Binance Square
#lazarusgroup

lazarusgroup

1.4M рет көрілді
329 адам талқылап жатыр
txhao
·
--
Мақала
The US Just Seized Nearly $500 Million in Iranian Crypto. North Korea's Lazarus Group Is Behind 76%Two law enforcement actions dropped this week that, combined, reveal something important about where crypto sits in the global geopolitical order. This is no longer a story about financial fraud. This is state-level warfare being conducted through digital assets.The US seized nearly $500 million in Iranian crypto.The US says it seized nearly $500 million in Iranian crypto assets. This is part of the broader financial campaign against Iran running parallel to the Strait of Hormuz conflict. The IRGC and affiliated entities have been using crypto — Bitcoin, USDT, and Ethereum — to route payments outside the SWIFT system, pay for imports under sanctions, and compensate assets in ways that traditional financial monitoring can't easily track. CointelegraphThe seizure happened simultaneously with an FBI-led global operation that arrested 276 suspects in pig butchering schemes — an FBI-led global enforcement effort targeting crypto pig butchering schemes led to the arrest of 276 suspects. Pig butchering is the social engineering scam where targets are cultivated over weeks or months through fake romantic relationships before being manipulated into depositing crypto into fraudulent investment platforms. CointelegraphNorth Korea's Lazarus Group: 76% of all 2026 losses, $6B stolen since 2017.The security intelligence research firm said North Korean state-backed hackers account for 76% of all crypto scam and hack losses in 2026 and have stolen $6 billion since 2017. New reporting this week on the Drift Protocol hack revealed the full scope of how Lazarus operates. The long con: North Korean spies spent months in-person to drain $285 million from Drift — the security intelligence research firm detailed how North Korean state-backed hackers infiltrated Drift through months of preparation, including suspected physical presence of operatives near the company's operations, before executing the exploit on April 1. Months of in-person preparation. This isn't a lone hacker running code from a basement. This is a structured, state-funded operation with the same discipline as any military intelligence unit — because that's exactly what it is. North Korea funds a significant portion of its weapons programs through crypto theft. The $577 million stolen in 2026 is not a side project. It's a strategic revenue source. PowerDrillPowerDrillThe picture this paints of crypto's global status in 2026: Iran uses crypto to evade sanctions. The US uses blockchain forensics to trace and seize those assets. North Korea steals crypto at industrial scale to fund its military. South Korea's FISA is monitoring DeFi protocols for state-linked wallets.Bitcoin was designed to be censorship-resistant and permissionless. What nobody anticipated when Satoshi wrote the whitepaper was that "permissionless" would eventually mean "accessible to every actor on earth" — including the ones building nuclear weapons and circumventing global financial sanctions.This doesn't change the fundamental value of decentralized money. But it changes how we need to think about the security, regulation, and geopolitical context of the ecosystem we're all participating in. #Bitcoin #LazarusGroup #CryptoSecurity #NorthKorea #IranSanctions

The US Just Seized Nearly $500 Million in Iranian Crypto. North Korea's Lazarus Group Is Behind 76%

Two law enforcement actions dropped this week that, combined, reveal something important about where crypto sits in the global geopolitical order. This is no longer a story about financial fraud. This is state-level warfare being conducted through digital assets.The US seized nearly $500 million in Iranian crypto.The US says it seized nearly $500 million in Iranian crypto assets. This is part of the broader financial campaign against Iran running parallel to the Strait of Hormuz conflict. The IRGC and affiliated entities have been using crypto — Bitcoin, USDT, and Ethereum — to route payments outside the SWIFT system, pay for imports under sanctions, and compensate assets in ways that traditional financial monitoring can't easily track. CointelegraphThe seizure happened simultaneously with an FBI-led global operation that arrested 276 suspects in pig butchering schemes — an FBI-led global enforcement effort targeting crypto pig butchering schemes led to the arrest of 276 suspects. Pig butchering is the social engineering scam where targets are cultivated over weeks or months through fake romantic relationships before being manipulated into depositing crypto into fraudulent investment platforms. CointelegraphNorth Korea's Lazarus Group: 76% of all 2026 losses, $6B stolen since 2017.The security intelligence research firm said North Korean state-backed hackers account for 76% of all crypto scam and hack losses in 2026 and have stolen $6 billion since 2017.

New reporting this week on the Drift Protocol hack revealed the full scope of how Lazarus operates. The long con: North Korean spies spent months in-person to drain $285 million from Drift — the security intelligence research firm detailed how North Korean state-backed hackers infiltrated Drift through months of preparation, including suspected physical presence of operatives near the company's operations, before executing the exploit on April 1.

Months of in-person preparation. This isn't a lone hacker running code from a basement. This is a structured, state-funded operation with the same discipline as any military intelligence unit — because that's exactly what it is. North Korea funds a significant portion of its weapons programs through crypto theft. The $577 million stolen in 2026 is not a side project. It's a strategic revenue source. PowerDrillPowerDrillThe picture this paints of crypto's global status in 2026: Iran uses crypto to evade sanctions. The US uses blockchain forensics to trace and seize those assets. North Korea steals crypto at industrial scale to fund its military. South Korea's FISA is monitoring DeFi protocols for state-linked wallets.Bitcoin was designed to be censorship-resistant and permissionless. What nobody anticipated when Satoshi wrote the whitepaper was that "permissionless" would eventually mean "accessible to every actor on earth" — including the ones building nuclear weapons and circumventing global financial sanctions.This doesn't change the fundamental value of decentralized money. But it changes how we need to think about the security, regulation, and geopolitical context of the ecosystem we're all participating in.

