Binance Square
#hack

hack

948,642 vistas
619 están debatiendo
ImCryptOpus
·
--
🥷 #DRIFT received 127.5 million $USDT for recovery after the hack. #hack #crypto
🥷 #DRIFT received 127.5 million $USDT for recovery after the hack. #hack

#crypto
😈 Grinex — всё. Минус биржа, минус деньги Если коротко: сначала санкции, потом добили хакеры. Grinex — это та самая биржа, которую в 2025 прижали, считая продолжением Garantex. Тогда было больно, но жить можно. А вот сейчас — уже нет. Хакеры вскрыли биржу и вынесли больше 1 млрд рублей у пользователей. Деньги быстро перегнали в TRON и слили на один адрес. На кошельке сейчас лежит около 45.9 млн TRX — это примерно $15 млн. 💬 Что говорит биржа: обвиняют “западные спецслужбы”, мол атака слишком сложная, такие ресурсы есть только у государств. 💬 Что это значит на практике: либо реально сложная атака, либо классическая попытка снять с себя ответственность. Потому что в крипте обычно всё проще: если есть дыра — её рано или поздно найдут. Итог: работа биржи остановлена, пользователи сидят без средств. 💬 Мораль старая как рынок: не твои ключи — не твоя крипта. #crypto #exchange #Hack #TRX 👀 Подписывайся, чтобы не узнавать о таких историях уже после того, как стало поздно
😈 Grinex — всё. Минус биржа, минус деньги

Если коротко: сначала санкции, потом добили хакеры.

Grinex — это та самая биржа, которую в 2025 прижали, считая продолжением Garantex. Тогда было больно, но жить можно.

А вот сейчас — уже нет.

Хакеры вскрыли биржу и вынесли больше 1 млрд рублей у пользователей.
Деньги быстро перегнали в TRON и слили на один адрес.

На кошельке сейчас лежит около 45.9 млн TRX — это примерно $15 млн.

💬 Что говорит биржа:
обвиняют “западные спецслужбы”, мол атака слишком сложная, такие ресурсы есть только у государств.

💬 Что это значит на практике:
либо реально сложная атака,
либо классическая попытка снять с себя ответственность.

Потому что в крипте обычно всё проще:
если есть дыра — её рано или поздно найдут.

Итог:
работа биржи остановлена,
пользователи сидят без средств.

💬 Мораль старая как рынок:
не твои ключи — не твоя крипта.

#crypto #exchange #Hack #TRX

👀 Подписывайся, чтобы не узнавать о таких историях уже после того, как стало поздно
2026 crypto hacks (jan - april): -) Truebit (Truebitprotocol) — $26M smart contract bug let attacker mint cheap tokens + drain ETH -) Step Finance (StepFinance_ ) — $27–40M team device hacked, private key stolen (phishing) -) SwapNet — $13M bad permissions + unlimited approvals drained funds -) Saga bridge — $7M bridge exploit -) Makina/Curve — $5M price/oracle manipulation with flashloans -) TMX — $1.4M liquidity pool manipulation -) Aperture — $3.7M contract issue -) random user — $282M tricked into giving access (social engineering) feb: -) CrossCurve — $3M fake cross-chain message -) IoTeX bridge — $4.4M validator key stolen → fake tokens minted march: -) Resolv Labs — $25M cloud system hacked → fake stablecoin minted -) Venus — $2–3.7M collateral rules bypassed -) Solv — $2.7M double mint bug -) multiple users — $18M–24M phishing / address poisoning april: -) @DriftProtocol Drift — $285M long-term social engineering + fake collateral + admin access -) @hyperbridge Hyperbridge — $237K fake bridge messages → minted fake tokens -) @dango Dango — $1.9M bug, but hacker returned everything (white hat) main pattern: most hacks aren’t “genius code exploits” it’s: - people getting tricked - private keys getting stolen - bridges minting fake assets - old code breaking #hack #trade
2026 crypto hacks (jan - april):

-) Truebit (Truebitprotocol) — $26M
smart contract bug let attacker mint cheap tokens + drain ETH

-) Step Finance (StepFinance_ ) — $27–40M
team device hacked, private key stolen (phishing)

