Binance Square
#hackers

hackers

Počet zobrazení: 423,173
Diskutuje: 204
Defrank
·
--
Pesimistický
🔥Hackers de Corea del Norte se siguen expandiendo y tienen en la mira el sector Defi 👈 Esto es algo sorprendente y es que en menos de tres semanas #hackers vinculados a Corea del Norte pudieron dar dos grandes golpes. El primero fue el protocolo #DRIFT en Solana y ahora el protocolo #KelpDAO . Estos hackers siguen evolucionando aplicando distintas técnicas para detectar vulnerabilidades. Ambos eventos ocasionaron cuantiosas pérdidas para el sector #cripto . Más de $ 500 millones de dólares fueron desviados a través de las vulnerabilidades de Drift y kelpdao. ¿coincidencia o ataques dirigidos a un sector específico? Según algunos analistas estos dos incidentes apuntan a algo más “organizado”. Estos ataques están siendo más frecuentes y ya no se trata de hackeos a intercambios o fallos en el código, si no ahora están apuntando a la infraestructura del sector. Pero esto no queda ahí y es que las repercusiones de la explotación de vulnerabilidades no se limitan a una sola dapp, si no que se extienden hacia otros protocolos, como ocurrió recientemente con kelpdao y #AAVE . Con los recientes acontecimientos ¿te sientes seguro usando algún protocolo Defi? 👉Mas actualizaciones cripto ... Comparte y sigueme para más 👈😎 $AAVE {spot}(AAVEUSDT)
🔥Hackers de Corea del Norte se siguen expandiendo y tienen en la mira el sector Defi 👈

Esto es algo sorprendente y es que en menos de tres semanas #hackers vinculados a Corea del Norte pudieron dar dos grandes golpes. El primero fue el protocolo #DRIFT en Solana y ahora el
protocolo #KelpDAO . Estos hackers siguen evolucionando aplicando distintas técnicas para detectar vulnerabilidades.

Ambos eventos ocasionaron cuantiosas pérdidas para el sector #cripto . Más de $ 500 millones de dólares fueron desviados a través de las vulnerabilidades de Drift y kelpdao.

¿coincidencia o ataques dirigidos a un sector específico? Según algunos analistas estos dos incidentes apuntan a algo más “organizado”. Estos ataques están siendo más frecuentes y ya
no se trata de hackeos a intercambios o fallos en el código, si no ahora están apuntando a la infraestructura del sector.

Pero esto no queda ahí y es que las repercusiones de la explotación de vulnerabilidades no se limitan a una sola dapp, si no que se extienden hacia otros protocolos, como ocurrió recientemente con kelpdao y #AAVE .

Con los recientes acontecimientos ¿te sientes seguro usando algún protocolo Defi?

👉Mas actualizaciones cripto ...
Comparte y sigueme para más 👈😎
$AAVE
🔥ARBITRUM TOMA UNA DECISIÓN QUE NADIE ESPERABA ¿EL FIN DE LA DESCENTRALIZACIÓN? 👀 Un hackeo masivo de 293 millones de dólares ha obligado a Arbitrum a tomar una decisión sin precedentes: congelar y mover billeteras en la blockchain. ¿Es este el fin de la descentralización o una jugada maestra para salvar el ecosistema? Descubre en este video la verdad detrás de esta polémica intervención y cómo podría afectar tu dinero. #Arbitrum #Criptomonedas #blockchain #hackers $ARB
🔥ARBITRUM TOMA UNA DECISIÓN QUE NADIE ESPERABA ¿EL FIN DE LA DESCENTRALIZACIÓN? 👀
Un hackeo masivo de 293 millones de dólares ha obligado a Arbitrum a tomar una decisión sin precedentes: congelar y mover billeteras en la blockchain. ¿Es este el fin de la descentralización o una jugada maestra para salvar el ecosistema? Descubre en este video la verdad detrás de esta polémica intervención y cómo podría afectar tu dinero. #Arbitrum #Criptomonedas #blockchain #hackers
$ARB
*DeFi Exploits 2026 - $775M Already Gone* Just 4 months into 2026 and #hackers have already drained over *$775M across 50+ incidents*. The pace is accelerating, and the attack vectors keep evolving. *Top exploits so far:* • KelpDAO - $292M • Drift - $285M • Step Finance - $40M • Truebit - $26.4M • Resolv - $25M • Rhea Finance - $18.4M • Grinex - $13.7M • SwapNet - $13.4M • YieldBlox - $10.2M • Saga - $7M *Top attack vector in 2026:* Private Key compromises - the human layer remains the weakest link. KelpDAO's rsETH exploit alone triggered the *$5B Aave #liquidity crunch* we're watching right now. Bridges and oracles keep printing losses - and 2026 is on pace to cross $3B by year-end. *Top 7 Ecosystem:* | | #RAVEWildMoves @wisegbevecryptonews9
*DeFi Exploits 2026 - $775M Already Gone*

Just 4 months into 2026 and #hackers have already drained over *$775M across 50+ incidents*. The pace is accelerating, and the attack vectors keep evolving.