#Bitcoin #LazarusGroup #CryptoSecurity #NorthKorea #IranSanctions
Мақала
​🛡️ DeFi-апокаліпсис квітня 2026: Чому збитки у $800 млн — це лише частина проблеми?​Квітень 2026 року офіційно став «найкривавішим» місяцем для криптоіндустрії. Сукупні збитки з початку року вже перевищили $800 мільйонів, і майже весь цей об’єм припадає на останні 30 днів. ​Ми спостерігаємо не просто серію зломів, а системну кризу безпеки інфраструктури та комунікацій. ​📉 Хроніка квітня: Гіганти та їхні помилки ​Основний удар нанесли інциденти з величезним капіталом, де за атаками простежується почерк Lazarus Group: ​Kelp DAO ($292 млн): Критична вразливість «1-of-1 verifier» у мосту LayerZero.​Drift Protocol ($285 млн): Наслідки складної операції соціальної інженерії проти Solana-DEX. ​На цьому фоні менші проєкти стали наочними посібниками з помилок: ​Grinex ($13,74 млн): Біржа в ауті з середини місяця.​Volo Protocol ($3,5 млн): Експлуатація сховищ на Sui.​CoW Swap ($1,2 млн): Класичнa атака на інтерфейс. ​⚠️ Wasabi Protocol: Таємницю розкрито (UPD: $5 млн+) ​Після тривожного мовчання ситуація з Wasabi нарешті прояснилася. Станом на 30 квітня підтверджено збитки понад $5 млн на Ethereum та Arbitrum. Причина — баг у валідації підписів, що дозволив провести Replay Attack. ​🧠 Головний урок Wasabi: Коли «довіра» стає вразливістю ​Інцидент із Wasabi — це не просто черговий баг, а жорстке нагадування про три системні проблеми: ​Ілюзія безпечних підписів: Ми звикли вважати підпис транзакції захищеним, але якщо контракт не вміє відрізняти старий дозвіл від нового, ваші кошти стають власністю хакера.​Пастка Unlimited Approvals: Користувачі продовжують надавати протоколам необмежені права. Саме ці «сплячі» дозволи дозволили зловмиснику маніпулювати чужими активами.​Криза комунікації: Тривала пауза від команди без офіційного post-mortem — це неприпустимо у 2026 році. Інформаційний вакуум спалює довіру швидше, ніж хакер — ліквідність. ​🧩 Висновок: Ми знову не вчимося? ​Хакери змістили фокус із пошуку помилок у коді на інфраструктуру: DNS, RPC-вузли та адмін-ключі. Кожен звіт пише про одні й ті самі уроки, але наступна атака зазвичай стається за тією ж схемою ще до того, як індустрія впроваджує захист. ​#DeFi #WasabiProtocol #CryptoSecurity #BinanceSquare #Web3Safety #LazarusGroup #BlockchainSecurity

​🛡️ DeFi-апокаліпсис квітня 2026: Чому збитки у $800 млн — це лише частина проблеми?

​Квітень 2026 року офіційно став «найкривавішим» місяцем для криптоіндустрії. Сукупні збитки з початку року вже перевищили $800 мільйонів, і майже весь цей об’єм припадає на останні 30 днів.
​Ми спостерігаємо не просто серію зломів, а системну кризу безпеки інфраструктури та комунікацій.
​📉 Хроніка квітня: Гіганти та їхні помилки
​Основний удар нанесли інциденти з величезним капіталом, де за атаками простежується почерк Lazarus Group:
​Kelp DAO ($292 млн): Критична вразливість «1-of-1 verifier» у мосту LayerZero.​Drift Protocol ($285 млн): Наслідки складної операції соціальної інженерії проти Solana-DEX.
​На цьому фоні менші проєкти стали наочними посібниками з помилок:
​Grinex ($13,74 млн): Біржа в ауті з середини місяця.​Volo Protocol ($3,5 млн): Експлуатація сховищ на Sui.​CoW Swap ($1,2 млн): Класичнa атака на інтерфейс.
​⚠️ Wasabi Protocol: Таємницю розкрито (UPD: $5 млн+)
​Після тривожного мовчання ситуація з Wasabi нарешті прояснилася. Станом на 30 квітня підтверджено збитки понад $5 млн на Ethereum та Arbitrum. Причина — баг у валідації підписів, що дозволив провести Replay Attack.
​🧠 Головний урок Wasabi: Коли «довіра» стає вразливістю
​Інцидент із Wasabi — це не просто черговий баг, а жорстке нагадування про три системні проблеми:
​Ілюзія безпечних підписів: Ми звикли вважати підпис транзакції захищеним, але якщо контракт не вміє відрізняти старий дозвіл від нового, ваші кошти стають власністю хакера.​Пастка Unlimited Approvals: Користувачі продовжують надавати протоколам необмежені права. Саме ці «сплячі» дозволи дозволили зловмиснику маніпулювати чужими активами.​Криза комунікації: Тривала пауза від команди без офіційного post-mortem — це неприпустимо у 2026 році. Інформаційний вакуум спалює довіру швидше, ніж хакер — ліквідність.
​🧩 Висновок: Ми знову не вчимося?
​Хакери змістили фокус із пошуку помилок у коді на інфраструктуру: DNS, RPC-вузли та адмін-ключі. Кожен звіт пише про одні й ті самі уроки, але наступна атака зазвичай стається за тією ж схемою ще до того, як індустрія впроваджує захист.

​#DeFi #WasabiProtocol #CryptoSecurity #BinanceSquare #Web3Safety #LazarusGroup #BlockchainSecurity
·
--
Мақала
$606 Million Stolen in 18 Days. April 2026 Is Already the Worst Month for Crypto Hacks Since Bybit.While markets were watching $79,000 and the Iran ceasefire, something else happened in April that deserves serious attention.Crypto protocols lost over $606 million to hacks in just 18 days of April 2026, making it the worst month since February 2025's Bybit breach. The entire first quarter of 2026 saw $165.5 million in losses across a relatively quiet stretch. April's $606 million total arrived in under three weeks, making the month 3.7 times larger than Q1 combined and pushing 2026's year-to-date theft total to approximately $771.8 million across 47 separate incidents. Two exploits account for nearly all of it. The $285 million Drift Protocol attack on April 1, later attributed to North Korea's Lazarus Group, and the $292 million KelpDAO breach on April 18, also linked to Lazarus, together represent roughly 95% of the month's losses and approximately 75% of everything stolen in crypto in 2026 so far. The same state-sponsored hacking group behind both attacks. Different protocols. Different chains. Different vulnerability types. Same attacker.Beyond the dollar totals, the pace of attacks is accelerating in a way that concerns security researchers as much as the individual incident sizes. DeFi recorded 47 separate incidents in the first four and a half months of 2026, compared with 28 over the same period in 2025, a 68% year-over-year increase in attack frequency. The diversification of attack vectors means that technical audits and code reviews alone are no longer sufficient protection for protocols with significant TVL. This is the part that most coverage misses. It's not just the dollar amounts. It's the shift in how protocols are being attacked. April's exploits cut across smart contract vulnerabilities, infrastructure attacks, and social engineering campaigns, including AI-driven attacks on wallets like Zerion. As crypto's cumulative hack losses have crossed $17 billion over the past decade, attackers are increasingly pivoting away from smart contract bugs toward private keys, signing infrastructure, and human-layer social engineering. AI-driven social engineering attacks. That's new and it's serious. As protocols hardened their smart contract code through multiple audits, sophisticated attackers evolved to target the humans operating the infrastructure — developers with admin keys, bridge operators, multisig signers.Jefferies has warned the string of marquee hacks could temporarily slow Wall Street's appetite for DeFi tokenization projects. PowerDrillThis is where the institutional story intersects with the security story. BlackRock, Morgan Stanley, Stripe — they're all building infrastructure on or adjacent to DeFi rails. If $600M+ can be stolen in 18 days from protocols that were considered secure, institutional risk departments need new frameworks before they commit more capital."DeFi remains a niche market until risk can be properly priced," one analyst wrote. That's the honest state of things. The technology is powerful. The security model isn't mature enough for the capital it's trying to hold. Both things are true simultaneously. #CryptoHacks #DeFiSecurity #LazarusGroup #KelpDAO #CryptoSecurity