-) SwapNet — $13M
bad permissions + unlimited approvals drained funds

-) Saga bridge — $7M
bridge exploit

-) Makina/Curve — $5M
price/oracle manipulation with flashloans

-) TMX — $1.4M
liquidity pool manipulation

-) Aperture — $3.7M
contract issue

-) random user — $282M
tricked into giving access (social engineering)

feb:
-) CrossCurve — $3M
fake cross-chain message

-) IoTeX bridge — $4.4M
validator key stolen → fake tokens minted

march:
-) Resolv Labs — $25M
cloud system hacked → fake stablecoin minted

-) Venus — $2–3.7M
collateral rules bypassed

-) Solv — $2.7M
double mint bug

-) multiple users — $18M–24M
phishing / address poisoning

april:
-) @DriftProtocol Drift — $285M
long-term social engineering + fake collateral + admin access

-) @hyperbridge Hyperbridge — $237K
fake bridge messages → minted fake tokens

-) @dango Dango — $1.9M
bug, but hacker returned everything (white hat)

main pattern:
most hacks aren’t “genius code exploits”

it’s:
- people getting tricked
- private keys getting stolen
- bridges minting fake assets
- old code breaking
#hack #trade
🇺🇸🕵️ JUST IN: The U.S. Government (Bitfinex Hacker Seized Funds) just deposited 8.2 $BTC ($606K) to #Coinbase Prime. #hack #crypto
🇺🇸🕵️ JUST IN: The U.S. Government (Bitfinex Hacker Seized Funds) just deposited 8.2 $BTC ($606K) to #Coinbase Prime. #hack

#crypto
Artículo
Kraken Faces Extortion Attempt Tied to Insider Data AccessKraken Defies Extortion Attempt Following Insider Data Breaches Crypto exchange Kraken has confirmed it is facing an extortion attempt after two separate incidents of unauthorized data access by internal support staff. Chief Security Officer Nicholas Percoco stated that approximately 2,000 accounts (0.02% of users) were affected, though he emphasized that no systems were breached and no funds were at risk. Incident Details February 2025: Kraken identified a staff member accessing support systems after a video surfaced on a criminal forum. Recent Incident: A second, similar case was discovered following another tip and video. Scope: Exposure was strictly limited to client support data; custody systems and account access remained secure. Zero-Negotiation Policy Kraken has terminated both employees and revoked all access. Percoco affirmed a firm stance against the extortionists, stating, "We will not pay these criminals; we will not ever negotiate." The company is currently collaborating with law enforcement to pursue arrests. Rising Operational Threats This incident reflects a broader trend noted in TRM Labs’ 2026 Crypto Crime Report. Attacks are shifting away from protocol exploits toward operational compromises—such as social engineering and weak access controls. Total illicit crypto volume surged to $158 billion in 2025, a 145% increase from the previous year. #hack #Dogecoin‬⁩ #MarketCorrectionBuyOrHODL? $BNB $XRP

Kraken Faces Extortion Attempt Tied to Insider Data Access

Kraken Defies Extortion Attempt Following Insider Data Breaches
Crypto exchange Kraken has confirmed it is facing an extortion attempt after two separate incidents of unauthorized data access by internal support staff. Chief Security Officer Nicholas Percoco stated that approximately 2,000 accounts (0.02% of users) were affected, though he emphasized that no systems were breached and no funds were at risk.
Incident Details
February 2025: Kraken identified a staff member accessing support systems after a video surfaced on a criminal forum.
Recent Incident: A second, similar case was discovered following another tip and video.
Scope: Exposure was strictly limited to client support data; custody systems and account access remained secure.
Zero-Negotiation Policy
Kraken has terminated both employees and revoked all access. Percoco affirmed a firm stance against the extortionists, stating, "We will not pay these criminals; we will not ever negotiate." The company is currently collaborating with law enforcement to pursue arrests.
Rising Operational Threats
This incident reflects a broader trend noted in TRM Labs’ 2026 Crypto Crime Report. Attacks are shifting away from protocol exploits toward operational compromises—such as social engineering and weak access controls. Total illicit crypto volume surged to $158 billion in 2025, a 145% increase from the previous year. #hack #Dogecoin‬⁩ #MarketCorrectionBuyOrHODL? $BNB $XRP
⚠️✴️#DOT #hack #crypto Hackers printed 1 billion $DOT tokens on the Ethereum mainnet and then successfully sold them — Certik.
⚠️✴️#DOT #hack #crypto

