Binance Square
#hacked

hacked

511,410 views
296 Discussing
Thomas Anderson
·
--
Android Hackers Target 800 Banking, Crypto and Social Media Apps With ‘Near-Zero Detection Rates’: Zimperium Android hackers are now targeting more than 800 applications across banking, cryptocurrency and social media sectors. The cybersecurity firm Zimperium says its researchers have identified four active malware families that use advanced command-and-control infrastructure to steal credentials, conduct unauthorized financial transactions and exfiltrate data at scale. “Collectively, these campaigns target over 800 applications across the banking, cryptocurrency, and social media sectors. By employing advanced anti-analysis techniques and structural APK tampering, these families often maintain near-zero detection rates against traditional signature-based security mechanisms.” The names of the malware families are RecruitRat, SaferRat, Astrinox and Massiv. Attackers commonly rely on phishing websites, fraudulent job offers, fake software updates, text-message scams and promotional lures to convince victims to install malicious Android apps. Once installed, the malware can request Accessibility permissions, hide app icons, block uninstall attempts, steal PINs and passwords through fake lock screens, capture one-time passcodes, stream live device screens and overlay counterfeit login pages on legitimate banking or crypto apps. “Overlay attacks remain the cornerstone of the credential-harvesting lifecycle. Using Accessibility Services to monitor the foreground, the malware detects the exact moment a victim launches a financial application. The malware then fetches a malicious HTML payload and overlays it onto the legitimate application’s user interface, creating a highly convincing, deceptive facade.” The company said the campaigns use HTTPS and WebSocket communications to blend malicious traffic with normal app activity, while some variants add extra encryption layers to evade detection. More news — subscribe #hacked
Android Hackers Target 800 Banking, Crypto and Social Media Apps With ‘Near-Zero Detection Rates’: Zimperium

Android hackers are now targeting more than 800 applications across banking, cryptocurrency and social media sectors.

The cybersecurity firm Zimperium says its researchers have identified four active malware families that use advanced command-and-control infrastructure to steal credentials, conduct unauthorized financial transactions and exfiltrate data at scale.

“Collectively, these campaigns target over 800 applications across the banking, cryptocurrency, and social media sectors.

By employing advanced anti-analysis techniques and structural APK tampering, these families often maintain near-zero detection rates against traditional signature-based security mechanisms.”

The names of the malware families are RecruitRat, SaferRat, Astrinox and Massiv.

Attackers commonly rely on phishing websites, fraudulent job offers, fake software updates, text-message scams and promotional lures to convince victims to install malicious Android apps.

Once installed, the malware can request Accessibility permissions, hide app icons, block uninstall attempts, steal PINs and passwords through fake lock screens, capture one-time passcodes, stream live device screens and overlay counterfeit login pages on legitimate banking or crypto apps.

“Overlay attacks remain the cornerstone of the credential-harvesting lifecycle. Using Accessibility Services to monitor the foreground, the malware detects the exact moment a victim launches a financial application. The malware then fetches a malicious HTML payload and overlays it onto the legitimate application’s user interface, creating a highly convincing, deceptive facade.”

The company said the campaigns use HTTPS and WebSocket communications to blend malicious traffic with normal app activity, while some variants add extra encryption layers to evade detection.

More news — subscribe

#hacked
E Alex:
Damn, 800 apps with near-zero detection? That's wild. Stay safe out there.
🚨 THE $17,000,000,000 WAKE-UP CALL 🚨 In just 10 years, hackers have drained $17B across 518 major incidents. The transition from DeFi exploits to CeFi targets in 2026 shows no one is safe without a plan. The Reality Check: Total Stolen: $17 Billion 💸 Total Hacks: 518 ⚔️ Biggest Lesson: Greed kills, but bad security buries you. Stay SAFU by using 2FA (Non-SMS) and verifying every link. What is the one security tool you can't live without? Let’s help each other stay safe! 👇 #CryptoSecurity #Hacked
🚨 THE $17,000,000,000 WAKE-UP CALL 🚨

In just 10 years, hackers have drained $17B across 518 major incidents. The transition from DeFi exploits to CeFi targets in 2026 shows no one is safe without a plan.