$606 Million Stolen in 18 Days. April 2026 Is Already the Worst Month for Crypto Hacks Since Bybit.

While markets were watching $79,000 and the Iran ceasefire, something else happened in April that deserves serious attention.Crypto protocols lost over $606 million to hacks in just 18 days of April 2026, making it the worst month since February 2025's Bybit breach. The entire first quarter of 2026 saw $165.5 million in losses across a relatively quiet stretch. April's $606 million total arrived in under three weeks, making the month 3.7 times larger than Q1 combined and pushing 2026's year-to-date theft total to approximately $771.8 million across 47 separate incidents.
Two exploits account for nearly all of it. The $285 million Drift Protocol attack on April 1, later attributed to North Korea's Lazarus Group, and the $292 million KelpDAO breach on April 18, also linked to Lazarus, together represent roughly 95% of the month's losses and approximately 75% of everything stolen in crypto in 2026 so far.
The same state-sponsored hacking group behind both attacks. Different protocols. Different chains. Different vulnerability types. Same attacker.Beyond the dollar totals, the pace of attacks is accelerating in a way that concerns security researchers as much as the individual incident sizes. DeFi recorded 47 separate incidents in the first four and a half months of 2026, compared with 28 over the same period in 2025, a 68% year-over-year increase in attack frequency. The diversification of attack vectors means that technical audits and code reviews alone are no longer sufficient protection for protocols with significant TVL.
This is the part that most coverage misses. It's not just the dollar amounts. It's the shift in how protocols are being attacked. April's exploits cut across smart contract vulnerabilities, infrastructure attacks, and social engineering campaigns, including AI-driven attacks on wallets like Zerion. As crypto's cumulative hack losses have crossed $17 billion over the past decade, attackers are increasingly pivoting away from smart contract bugs toward private keys, signing infrastructure, and human-layer social engineering.
AI-driven social engineering attacks. That's new and it's serious. As protocols hardened their smart contract code through multiple audits, sophisticated attackers evolved to target the humans operating the infrastructure — developers with admin keys, bridge operators, multisig signers.Jefferies has warned the string of marquee hacks could temporarily slow Wall Street's appetite for DeFi tokenization projects. PowerDrillThis is where the institutional story intersects with the security story. BlackRock, Morgan Stanley, Stripe — they're all building infrastructure on or adjacent to DeFi rails. If $600M+ can be stolen in 18 days from protocols that were considered secure, institutional risk departments need new frameworks before they commit more capital."DeFi remains a niche market until risk can be properly priced," one analyst wrote.
That's the honest state of things. The technology is powerful. The security model isn't mature enough for the capital it's trying to hold. Both things are true simultaneously.
#CryptoHacks #DeFiSecurity #LazarusGroup #KelpDAO #CryptoSecurity
·
--
Alerta de Seguridad: El Grupo Lazarus golpea de nuevo con un robo de $290M ​El ecosistema cripto enfrenta su mayor desafío en lo que va de 2026. El reconocido grupo de hackers norcoreanos, Lazarus, es el principal sospechoso del masivo ataque sufrido este fin de semana contra la plataforma de inversión KelpDAO. ​Aquí los detalles clave de lo ocurrido: ​El Botín: Aproximadamente $290 millones de dólares en tokens vinculados a Ethereum. ​El Método: Fueron comprometidos dos servidores alojados a través de la aplicación LayerZero, permitiendo la extracción de los activos el pasado 18 de abril. ​El Impacto: Se consolida como el ciberataque de criptomonedas más grande registrado en 2026 hasta la fecha. ​🛡️ ¿Por qué es relevante? ​Expertos como Henri Arslanian (Nine Blocks Capital Management) señalan que la sofisticación del ataque apunta directamente a capacidades estatales. Según informes de la ONU, estos fondos sustraídos tienen un objetivo crítico y alarmante: financiar el programa de desarrollo de armas nucleares de Corea del Norte. ​Desde 2017, se estima que este grupo ha sustraído más de $3,000 millones de dólares en activos digitales. ​Afortunadamente, LayerZero ha comunicado que no hay contagio hacia otros activos o aplicaciones de su red, pero el incidente reabre el debate sobre la seguridad en protocolos de interoperabilidad y almacenamiento. ​Mantén tus activos seguros y siempre verifica los protocolos donde operas. 🔒 ​#LazarusGroup #CryptoSecurity2025 #KelpDAO #Ethereum #SeguridadCripto $ETH $BTC $BNB {future}(ETHUSDT) {future}(BTCUSDT) {future}(BNBUSDT)
Alerta de Seguridad: El Grupo Lazarus golpea de nuevo con un robo de $290M

​El ecosistema cripto enfrenta su mayor desafío en lo que va de 2026. El reconocido grupo de hackers norcoreanos, Lazarus, es el principal sospechoso del masivo ataque sufrido este fin de semana contra la plataforma de inversión KelpDAO.

​Aquí los detalles clave de lo ocurrido:

​El Botín: Aproximadamente $290 millones de dólares en tokens vinculados a Ethereum.

​El Método: Fueron comprometidos dos servidores alojados a través de la aplicación LayerZero, permitiendo la extracción de los activos el pasado 18 de abril.

​El Impacto: Se consolida como el ciberataque de criptomonedas más grande registrado en 2026 hasta la fecha.

​🛡️ ¿Por qué es relevante?