Hackers printed 1 billion $DOT tokens on the Ethereum mainnet and then successfully sold them — Certik.
💥 Bridge Exploit! Hacker Mints $1 Billion DOT but Only Sells for $237K Attackers exploited a vulnerability in the Bridged DOT contract on Ethereum, minting a massive amount of tokens worth $1.22 Billion 💸 📌 Key Details - The Heist: They successfully dumped the tokens via Uniswap and Odos Router, walking away with 108.2 ETH (~$237,975). - Cost: The entire operation cost them only $0.74 in gas fees. - Important: This affects only Wrapped/Bridged DOT on Ethereum, not the native DOT on the Polkadot network. 📈 Market Impact Outlook: Bearish 🔴 While the actual financial damage is limited, this incident highlights the ongoing security risks and vulnerabilities within cross-chain bridge infrastructure. #DOT #Polkadot #Bridge #Hack #CryptoNews
💥 Bridge Exploit! Hacker Mints $1 Billion DOT but Only Sells for $237K

Attackers exploited a vulnerability in the Bridged DOT contract on Ethereum, minting a massive amount of tokens worth $1.22 Billion 💸

📌 Key Details

- The Heist: They successfully dumped the tokens via Uniswap and Odos Router, walking away with 108.2 ETH (~$237,975).
- Cost: The entire operation cost them only $0.74 in gas fees.
- Important: This affects only Wrapped/Bridged DOT on Ethereum, not the native DOT on the Polkadot network.

📈 Market Impact

Outlook: Bearish 🔴
While the actual financial damage is limited, this incident highlights the ongoing security risks and vulnerabilities within cross-chain bridge infrastructure.

#DOT #Polkadot #Bridge #Hack #CryptoNews
🚨 POLKADOT EXPLOITED 1 BILLION $DOT MINTED & DUMPED This just shocked the market. An attacker minted 1 BILLION bridged $DOT on Ethereum… And dumped it ALL in a single transaction. The attacker walked away with: 108.2 $ETH ($238K) That’s it. Massive supply injection… tiny exit liquidity. $DOT instantly dropped -4.8% to $1.15 on the news. Here’s what’s important: This was a bridged token exploit NOT native Polkadot chain (for now) But the market doesn’t care panic spreads fast Confidence > fundamentals in moments like this. No official statement yet. That silence? Fuel for more volatility. What to watch next: Team response (critical) Exchange reactions Further abnormal minting activity Liquidity impact on $DOT pairs If fear escalates: Expect deeper downside Liquidity drains Short-term chaos If controlled quickly: Possible sharp bounce Relief rally setup Fast sentiment recovery This is how fast narratives shift in crypto. Stay sharp. #Polkadot #Crypto #DeFi #Hack #Altcoins
🚨 POLKADOT EXPLOITED 1 BILLION $DOT MINTED & DUMPED

This just shocked the market.

An attacker minted 1 BILLION bridged $DOT on Ethereum…
And dumped it ALL in a single transaction.

The attacker walked away with:

108.2 $ETH ($238K)

That’s it.

Massive supply injection… tiny exit liquidity.

$DOT instantly dropped -4.8% to $1.15 on the news.

Here’s what’s important:

This was a bridged token exploit
NOT native Polkadot chain (for now)
But the market doesn’t care panic spreads fast

Confidence > fundamentals in moments like this.

No official statement yet.

That silence?

Fuel for more volatility.

What to watch next:

Team response (critical)
Exchange reactions
Further abnormal minting activity
Liquidity impact on $DOT pairs

If fear escalates:

Expect deeper downside
Liquidity drains
Short-term chaos

If controlled quickly:

Possible sharp bounce
Relief rally setup
Fast sentiment recovery

This is how fast narratives shift in crypto.

Stay sharp.

#Polkadot #Crypto #DeFi #Hack #Altcoins
🚨 HACK ALERT: Bitcoin Depot Suffers Security Breach, Loses $3.7M in BTC! Major crypto ATM operator Bitcoin Depot has officially filed with the SEC, revealing they were hacked on March 23rd. The attack resulted in the loss of 50.9 BTC, worth approximately $3.66 Million 💸 What Happened? - Hackers gained unauthorized access to the company's internal settlement wallet credentials. - However, the company confirmed that customer funds and personal data remain safe and were not compromised. - They are currently working with cybersecurity experts and law enforcement to investigate the incident. ⚠️ A Cause for Concern - This is not the first time! The company also suffered a data breach back in 2024, exposing user information. - While the financial impact is deemed manageable, it raises serious questions about the security standards of major service providers. 📈 Market Impact Outlook: Bearish 🔴 Incidents like this reinforce security concerns in the industry and could temporarily dampen investor confidence, especially regarding infrastructure providers. $BTC $BCH #Bitcoin #Hack #Security #BitcoinDepot
🚨 HACK ALERT: Bitcoin Depot Suffers Security Breach, Loses $3.7M in BTC!

