 members, the team is currently recovering and strengthening security. Hacker attacks are frequent, it's not just swarms; yesterday Consensys also confirmed a hard disk issue with MetaMask, there are indeed many security risks in the crypto ecosystem. Linking to stablecoin underlying asset management and the launch of Cyber AI tools, project teams need to quickly patch up vulnerabilities, otherwise user confidence will collapse. I believe this will increase the demand for security tools. Next, we will focus on the team's recovery progress. In the short term, similar incidents may drag down the AI sector, but in the long run, strengthening security can stabilize the market, so don't rush to sell
#HackedFunds #HackerAlert

follow like share

The AI agent protocol swarms community Discord account was hacked, the attacker deleted channels and kicked out over 300 members, the team is currently recovering and strengthening security.
Hacker attacks are frequent, it's not just swarms; yesterday Consensys also confirmed a hard disk issue with MetaMask, there are indeed many security risks in the crypto ecosystem.
Linking to stablecoin underlying asset management and the launch of Cyber AI tools, project teams need to quickly patch up vulnerabilities, otherwise user confidence will collapse. I believe this will increase the demand for security tools.
Next, we will focus on the team's recovery progress. In the short term, similar incidents may drag down the AI sector, but in the long run, strengthening security can stabilize the market, so don't rush to sell
Article
Warning About a Crypto Scam: Hacked @TrumpDaily Account Promotes Fake Meme CoinsHackers Exploited the Account to Promote Fraudulent Tokens The @TrumpDailyPosts account on the X platform (formerly Twitter) has been hacked and is being misused to spread fake meme coin addresses. The compromised account continues to actively promote several fraudulent tokens, including a fake token named $POWER. According to Scam Sniffer, a Web3 platform focused on combating scams, the hackers not only post but also quickly delete content related to these fraudulent schemes. Users are advised to verify the credibility of any investment promises, especially those originating from compromised accounts. Connection to Other Organized Scams Investigations revealed that the gas source used to create the fake $POWER token address was linked to the same platform involved in a recent hack of the Farcaster account, owned by a MetaMask co-founder. During that incident, hackers promoted fraudulent meme coins and were accused of generating over 1,000 SOL (Solana). These activities point to a well-organized cybercriminal gang targeting prominent crypto figures and organizations. Social Media as an Emerging Tool for Fraud A troubling trend in the crypto space is the increasing use of social media accounts to promote fraudulent tokens. Hackers exploit high-profile accounts to create an illusion of trustworthiness and maximize their financial gains. The hacking of @TrumpDailyPosts is yet another example of how cybercriminals are adapting their methods. By leveraging fraudulent meme coins and social media, they are creating new ways to deceive investors and extract illicit profits. How to Protect Yourself From These Scams Given these trends, it is crucial for both users and platforms to pay closer attention to identifying fraudulent activities. Users should exercise extreme caution when considering any investment opportunities, especially involving meme coins or less-known tokens. Safety should always take precedence over the promise of profit. Verify sources, thoroughly check addresses, and avoid suspicious projects promising unrealistic returns. The crypto space offers numerous opportunities but also comes with heightened risks that require vigilance and proactive measures. #CryptoNewss , #blockchain , #CryptoScamAlert , #cryptohacks , #HackerAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Warning About a Crypto Scam: Hacked @TrumpDaily Account Promotes Fake Meme Coins

Hackers Exploited the Account to Promote Fraudulent Tokens
The @TrumpDailyPosts account on the X platform (formerly Twitter) has been hacked and is being misused to spread fake meme coin addresses. The compromised account continues to actively promote several fraudulent tokens, including a fake token named $POWER.
According to Scam Sniffer, a Web3 platform focused on combating scams, the hackers not only post but also quickly delete content related to these fraudulent schemes. Users are advised to verify the credibility of any investment promises, especially those originating from compromised accounts.
Connection to Other Organized Scams
Investigations revealed that the gas source used to create the fake $POWER token address was linked to the same platform involved in a recent hack of the Farcaster account, owned by a MetaMask co-founder.
During that incident, hackers promoted fraudulent meme coins and were accused of generating over 1,000 SOL (Solana). These activities point to a well-organized cybercriminal gang targeting prominent crypto figures and organizations.
Social Media as an Emerging Tool for Fraud
A troubling trend in the crypto space is the increasing use of social media accounts to promote fraudulent tokens. Hackers exploit high-profile accounts to create an illusion of trustworthiness and maximize their financial gains.
The hacking of @TrumpDailyPosts is yet another example of how cybercriminals are adapting their methods. By leveraging fraudulent meme coins and social media, they are creating new ways to deceive investors and extract illicit profits.
How to Protect Yourself From These Scams
Given these trends, it is crucial for both users and platforms to pay closer attention to identifying fraudulent activities. Users should exercise extreme caution when considering any investment opportunities, especially involving meme coins or less-known tokens.
Safety should always take precedence over the promise of profit. Verify sources, thoroughly check addresses, and avoid suspicious projects promising unrealistic returns. The crypto space offers numerous opportunities but also comes with heightened risks that require vigilance and proactive measures.
#CryptoNewss , #blockchain , #CryptoScamAlert , #cryptohacks , #HackerAlert
Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins. It gives them full admin access, evades detection, and locks out real users. It looks like a legit plugin—and it auto-activates. CheckDot is SAFU #dyor on CheckDot 🤝 #HackerAlert
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins.

It gives them full admin access, evades detection, and locks out real users.

It looks like a legit plugin—and it auto-activates.

