Binance Square

hackerattack

100 views
3 Discussing
AlexXXXXXX1
·
--
🚨 Attention, Crypto Fam! New Threat for Chrome and Edge Users 🛡️ The KongTuke hacking group has launched a dangerous campaign aimed at stealing data and gaining full control over your devices. 🔹 How it works: Attackers are distributing a malicious extension called NexShield, disguised as an "ultra-lightweight ad blocker." Once installed, it intentionally crashes your browser. 🔹 The Trap: When the system freezes, NexShield displays a fake security window. It prompts you to "fix the issue" by copying a command and pasting it into the Windows Command Prompt. ❌ NEVER DO THIS! 🔹 The Result: Executing the command installs the ModeloRAT trojan. This allows hackers to remotely control your PC, modify the registry, and steal sensitive information. Corporate networks are the primary targets. ⚠️ What to do? Do not install suspicious or unverified extensions.Never copy-paste commands from a browser into your terminal.If infected: Simply deleting the extension won't help. You need a full system scan with deep-cleaning antivirus software. Protect your seed phrases and stay vigilant! 🔐 #CyberSecurity #HackerAttack #Chrome #Safety #CryptoSafety {spot}(BNBUSDT) {spot}(SOLUSDT) {spot}(BTCUSDT)
🚨 Attention, Crypto Fam! New Threat for Chrome and Edge Users 🛡️
The KongTuke hacking group has launched a dangerous campaign aimed at stealing data and gaining full control over your devices.
🔹 How it works:
Attackers are distributing a malicious extension called NexShield, disguised as an "ultra-lightweight ad blocker." Once installed, it intentionally crashes your browser.
🔹 The Trap:
When the system freezes, NexShield displays a fake security window. It prompts you to "fix the issue" by copying a command and pasting it into the Windows Command Prompt.
❌ NEVER DO THIS!
🔹 The Result:
Executing the command installs the ModeloRAT trojan. This allows hackers to remotely control your PC, modify the registry, and steal sensitive information. Corporate networks are the primary targets.
⚠️ What to do?
Do not install suspicious or unverified extensions.Never copy-paste commands from a browser into your terminal.If infected: Simply deleting the extension won't help. You need a full system scan with deep-cleaning antivirus software.
Protect your seed phrases and stay vigilant! 🔐
#CyberSecurity #HackerAttack #Chrome #Safety #CryptoSafety
A hacker incident in the BNB Smart Chain (#BSC ) led to the theft of over $3.1 million from the #GANA Payment project. The breach was reported by analyst ZachXBT, noting that the attackers quickly withdrew and transferred assets between networks to cover their tracks. According to the tracker, the hackers collected the stolen funds at an address and primarily converted them into $BNB . About 1140 BNB worth $1.04 million was sent to Tornado Cash. Another portion of the assets was transferred to Ethereum $ETH , after which the attacker deposited an additional 346.8 ETH (approximately $1.05 million) into Tornado Cash. Another 346 ETH remain on an inactive address. GANA Payment is a small payment project on BSC that operates through decentralized exchanges and on-chain liquidity pools. The project lacks official security audits or detailed technical documentation, so the nature of the vulnerability is still unknown. #HackerAttack #SaveYourCrypto
A hacker incident in the BNB Smart Chain (#BSC ) led to the theft of over $3.1 million from the #GANA Payment project. The breach was reported by analyst ZachXBT, noting that the attackers quickly withdrew and transferred assets between networks to cover their tracks.

According to the tracker, the hackers collected the stolen funds at an address and primarily converted them into $BNB . About 1140 BNB worth $1.04 million was sent to Tornado Cash. Another portion of the assets was transferred to Ethereum $ETH , after which the attacker deposited an additional 346.8 ETH (approximately $1.05 million) into Tornado Cash. Another 346 ETH remain on an inactive address.

GANA Payment is a small payment project on BSC that operates through decentralized exchanges and on-chain liquidity pools. The project lacks official security audits or detailed technical documentation, so the nature of the vulnerability is still unknown.

#HackerAttack #SaveYourCrypto
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number