*Top exploits so far:*
• KelpDAO - $292M
• Drift - $285M
• Step Finance - $40M
• Truebit - $26.4M
• Resolv - $25M
• Rhea Finance - $18.4M
• Grinex - $13.7M
• SwapNet - $13.4M
• YieldBlox - $10.2M
• Saga - $7M

*Top attack vector in 2026:* Private Key compromises - the human layer remains the weakest link.

KelpDAO's rsETH exploit alone triggered the *$5B Aave #liquidity crunch* we're watching right now. Bridges and oracles keep printing losses - and 2026 is on pace to cross $3B by year-end.

*Top 7 Ecosystem:* | |

#RAVEWildMoves @WISE PUMPS
·
--
Pesimistický
🔥Hacker logra tener control de un puente de Polkadot y logra llevarse dinero 👀 Varios analistas de cadenas de bloques alertaron en la última hora un incidente que afecta a un puente importante del ecosistema de #Polkadot . Unos #hackers lograron explotar una vulnerabilidad del contrato de la puerta de enlace del puente Hyperbirdge para poder acuñar tokens #dot en #Ethereum y posteriormente venderlos. Ese era el plan original, hackers tenían en la mira a Hyperbridge, logrando burlar la seguridad de este protocolo de interoperabilidad, lo que les daba acceso a poder falsificar mensaje y tomar el control administrativo del contrato del token DOT en Ethereum. Querían realizar todo este movimiento rápido y sin levantar sospechas. Una vez que tenían el control , decidieron acuñar mil millones de tokens DOT (Polkadot) en Ethereum, vendiéndolo rápidamente por un valor de $ 237,000 dólares. El precio de DOT en las últimas horas del incidente cayó 5% llegando hasta $ 1.17 dólares. Varios exchanges han tomado medidas por este incidente. ¿Alguna vez haz usado este puente en el ecosistema de Polkadot? 👉Mas actualizaciones cripto ... Comparte y sigueme para más 👈😎 $DOT {spot}(DOTUSDT)
🔥Hacker logra tener control de un puente de Polkadot y logra llevarse dinero 👀

Varios analistas de cadenas de bloques alertaron en la última hora un incidente que afecta a un puente importante del ecosistema de #Polkadot . Unos #hackers lograron explotar una vulnerabilidad del contrato de la puerta de enlace del puente Hyperbirdge para poder acuñar tokens #dot en #Ethereum y posteriormente venderlos.

Ese era el plan original, hackers tenían en la mira a Hyperbridge, logrando burlar la seguridad de este protocolo de interoperabilidad, lo que les daba acceso a poder falsificar mensaje y tomar el control administrativo del contrato del token DOT en Ethereum.

Querían realizar todo este movimiento rápido y sin levantar sospechas. Una vez que tenían el control , decidieron acuñar mil millones de tokens DOT (Polkadot) en Ethereum, vendiéndolo rápidamente por un valor de $ 237,000 dólares. El precio de DOT en las últimas horas del incidente cayó 5% llegando hasta $ 1.17 dólares. Varios exchanges han tomado medidas por este incidente.

¿Alguna vez haz usado este puente en el ecosistema de Polkadot?

👉Mas actualizaciones cripto ...
Comparte y sigueme para más 👈😎
$DOT
👉👉👉 #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam. Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility. “Due to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,” explained a MailerLite spokesperson today. “As a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.” We extend our sincere apologies to MailerLite for our hasty misjudgment. We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails. While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains! Source - decrypt.co #CryptoNews🔒📰🚫 #BinanceSquareTalks
👉👉👉 #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest

In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam.

Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility.

“Due to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,” explained a MailerLite spokesperson today. “As a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.”

We extend our sincere apologies to MailerLite for our hasty misjudgment.

We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails.

While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains!