The Reality Check:

Total Stolen: $17 Billion 💸

Total Hacks: 518 ⚔️

Biggest Lesson: Greed kills, but bad security buries you.

Stay SAFU by using 2FA (Non-SMS) and verifying every link.

What is the one security tool you can't live without? Let’s help each other stay safe! 👇

#CryptoSecurity #Hacked
Article
Android Security Alert: 800+ Crypto and Banking Apps in the CrosshairsIf you're managing your assets on Android, caution is key. Cybersecurity firm Zimperium has just uncovered a massive offensive. Four families of ultra-sophisticated malware are currently targeting over 800 apps, including your exchanges, wallets, and social networks. Their strong suit? Absolute discretion. Thanks to APK spoofing techniques, these viruses show a near-zero detection rate against standard antivirus solutions.

Android Security Alert: 800+ Crypto and Banking Apps in the Crosshairs

If you're managing your assets on Android, caution is key. Cybersecurity firm Zimperium has just uncovered a massive offensive. Four families of ultra-sophisticated malware are currently targeting over 800 apps, including your exchanges, wallets, and social networks.
Their strong suit? Absolute discretion. Thanks to APK spoofing techniques, these viruses show a near-zero detection rate against standard antivirus solutions.
Article
Scallop Exploit: Targeted AttackScallop, the leading money market in the Sui ecosystem, fell victim to a targeted attack. Although the scale of the damage isn't critical for the protocol, this incident has raised a red flag for the entire Sui network, which was previously considered one of the safest due to the Move programming language. Details

Scallop Exploit: Targeted Attack

Scallop, the leading money market in the Sui ecosystem, fell victim to a targeted attack. Although the scale of the damage isn't critical for the protocol, this incident has raised a red flag for the entire Sui network, which was previously considered one of the safest due to the Move programming language.
Details
🚨 BINANCE SQUARE POST $606,000,000 stolen in 18 days. April 2026 is already the worst month for crypto hacks since the $1.4B Bybit breach. Two attacks. Both Lazarus Group. Both devastating: → $285M — Drift Protocol (April 1) → $292M — KelpDAO (April 18) The KelpDAO exploit alone triggered $10B+ in Aave outflows and sent shockwaves across 20+ connected protocols. And it's not slowing down. DeFi attack frequency is up 68% year-on-year. Smart contract audits alone are no longer enough — attackers have shifted to private keys, bridge infrastructure, and AI-driven social engineering. 😫Most retail traders only think about fees and leverage when choosing an exchange. Security should be the first filter. What actually matters when vetting an exchange: ✅ Proof of reserves (independently verified) ✅ Cold storage ratio ✅ Track record after a breach — did they compensate users? ✅ MiCA / regulated status in your jurisdiction ✅ Insurance funds We review every exchange on these criteria before anything else. 🔗 Full exchange rankings: https://trading365.org/reviews Don't let the next hack be your exit from crypto. #Hacked #StolenFunds
🚨 BINANCE SQUARE POST

$606,000,000 stolen in 18 days. April 2026 is already the worst month for crypto hacks since the $1.4B Bybit breach.

Two attacks. Both Lazarus Group. Both devastating:
→ $285M — Drift Protocol (April 1)
→ $292M — KelpDAO (April 18)

The KelpDAO exploit alone triggered $10B+ in Aave outflows and sent shockwaves across 20+ connected protocols.

And it's not slowing down. DeFi attack frequency is up 68% year-on-year. Smart contract audits alone are no longer enough — attackers have shifted to private keys, bridge infrastructure, and AI-driven social engineering.

😫Most retail traders only think about fees and leverage when choosing an exchange. Security should be the first filter.

What actually matters when vetting an exchange:
✅ Proof of reserves (independently verified)
✅ Cold storage ratio
✅ Track record after a breach — did they compensate users?
✅ MiCA / regulated status in your jurisdiction
✅ Insurance funds

We review every exchange on these criteria before anything else.