Major crypto ATM operator Bitcoin Depot has officially filed with the SEC, revealing they were hacked on March 23rd. The attack resulted in the loss of 50.9 BTC, worth approximately $3.66 Million 💸

What Happened?

- Hackers gained unauthorized access to the company's internal settlement wallet credentials.
- However, the company confirmed that customer funds and personal data remain safe and were not compromised.
- They are currently working with cybersecurity experts and law enforcement to investigate the incident.

⚠️ A Cause for Concern

- This is not the first time! The company also suffered a data breach back in 2024, exposing user information.
- While the financial impact is deemed manageable, it raises serious questions about the security standards of major service providers.

📈 Market Impact

Outlook: Bearish 🔴
Incidents like this reinforce security concerns in the industry and could temporarily dampen investor confidence, especially regarding infrastructure providers.
$BTC $BCH
#Bitcoin #Hack #Security #BitcoinDepot
According to reports, Bybit averted a big attempted fraud totalling more than $1.3B According to internal findings, attackers attempted to abuse the deposit mechanism by creating misleading transaction records on several blockchain networks. The purpose was to make it look that more than 1 billion DOT (roughly $1.32 billion) had been successfully deposited, despite no actual payments being received on-chain. The attack involved altering transaction data and execution logs to trick the system into crediting balances that did not exist. However, Bybit’s risk control infrastructure did not rely solely on logs. Instead, it checked true on-chain balances, allowing the exchange to notice the disparity and prevent any losses. This type of "fake deposit" attack isn't new. Similar approaches were utilised in previous events, including the Mt. Gox hack, which resulted in the loss of around 850,000 BTC, and vulnerabilities related to Silk Road, which affected over 51,000 BTC between 2011 and 2014. Despite being a well-known vector, attackers are constantly tweaking it to exploit modern blockchain systems #bybit #CZReleasedMemeoir #MarketRebound #Hack $BTC $BNB $XRP
According to reports, Bybit averted a big attempted fraud totalling more than $1.3B

According to internal findings, attackers attempted to abuse the deposit mechanism by creating misleading transaction records on several blockchain networks. The purpose was to make it look that more than 1 billion DOT (roughly $1.32 billion) had been successfully deposited, despite no actual payments being received on-chain.

The attack involved altering transaction data and execution logs to trick the system into crediting balances that did not exist. However, Bybit’s risk control infrastructure did not rely solely on logs. Instead, it checked true on-chain balances, allowing the exchange to notice the disparity and prevent any losses.

This type of "fake deposit" attack isn't new. Similar approaches were utilised in previous events, including the Mt. Gox hack, which resulted in the loss of around 850,000 BTC, and vulnerabilities related to Silk Road, which affected over 51,000 BTC between 2011 and 2014.

Despite being a well-known vector, attackers are constantly tweaking it to exploit modern blockchain systems

#bybit #CZReleasedMemeoir #MarketRebound #Hack
$BTC $BNB $XRP
The $285 Million Drift Hack (April 1, 2026)#BinanceNews #Hack #CyberSecurity Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People's Republic of Korea (DPRK) that began in the fall of 2025. The Solana-based decentralized exchange described it as "an attack six months in the making," attributing it with medium confidence to a North Korean state-sponsored hacking group dubbed UNC4736, which is also tracked under the cyptonyms AppleJeus, Citrine Sleet, Golden Chollima, and Gleaming Pisces. The threat actor has a history of targeting the cryptocurrency sector for financial theft since at least 2018. It's best known for the X_TRADER/3CX supply chain breach in 2023 and the $53 million hack of decentralized finance (DeFi) platform Radiant Capital in October 2024. "The basis for this connection is both on-chain (fund flows used to stage and test this operation trace back to the Radiant attackers) and operational (personas deployed across this campaign have identifiable overlaps with known DPRK-linked activity)," Drift said in a Sunday analysis. In an assessment published in late January 2026, cybersecurity company CrowdStrike described Golden Chollima as an offshoot of Labyrinth Chollima that's primarily geared towards cryptocurrency theft by targeting small fintech firms in the U.S., Canada, South Korea, India, and Western Europe. "The adversary typically conducts smaller-value thefts at a more consistent operational tempo, suggesting responsibility for ensuring baseline revenue generation for the DPRK regime," CrowdStrike said. "Despite improving trade relations with Russia, the DPRK requires additional revenue to fund ambitious military plans that include constructing new destroyers, building nuclear-powered submarines, and launching additional reconnaissance satellites." In at least one incident observed in late 2024, UNC4736 delivered malicious Python packages through a fraudulent recruitment scheme to a European fintech company. Upon gaining access, the threat actor moved laterally to the victim's cloud environment to access IAM configurations and associated cloud resources, and ultimately diverted cryptocurrency assets to adversary-controlled wallets. #Binance #bitcoin