​Expertos como Henri Arslanian (Nine Blocks Capital Management) señalan que la sofisticación del ataque apunta directamente a capacidades estatales. Según informes de la ONU, estos fondos sustraídos tienen un objetivo crítico y alarmante: financiar el programa de desarrollo de armas nucleares de Corea del Norte.

​Desde 2017, se estima que este grupo ha sustraído más de $3,000 millones de dólares en activos digitales.

​Afortunadamente, LayerZero ha comunicado que no hay contagio hacia otros activos o aplicaciones de su red, pero el incidente reabre el debate sobre la seguridad en protocolos de interoperabilidad y almacenamiento.

​Mantén tus activos seguros y siempre verifica los protocolos donde operas. 🔒

#LazarusGroup #CryptoSecurity2025 #KelpDAO #Ethereum #SeguridadCripto

$ETH $BTC $BNB
Мақала
🚨 BREAKING: NORTH KOREA JUST STOLE $577M FROM DEFI IN 18 DAYS — AND NOBODY IS TALKING ABOUT......April 23, 2026 The numbers are in. They are catastrophic. Crypto protocols have lost over $606 million to hacks and exploits in just the first 18 days of April 2026 making it the single worst month for theft in the industry since the $1.4 billion Bybit breach in February 2025. Two attacks. Two names. Both point to the same culprit. 🔴 WHAT HAPPENED The $285 million Drift Protocol attack on April 1st, and the $292 million KelpDAO breach on April 18th both later attributed to North Korea’s Lazarus Group together represent roughly 95% of April’s losses. This wasn’t random. This was surgical. Following the KelpDAO exploit alone, DeFi’s total value locked fell over 7% in 24 hours. Aave dropped from $26.4 billion to near $17.9 billion. Billions. Gone. Overnight. 🔥 WHY IT MATTERS This isn’t just a bad month. The entire first quarter of 2026 saw just $165.5 million in losses. April’s total arrived in under three weeks making the month 3.7× larger than all of Q1 combined. The pace is accelerating dangerously. DeFi recorded 47 separate incidents in the first 4.5 months of 2026, compared with 28 over the same period in 2025 a 68% year-over-year increase in attack frequency. 📉 MARKET REACTION Panic. Institutional players are not waiting around. Institutional players responded with emergency rate limits and frozen bridge flows, while Jefferies warned the string of hacks could temporarily slow Wall Street’s appetite for DeFi tokenization projects. $BTC is holding. Alts are bleeding. Risk-off mode is fully activated. ⚠️ MOST PEOPLE ARE MISSING THIS DETAIL… Everyone is focused on the dollar amounts. But the real story is HOW they’re getting in. April’s exploits cut across smart contract vulnerabilities, infrastructure attacks, AND social engineering campaigns including AI-driven attacks on wallets. The old playbook of “just get your code audited” is dead. Lazarus Group is now deploying AI to target individuals. Your wallet. Your team. Your infra. As one analyst put it bluntly: “DeFi remains a niche market until risk can be properly priced and right now, we’re far from it.” 🔮 WHAT HAPPENS NEXT If even one more mid-size exploit hits before April 30th, the month’s total could approach $700 million. The Clarity Act which could bring regulatory structure to protect DeFi looks like a lost cause for April, with a potential Senate committee hearing pushed into May at the earliest. Meanwhile, the attackers are not slowing down. The question isn’t whether your protocol will be targeted. It’s whether you’ll still be solvent when it is. 🔒 #defi #KelpDAO #LazarusGroup #CryptoSecurity #BinanceSquare

🚨 BREAKING: NORTH KOREA JUST STOLE $577M FROM DEFI IN 18 DAYS — AND NOBODY IS TALKING ABOUT......

April 23, 2026
The numbers are in. They are catastrophic.
Crypto protocols have lost over $606 million to hacks and exploits in just the first 18 days of April 2026 making it the single worst month for theft in the industry since the $1.4 billion Bybit breach in February 2025.
Two attacks. Two names. Both point to the same culprit.

🔴 WHAT HAPPENED
The $285 million Drift Protocol attack on April 1st, and the $292 million KelpDAO breach on April 18th both later attributed to North Korea’s Lazarus Group together represent roughly 95% of April’s losses.
This wasn’t random. This was surgical.
Following the KelpDAO exploit alone, DeFi’s total value locked fell over 7% in 24 hours. Aave dropped from $26.4 billion to near $17.9 billion. Billions. Gone. Overnight.

🔥 WHY IT MATTERS
This isn’t just a bad month. The entire first quarter of 2026 saw just $165.5 million in losses. April’s total arrived in under three weeks making the month 3.7× larger than all of Q1 combined.
The pace is accelerating dangerously. DeFi recorded 47 separate incidents in the first 4.5 months of 2026, compared with 28 over the same period in 2025 a 68% year-over-year increase in attack frequency.

📉 MARKET REACTION
Panic. Institutional players are not waiting around. Institutional players responded with emergency rate limits and frozen bridge flows, while Jefferies warned the string of hacks could temporarily slow Wall Street’s appetite for DeFi tokenization projects.
$BTC is holding. Alts are bleeding. Risk-off mode is fully activated.

⚠️ MOST PEOPLE ARE MISSING THIS DETAIL…
Everyone is focused on the dollar amounts. But the real story is HOW they’re getting in.
April’s exploits cut across smart contract vulnerabilities, infrastructure attacks, AND social engineering campaigns including AI-driven attacks on wallets. The old playbook of “just get your code audited” is dead.
Lazarus Group is now deploying AI to target individuals. Your wallet. Your team. Your infra.
As one analyst put it bluntly: “DeFi remains a niche market until risk can be properly priced and right now, we’re far from it.”

🔮 WHAT HAPPENS NEXT
If even one more mid-size exploit hits before April 30th, the month’s total could approach $700 million.
The Clarity Act which could bring regulatory structure to protect DeFi looks like a lost cause for April, with a potential Senate committee hearing pushed into May at the earliest.
Meanwhile, the attackers are not slowing down.

The question isn’t whether your protocol will be targeted.
It’s whether you’ll still be solvent when it is. 🔒

#defi #KelpDAO #LazarusGroup #CryptoSecurity #BinanceSquare
$292M GONE: THE DEFI CONTAGION 🚨 The KelpDAO exploit is officially the largest DeFi theft of 2026. Hackers are using THORChain to swap stolen $ETH for $BTC , leaving a massive trail of chaos. Arbitrum froze $75M, but the rest is disappearing into the void. This isn't just one protocol—it’s a systemic failure. Are we witnessing the "Death of Interoperability"? Be careful where you deposit your assets! #KelpDAO #DeFiHack #Security #Alert #LazarusGroup
$292M GONE: THE DEFI CONTAGION 🚨

The KelpDAO exploit is officially the largest DeFi theft of 2026. Hackers are using THORChain to swap stolen $ETH for $BTC , leaving a massive trail of chaos. Arbitrum froze $75M, but the rest is disappearing into the void.

