Binance Square

hackeralert

1.7M vistas
860 están debatiendo
Thomas Anderson
·
--
#HackerAlert Bank Trojan Hits Android Users, Targets Payment System Used by 150,000,000 People A new Android banking trojan that uses a mix of human and artificial intelligence agents to steal from victims is now targeting a payments system relied on by tens of millions of people. According to cybersecurity firm Zimperium, the PixRevolution banking malware is targeting users of Brazil’s PIX payment system by first surveilling them in real-time and then draining their funds when they initiate transactions. Per Zimperium, PixRevolution banking malware drains funds in a five-step process that includes monitoring for victims to initiate PIX payments. Upon detecting an imminent PIX transaction, the malware notifies its command and control server, which subsequently alerts an AI or human agent to start watching the victim’s screen in real time. Once the process to transfer funds is underway, the agent sends a command that discreetly changes the intended recipient to the attacker’s preferred account. “What distinguishes this threat from conventional banking trojans is its fundamental design: a human or AI agent operator is actively engaged on the remote end, observing the victim’s phone screen instantaneously, poised to act at the precise moment of transaction.” Zimperium says that victims don’t usually notice anything unusual as their banking app performs as normal and they receive all the confirmations necessary to conclude that a successful transaction took place. According to Zimperium, it is only later that victims realize that the money was sent to the wrong recipient. “And because PIX transfers are instant and final, recovery is extraordinarily difficult.” The PIX payment system processes over three billion transactions every month and boasts more than 150 million registered users.
#HackerAlert

Bank Trojan Hits Android Users, Targets Payment System Used by 150,000,000 People

A new Android banking trojan that uses a mix of human and artificial intelligence agents to steal from victims is now targeting a payments system relied on by tens of millions of people.

According to cybersecurity firm Zimperium, the PixRevolution banking malware is targeting users of Brazil’s PIX payment system by first surveilling them in real-time and then draining their funds when they initiate transactions.

Per Zimperium, PixRevolution banking malware drains funds in a five-step process that includes monitoring for victims to initiate PIX payments.

Upon detecting an imminent PIX transaction, the malware notifies its command and control server, which subsequently alerts an AI or human agent to start watching the victim’s screen in real time. Once the process to transfer funds is underway, the agent sends a command that discreetly changes the intended recipient to the attacker’s preferred account.

“What distinguishes this threat from conventional banking trojans is its fundamental design: a human or AI agent operator is actively engaged on the remote end, observing the victim’s phone screen instantaneously, poised to act at the precise moment of transaction.”

Zimperium says that victims don’t usually notice anything unusual as their banking app performs as normal and they receive all the confirmations necessary to conclude that a successful transaction took place. According to Zimperium, it is only later that victims realize that the money was sent to the wrong recipient.

“And because PIX transfers are instant and final, recovery is extraordinarily difficult.”

The PIX payment system processes over three billion transactions every month and boasts more than 150 million registered users.
·
--
Bajista
IBM X-Force and Flare Research uncovered details of North Korea’s fake IT worker operation, with approximately 100,000 North Koreans spread across 40 countries generating $500 million annually for Pyongyang, which is the capital of North Korea. Individual workers can earn over $300,000 yearly while stealing sensitive company information. The scheme involves recruiters, facilitators, IT workers, and Western collaborators who provide identities. Fake workers use counterfeit accounts, Google Translate for all communications, North Korean VPN tools like OConnect/NetKey, and AI voice/face changers during interviews. They bid on freelancing sites like Upwork and LinkedIn. Mitigation strategies include watching for resume discrepancies and fake backgrounds. One effective interview question: asking about Kim Jong Un causes North Korean workers to immediately terminate calls. #KimJongUn #VPN #HackerAlert $VSN $BTC $BNB
IBM X-Force and Flare Research uncovered details of North Korea’s fake IT worker operation, with approximately 100,000 North Koreans spread across 40 countries generating $500 million annually for Pyongyang, which is the capital of North Korea.
Individual workers can earn over $300,000 yearly while stealing sensitive company information.
The scheme involves recruiters, facilitators, IT workers, and Western collaborators who provide identities.
Fake workers use counterfeit accounts, Google Translate for all communications, North Korean VPN tools like OConnect/NetKey, and AI voice/face changers during interviews. They bid on freelancing sites like Upwork and LinkedIn.
Mitigation strategies include watching for resume discrepancies and fake backgrounds. One effective interview question: asking about Kim Jong Un causes North Korean workers to immediately terminate calls.
#KimJongUn #VPN #HackerAlert $VSN $BTC $BNB
·
--
Make sure your iOS devices are up-to-date. Stay SAFU. Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabilities to fully compromise devices. Based on toolmarks in recovered payloads, we believe the exploit chain to be called DarkSword. Since at least November 2025, GTIG has observed multiple commercial surveillance vendors and suspected state-sponsored actors utilizing DarkSword in distinct campaigns. These threat actors have deployed the exploit chain against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine. #BTC #bnb #Binance #HackerAlert #CZ
Make sure your iOS devices are up-to-date. Stay SAFU.