CheckDot is SAFU #dyor on CheckDot 🤝

#HackerAlert
Article
Coinbase Hacker Mocks Investigator While Laundering Millions via Decentralized PlatformsOn Wednesday night, a mysterious message appeared on the Ethereum blockchain — a direct mockery aimed at one of the most prominent crypto investigators. The sender? A hacker linked to the recent massive data breach at Coinbase, which compromised the accounts of over 69,000 users and may cost the exchange hundreds of millions of dollars. The taunt, simply reading "L bozo", was embedded in a transaction and meant to ridicule the investigator. The hacker even included a link to a viral meme video featuring NBA Hall of Famer James Worthy smoking a cigar, escalating the provocation. 💰 $44.9 Million Laundered Through THORChain But the trolling wasn’t all. On Tuesday, the attacker began liquidating stolen assets, converting 17,800 ETH into DAI stablecoins — worth roughly $44.9 million — using THORChain, a decentralized cross-chain trading protocol. 📉 The swaps occurred at an average ETH price of $2,528. 💼 One major swap involved 9,080 ETH for $22.8 million in DAI. Using THORChain allowed the hacker to bypass centralized exchanges, complicating tracking efforts and signaling a new level of sophistication in crypto laundering tactics. 🔓 What Happened at Coinbase? Coinbase confirmed that the breach took place in December 2024, but it wasn’t disclosed publicly until May 2025. The hackers gained access to sensitive personal data of around 69,000 users. Soon after, they allegedly demanded $20 million in Bitcoin as ransom, threatening to leak the stolen data on the dark web. Coinbase refused to pay and instead offered the same amount as a reward for information leading to the attackers. 📉 Financial Fallout: Coinbase in Crisis The breach has severely damaged Coinbase’s reputation. On Wednesday, its stock (COIN) closed down 0.92% at $258.97, continuing a 36% monthly decline. Security experts claim the exchange ignored prior warnings of suspicious activity as early as December, a failure that now haunts its image and user trust. 🛡️ Binance and Kraken Also Targeted Coinbase wasn’t the only target. Binance and Kraken also faced recent social engineering attempts, where attackers posed as users and tried to bribe support agents. Binance’s AI systems successfully flagged and blocked the suspicious messages. Kraken reported no customer data losses either, thanks to strong internal protocols. 🔚 A Glimpse Into the Future of Crypto Crime? This case is more than a breach — it's a bold show of power by a cybercriminal who’s fluent in DeFi and unafraid to mock those chasing him. With advanced laundering tactics and an open taunt of blockchain sleuths, we may be witnessing the next evolution in crypto-based crime. Coinbase may recover financially — but the reputational scars will be harder to erase. #HackerAlert , #CryptoSecurity , #CryptoCrime , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Coinbase Hacker Mocks Investigator While Laundering Millions via Decentralized Platforms

On Wednesday night, a mysterious message appeared on the Ethereum blockchain — a direct mockery aimed at one of the most prominent crypto investigators. The sender? A hacker linked to the recent massive data breach at Coinbase, which compromised the accounts of over 69,000 users and may cost the exchange hundreds of millions of dollars.
The taunt, simply reading "L bozo", was embedded in a transaction and meant to ridicule the investigator. The hacker even included a link to a viral meme video featuring NBA Hall of Famer James Worthy smoking a cigar, escalating the provocation.
💰 $44.9 Million Laundered Through THORChain
But the trolling wasn’t all. On Tuesday, the attacker began liquidating stolen assets, converting 17,800 ETH into DAI stablecoins — worth roughly $44.9 million — using THORChain, a decentralized cross-chain trading protocol.
📉 The swaps occurred at an average ETH price of $2,528.
💼 One major swap involved 9,080 ETH for $22.8 million in DAI.
Using THORChain allowed the hacker to bypass centralized exchanges, complicating tracking efforts and signaling a new level of sophistication in crypto laundering tactics.
🔓 What Happened at Coinbase?
Coinbase confirmed that the breach took place in December 2024, but it wasn’t disclosed publicly until May 2025. The hackers gained access to sensitive personal data of around 69,000 users.
Soon after, they allegedly demanded $20 million in Bitcoin as ransom, threatening to leak the stolen data on the dark web. Coinbase refused to pay and instead offered the same amount as a reward for information leading to the attackers.
📉 Financial Fallout: Coinbase in Crisis
The breach has severely damaged Coinbase’s reputation. On Wednesday, its stock (COIN) closed down 0.92% at $258.97, continuing a 36% monthly decline.
Security experts claim the exchange ignored prior warnings of suspicious activity as early as December, a failure that now haunts its image and user trust.
🛡️ Binance and Kraken Also Targeted
Coinbase wasn’t the only target. Binance and Kraken also faced recent social engineering attempts, where attackers posed as users and tried to bribe support agents.
Binance’s AI systems successfully flagged and blocked the suspicious messages. Kraken reported no customer data losses either, thanks to strong internal protocols.
🔚 A Glimpse Into the Future of Crypto Crime?
This case is more than a breach — it's a bold show of power by a cybercriminal who’s fluent in DeFi and unafraid to mock those chasing him. With advanced laundering tactics and an open taunt of blockchain sleuths, we may be witnessing the next evolution in crypto-based crime.
Coinbase may recover financially — but the reputational scars will be harder to erase.
#HackerAlert , #CryptoSecurity , #CryptoCrime , #CyberSecurity , #CryptoNewss
Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥 Yesterday, the crypto world exploded with two shocking headlines: 1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack. 2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯 Coincidence? Or something bigger? 🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang. 🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen! 🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots. 💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥 🔔 Follow for more real-time crypto updates! 🚀 #BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥

Yesterday, the crypto world exploded with two shocking headlines:

1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack.

2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯

Coincidence? Or something bigger?
🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang.

🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen!

🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots.

💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥

🔔 Follow for more real-time crypto updates! 🚀

#BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number