Binance Square

hack

937,570 views
505 Discussing
Evgenia Crypto
--
See original
HACKER TRUEBIT FULLY CLEANED 8,535,$ETH ๐Ÿšจ๐ŸŒช๏ธ {future}(ETHUSDT) ๐Ÿ“ Amount: $26.44M. ๐Ÿ“ Method: Tornado Cash. ๐Ÿ“ Result: Trail lost. The Truebit hack at present is the most prominent security breach of 2026. Token $TRU dropped by 99.9%. {future}(TRUUSDT) Investors shocked, hacker in chocolate. ๐Ÿซ Be cautious with DeFi protocols that haven't updated their code in years! โš ๏ธ #BreakingNews #Truebit #Ethereum #Hack #CryptoAlert
HACKER TRUEBIT FULLY CLEANED 8,535,$ETH ๐Ÿšจ๐ŸŒช๏ธ


๐Ÿ“ Amount: $26.44M. ๐Ÿ“ Method: Tornado Cash. ๐Ÿ“ Result: Trail lost.

The Truebit hack at present is the most prominent security breach of 2026. Token $TRU dropped by 99.9%.


Investors shocked, hacker in chocolate. ๐Ÿซ Be cautious with DeFi protocols that haven't updated their code in years! โš ๏ธ #BreakingNews #Truebit #Ethereum #Hack #CryptoAlert
K_A_S_P_ฤฐ_A_B_C:
super๐Ÿ‘
$TRU COLLAPSE: 26 MILLION USD VANISHED! TRU fell over 60% from 0.16 to 0.005. A simple pricing bug drained 8,500 ETH. Attackers minted free tokens and sold them, emptying reserves. Half the stolen funds went through Tornado Cash. This is a critical smart contract logic failure. The outlook for TRU holders is grim. This incident highlights the persistent dangers in DeFi. Is this a warning or a high-risk buying opportunity? Disclaimer: Research and information from Trading Insight are for reference only and do not constitute investment advice. #DeFi #Crypto #TRU #Hack ๐Ÿ’ฅ {future}(TRUMPUSDT)
$TRU COLLAPSE: 26 MILLION USD VANISHED!

TRU fell over 60% from 0.16 to 0.005. A simple pricing bug drained 8,500 ETH. Attackers minted free tokens and sold them, emptying reserves. Half the stolen funds went through Tornado Cash. This is a critical smart contract logic failure. The outlook for TRU holders is grim. This incident highlights the persistent dangers in DeFi. Is this a warning or a high-risk buying opportunity?

Disclaimer: Research and information from Trading Insight are for reference only and do not constitute investment advice.

#DeFi #Crypto #TRU #Hack ๐Ÿ’ฅ
TRUEBIT BLEEDING 8535 ETH On-chain data confirms TrueBit exploited. Massive 8535 ETH loss. That's $26.4 MILLION GONE. Chaos in the ecosystem. This is not a drill. Act now. Disclaimer: This is not financial advice. #crypto #hack #ethereum ๐Ÿšจ
TRUEBIT BLEEDING 8535 ETH

On-chain data confirms TrueBit exploited.
Massive 8535 ETH loss.
That's $26.4 MILLION GONE.
Chaos in the ecosystem.
This is not a drill.
Act now.

Disclaimer: This is not financial advice.
#crypto #hack #ethereum ๐Ÿšจ
POLYcule HACKED: $230K GONE. BOT OFFLINE. Urgent alert. Polycule has been compromised. $230,000 in user funds are affected. The bot is offline. Critical patching and auditing are underway. This will be fixed before the weekend. Act fast. Disclaimer: This is not financial advice. #crypto #hack #security ๐Ÿšจ
POLYcule HACKED: $230K GONE. BOT OFFLINE.

Urgent alert. Polycule has been compromised. $230,000 in user funds are affected. The bot is offline. Critical patching and auditing are underway. This will be fixed before the weekend. Act fast.

Disclaimer: This is not financial advice.