🔗 Full exchange rankings: https://trading365.org/reviews

Don't let the next hack be your exit from crypto.
#Hacked #StolenFunds
Cybersecurity in Crypto Ways to safeguard your assets from hacks. Solve interactive challenges to uncover vulnerabilities in your account. #HotTrends #Hacked $BTC $XRP $USDC
Cybersecurity in Crypto
Ways to safeguard your assets from hacks. Solve interactive challenges to uncover vulnerabilities in your account.
#HotTrends
#Hacked
$BTC
$XRP
$USDC
DefiLlama data shows that over the past decade, the crypto industry has experienced 518 attacks, resulting in total losses exceeding 17 billion USD. This 17 billion is essentially the industry's painful tuition fee, but this data has been thrown out, and not even a ripple has been seen in the market. Today's players have become completely desensitized to hacker news; this 'security aesthetic fatigue' is actually a typical emotional turning point. From a chip perspective, a large portion of the stolen coins have become a black hole that can never be recovered, effectively completing a forced deflation. When such negative news can no longer trigger panic selling and is even regarded as old news, it indicates that the resilience of the market bottom has already been forged. Instead of worrying about code vulnerabilities, people might as well be concerned that their wallets haven't yet seen a hundredfold dog. After so many years, have you contributed 'tuition fees' to hackers? #Security #DeFi #Hacked $BTC $ETH {future}(ETHUSDT) {future}(BTCUSDT)
DefiLlama data shows that over the past decade, the crypto industry has experienced 518 attacks, resulting in total losses exceeding 17 billion USD.
This 17 billion is essentially the industry's painful tuition fee, but this data has been thrown out, and not even a ripple has been seen in the market. Today's players have become completely desensitized to hacker news; this 'security aesthetic fatigue' is actually a typical emotional turning point.
From a chip perspective, a large portion of the stolen coins have become a black hole that can never be recovered, effectively completing a forced deflation. When such negative news can no longer trigger panic selling and is even regarded as old news, it indicates that the resilience of the market bottom has already been forged. Instead of worrying about code vulnerabilities, people might as well be concerned that their wallets haven't yet seen a hundredfold dog.
After so many years, have you contributed 'tuition fees' to hackers? #Security #DeFi #Hacked $BTC $ETH
Article
$13 BILLION vanished from DeFi in just 48 hours.Panic hit the market — but is this really the end for Aave ($AAVE)? Let’s cut through the noise. The recent exploit tied to KelpDAO didn’t just trigger losses — it shook confidence across decentralized finance overnight. Liquidity fled, prices reacted violently, and fear spread faster than facts. Billions were erased, leaving investors questioning whether DeFi’s biggest protocols can survive the shock. But market chaos doesn’t automatically equal collapse. Short-Term Shock vs Long-Term Reality Crypto history shows one pattern repeating: every major disruption looks like the end — until recovery begins. DeFi is still an emerging financial system, and security incidents, while damaging, have historically accelerated improvement rather than destruction. Established platforms with deep liquidity and proven infrastructure tend to endure after weaker projects fall away. Aave sits in that category. Stress Test, Not a Death Sentence Moments like this act as pressure tests. While the market reacts emotionally, strong protocols adapt. Aave’s lending architecture, risk management systems, and long-standing community support give it resilience many newer projects lack. In decentralized finance, survival often belongs to platforms that evolve fastest after crises. Fundamentals Still Matter Unlike speculative tokens driven purely by hype, Aave provides real utility — borrowing, lending, and capital efficiency within the ecosystem. That utility creates staying power. Even during market-wide selloffs, platforms delivering consistent value tend to regain traction once panic fades. The Bigger Picture Yes, $13B disappearing is massive. But zooming out reveals something different: this is part of DeFi’s maturation process. Every cycle removes weak structures and forces stronger standards. Meanwhile, institutional curiosity around decentralized finance continues to grow, suggesting long-term capital hasn’t disappeared — it’s waiting for stability. Markets panic. Infrastructure adapts. Survivors lead the next cycle. The real question isn’t whether DeFi survives — it’s which protocols emerge stronger when the fear ends #Hacked $AAVE #BTC #insight

$13 BILLION vanished from DeFi in just 48 hours.