The $285 Million Drift Hack (April 1, 2026)

#BinanceNews #Hack #CyberSecurity
Drift has revealed that the April 1, 2026, attack that led to the theft of $285 million was the culmination of a months-long targeted and meticulously planned social engineering operation undertaken by the Democratic People's Republic of Korea (DPRK) that began in the fall of 2025.

The Solana-based decentralized exchange described it as "an attack six months in the making," attributing it with medium confidence to a North Korean state-sponsored hacking group dubbed UNC4736, which is also tracked under the cyptonyms AppleJeus, Citrine Sleet, Golden Chollima, and Gleaming Pisces.

The threat actor has a history of targeting the cryptocurrency sector for financial theft since at least 2018. It's best known for the X_TRADER/3CX supply chain breach in 2023 and the $53 million hack of decentralized finance (DeFi) platform Radiant Capital in October 2024.

"The basis for this connection is both on-chain (fund flows used to stage and test this operation trace back to the Radiant attackers) and operational (personas deployed across this campaign have identifiable overlaps with known DPRK-linked activity)," Drift said in a Sunday analysis.

In an assessment published in late January 2026, cybersecurity company CrowdStrike described Golden Chollima as an offshoot of Labyrinth Chollima that's primarily geared towards cryptocurrency theft by targeting small fintech firms in the U.S., Canada, South Korea, India, and Western Europe.

"The adversary typically conducts smaller-value thefts at a more consistent operational tempo, suggesting responsibility for ensuring baseline revenue generation for the DPRK regime," CrowdStrike said. "Despite improving trade relations with Russia, the DPRK requires additional revenue to fund ambitious military plans that include constructing new destroyers, building nuclear-powered submarines, and launching additional reconnaissance satellites."

In at least one incident observed in late 2024, UNC4736 delivered malicious Python packages through a fraudulent recruitment scheme to a European fintech company. Upon gaining access, the threat actor moved laterally to the victim's cloud environment to access IAM configurations and associated cloud resources, and ultimately diverted cryptocurrency assets to adversary-controlled wallets.
#Binance #bitcoin
·
--
Alcista
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa. 💀 La estafa del Memecoin de Grimace 👾 Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos. 📊 Pump & Dump Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos. 💸 El desembolso En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana". ⚠️ Consecuencias Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana

En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa.

💀 La estafa del Memecoin de Grimace 👾

Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos.

📊 Pump & Dump

Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos.

💸 El desembolso

En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana".

⚠️ Consecuencias

Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas.

#scam #hack #Solana⁩ $SOL #RiskManagement
Artículo
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
Artículo
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Artículo
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
·
--
Stay #SAFU on X and other socials. @JasonYanowitz on X narrates his #hack odeal. I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked. Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole. I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed. This was the real hack. I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address. But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it. Some takeaways: - Don't click links - If you do click a link, review the actual email address - Set up non-text 2FA on everything - If you've done that, trust your own security process - If you think you've been hacked, slow down and think about how this could have happened Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly. If you're still reading, go read the self-audit series from @samczsun. And this best practices from @bobbyong. Lot more you can do but start there. #phishing
Stay #SAFU on X and other socials.

@JasonYanowitz on X narrates his #hack odeal.

I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked.
Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole.
I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed.

This was the real hack.

I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address.
But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it.

Some takeaways:
- Don't click links
- If you do click a link, review the actual email address
- Set up non-text 2FA on everything
- If you've done that, trust your own security process
- If you think you've been hacked, slow down and think about how this could have happened
Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly.
If you're still reading, go read the self-audit series from @samczsun.
And this best practices from @bobbyong.
Lot more you can do but start there. #phishing
Inicia sesión para explorar más contenidos
Únete a usuarios globales de criptomonedas en Binance Square
⚡️ Obtén información útil y actualizada sobre criptos.
💬 Avalado por el mayor exchange de criptomonedas en el mundo.
👍 Descubre perspectivas reales de creadores verificados.
Email/número de teléfono