#crypto #hack #security ๐Ÿšจ
--
Bullish
#TrustWallet #Hack โ€ผ๏ธLessons from the December Trust Wallet Hack: Why SMEs are at Risk ๐Ÿ›ก๏ธ $XRP $ETH $SOL The recent Trust Wallet hack (December 2025), which resulted in a loss of $7 million, was a wake-up call not only for private users but also for small and medium-sized businesses (SMEs). Although the attack targeted a browser extension, its mechanics highlight critical vulnerabilities in the crypto-fintech ecosystem. Key takeaways for businesses: 1๏ธโƒฃ Supply chain risks: Attackers used a stolen Chrome Web Store API key to inject malicious code into an official update (v2.68). Even trusted software can become the enemy. 2๏ธโƒฃ The hot wallet trap: The convenience of browser extensions comes at a price. For SMEs, storing operating funds in hot wallets without additional protection is an open door to malware. 3๏ธโƒฃ Verification Crisis: Nearly 5,000 refund requests have been received for 2,500 affected addresses. The lack of ready-made identity verification protocols slows down payouts and drains company resources. What should companies do now? โ€ข Move key assets to cold storage. โ€ข Implement strict MFA for all financial transactions. โ€ข Prepare an Incident Response Plan before they happen. โš ๏ธCrypto security is not just about complex algorithms, itโ€™s about process hygiene. {future}(SOLUSDT) {future}(ETHUSDT) {future}(XRPUSDT)
#TrustWallet #Hack
โ€ผ๏ธLessons from the December Trust Wallet Hack: Why SMEs are at Risk ๐Ÿ›ก๏ธ
$XRP $ETH $SOL
The recent Trust Wallet hack (December 2025), which resulted in a loss of $7 million, was a wake-up call not only for private users but also for small and medium-sized businesses (SMEs). Although the attack targeted a browser extension, its mechanics highlight critical vulnerabilities in the crypto-fintech ecosystem.

Key takeaways for businesses:
1๏ธโƒฃ Supply chain risks: Attackers used a stolen Chrome Web Store API key to inject malicious code into an official update (v2.68). Even trusted software can become the enemy.
2๏ธโƒฃ The hot wallet trap: The convenience of browser extensions comes at a price. For SMEs, storing operating funds in hot wallets without additional protection is an open door to malware.
3๏ธโƒฃ Verification Crisis: Nearly 5,000 refund requests have been received for 2,500 affected addresses. The lack of ready-made identity verification protocols slows down payouts and drains company resources.

What should companies do now?
โ€ข Move key assets to cold storage.
โ€ข Implement strict MFA for all financial transactions.
โ€ข Prepare an Incident Response Plan before they happen.

โš ๏ธCrypto security is not just about complex algorithms, itโ€™s about process hygiene.
__BARON__:
how?
See original
โš–๏ธโœ… The Bitfinex hacker Ilya Lichtenstein was granted early release under Trump's First Step Act, serving only one year of a five-year sentence. #hack link
โš–๏ธโœ…
The Bitfinex hacker Ilya Lichtenstein was granted early release under Trump's First Step Act, serving only one year of a five-year sentence. #hack link
โšกUPDATE: Bitfinex hacker Ilya Lichtenstein was freed early under Trumpโ€™s First Step Act, just a year into a five-year sentence #TRUMP #Bitfinex #Hack
โšกUPDATE: Bitfinex hacker Ilya Lichtenstein was freed early under Trumpโ€™s First Step Act, just a year into a five-year sentence
#TRUMP #Bitfinex #Hack
Hereโ€™s what happened in crypto today : ๐Ÿ‘‰BitMine stakes $259M more $ETH , pushing validator entry queue near 1M Ether : ๐Ÿ’ฅBitMine Immersion Technologies has added another 82,560 Ether, to Ethereumโ€™s staking system, intensifying congestion in the networkโ€™s validator entry queue as institutional demand for yield continues to build. Etherย treasury firm sent multiple large deposits to Ethereumโ€™s BatchDeposit contract within the past few hours. With the new stake, BitMineโ€™s total staked ETH has climbed to 544,064 Ether, accordingย to onchain analyst Lookonchain. ๐Ÿ‘‰Coinbase exec defends CLARITY Act delay: 'I completely understand' The Digital Asset Market Clarity Act, or CLARITY Act, is moving along the right pathway, according to a Coinbase executive. โ€œI completely understand why this is taking longer,โ€ said by Coinbase Institutional head of strategy John Dโ€™Agostinoย on CNBC โ€œItโ€™s the kind of bill that is quite frankly more foundational for the growth of crypto or any real asset class,โ€ he said, it makes sense for the process to take some time. He said that the CLARITY Act is a lot more complex than the Genius Act, the stablecoin legislation that was passed into US law in July. ๐Ÿ‘‰'Hundreds' of EVM wallets drained in mysterious attack: An attackerย has drained "hundredsโ€ of crypto walletsย on (EVM) chains, onchain investigator ZachXBT described as a broad but low-value exploit. The hacker send an mail to metamask wallet users pretending like it's an official from metamask wallet . Each victim lose an approxiamtely $2000 per user in EVM compatible chain's . #Hack #CLARITYAct {spot}(ETHUSDT)
Hereโ€™s what happened in crypto today :