Panic hit the market — but is this really the end for Aave ($AAVE )?
Let’s cut through the noise.
The recent exploit tied to KelpDAO didn’t just trigger losses — it shook confidence across decentralized finance overnight. Liquidity fled, prices reacted violently, and fear spread faster than facts. Billions were erased, leaving investors questioning whether DeFi’s biggest protocols can survive the shock.
But market chaos doesn’t automatically equal collapse.
Short-Term Shock vs Long-Term Reality
Crypto history shows one pattern repeating: every major disruption looks like the end — until recovery begins. DeFi is still an emerging financial system, and security incidents, while damaging, have historically accelerated improvement rather than destruction. Established platforms with deep liquidity and proven infrastructure tend to endure after weaker projects fall away.
Aave sits in that category.
Stress Test, Not a Death Sentence
Moments like this act as pressure tests. While the market reacts emotionally, strong protocols adapt. Aave’s lending architecture, risk management systems, and long-standing community support give it resilience many newer projects lack. In decentralized finance, survival often belongs to platforms that evolve fastest after crises.

Fundamentals Still Matter
Unlike speculative tokens driven purely by hype, Aave provides real utility — borrowing, lending, and capital efficiency within the ecosystem. That utility creates staying power. Even during market-wide selloffs, platforms delivering consistent value tend to regain traction once panic fades.
The Bigger Picture
Yes, $13B disappearing is massive. But zooming out reveals something different: this is part of DeFi’s maturation process. Every cycle removes weak structures and forces stronger standards. Meanwhile, institutional curiosity around decentralized finance continues to grow, suggesting long-term capital hasn’t disappeared — it’s waiting for stability.

Markets panic. Infrastructure adapts. Survivors lead the next cycle.
The real question isn’t whether DeFi survives — it’s which protocols emerge stronger when the fear ends

#Hacked $AAVE #BTC #insight
Article
The Digital Heist of the Decade: How Kelp DAO Lost $300M in MinutesApril 20, 2026, will go down in cybersecurity history as the day of one of the boldest hacks in the decentralized finance space. Hackers managed to snag over $300 million, throwing the stability of the entire crypto market into jeopardy. The attackers uncovered a critical vulnerability in the cross-chain infrastructure used by the Kelp DAO protocol. Due to a bug in the bridge code based on LayerZero technology, the hackers were able to compromise the transaction verification system.

The Digital Heist of the Decade: How Kelp DAO Lost $300M in Minutes

April 20, 2026, will go down in cybersecurity history as the day of one of the boldest hacks in the decentralized finance space. Hackers managed to snag over $300 million, throwing the stability of the entire crypto market into jeopardy.

The attackers uncovered a critical vulnerability in the cross-chain infrastructure used by the Kelp DAO protocol. Due to a bug in the bridge code based on LayerZero technology, the hackers were able to compromise the transaction verification system.
🏛️💔 WHEN SECURITY BREAKS: MY REFLECTION AFTER THE $292 MILLION BLOW TO KELP DAO$BTC ✨ $ETH ✨ $BNB Hello, family! Good morning. ☕️ Today it was a bit harder than usual for me to sit down and write to you. Sometimes, in this crypto world, we get carried away by the excitement of the charts, the all-time highs, and that feeling that we are all going to win. But today, Monday, April 20, reality hit us with a blow that makes you think for a while. If you have been checking the trends, you surely saw the hashtag #KelpDAOFacesAttack And no, it’s not just another news item. We are talking about $292 million that vanished in the blink of an eye. 🏛️💸

🏛️💔 WHEN SECURITY BREAKS: MY REFLECTION AFTER THE $292 MILLION BLOW TO KELP DAO

$BTC $ETH $BNB
Hello, family! Good morning. ☕️ Today it was a bit harder than usual for me to sit down and write to you. Sometimes, in this crypto world, we get carried away by the excitement of the charts, the all-time highs, and that feeling that we are all going to win. But today, Monday, April 20, reality hit us with a blow that makes you think for a while.
If you have been checking the trends, you surely saw the hashtag #KelpDAOFacesAttack And no, it’s not just another news item. We are talking about $292 million that vanished in the blink of an eye. 🏛️💸
Article
U.S. moved BTC linked to the Bitfinex hack of 2016 to Coinbase Prime🧠 📢 What exactly happened? The U.S. government: moved linked to the Bitfinex hack of 2016 to Coinbase Prime 👉 Detected by on-chain data (Arkham, etc.) 🧩 🔍 Key context (VERY important) 🧨 The Bitfinex hack (2016) ~ stolen 119,756 BTC One of the biggest hacks in history In 2022, the U.S. recovered a large portion (~94,000 BTC) 👉 Today, those funds are still under government control ⚖️ 🧠 Why did they move those BTC? Here's the key point: 👉 NOT a sell-off (probably)