Google Threat Intelligence Group (GTIG) has identified a new iOS full-chain exploit that leveraged multiple zero-day vulnerabilities to fully compromise devices. Based on toolmarks in recovered payloads, we believe the exploit chain to be called DarkSword. Since at least November 2025, GTIG has observed multiple commercial surveillance vendors and suspected state-sponsored actors utilizing DarkSword in distinct campaigns. These threat actors have deployed the exploit chain against targets in Saudi Arabia, Turkey, Malaysia, and Ukraine.
#BTC
#bnb
#Binance
#HackerAlert
#CZ
#HackerAlert #Bitrefill 🇰🇵💻 Lazarus hackers strike again | A Bitrefill employee's computer was hacked, exposing 18,500 purchase records and emptying hot wallets — but the company absorbed the losses and managed the crisis with rare praise for its transparency! 🛡️👏 $BTC {spot}(BTCUSDT)
#HackerAlert
#Bitrefill

🇰🇵💻 Lazarus hackers strike again | A Bitrefill employee's computer was hacked, exposing 18,500 purchase records and emptying hot wallets — but the company absorbed the losses and managed the crisis with rare praise for its transparency! 🛡️👏

$BTC
If you’re using an old wallet, revoke now Hackers are no longer brute forcing wallets — they’re using LLMs to scan EVM contracts at scale, targeting old code with hidden vulnerabilities. The real attack surface isn’t your wallet — it’s token approvals you granted years ago. When you approved a contract back then, you gave it permanent permission to move your tokens. That access still exists today. If that contract gets exploited, attackers can drain your funds without any new signature or warning. Hardware wallets don’t protect you here — they secure your private keys, not the permissions you’ve already given away. $ETH #HackerAlert #ETH
If you’re using an old wallet, revoke now

Hackers are no longer brute forcing wallets — they’re using LLMs to scan EVM contracts at scale, targeting old code with hidden vulnerabilities.

The real attack surface isn’t your wallet — it’s token approvals you granted years ago.

When you approved a contract back then, you gave it permanent permission to move your tokens. That access still exists today.
If that contract gets exploited, attackers can drain your funds without any new signature or warning.

Hardware wallets don’t protect you here — they secure your private keys, not the permissions you’ve already given away.

$ETH #HackerAlert #ETH
Bonk.fun Domain Hijack 🚨🚨🚨 Security is still one of crypto’s weakest pressure points, and the latest Bonk.fun incident proves it. The protocol itself was not the main story. The attack came through the surface layer, after the domain was taken over and a wallet-draining trap was placed in front of users. That is what makes it dangerous. In this cycle, hackers do not always need to break the core system. Sometimes they only need to hijack the doorway. One fake prompt, one rushed signature, and the damage is done. It is a sharp reminder that in crypto, trust can be lost at the frontend long before the protocol itself fails. #Bonk #HackerAlert $BONK {spot}(BONKUSDT)
Bonk.fun Domain Hijack 🚨🚨🚨

Security is still one of crypto’s weakest pressure points, and the latest Bonk.fun incident proves it. The protocol itself was not the main story. The attack came through the surface layer, after the domain was taken over and a wallet-draining trap was placed in front of users. That is what makes it dangerous. In this cycle, hackers do not always need to break the core system. Sometimes they only need to hijack the doorway. One fake prompt, one rushed signature, and the damage is done. It is a sharp reminder that in crypto, trust can be lost at the frontend long before the protocol itself fails.

#Bonk #HackerAlert $BONK
☠️ The FBI announced the shutdown of the global hacking proxy service SocksEscort — during the operation, dozens of servers and domains were seized and millions of dollars in cryptocurrency were frozen. The service used malware that infected home routers and devices worldwide, turning them into proxy nodes to hide cybercriminal activity. Through this network, attackers carried out fraud, account attacks, and other cybercrimes while masking their traffic as regular “home” IP addresses #HackerAlert
☠️ The FBI announced the shutdown of the global hacking proxy service SocksEscort — during the operation, dozens of servers and domains were seized and millions of dollars in cryptocurrency were frozen.