This isn't just one protocol—it’s a systemic failure. Are we witnessing the "Death of Interoperability"? Be careful where you deposit your assets!

#KelpDAO #DeFiHack #Security #Alert #LazarusGroup
The **Kelp DAO exploit** is currently the largest DeFi hack of 2026, totaling nearly **$293 million**. Here is a professional post draft for Binance Square that breaks down the situation and the recent "freeze" actions. ## 🚨 Market Alert: The Kelp DAO Exploit & The "Freeze" Response The DeFi community is reeling from a sophisticated **$293 million** exploit targeting **Kelp DAO (@KelpDAO)**. This incident, attributed to the Lazarus Group, has triggered a massive contagion event across the ecosystem. ### 🔍 What Happened? The attack targeted a vulnerability in the verification process between Kelp DAO and the **LayerZero** protocol. By exploiting a "1-of-1 verifier" setup and using a DDoS attack to isolate RPC nodes, the hackers successfully minted **116,500 rsETH** without backing. ### ❄️ The Strategic Freeze To prevent further damage and bad debt, major protocols have taken emergency measures: * **Arbitrum Security Council:** In a historic move, they successfully **froze 30,766 ETH (~$71M)** held in an address linked to the exploit. These funds are now moved to a locked wallet pending a governance vote. * **Lending Protocols:** Platforms like **Aave, SparkLend, and Fluid** have frozen their rsETH markets. This was crucial as the attacker had already deposited stolen tokens as collateral to borrow nearly $190M in real assets. * **Contract Pause:** Kelp DAO successfully paused their contracts in time to block a second attempt to drain an additional **40,000 rsETH**. ### 📉 Ecosystem Impact * **Aave** saw a nearly **$8 Billion drop in TVL** as users reassessed risk. * **$PIXEL** and other Web3 assets are being closely watched for side-effect volatility. * This event highlights the critical need for **decentralized verification** over 1-of-1 configurations. Stay vigilant and monitor your positions in restaking protocols. 🛡️ #KelpDAOExploitFreeze #DeFiSecurity #LazarusGroup #rsETH $ETH {spot}(ETHUSDT) $ARB
The **Kelp DAO exploit** is currently the largest DeFi hack of 2026, totaling nearly **$293 million**. Here is a professional post draft for Binance Square that breaks down the situation and the recent "freeze" actions.
## 🚨 Market Alert: The Kelp DAO Exploit & The "Freeze" Response
The DeFi community is reeling from a sophisticated **$293 million** exploit targeting **Kelp DAO (@KelpDAO)**. This incident, attributed to the Lazarus Group, has triggered a massive contagion event across the ecosystem.
### 🔍 What Happened?
The attack targeted a vulnerability in the verification process between Kelp DAO and the **LayerZero** protocol. By exploiting a "1-of-1 verifier" setup and using a DDoS attack to isolate RPC nodes, the hackers successfully minted **116,500 rsETH** without backing.
### ❄️ The Strategic Freeze
To prevent further damage and bad debt, major protocols have taken emergency measures:
* **Arbitrum Security Council:** In a historic move, they successfully **froze 30,766 ETH (~$71M)** held in an address linked to the exploit. These funds are now moved to a locked wallet pending a governance vote.
* **Lending Protocols:** Platforms like **Aave, SparkLend, and Fluid** have frozen their rsETH markets. This was crucial as the attacker had already deposited stolen tokens as collateral to borrow nearly $190M in real assets.
* **Contract Pause:** Kelp DAO successfully paused their contracts in time to block a second attempt to drain an additional **40,000 rsETH**.
### 📉 Ecosystem Impact
* **Aave** saw a nearly **$8 Billion drop in TVL** as users reassessed risk.
* **$PIXEL** and other Web3 assets are being closely watched for side-effect volatility.
* This event highlights the critical need for **decentralized verification** over 1-of-1 configurations.
Stay vigilant and monitor your positions in restaking protocols. 🛡️
#KelpDAOExploitFreeze #DeFiSecurity #LazarusGroup #rsETH $ETH
$ARB
​🚨 Security Alert: Record increase in cyber attacks on DeFi platforms ​A big shock for the crypto world! According to reports, operators linked to North Korea have stolen more than $500 million from DeFi platforms in less than three weeks. Their total crypto hacking has now reached an estimated $6.75 billion. ⚠️💸 ​Recent major hacks (Exploits): ​KelpDAO (April 18): Loss of about $290 million. According to forensic analysis, the Lazarus Group's 'TraderTraitor' group is behind it. ​Drift Protocol (April 1): Loss of about $286 million. According to Elliptic reports, the patterns of this hack are exactly the same as previous attacks by the DPRK (North Korea). ​Horrifying revelation: The 'Ketman Project' has revealed that nearly 100 North Korean operators are working inside various blockchain companies to carry out secret hacking. ​Important advice for investors: ​Keep your wallets safe: Use only reputable and audited DeFi protocols. ​Unusual activity: If you are investing in a project, be sure to check its security team and recent audit reports. ​Large holdings: Don't keep all your digital wealth on a single DeFi platform. ​This news is a reminder that security should be the top priority in the blockchain world. What do you think about these attacks? Should DeFi platforms adopt more stringent security protocols? Let us know your thoughts in the comments! 👇 ​Follow me for more market alerts and security updates! $BSB $ON $UAI ​#DeFi #CryptoSecurity #LazarusGroup BlockchainNews CryptoMarket DigitalAssets #cyberattack
​🚨 Security Alert: Record increase in cyber attacks on DeFi platforms

​A big shock for the crypto world! According to reports, operators linked to North Korea have stolen more than $500 million from DeFi platforms in less than three weeks. Their total crypto hacking has now reached an estimated $6.75 billion. ⚠️💸

​Recent major hacks (Exploits):

​KelpDAO (April 18): Loss of about $290 million. According to forensic analysis, the Lazarus Group's 'TraderTraitor' group is behind it.

​Drift Protocol (April 1): Loss of about $286 million. According to Elliptic reports, the patterns of this hack are exactly the same as previous attacks by the DPRK (North Korea).