๐Ÿ‘‰BitMine stakes $259M more $ETH , pushing validator entry queue near 1M Ether :

๐Ÿ’ฅBitMine Immersion Technologies has added another 82,560 Ether, to Ethereumโ€™s staking system, intensifying congestion in the networkโ€™s validator entry queue as institutional demand for yield continues to build.

Etherย treasury firm sent multiple large deposits to Ethereumโ€™s BatchDeposit contract within the past few hours.

With the new stake, BitMineโ€™s total staked ETH has climbed to 544,064 Ether, accordingย to onchain analyst Lookonchain.

๐Ÿ‘‰Coinbase exec defends CLARITY Act delay: 'I completely understand'

The Digital Asset Market Clarity Act, or CLARITY Act, is moving along the right pathway, according to a Coinbase executive.

โ€œI completely understand why this is taking longer,โ€ said by Coinbase Institutional head of strategy John Dโ€™Agostinoย on CNBC

โ€œItโ€™s the kind of bill that is quite frankly more foundational for the growth of crypto or any real asset class,โ€ he said, it makes sense for the process to take some time.

He said that the CLARITY Act is a lot more complex than the Genius Act, the stablecoin legislation that was passed into US law in July.

๐Ÿ‘‰'Hundreds' of EVM wallets drained in mysterious attack:

An attackerย has drained "hundredsโ€ of crypto walletsย on (EVM) chains, onchain investigator ZachXBT described as a broad but low-value exploit.

The hacker send an mail to metamask wallet users pretending like it's an official from metamask wallet . Each victim lose an approxiamtely $2000 per user in EVM compatible chain's .

#Hack #CLARITYAct
๐Ÿ”ฅ๐ŸšจBitfinex 2016 #hack mastermind Ilya Lichtenstein has been released early, citing sentence reductions under the ๐Ÿ‡บ๐Ÿ‡ธU.S. First Step Act signed by President Trump in 2018. Lichtenstein was sentenced to five years in November 2024 for laundering nearly 120,000 $BTC (~$4.5 billion at the time). {spot}(BTCUSDT)
๐Ÿ”ฅ๐ŸšจBitfinex 2016 #hack mastermind Ilya Lichtenstein has been released early, citing sentence reductions under the ๐Ÿ‡บ๐Ÿ‡ธU.S. First Step Act signed by President Trump in 2018.

Lichtenstein was sentenced to five years in November 2024 for laundering nearly 120,000 $BTC (~$4.5 billion at the time).
FLOW HACKED! BINANCE FREEZES FUNDS. Entry: 1.10 ๐ŸŸฉ Target 1: 1.25 ๐ŸŽฏ Target 2: 1.40 ๐ŸŽฏ Stop Loss: 0.95 ๐Ÿ›‘ FLOW network EXPLODES with a massive security breach. Hackers minted untold tokens. Binance acted INSTANTLY, freezing hacker funds on their platform. Binance reached out to the Flow team, offering full support. Shockingly, the Flow team has gone SILENT. Binance urges the Flow team to exclude CEX wallets from any recovery and demands a full post-mortem. This is CHAOS. Disclaimer: Trading is risky. #FLOW #CRYPTO #HACK #BINANCE ๐Ÿšจ
FLOW HACKED! BINANCE FREEZES FUNDS.

Entry: 1.10 ๐ŸŸฉ
Target 1: 1.25 ๐ŸŽฏ
Target 2: 1.40 ๐ŸŽฏ
Stop Loss: 0.95 ๐Ÿ›‘

FLOW network EXPLODES with a massive security breach. Hackers minted untold tokens. Binance acted INSTANTLY, freezing hacker funds on their platform. Binance reached out to the Flow team, offering full support. Shockingly, the Flow team has gone SILENT. Binance urges the Flow team to exclude CEX wallets from any recovery and demands a full post-mortem. This is CHAOS.

Disclaimer: Trading is risky.