Source - decrypt.co

#CryptoNews🔒📰🚫 #BinanceSquareTalks
🚨 Deepfake Alert! 🔴 Manta Network's Kenny Li suspects the notorious Lazarus Group tried to target him in a sophisticated deepfake Zoom attack 🕵️‍♂️. #Hackers used a fake video to gain trust, then pushed a malicious script download before disappearing 💻😱. This incident highlights the growing threat of #deepfakes and social engineering in cybersecurity 🤖💸. Prioritize your online security: ✨ Verify identities before sharing sensitive info ✨ Be cautious of unexpected video calls or requests ✨ Keep software and systems up-to-date
🚨 Deepfake Alert!

🔴 Manta Network's Kenny Li suspects the notorious Lazarus Group tried to target him in a sophisticated deepfake Zoom attack 🕵️‍♂️.

#Hackers used a fake video to gain trust, then pushed a malicious script download before disappearing 💻😱.

This incident highlights the growing threat of #deepfakes and social engineering in cybersecurity 🤖💸. Prioritize your online security:

✨ Verify identities before sharing sensitive info
✨ Be cautious of unexpected video calls or requests
✨ Keep software and systems up-to-date
Článok
North Korea is behind the Bybit HACK🙄Hack A group of DPRK #hackers #LazarusGroup hacked a cold wallet on the exchange for 400k $ETH ($1.5 billion dollars) Now they have more ether than Vitaliy Buterin, the creator of the token himself 😀The channels are already screaming that North Korea has announced a strategic reserve of ether😂 #BybitHack #BybitWalletHack

North Korea is behind the Bybit HACK

🙄Hack A group of DPRK #hackers #LazarusGroup hacked a cold wallet on the exchange for 400k $ETH ($1.5 billion dollars)
Now they have more ether than Vitaliy Buterin, the creator of the token himself
😀The channels are already screaming that North Korea has announced a strategic reserve of ether😂

#BybitHack #BybitWalletHack
·
--
Optimistický
More about OpenBounty on Shentu Chain! OpenBounty is a decentralized platform that connects white hat hackers and Web3 projects to enhance the security of the decentralized ecosystem. Here's a more detailed breakdown of how it works: 1. Project Registration: Web3 projects register on the OpenBounty platform, providing details about their project and the bounties they offer for identifying and reporting vulnerabilities. 2. Bounty Creation: Projects create bounties for specific vulnerabilities or issues they want to address. The bounty amount is set by the project and can vary depending on the severity of the vulnerability. 3. White Hat Participation: White hat hackers and security researchers review the available bounties and choose the ones they want to work on. They then analyze the project's code and systems to identify potential vulnerabilities. 4. Vulnerability Reporting: Once a white hat hacker identifies a vulnerability, they submit a detailed report to the OpenBounty platform. The report includes a description of the vulnerability, its potential impact, and steps to reproduce the issue. 5. Verification and Resolution: The project team reviews the vulnerability report and verifies its validity. If the vulnerability is confirmed, the project works on fixing the issue. The white hat hacker receives the bounty reward once the vulnerability is resolved. 6. Reputation System: OpenBounty maintains a reputation system for both projects and white hat hackers. Projects with a good reputation are more likely to attract skilled white hat hackers, while white hat hackers with a strong reputation are more likely to be trusted by projects. By utilizing the Shentu Chain, OpenBounty ensures a transparent and tamper-proof environment for bug bounty programs. This fosters collaboration between Web3 protocols and skilled white hat hackers, ultimately enhancing the security of the decentralized ecosystem. #shentu #ShentuChain #openbounty #hackers #write2earn $CTK
More about OpenBounty on Shentu Chain!

OpenBounty is a decentralized platform that connects white hat hackers and Web3 projects to enhance the security of the decentralized ecosystem. Here's a more detailed breakdown of how it works:

1. Project Registration: Web3 projects register on the OpenBounty platform, providing details about their project and the bounties they offer for identifying and reporting vulnerabilities.

2. Bounty Creation: Projects create bounties for specific vulnerabilities or issues they want to address. The bounty amount is set by the project and can vary depending on the severity of the vulnerability.

3. White Hat Participation: White hat hackers and security researchers review the available bounties and choose the ones they want to work on. They then analyze the project's code and systems to identify potential vulnerabilities.

4. Vulnerability Reporting: Once a white hat hacker identifies a vulnerability, they submit a detailed report to the OpenBounty platform. The report includes a description of the vulnerability, its potential impact, and steps to reproduce the issue.

5. Verification and Resolution: The project team reviews the vulnerability report and verifies its validity. If the vulnerability is confirmed, the project works on fixing the issue. The white hat hacker receives the bounty reward once the vulnerability is resolved.