​Horrifying revelation:

The 'Ketman Project' has revealed that nearly 100 North Korean operators are working inside various blockchain companies to carry out secret hacking.

​Important advice for investors:

​Keep your wallets safe: Use only reputable and audited DeFi protocols.

​Unusual activity: If you are investing in a project, be sure to check its security team and recent audit reports.

​Large holdings: Don't keep all your digital wealth on a single DeFi platform.

​This news is a reminder that security should be the top priority in the blockchain world. What do you think about these attacks? Should DeFi platforms adopt more stringent security protocols? Let us know your thoughts in the comments! 👇

​Follow me for more market alerts and security updates!

$BSB $ON $UAI

#DeFi #CryptoSecurity #LazarusGroup BlockchainNews CryptoMarket DigitalAssets #cyberattack
North Korea’s $500M DeFi Blitz: Is Your Protocol Next? The "isolated incident" era is over. In a span of just two weeks, the DeFi landscape has been rocked by a pair of sophisticated exploits targeting Drift Protocol and Kelp DAO, resulting in a staggering loss of over $500 million. What we are witnessing is a strategic, state-sponsored playbook evolving in real-time. Security analysts are increasingly pointing the finger at North Korean-aligned threat actors, suggesting these aren’t just random hacks, but a sustained campaign to bypass global sanctions. The Anatomy of the Attack The precision of these hits is what should worry every $SOL and $ETH holder: {future}(SOLUSDT) {future}(ETHUSDT) Drift Protocol ($285M): A masterclass in social engineering. Hackers spent months building fake identities to compromise admin keys, eventually manipulating oracle prices with a "worthless" token to drain the vaults. Kelp DAO ($290M+): A cross-chain nightmare. By targeting a $LAYERZERO bridge, attackers siphoned $rsETH, triggering a massive contagion that saw billions in liquidity exit protocols like $AAVE in under 48 hours. Why DeFi? For a sanctioned state, DeFi represents the path of least resistance. The interconnectedness of protocols—where one asset is used as collateral for another—means a single "zero-timelock" vulnerability can collapse an entire ecosystem like a house of cards. How to Protect Your Assets Check Your Permissions: Revoke any unnecessary smart contract approvals. Monitor "Circuit Breakers": Favor protocols with active safety delays and multi-sig transparency. Diversify Your Risk: Don't keep all your $USDC or SOL in a single "restaking" basket. {future}(USDCUSDT) The barrier to entry for these attackers is getting lower thanks to AI-generated personas, while their speed is increasing. It’s no longer about if a protocol will be targeted, but when. #writetoearn #defi #LazarusGroup #CyberSecurity #CryptoNews
North Korea’s $500M DeFi Blitz: Is Your Protocol Next?

The "isolated incident" era is over. In a span of just two weeks, the DeFi landscape has been rocked by a pair of sophisticated exploits targeting Drift Protocol and Kelp DAO, resulting in a staggering loss of over $500 million.

What we are witnessing is a strategic, state-sponsored playbook evolving in real-time. Security analysts are increasingly pointing the finger at North Korean-aligned threat actors, suggesting these aren’t just random hacks, but a sustained campaign to bypass global sanctions.

The Anatomy of the Attack
The precision of these hits is what should worry every $SOL and $ETH holder:
Drift Protocol ($285M): A masterclass in social engineering. Hackers spent months building fake identities to compromise admin keys, eventually manipulating oracle prices with a "worthless" token to drain the vaults.

Kelp DAO ($290M+): A cross-chain nightmare. By targeting a $LAYERZERO bridge, attackers siphoned $rsETH, triggering a massive contagion that saw billions in liquidity exit protocols like $AAVE in under 48 hours.

Why DeFi?
For a sanctioned state, DeFi represents the path of least resistance. The interconnectedness of protocols—where one asset is used as collateral for another—means a single "zero-timelock" vulnerability can collapse an entire ecosystem like a house of cards.

How to Protect Your Assets
Check Your Permissions: Revoke any unnecessary smart contract approvals.

Monitor "Circuit Breakers": Favor protocols with active safety delays and multi-sig transparency.

Diversify Your Risk: Don't keep all your $USDC or SOL in a single "restaking" basket.
The barrier to entry for these attackers is getting lower thanks to AI-generated personas, while their speed is increasing. It’s no longer about if a protocol will be targeted, but when.

#writetoearn #defi #LazarusGroup #CyberSecurity #CryptoNews
微策终究还是超越了贝莱德,坐稳了全球持仓量的头把交椅;同时KelpDAO那1.75亿美金的被盗资金也开始异动,背后直指北边邻居。 塞勒这波是真硬,凭一己之力在规模上盖过了全球最大的资管巨头,这说明企业储备资产的叙事已经跑赢了ETF通道。宏观上看,筹码进一步向顶级意志集中,长线逻辑依然稳健。但这1.75亿美金的黑钱动向就像个情绪苍蝇,虽然实际抛压对大盘冲击有限,但“北边黑客”这四个字一出,总能让短线流动性紧一紧。一边是顶级合规明牌增持,一边是顶级黑产暗戳戳变现,这味儿太正了,妥妥的币圈魔幻现实主义。你们觉得塞勒这波能领跑多久? #MicroStrategy #BlackRock #KelpDAO #LazarusGroup $BTC $MSTR {future}(MSTRUSDT) {future}(BTCUSDT)
微策终究还是超越了贝莱德,坐稳了全球持仓量的头把交椅;同时KelpDAO那1.75亿美金的被盗资金也开始异动,背后直指北边邻居。
塞勒这波是真硬,凭一己之力在规模上盖过了全球最大的资管巨头,这说明企业储备资产的叙事已经跑赢了ETF通道。宏观上看,筹码进一步向顶级意志集中,长线逻辑依然稳健。但这1.75亿美金的黑钱动向就像个情绪苍蝇,虽然实际抛压对大盘冲击有限,但“北边黑客”这四个字一出,总能让短线流动性紧一紧。一边是顶级合规明牌增持,一边是顶级黑产暗戳戳变现,这味儿太正了,妥妥的币圈魔幻现实主义。你们觉得塞勒这波能领跑多久? #MicroStrategy #BlackRock #KelpDAO #LazarusGroup $BTC $MSTR
A million-dollar capitulation. 📉 Trader 0x720 just locked in a -$374,000 loss, dumping all their $ZRO on Binance. For three weeks, they DCA'd, betting on the Zero blockchain launch, but the Lazarus Group hack killed the strategy. Dumping $982k into the market is a cry of despair. When whales exit at a loss, it means they know the bottom isn't in yet. Stay sharp the market is hunting for your liquidity! {future}(ZROUSDT) ​#ZRO #LayerZero #LazarusGroup #CryptoHack
A million-dollar capitulation. 📉
Trader 0x720 just locked in a -$374,000 loss, dumping all their $ZRO on Binance.