The service used malware that infected home routers and devices worldwide, turning them into proxy nodes to hide cybercriminal activity. Through this network, attackers carried out fraud, account attacks, and other cybercrimes while masking their traffic as regular “home” IP addresses

#HackerAlert
$DMC usdt full Bullish momentum target 🎯💯💯 congratulations 🎉👏🎉🎉 all my followers #HackerAlert 🤣🤣🤣 {future}(DMCUSDT) Thanks to all hackers 💪💪💪🤣🤣🤣
$DMC usdt full Bullish momentum target 🎯💯💯
congratulations 🎉👏🎉🎉 all my followers #HackerAlert 🤣🤣🤣
Thanks to all hackers 💪💪💪🤣🤣🤣
Hacker Strikes Again! 🚨 Entry: 0 🟩 Target 1: 1 🎯 Stop Loss: 0.1 🛑 The crypto space just faced a massive shock! A hacker has minted 1 billion $PORT3, cashing out 162.75 million for a staggering 199.56 $BNB (over 166k USD). Before the sell-off could complete, the project team yanked liquidity, causing exchanges to halt deposits. But wait— the hacker burned the remaining 837.25 million $PORT3!This is not just another hack; it’s a market tremor. Act fast, the storm is brewing, and you won't want to miss this! ⚠️ This is for informational purposes only, not investment advice! #CryptoNews #HackerAlert #PORT3 #Trading #UrgentAction 🔥 {alpha}(560xb4357054c3da8d46ed642383f03139ac7f090343) {future}(BNBUSDT)
Hacker Strikes Again! 🚨

Entry: 0 🟩
Target 1: 1 🎯
Stop Loss: 0.1 🛑

The crypto space just faced a massive shock! A hacker has minted 1 billion $PORT3, cashing out 162.75 million for a staggering 199.56 $BNB (over 166k USD). Before the sell-off could complete, the project team yanked liquidity, causing exchanges to halt deposits. But wait— the hacker burned the remaining 837.25 million $PORT3!This is not just another hack; it’s a market tremor. Act fast, the storm is brewing, and you won't want to miss this!

⚠️ This is for informational purposes only, not investment advice!

#CryptoNews #HackerAlert #PORT3 #Trading #UrgentAction 🔥
·
--
Bajista
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨 Another major blow to DeFi security! The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol. 🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi. 📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations! 🔐 This is a harsh reminder to: — Stay updated on security risks — Use cold wallets for long-term holdings — Never go all-in on unverified protocols 👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem. #gmx #defi #HackerAlert #CryptoNewss
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨

Another major blow to DeFi security!

The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol.

🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi.

📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations!

🔐 This is a harsh reminder to: — Stay updated on security risks
— Use cold wallets for long-term holdings
— Never go all-in on unverified protocols

👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem.

#gmx #defi
#HackerAlert
#CryptoNewss
·
--
Alcista
#HackerAlert JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report. $BTC $ETH $TRX
#HackerAlert
JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report.
$BTC $ETH $TRX
#HackedFunds #HackerAlert follow like share The AI agent protocol swarms community Discord account was hacked, the attacker deleted channels and kicked out over 300 members, the team is currently recovering and strengthening security. Hacker attacks are frequent, it's not just swarms; yesterday Consensys also confirmed a hard disk issue with MetaMask, there are indeed many security risks in the crypto ecosystem. Linking to stablecoin underlying asset management and the launch of Cyber AI tools, project teams need to quickly patch up vulnerabilities, otherwise user confidence will collapse. I believe this will increase the demand for security tools. Next, we will focus on the team's recovery progress. In the short term, similar incidents may drag down the AI sector, but in the long run, strengthening security can stabilize the market, so don't rush to sell
#HackedFunds #HackerAlert