6. Reputation System: OpenBounty maintains a reputation system for both projects and white hat hackers. Projects with a good reputation are more likely to attract skilled white hat hackers, while white hat hackers with a strong reputation are more likely to be trusted by projects.

By utilizing the Shentu Chain, OpenBounty ensures a transparent and tamper-proof environment for bug bounty programs. This fosters collaboration between Web3 protocols and skilled white hat hackers, ultimately enhancing the security of the decentralized ecosystem.

#shentu #ShentuChain #openbounty #hackers #write2earn

$CTK
·
--
Optimistický
🔓 Hackers Steal $1.5bn from Crypto Exchange in ‘Biggest Digital Heist Ever’ 💸💻 The crypto world has been rocked by a massive security breach! 😱 Hackers have stolen a staggering $1.5 billion from a major cryptocurrency exchange, making it the largest digital heist in history. 🏴‍☠️💰 🚨 What Happened? Cybercriminals managed to bypass security protocols and siphon off funds from the exchange’s wallets. 🔐➡️💸 Here’s what we know: ⚠️ Unprecedented breach – A sophisticated attack exploited vulnerabilities in the exchange’s system. 🛑🔓 💰 $1.5 billion lost – One of the biggest crypto thefts ever recorded. 📉🔥 🌐 Impact on the crypto market – Prices of major cryptocurrencies fluctuated as news broke. 📊📉 🕵️ How Did the Hackers Do It? Security experts believe the attack was executed through: 🔍 Phishing & social engineering – Tricking employees into revealing credentials. 🎭🔑 🛠️ Exploiting smart contract flaws – Manipulating weaknesses in blockchain protocols. 🏗️⚠️ 🌍 Global cyber network – A well-organized hacker group likely behind the attack. 💻🌐 🏦 How to Protect Your Crypto? With cybercrime on the rise, here’s how you can keep your crypto assets safe: 🛡️🔒 1️⃣ Use Cold Wallets – Store your crypto offline to prevent online breaches. 🏦❄️ 2️⃣ Enable 2FA – Add an extra layer of security to your accounts. 🔑🔐 3️⃣ Be Wary of Phishing – Avoid suspicious emails and messages. 🚫📧 4️⃣ Use Reputable Exchanges – Stick to platforms with strong security measures. 🏛️✅ 5️⃣ Stay Informed – Follow cybersecurity updates to spot potential threats. 📢📰 🏁 What’s Next? Authorities and cybersecurity firms are working around the clock to track down the hackers and recover stolen funds. ⏳⚖️ Will they succeed? Only time will tell. 🕰️👀 #Crypto #Hackers #CyberSecurity #Bitcoin #CryptoExchange $SOL $BNB $XRP
🔓 Hackers Steal $1.5bn from Crypto Exchange in ‘Biggest Digital Heist Ever’ 💸💻

The crypto world has been rocked by a massive security breach! 😱 Hackers have stolen a staggering $1.5 billion from a major cryptocurrency exchange, making it the largest digital heist in history. 🏴‍☠️💰

🚨 What Happened?

Cybercriminals managed to bypass security protocols and siphon off funds from the exchange’s wallets. 🔐➡️💸 Here’s what we know:

⚠️ Unprecedented breach – A sophisticated attack exploited vulnerabilities in the exchange’s system. 🛑🔓
💰 $1.5 billion lost – One of the biggest crypto thefts ever recorded. 📉🔥
🌐 Impact on the crypto market – Prices of major cryptocurrencies fluctuated as news broke. 📊📉

🕵️ How Did the Hackers Do It?

Security experts believe the attack was executed through:

🔍 Phishing & social engineering – Tricking employees into revealing credentials. 🎭🔑
🛠️ Exploiting smart contract flaws – Manipulating weaknesses in blockchain protocols. 🏗️⚠️
🌍 Global cyber network – A well-organized hacker group likely behind the attack. 💻🌐

🏦 How to Protect Your Crypto?

With cybercrime on the rise, here’s how you can keep your crypto assets safe: 🛡️🔒

1️⃣ Use Cold Wallets – Store your crypto offline to prevent online breaches. 🏦❄️
2️⃣ Enable 2FA – Add an extra layer of security to your accounts. 🔑🔐
3️⃣ Be Wary of Phishing – Avoid suspicious emails and messages. 🚫📧
4️⃣ Use Reputable Exchanges – Stick to platforms with strong security measures. 🏛️✅
5️⃣ Stay Informed – Follow cybersecurity updates to spot potential threats. 📢📰

🏁 What’s Next?