U.S. moved BTC linked to the Bitfinex hack of 2016 to Coinbase Prime

🧠 📢 What exactly happened?

The U.S. government:

moved
linked to the Bitfinex hack of 2016
to Coinbase Prime

👉 Detected by on-chain data (Arkham, etc.)

🧩 🔍 Key context (VERY important)

🧨 The Bitfinex hack (2016)

~ stolen
119,756 BTC
One of the biggest hacks in history

In 2022, the U.S. recovered a large portion (~94,000 BTC)

👉 Today, those funds are still under government control

⚖️ 🧠 Why did they move those BTC?

Here's the key point:

👉 NOT a sell-off (probably)
Bearish sentiment around $AAVE after the #KelpDAO rsETH exploit. Around $290M in rsETH was reportedly drained, then used on Aave as collateral to borrow WETH, creating potential bad debt inside #Aave pools. Important Aave itself was not #hacked but it is now exposed to fallout from worthless collateral. Short term outlook remains bearish until Exact bad debt is confirmed Aave announces recovery measures Market confidence returns {spot}(AAVEUSDT) For investors. waiting may be safer than rushing to buy. If you believe in Aave long term, scaling in slowly could be smarter than going all in. Fear is high, but if Aave handles this well, recovery is still possible. #KelpDAOFacesAttack
Bearish sentiment around $AAVE after the #KelpDAO rsETH exploit.

Around $290M in rsETH was reportedly drained, then used on Aave as collateral to borrow WETH, creating potential bad debt inside #Aave pools.

Important Aave itself was not #hacked but it is now exposed to fallout from worthless collateral.

Short term outlook remains bearish until

Exact bad debt is confirmed

Aave announces recovery measures

Market confidence returns


For investors. waiting may be safer than rushing to buy. If you believe in Aave long term, scaling in slowly could be smarter than going all in.

Fear is high, but if Aave handles this well, recovery is still possible.

#KelpDAOFacesAttack
Kelp DAO, a liquid restaking protocol connected to EigenLayer, was exploited on April 18, 2026. Around $292 million worth of $RSETH was drained through its LayerZero cross-chain bridge. The attacker forged a cross-chain message that the system accepted as valid, even though no real deposit happened on the source chain. This allowed them to mint or unlock about 116,500 rsETH without any actual ETH backing it. The stolen rsETH was then sent to Aave, a major DeFi lending protocol, where it was used as collateral to borrow large amounts of real ETH and wrapped ETH. By the time protocols responded, much of the borrowed ETH had already moved. A second attack was nearly executed that could have drained another $100M, but a rapid blacklist response stopped it just before it went through. Kelp DAO paused rsETH contracts across mainnet and several Layer-2 chains. Aave froze the $RSETH markets. Compound, Euler Labs, and Venus Protocol also reviewed and adjusted their exposure. The failure is reported to have happened in the Decentralized Verifier Network layer, which is responsible for confirming cross-chain messages, not in the core smart contracts themselves. This points to a configuration weakness in how external validation was trusted. The exploit was first reported by the blockchain investigator ZachCBT and is now considered one of the largest DeFi incidents of 2026, showing how a single bridge failure can spread risk across the entire DeFi ecosystem within minutes. #KelpDAO #security #Hack #Hacked #exploit
Kelp DAO, a liquid restaking protocol connected to EigenLayer, was exploited on April 18, 2026. Around $292 million worth of $RSETH was drained through its LayerZero cross-chain bridge.

The attacker forged a cross-chain message that the system accepted as valid, even though no real deposit happened on the source chain. This allowed them to mint or unlock about 116,500 rsETH without any actual ETH backing it.