For three weeks, they DCA'd, betting on the Zero blockchain launch, but the Lazarus Group hack killed the strategy.

Dumping $982k into the market is a cry of despair. When whales exit at a loss, it means they know the bottom isn't in yet.
Stay sharp the market is hunting for your liquidity!

#ZRO #LayerZero #LazarusGroup #CryptoHack
Evgenia Crypto
·
--
Numbers that terrify shorters MicroStrategy now controls over 3.8% of the total Bitcoin supply. 🦾 Buying 34,164 $BTC at an average of $74,395 proves Saylor is ready to buy any high. Despite a $317M unrealized loss, the strategy is unshakable. While you wonder if it's "too expensive," institutions are securing your future. 🎯💎
{future}(BTCUSDT)

​#BTC #Strategy #WhaleActivity
🚨 DEFI EMERGENCY: The $292M Kelp DAO Exploit Explained! The Attack: A massive breach allowed hackers to mint 116,500 rsETH out of thin air. The Culprit: Initial reports link the attack to the Lazarus Group (North Korea). Contagion: Over 15 protocols (including Ethena and TRON DAO) have frozen their bridges to stop the bleeding. Stay Safe: If you hold rsETH, check your wallet immediately. Aave has already frozen these markets to protect users. 👉 Do follow for the latest DeFi security patches and safety tips! #KelpDAOFacesAttack #DeFiExploit #Web3Security #ETH #LazarusGroup $
🚨 DEFI EMERGENCY: The $292M Kelp DAO Exploit Explained!

The Attack: A massive breach allowed hackers to mint 116,500 rsETH out of thin air.

The Culprit: Initial reports link the attack to the Lazarus Group (North Korea).

Contagion: Over 15 protocols (including Ethena and TRON DAO) have frozen their bridges to stop the bleeding.

Stay Safe: If you hold rsETH, check your wallet immediately. Aave has already frozen these markets to protect users.

👉 Do follow for the latest DeFi security patches and safety tips!

#KelpDAOFacesAttack #DeFiExploit #Web3Security #ETH #LazarusGroup $
Kelp DAO Exploit: The Lazarus Shadow Reappears Security alert for the DeFi community. Recent findings from security firms have linked the Kelp DAO exploit directly to the Lazarus Group, the notorious North Korean state-sponsored unit. This breach has reignited a fierce debate over DeFi security protocols and the vulnerability of "single-point" setups. $MSFT This isn't just a hack; it’s a reminder that state-sponsored threats are evolving alongside our tech. For the "Alpha" hunter, this means looking for protocols implementing "Quantum-Safe" or multi-layered security. Stay safe out there—security is your best ROI.$GUN $AVGO References: LayerZero Security Report (April 20, 2026) Chainalysis – DPRK Threat Update (April 20, 2026) Follow Me for critical security updates! #DeFiSecurity #LazarusGroup #CryptoSafety #WhatNextForUSIranConflict #Write2Earn
Kelp DAO Exploit: The Lazarus Shadow Reappears

Security alert for the DeFi community. Recent findings from security firms have linked the Kelp DAO exploit directly to the Lazarus Group, the notorious North Korean state-sponsored unit. This breach has reignited a fierce debate over DeFi security protocols and the vulnerability of "single-point" setups.
$MSFT
This isn't just a hack; it’s a reminder that state-sponsored threats are evolving alongside our tech. For the "Alpha" hunter, this means looking for protocols implementing "Quantum-Safe" or multi-layered security. Stay safe out there—security is your best ROI.$GUN
$AVGO
References:
LayerZero Security Report (April 20, 2026)

Chainalysis – DPRK Threat Update (April 20, 2026)

Follow Me for critical security updates!

#DeFiSecurity #LazarusGroup #CryptoSafety #WhatNextForUSIranConflict #Write2Earn
🚨 $1.5 BILLION BYBIT HACK—FBI CONFIRMS NORTH KOREA’S INVOLVEMENT! 💻🔓 The biggest crypto heist in history just took a shocking turn—The FBI has officially linked the Bybit $1.5 billion hack to the infamous Lazarus Group, a North Korean state-backed cybercrime syndicate! 😱💰 🔍 Timeline of the Attack: 📅 February 2025 – Bybit detects suspicious activity in its system and reports a massive security breach. 🚨💻 📅 February 29, 2025 – The FBI officially confirms that the Lazarus Group is behind the attack. 🕵️‍♂️🇰🇵 📅 March 1, 2025 – Bybit announces a $140 MILLION REWARD for information leading to the recovery of the stolen funds. 💰🏆 📅 March 3, 2025 – The FBI issues a global alert urging crypto exchanges to block transactions linked to the hack. 🚧🔗 🔎 Key Details of the Heist: 🔥 AMOUNT STOLEN: 401,000 Ethereum (ETH)—the largest crypto theft ever recorded! 🚀💸 🔥 HACKER TACTICS: The Lazarus Group used advanced malware to access Bybit’s cold wallets before laundering funds across multiple blockchains. 💀🔐 🔥 EXCHANGE RESPONSE: Bybit is working with law enforcement and blockchain analysts to track and recover the stolen assets. 🔍 🤯 What Happens Next? 💭 Will Bybit recover the stolen billions? 💭 Can exchanges stop Lazarus from laundering the money? 💭 Will this push governments to tighten crypto security laws? This is the fight for crypto’s future. Stay vigilant. Stay informed. 🚀👀 💬 What do you think? Should exchanges do more to prevent hacks like this? Drop your thoughts below! ⬇️🔥 📌 Verified Sources: 🔗 Business Insider 🔗 Coin Tribune 🔗 The Times ⚠️ Disclaimer: This post is for informational purposes only. Always verify information before making financial decisions. #BybitHack #CryptoSecurity #LazarusGroup #BlockchainSafety #CryptoNews🚀🔥
🚨 $1.5 BILLION BYBIT HACK—FBI CONFIRMS NORTH KOREA’S INVOLVEMENT! 💻🔓