follow like share

The AI agent protocol swarms community Discord account was hacked, the attacker deleted channels and kicked out over 300 members, the team is currently recovering and strengthening security.
Hacker attacks are frequent, it's not just swarms; yesterday Consensys also confirmed a hard disk issue with MetaMask, there are indeed many security risks in the crypto ecosystem.
Linking to stablecoin underlying asset management and the launch of Cyber AI tools, project teams need to quickly patch up vulnerabilities, otherwise user confidence will collapse. I believe this will increase the demand for security tools.
Next, we will focus on the team's recovery progress. In the short term, similar incidents may drag down the AI sector, but in the long run, strengthening security can stabilize the market, so don't rush to sell
B
1MBABYDOGE/USDT
Precio
0,0011909
Warning About a Crypto Scam: Hacked @TrumpDaily Account Promotes Fake Meme CoinsHackers Exploited the Account to Promote Fraudulent Tokens The @TrumpDailyPosts account on the X platform (formerly Twitter) has been hacked and is being misused to spread fake meme coin addresses. The compromised account continues to actively promote several fraudulent tokens, including a fake token named $POWER. According to Scam Sniffer, a Web3 platform focused on combating scams, the hackers not only post but also quickly delete content related to these fraudulent schemes. Users are advised to verify the credibility of any investment promises, especially those originating from compromised accounts. Connection to Other Organized Scams Investigations revealed that the gas source used to create the fake $POWER token address was linked to the same platform involved in a recent hack of the Farcaster account, owned by a MetaMask co-founder. During that incident, hackers promoted fraudulent meme coins and were accused of generating over 1,000 SOL (Solana). These activities point to a well-organized cybercriminal gang targeting prominent crypto figures and organizations. Social Media as an Emerging Tool for Fraud A troubling trend in the crypto space is the increasing use of social media accounts to promote fraudulent tokens. Hackers exploit high-profile accounts to create an illusion of trustworthiness and maximize their financial gains. The hacking of @TrumpDailyPosts is yet another example of how cybercriminals are adapting their methods. By leveraging fraudulent meme coins and social media, they are creating new ways to deceive investors and extract illicit profits. How to Protect Yourself From These Scams Given these trends, it is crucial for both users and platforms to pay closer attention to identifying fraudulent activities. Users should exercise extreme caution when considering any investment opportunities, especially involving meme coins or less-known tokens. Safety should always take precedence over the promise of profit. Verify sources, thoroughly check addresses, and avoid suspicious projects promising unrealistic returns. The crypto space offers numerous opportunities but also comes with heightened risks that require vigilance and proactive measures. #CryptoNewss , #blockchain , #CryptoScamAlert , #cryptohacks , #HackerAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Warning About a Crypto Scam: Hacked @TrumpDaily Account Promotes Fake Meme Coins

Hackers Exploited the Account to Promote Fraudulent Tokens
The @TrumpDailyPosts account on the X platform (formerly Twitter) has been hacked and is being misused to spread fake meme coin addresses. The compromised account continues to actively promote several fraudulent tokens, including a fake token named $POWER.
According to Scam Sniffer, a Web3 platform focused on combating scams, the hackers not only post but also quickly delete content related to these fraudulent schemes. Users are advised to verify the credibility of any investment promises, especially those originating from compromised accounts.

Connection to Other Organized Scams
Investigations revealed that the gas source used to create the fake $POWER token address was linked to the same platform involved in a recent hack of the Farcaster account, owned by a MetaMask co-founder.
During that incident, hackers promoted fraudulent meme coins and were accused of generating over 1,000 SOL (Solana). These activities point to a well-organized cybercriminal gang targeting prominent crypto figures and organizations.
Social Media as an Emerging Tool for Fraud
A troubling trend in the crypto space is the increasing use of social media accounts to promote fraudulent tokens. Hackers exploit high-profile accounts to create an illusion of trustworthiness and maximize their financial gains.
The hacking of @TrumpDailyPosts is yet another example of how cybercriminals are adapting their methods. By leveraging fraudulent meme coins and social media, they are creating new ways to deceive investors and extract illicit profits.
How to Protect Yourself From These Scams
Given these trends, it is crucial for both users and platforms to pay closer attention to identifying fraudulent activities. Users should exercise extreme caution when considering any investment opportunities, especially involving meme coins or less-known tokens.
Safety should always take precedence over the promise of profit. Verify sources, thoroughly check addresses, and avoid suspicious projects promising unrealistic returns. The crypto space offers numerous opportunities but also comes with heightened risks that require vigilance and proactive measures.

#CryptoNewss , #blockchain , #CryptoScamAlert , #cryptohacks , #HackerAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins. It gives them full admin access, evades detection, and locks out real users. It looks like a legit plugin—and it auto-activates. CheckDot is SAFU #dyor on CheckDot 🤝 #HackerAlert
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins.

It gives them full admin access, evades detection, and locks out real users.

It looks like a legit plugin—and it auto-activates.