The stolen rsETH was then sent to Aave, a major DeFi lending protocol, where it was used as collateral to borrow large amounts of real ETH and wrapped ETH. By the time protocols responded, much of the borrowed ETH had already moved.

A second attack was nearly executed that could have drained another $100M, but a rapid blacklist response stopped it just before it went through.

Kelp DAO paused rsETH contracts across mainnet and several Layer-2 chains. Aave froze the $RSETH markets. Compound, Euler Labs, and Venus Protocol also reviewed and adjusted their exposure.

The failure is reported to have happened in the Decentralized Verifier Network layer, which is responsible for confirming cross-chain messages, not in the core smart contracts themselves. This points to a configuration weakness in how external validation was trusted.

The exploit was first reported by the blockchain investigator ZachCBT and is now considered one of the largest DeFi incidents of 2026, showing how a single bridge failure can spread risk across the entire DeFi ecosystem within minutes.

#KelpDAO #security #Hack #Hacked #exploit
Article
290 million per hour!!!290 million per hour: technical post-mortem of the Kelp DAO rsETH bridge exploit On April 18, 2026, at 17:35 UTC, one of the largest DeFi exploits of 2026 occurred. The attacker withdrew 116,500 rsETH (approximately $292–293 million at the current exchange rate) through a LayerZero OFT-based bridge. This is about 18% of the total circulating supply of rsETH. Important: the main protocol of Kelp DAO (deposit pools, EigenLayer integration, and restaking logic) was not affected. The blow was exclusively on the cross-chain bridge — the OFT adapter (Omnichain Fungible Token) built on top of LayerZero infrastructure.

290 million per hour!!!

290 million per hour: technical post-mortem of the Kelp DAO rsETH bridge exploit

On April 18, 2026, at 17:35 UTC, one of the largest DeFi exploits of 2026 occurred. The attacker withdrew 116,500 rsETH (approximately $292–293 million at the current exchange rate) through a LayerZero OFT-based bridge. This is about 18% of the total circulating supply of rsETH.
Important: the main protocol of Kelp DAO (deposit pools, EigenLayer integration, and restaking logic) was not affected. The blow was exclusively on the cross-chain bridge — the OFT adapter (Omnichain Fungible Token) built on top of LayerZero infrastructure.
#ScrollCoFounderXAccountHacked Bigger Lesson for Web3 Founders 🔐 #ScrollCoFounderXAccountHacked This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels #Hack #HackerAlert #Hacked
#ScrollCoFounderXAccountHacked
Bigger Lesson for Web3 Founders
🔐 #ScrollCoFounderXAccountHacked
This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels
#Hack #HackerAlert #Hacked
🚨OKX #SLAPS BACK AT JUSTIN SUN OVER #STOLEN FUNDS FREEZE DRAMA 🔹Tron’s X account #hacked ; malicious contract posted, DMs sent. 🔹Justin Sun claims OKX ignored a law enforcement freeze notice. 🔹OKX #CEO Star Xu denies receiving any such request—even checked spam folder. 🔹Xu: “We need legal process, not personal posts or oral requests.” 🔹OKX demands proof of request, while Sun deletes key posts. 🔹Part of ongoing trend of high-profile crypto X hacks (e.g., Kaito AI, Pump.fun). $TRX {spot}(TRXUSDT)
🚨OKX #SLAPS BACK AT JUSTIN SUN OVER #STOLEN FUNDS FREEZE DRAMA

🔹Tron’s X account #hacked ; malicious contract posted, DMs sent.

🔹Justin Sun claims OKX ignored a law enforcement freeze notice.

🔹OKX #CEO Star Xu denies receiving any such request—even checked spam folder.

🔹Xu: “We need legal process, not personal posts or oral requests.”

🔹OKX demands proof of request, while Sun deletes key posts.