Authorities and cybersecurity firms are working around the clock to track down the hackers and recover stolen funds. ⏳⚖️ Will they succeed? Only time will tell. 🕰️👀

#Crypto #Hackers #CyberSecurity #Bitcoin #CryptoExchange

$SOL $BNB $XRP
🚨🇰🇵North Korean #hackers are using a new malware called "NimDoor" to target crypto companies, according to Sentinel Labs. 🔹Disguised as Zoom updates and spread via Telegram, the malware is written in the rare Nim language, allowing it to bypass Apple's security and steal crypto wallet data, browser passwords, and Telegram local databases. ---- $BTC $ETH {spot}(ETHUSDT)
🚨🇰🇵North Korean #hackers are using a new malware called "NimDoor" to target crypto companies, according to Sentinel Labs.

🔹Disguised as Zoom updates and spread via Telegram, the malware is written in the rare Nim language, allowing it to bypass Apple's security and steal crypto wallet data, browser passwords, and Telegram local databases.
----
$BTC $ETH
what do you all think about hackers who hacked major crypto exchanges $BTC #hackers
what do you all think about hackers who hacked major crypto exchanges $BTC #hackers
🚨#LOOPSCALE RECAPTURES #STOLEN FUNDS, SET TO RESTART SERVICES POST-HACK 🔹Exploit Details: #Hackers drained 5.73M USDC and 1,211.4 SOL via a pricing logic flaw 🔹All stolen funds have been recovered 🔹Service Restoration: Refinancing function will restart soon, full rollout in phases 🔹Borrower Update: 3-day grace period extended; users urged to manage positions proactively 🔹Rewards: Vault/Advanced Lend balances (Apr 26–Jun 7) get 12x points boost --- $SOL
🚨#LOOPSCALE RECAPTURES #STOLEN FUNDS, SET TO RESTART SERVICES POST-HACK

🔹Exploit Details: #Hackers drained 5.73M USDC and 1,211.4 SOL via a pricing logic flaw

🔹All stolen funds have been recovered

🔹Service Restoration: Refinancing function will restart soon, full rollout in phases

🔹Borrower Update: 3-day grace period extended; users urged to manage positions proactively

🔹Rewards: Vault/Advanced Lend balances (Apr 26–Jun 7) get 12x points boost
---
$SOL
Clash Crypto
·
--
🚨LOOPscale #HACKER AGREES TO#RETURN FUNDS FOR BOUNTY

🔹Loopscale Labs said hackers agreed to return stolen funds via bounty negotiation.

🔹Hack involved 5.7M$USDC and 1,200$SOL theft.

🔹Withdrawal recovery plan and incident report postponed, expected in a few days.
🛡️ Blockchain vs Hackers: Who Wins in 2025? 🚀 Blockchain is secure, but hackers don’t always attack the chain itself—they target exchanges, wallets, and smart contracts. ⚡ Common Attacks: ✅Exchange hacks 💸 ✅Smart contract bugs 🔓 ✅Cross-chain bridge exploits 🌉 ✅Phishing scams 🎭 ❌ Defenses: ✅Decentralization makes Bitcoin/Ethereum resilient ✅Audits & bug bounties protect DeFi ✅Multi-sig wallets & AI monitoring improve security 👉 Final Thought: Blockchain isn’t unhackable, but it’s getting harder to break every year. Do you think hackers will always stay one step ahead, or will blockchain win the battle? #Blockchain #Hackers #CyberSecurity #Crypto $BTC
🛡️ Blockchain vs Hackers: Who Wins in 2025? 🚀

Blockchain is secure, but hackers don’t always attack the chain itself—they target exchanges, wallets, and smart contracts.

⚡ Common Attacks:

✅Exchange hacks 💸

✅Smart contract bugs 🔓

✅Cross-chain bridge exploits 🌉

✅Phishing scams 🎭

❌ Defenses:

✅Decentralization makes Bitcoin/Ethereum resilient

✅Audits & bug bounties protect DeFi

✅Multi-sig wallets & AI monitoring improve security

👉 Final Thought: Blockchain isn’t unhackable, but it’s getting harder to break every year.

Do you think hackers will always stay one step ahead, or will blockchain win the battle?