CheckDot is SAFU #dyor on CheckDot 🤝

#HackerAlert
Coinbase Hacker Mocks Investigator While Laundering Millions via Decentralized PlatformsOn Wednesday night, a mysterious message appeared on the Ethereum blockchain — a direct mockery aimed at one of the most prominent crypto investigators. The sender? A hacker linked to the recent massive data breach at Coinbase, which compromised the accounts of over 69,000 users and may cost the exchange hundreds of millions of dollars. The taunt, simply reading "L bozo", was embedded in a transaction and meant to ridicule the investigator. The hacker even included a link to a viral meme video featuring NBA Hall of Famer James Worthy smoking a cigar, escalating the provocation. 💰 $44.9 Million Laundered Through THORChain But the trolling wasn’t all. On Tuesday, the attacker began liquidating stolen assets, converting 17,800 ETH into DAI stablecoins — worth roughly $44.9 million — using THORChain, a decentralized cross-chain trading protocol. 📉 The swaps occurred at an average ETH price of $2,528. 💼 One major swap involved 9,080 ETH for $22.8 million in DAI. Using THORChain allowed the hacker to bypass centralized exchanges, complicating tracking efforts and signaling a new level of sophistication in crypto laundering tactics. 🔓 What Happened at Coinbase? Coinbase confirmed that the breach took place in December 2024, but it wasn’t disclosed publicly until May 2025. The hackers gained access to sensitive personal data of around 69,000 users. Soon after, they allegedly demanded $20 million in Bitcoin as ransom, threatening to leak the stolen data on the dark web. Coinbase refused to pay and instead offered the same amount as a reward for information leading to the attackers. 📉 Financial Fallout: Coinbase in Crisis The breach has severely damaged Coinbase’s reputation. On Wednesday, its stock (COIN) closed down 0.92% at $258.97, continuing a 36% monthly decline. Security experts claim the exchange ignored prior warnings of suspicious activity as early as December, a failure that now haunts its image and user trust. 🛡️ Binance and Kraken Also Targeted Coinbase wasn’t the only target. Binance and Kraken also faced recent social engineering attempts, where attackers posed as users and tried to bribe support agents. Binance’s AI systems successfully flagged and blocked the suspicious messages. Kraken reported no customer data losses either, thanks to strong internal protocols. 🔚 A Glimpse Into the Future of Crypto Crime? This case is more than a breach — it's a bold show of power by a cybercriminal who’s fluent in DeFi and unafraid to mock those chasing him. With advanced laundering tactics and an open taunt of blockchain sleuths, we may be witnessing the next evolution in crypto-based crime. Coinbase may recover financially — but the reputational scars will be harder to erase. #HackerAlert , #CryptoSecurity , #CryptoCrime , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Coinbase Hacker Mocks Investigator While Laundering Millions via Decentralized Platforms

On Wednesday night, a mysterious message appeared on the Ethereum blockchain — a direct mockery aimed at one of the most prominent crypto investigators. The sender? A hacker linked to the recent massive data breach at Coinbase, which compromised the accounts of over 69,000 users and may cost the exchange hundreds of millions of dollars.
The taunt, simply reading "L bozo", was embedded in a transaction and meant to ridicule the investigator. The hacker even included a link to a viral meme video featuring NBA Hall of Famer James Worthy smoking a cigar, escalating the provocation.

💰 $44.9 Million Laundered Through THORChain
But the trolling wasn’t all. On Tuesday, the attacker began liquidating stolen assets, converting 17,800 ETH into DAI stablecoins — worth roughly $44.9 million — using THORChain, a decentralized cross-chain trading protocol.
📉 The swaps occurred at an average ETH price of $2,528.

💼 One major swap involved 9,080 ETH for $22.8 million in DAI.
Using THORChain allowed the hacker to bypass centralized exchanges, complicating tracking efforts and signaling a new level of sophistication in crypto laundering tactics.

🔓 What Happened at Coinbase?
Coinbase confirmed that the breach took place in December 2024, but it wasn’t disclosed publicly until May 2025. The hackers gained access to sensitive personal data of around 69,000 users.
Soon after, they allegedly demanded $20 million in Bitcoin as ransom, threatening to leak the stolen data on the dark web. Coinbase refused to pay and instead offered the same amount as a reward for information leading to the attackers.

📉 Financial Fallout: Coinbase in Crisis
The breach has severely damaged Coinbase’s reputation. On Wednesday, its stock (COIN) closed down 0.92% at $258.97, continuing a 36% monthly decline.
Security experts claim the exchange ignored prior warnings of suspicious activity as early as December, a failure that now haunts its image and user trust.