🔹Part of ongoing trend of high-profile crypto X hacks (e.g., Kaito AI, Pump.fun).
$TRX
Bybit Hackers Identified – North Korean Cybercriminals Behind $1.5B Theft! 🚨 Investigations confirm that Park Jin Hyok, a North Korean computer engineer linked to the Lazarus Group, played a key role in the $1.5 billion Bybit hack. The notorious cybercrime syndicate has been responsible for some of the biggest crypto heists in history! 🔎 Key Findings: • Blockchain analyst ZachXBT, in collaboration with Arkham Intelligence, traced stolen funds back to Lazarus-linked wallets. • The same group was previously linked to the $70M Phemex attack in January 2025. • Lazarus continues to exploit crypto exchanges, DeFi platforms, and bridge protocols, targeting weak security systems. 🔥 What This Means for Crypto? With North Korean state-sponsored hackers intensifying their attacks, crypto traders and exchanges must prioritize security to prevent future breaches. Regulators are closely watching! 💡 Pro Tip: Always use hardware wallets, enable 2FA, and avoid interacting with unknown smart contracts to keep your assets safe! #BinanceAirdropAlert #Hacked
Bybit Hackers Identified – North Korean Cybercriminals Behind $1.5B Theft! 🚨
Investigations confirm that Park Jin Hyok, a North Korean computer engineer linked to the Lazarus Group, played a key role in the $1.5 billion Bybit hack. The notorious cybercrime syndicate has been responsible for some of the biggest crypto heists in history!
🔎 Key Findings:
• Blockchain analyst ZachXBT, in collaboration with Arkham Intelligence, traced stolen funds back to Lazarus-linked wallets.
• The same group was previously linked to the $70M Phemex attack in January 2025.
• Lazarus continues to exploit crypto exchanges, DeFi platforms, and bridge protocols, targeting weak security systems.
🔥 What This Means for Crypto?
With North Korean state-sponsored hackers intensifying their attacks, crypto traders and exchanges must prioritize security to prevent future breaches. Regulators are closely watching!
💡 Pro Tip: Always use hardware wallets, enable 2FA, and avoid interacting with unknown smart contracts to keep your assets safe!
#BinanceAirdropAlert
#Hacked
Article
North Korea legalizes stolen cryptocurrency through Russia and Asia OOHNorth Korean hackers have stolen cryptocurrency worth $2.837 billion from January 2024 to September 2025. Most of the funds are laundered through intermediaries in Russia, Hong Kong, and Cambodia, experts from the Multilateral Sanctions Monitoring Group on North Korea (MSMT) at the UN reported. The main goal of hackers from North Korea, experts from the United Nations stated, is large centralized cryptocurrency exchanges. Cybercriminals have established close ties with Russian groups that are involved in the development of ransomware, representatives of MSMT said.

North Korea legalizes stolen cryptocurrency through Russia and Asia OOH

North Korean hackers have stolen cryptocurrency worth $2.837 billion from January 2024 to September 2025. Most of the funds are laundered through intermediaries in Russia, Hong Kong, and Cambodia, experts from the Multilateral Sanctions Monitoring Group on North Korea (MSMT) at the UN reported.
The main goal of hackers from North Korea, experts from the United Nations stated, is large centralized cryptocurrency exchanges. Cybercriminals have established close ties with Russian groups that are involved in the development of ransomware, representatives of MSMT said.
·
--
A known contact on TG reached out to me to ask for a chat. Scheduled a Zoom call. When I got on the Zoom, it asked me for camera access which I found a bit odd because I have used Zoom many times. Even crazier, the team members had their cameras on. I could see their legit faces. Everything looked very real. But I couldn’t hear them. It said my Zoom needs an update. But it asked me to download a script file. I immediately left. Messaged the guy on Telegram and told him to call me on TG to verify him. He then proceeded to erase all the messages and block me. #Hacked #HackerAlert
A known contact on TG reached out to me to ask for a chat. Scheduled a Zoom call. When I got on the Zoom, it asked me for camera access which I found a bit odd because I have used Zoom many times.

Even crazier, the team members had their cameras on. I could see their legit faces. Everything looked very real. But I couldn’t hear them. It said my Zoom needs an update. But it asked me to download a script file.

I immediately left. Messaged the guy on Telegram and told him to call me on TG to verify him. He then proceeded to erase all the messages and block me.

#Hacked #HackerAlert
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number