The biggest crypto heist in history just took a shocking turn—The FBI has officially linked the Bybit $1.5 billion hack to the infamous Lazarus Group, a North Korean state-backed cybercrime syndicate! 😱💰

🔍 Timeline of the Attack:

📅 February 2025 – Bybit detects suspicious activity in its system and reports a massive security breach. 🚨💻
📅 February 29, 2025 – The FBI officially confirms that the Lazarus Group is behind the attack. 🕵️‍♂️🇰🇵
📅 March 1, 2025 – Bybit announces a $140 MILLION REWARD for information leading to the recovery of the stolen funds. 💰🏆
📅 March 3, 2025 – The FBI issues a global alert urging crypto exchanges to block transactions linked to the hack. 🚧🔗

🔎 Key Details of the Heist:

🔥 AMOUNT STOLEN: 401,000 Ethereum (ETH)—the largest crypto theft ever recorded! 🚀💸
🔥 HACKER TACTICS: The Lazarus Group used advanced malware to access Bybit’s cold wallets before laundering funds across multiple blockchains. 💀🔐
🔥 EXCHANGE RESPONSE: Bybit is working with law enforcement and blockchain analysts to track and recover the stolen assets. 🔍

🤯 What Happens Next?

💭 Will Bybit recover the stolen billions?
💭 Can exchanges stop Lazarus from laundering the money?
💭 Will this push governments to tighten crypto security laws?

This is the fight for crypto’s future. Stay vigilant. Stay informed. 🚀👀

💬 What do you think? Should exchanges do more to prevent hacks like this? Drop your thoughts below! ⬇️🔥

📌 Verified Sources:
🔗 Business Insider
🔗 Coin Tribune
🔗 The Times

⚠️ Disclaimer: This post is for informational purposes only. Always verify information before making financial decisions.

#BybitHack #CryptoSecurity #LazarusGroup #BlockchainSafety #CryptoNews🚀🔥
Викрито хакера Bybit – крадіжка на суму 1,5 мільярда доларів відслідковується компанією Lazarus GrouЗа даними Arkham Intelligence, організатор зламу Bybit на суму 1,5 мільярда доларів був ідентифікований, і винуватцем є не хто інший, як Lazarus Group, сумнозвісний північнокорейський синдикат кіберзлочинців. 🔎 Що ми знаємо на даний момент: 🔹 Lazarus Group має історію великих криптовалютних крадіжок, відмиваючи мільярди через складні блокчейн-транзакції. 🔹 Викрадені кошти переміщуються через кілька гаманців, що ускладнює повернення. 🔹 Влада та аналітики блокчейну зараз відстежують активи, щоб запобігти ліквідації. ⚠️ Що далі? Ця атака посилює потребу в більш сильних заходах криптобезпеки та глобальній співпраці для боротьби з кіберзлочинністю. Чи Bybit поверне втрачені кошти, чи це ще одна загадка на мільярд доларів? 💬 Що ви думаєте про останнє пограбування криптовалюти? Залиште свої думки нижче! 👇 👉 Слідкуйте за новинами про криптовалюту в реальному часі! – Мухаммад Еджаз #BybitHack #CryptoSecurity #LazarusGroup #CyberCrimeFighter #BlockchainForensics 🚨

Викрито хакера Bybit – крадіжка на суму 1,5 мільярда доларів відслідковується компанією Lazarus Grou

За даними Arkham Intelligence, організатор зламу Bybit на суму 1,5 мільярда доларів був ідентифікований, і винуватцем є не хто інший, як Lazarus Group, сумнозвісний північнокорейський синдикат кіберзлочинців.

🔎 Що ми знаємо на даний момент:
🔹 Lazarus Group має історію великих криптовалютних крадіжок, відмиваючи мільярди через складні блокчейн-транзакції.
🔹 Викрадені кошти переміщуються через кілька гаманців, що ускладнює повернення.
🔹 Влада та аналітики блокчейну зараз відстежують активи, щоб запобігти ліквідації.

⚠️ Що далі?
Ця атака посилює потребу в більш сильних заходах криптобезпеки та глобальній співпраці для боротьби з кіберзлочинністю. Чи Bybit поверне втрачені кошти, чи це ще одна загадка на мільярд доларів?

💬 Що ви думаєте про останнє пограбування криптовалюти? Залиште свої думки нижче! 👇

👉 Слідкуйте за новинами про криптовалюту в реальному часі! – Мухаммад Еджаз
#BybitHack #CryptoSecurity #LazarusGroup #CyberCrimeFighter #BlockchainForensics 🚨
🚨🚨🚨 There was no code exploit, no leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet... But that raises a terrifying question. How did Lazarus know exactly who to target? A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed. That means Lazarus didn’t just hack Bybit. They knew who to manipulate. There are only a few ways to get that kind of information. 🚩 Inside job – Someone leaked the signer list. 🚩 Social engineering – Lazarus studied their emails and behavior. 🚩 Device compromise – One or more signers were infected with malware. This means other exchanges are at risk, too... Lazarus stole 0.42% of all Ethereum It means they own more than the Ethereum Foundation, more than Vitalik Buterin and more than Fidelity. Advice: Keep your money on multiple wallets, not on exchanges #BybitSecurityBreach #LazarusGroup
🚨🚨🚨 There was no code exploit, no leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet...

But that raises a terrifying question. How did Lazarus know exactly who to target?

A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed.

That means Lazarus didn’t just hack Bybit. They knew who to manipulate. There are only a few ways to get that kind of information.

🚩 Inside job – Someone leaked the signer list.
🚩 Social engineering – Lazarus studied their emails and behavior.
🚩 Device compromise – One or more signers were infected with malware.

This means other exchanges are at risk, too...

Lazarus stole 0.42% of all Ethereum

It means they own more than the Ethereum Foundation, more than Vitalik Buterin and more than Fidelity.

Advice:
Keep your money on multiple wallets, not on exchanges

#BybitSecurityBreach #LazarusGroup
Miss Sara Bellum
·
--
#BenZhou now live on X

#BybitSecurityBreach
Басқа контенттерді шолу үшін жүйеге кіріңіз
Binance Square платформасында әлемдік криптоқоғамдастыққа қосылыңыз
⚡️ Криптовалюта туралы ең соңғы және пайдалы ақпаратты алыңыз.
💬 Әлемдегі ең ірі криптобиржаның сеніміне ие.
👍 Расталған авторлардың нақты пікірлерін табыңыз.
Электрондық пошта/телефон нөмірі