🛡️ Binance and Kraken Also Targeted
Coinbase wasn’t the only target. Binance and Kraken also faced recent social engineering attempts, where attackers posed as users and tried to bribe support agents.
Binance’s AI systems successfully flagged and blocked the suspicious messages. Kraken reported no customer data losses either, thanks to strong internal protocols.

🔚 A Glimpse Into the Future of Crypto Crime?
This case is more than a breach — it's a bold show of power by a cybercriminal who’s fluent in DeFi and unafraid to mock those chasing him. With advanced laundering tactics and an open taunt of blockchain sleuths, we may be witnessing the next evolution in crypto-based crime.
Coinbase may recover financially — but the reputational scars will be harder to erase.

#HackerAlert , #CryptoSecurity , #CryptoCrime , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥 Yesterday, the crypto world exploded with two shocking headlines: 1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack. 2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯 Coincidence? Or something bigger? 🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang. 🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen! 🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots. 💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥 🔔 Follow for more real-time crypto updates! 🚀 #BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥

Yesterday, the crypto world exploded with two shocking headlines:

1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack.

2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯

Coincidence? Or something bigger?
🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang.

🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen!

🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots.

💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥

🔔 Follow for more real-time crypto updates! 🚀

#BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
#BTCReserveStrategy 🚨 ¿El mayor robo de Bitcoin en la historia? 🚨 🔎 Arkham Intelligence acaba de revelar un mega-hackeo al grupo minero chino luBian 127,426 BTC robados en 2020 (¡$3.5 mil millones en ese entonces!). 💰 Hoy, ese botín vale… ¡$14.5 MIL MILLONES! 😱 🔑 El hacker explotó una vulnerabilidad en las claves privadas de LuBian y se llevó casi todo. Lo más increíble: nunca se hizo público, y el atacante sigue sin ser identificado. 📌 Datos clave: ✔️ El robo supera incluso al hackeo de Bybit ($1.5B en ETH). ✔️ LuBian intentó recuperar los BTC enviando mensajes en la blockchain (gastaron 1.4 BTC en intentos). ✔️ El hacker ahora es el 13° mayor tenedor de BTC del mundo. 🤔 ¿Cómo es posible que un robo así pase desapercibido por años? ¿Crees que los fondos algún día serán rastreados? 👇 ¡Comenta tu opinión! #Bitcoin #HackerAlert #CriptoNoticias (Fuente: Arkham Intelligence / Últimos datos de BTC) {spot}(BTCUSDT)
#BTCReserveStrategy 🚨 ¿El mayor robo de Bitcoin en la historia? 🚨

🔎 Arkham Intelligence acaba de revelar un mega-hackeo al grupo minero chino luBian 127,426 BTC robados en 2020 (¡$3.5 mil millones en ese entonces!).

💰 Hoy, ese botín vale… ¡$14.5 MIL MILLONES! 😱

🔑 El hacker explotó una vulnerabilidad en las claves privadas de LuBian y se llevó casi todo. Lo más increíble: nunca se hizo público, y el atacante sigue sin ser identificado.

📌 Datos clave:
✔️ El robo supera incluso al hackeo de Bybit ($1.5B en ETH).
✔️ LuBian intentó recuperar los BTC enviando mensajes en la blockchain (gastaron 1.4 BTC en intentos).
✔️ El hacker ahora es el 13° mayor tenedor de BTC del mundo.

🤔 ¿Cómo es posible que un robo así pase desapercibido por años? ¿Crees que los fondos algún día serán rastreados?

👇 ¡Comenta tu opinión!

#Bitcoin #HackerAlert #CriptoNoticias

(Fuente: Arkham Intelligence / Últimos datos de BTC)
🚨 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password — some bugs sat undetected for 9 years. Researchers warn attackers could chain them for full remote takeover. CheckDot is SAFU #dyor on CheckDot 🤝 #HackerAlert
🚨 14 new flaws in CyberArk & HashiCorp vaults can let hackers steal corporate secrets without a password — some bugs sat undetected for 9 years.

Researchers warn attackers could chain them for full remote takeover.

CheckDot is SAFU #dyor on CheckDot 🤝
#HackerAlert
Inicia sesión para explorar más contenidos
Conoce las noticias más recientes del sector
⚡️ Participa en los últimos debates del mundo cripto
💬 Interactúa con tus creadores favoritos
👍 Disfruta contenido de tu interés
Email/número de teléfono