#Blockchain #Hackers #CyberSecurity #Crypto $BTC
·
--
Optimistický
Schrödinger's Vulnerability: Why Hackers Invent WordPress Security Problems An unusual strategy by cybercriminals is leading to massive infections of websites with malicious code. WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly being tracked under the ID CVE-2023-45124 . The purpose of the attack is to infect websites with a malicious plugin. The emails, masquerading as official messages from WordPress, talk about a critical remote code execution ( RCE ) vulnerability discovered on the administrator's site. WordPress users are being persuaded to install a plugin that claims to solve a security problem. Clicking the “Download plugin” button leads to a fake page “en-gb-wordpress[.]org”, outwardly indistinguishable from the official site “wordpress.com”. The page indicates an inflated number of downloads of the plugin at 500 thousand downloads, as well as fake user reviews. makes it difficult to detect and remove. At the moment, the purpose of the plugin is unknown, but experts suggest that it can be used to inject advertising on compromised sites, redirect visitors, steal confidential information, or even blackmail site owners with the threat of leaking database contents. WordPress security experts from Wordfence and PatchStack have posted warnings on their sites to raise awareness among administrators and users about this threat. It is extremely important to be careful when installing unknown plugins and to pay attention to suspicious emails. #cyborg #BinanceTournament #hackers #News #BTC $BTC $ETH $BNB
Schrödinger's Vulnerability: Why Hackers Invent WordPress Security Problems
An unusual strategy by cybercriminals is leading to massive infections of websites with malicious code.
WordPress admins are receiving fake security notifications related to a non-existent vulnerability allegedly being tracked under the ID CVE-2023-45124 . The purpose of the attack is to infect websites with a malicious plugin.
The emails, masquerading as official messages from WordPress, talk about a critical remote code execution ( RCE ) vulnerability discovered on the administrator's site. WordPress users are being persuaded to install a plugin that claims to solve a security problem.
Clicking the “Download plugin” button leads to a fake page “en-gb-wordpress[.]org”, outwardly indistinguishable from the official site “wordpress.com”. The page indicates an inflated number of downloads of the plugin at 500 thousand downloads, as well as fake user reviews.
makes it difficult to detect and remove. At the moment, the purpose of the plugin is unknown, but experts suggest that it can be used to inject advertising on compromised sites, redirect visitors, steal confidential information, or even blackmail site owners with the threat of leaking database contents.
WordPress security experts from Wordfence and PatchStack have posted warnings on their sites to raise awareness among administrators and users about this threat. It is extremely important to be careful when installing unknown plugins and to pay attention to suspicious emails.
#cyborg #BinanceTournament #hackers #News #BTC
$BTC $ETH $BNB
🟦 Global Threat Alert ⚠️ North Korea’s AI Hackers Target Crypto Sector Cybersecurity firms report that North Korea’s AI-driven hacker groups are using advanced machine learning to bypass security systems and steal digital assets from major exchanges and DeFi protocols. 🤖 AI in Cybercrime: The hackers use AI to mimic user behavior, craft realistic phishing messages, and automate attack strategies — making their operations faster and harder to detect. 💰 Estimated Damage: Over $3 billion in crypto has been linked to North Korean cyber thefts since 2020, with AI now amplifying their reach and precision. 🛡️ What’s Next: Experts urge exchanges and users to adopt AI-based defense tools and multi-layer authentication to counter evolving threats. #CryptoSecurity #northkorea #AI #hackers #Blockchain #BinanceSquare
🟦 Global Threat Alert

⚠️ North Korea’s AI Hackers Target Crypto Sector
Cybersecurity firms report that North Korea’s AI-driven hacker groups are using advanced machine learning to bypass security systems and steal digital assets from major exchanges and DeFi protocols.

🤖 AI in Cybercrime:
The hackers use AI to mimic user behavior, craft realistic phishing messages, and automate attack strategies — making their operations faster and harder to detect.

💰 Estimated Damage:
Over $3 billion in crypto has been linked to North Korean cyber thefts since 2020, with AI now amplifying their reach and precision.

🛡️ What’s Next:
Experts urge exchanges and users to adopt AI-based defense tools and multi-layer authentication to counter evolving threats.

#CryptoSecurity #northkorea #AI #hackers #Blockchain #BinanceSquare
Ak chcete preskúmať ďalší obsah, prihláste sa
Pripojte sa k používateľom kryptomien na celom svete na Binance Square
⚡️ Získajte najnovšie a užitočné informácie o kryptomenách.
💬 Dôvera najväčšej kryptoburzy na svete.
👍 Objavte skutočné poznatky od overených tvorcov.
E-mail/telefónne číslo