#FLOW #CRYPTO #HACK #BINANCE ๐Ÿšจ
--
Bullish
See original
๐Ÿ” McDonald's Memecoin Hack: Cyber โ€‹โ€‹Thieves Steal Around $700,000 in Solana In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered. ๐Ÿ’€ The Grimace Memecoin Scam ๐Ÿ‘พ Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes. ๐Ÿ“Š Pump & Dump The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes. ๐Ÿ’ธ The Payout In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana." โš ๏ธ Aftermath The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams. #scam #hack #Solanaโฉ $SOL #RiskManagement {spot}(SOLUSDT)
๐Ÿ” McDonald's Memecoin Hack: Cyber โ€‹โ€‹Thieves Steal Around $700,000 in Solana

In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered.

๐Ÿ’€ The Grimace Memecoin Scam ๐Ÿ‘พ

Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes.

๐Ÿ“Š Pump & Dump

The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes.

๐Ÿ’ธ The Payout

In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana."

โš ๏ธ Aftermath

The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams.

#scam #hack #Solanaโฉ $SOL #RiskManagement
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates๐Ÿ”น Fake Zoom meeting invites and update links deceive Web3 teams ๐Ÿ”น New NimDoor malware infiltrates macOS with advanced evasion techniques ๐Ÿ”น Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: ๐Ÿ”น Data extraction โ€“ stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. ๐Ÿ”น System persistence โ€“ maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: ๐Ÿ”น Automatically reinstalls itself if users try to terminate or delete it ๐Ÿ”น Creates hidden files and folders that look like legitimate macOS system components ๐Ÿ”น Connects to the attackerโ€™s server every 30 seconds for instructions, disguised as normal internet traffic ๐Ÿ”น Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead โ€“ follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.โ€œ

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

๐Ÿ”น Fake Zoom meeting invites and update links deceive Web3 teams

๐Ÿ”น New NimDoor malware infiltrates macOS with advanced evasion techniques

๐Ÿ”น Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
๐Ÿ”น Data extraction โ€“ stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

๐Ÿ”น System persistence โ€“ maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
๐Ÿ”น Automatically reinstalls itself if users try to terminate or delete it

๐Ÿ”น Creates hidden files and folders that look like legitimate macOS system components

๐Ÿ”น Connects to the attackerโ€™s server every 30 seconds for instructions, disguised as normal internet traffic

๐Ÿ”น Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead โ€“ follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.โ€œ
๐Ÿ”ฅ Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions ๐Ÿ’ธ๐ŸŒ The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. ๐Ÿšจ The main vulnerability? Access control issues, responsible for 78% of all attacks. ๐Ÿ’Ž DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. ๐Ÿฆ CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). ๐ŸŽฎ Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. ๐ŸŽฒ ๐Ÿšฉ Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. ๐Ÿ“ˆ ๐ŸŽฏ Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. ๐Ÿ’ฐ They also exploited the names of celebrities and influencers to deceive investors. ๐Ÿ‘จโ€๐Ÿ’ป Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. โš ๏ธ Stay Alert! Crypto scams are becoming increasingly sophisticated. ๐Ÿ›ก๏ธ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

๐Ÿ”ฅ Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions ๐Ÿ’ธ

๐ŸŒ The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. ๐Ÿšจ The main vulnerability? Access control issues, responsible for 78% of all attacks.

๐Ÿ’Ž DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

๐Ÿฆ CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

๐ŸŽฎ Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. ๐ŸŽฒ

๐Ÿšฉ Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. ๐Ÿ“ˆ

๐ŸŽฏ Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. ๐Ÿ’ฐ They also exploited the names of celebrities and influencers to deceive investors.

๐Ÿ‘จโ€๐Ÿ’ป Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

โš ๏ธ Stay Alert!
Crypto scams are becoming increasingly sophisticated. ๐Ÿ›ก๏ธ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
๐Ÿšจ Did North Korea Just Pull Off the Biggest Crypto Heist? ๐Ÿ”ฅ Yesterday, the crypto world exploded with two shocking headlines: 1๏ธโƒฃ A major exchange lost $1.5 billion in Ethereum after a massive hack. 2๏ธโƒฃ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. ๐Ÿคฏ Coincidence? Or something bigger? ๐Ÿ”น The Hack: Hackers drained 400,000 ETH from the exchangeโ€™s secure wallet. Experts suspect North Koreaโ€™s Lazarus Group, a well-known cybercrime gang. ๐Ÿ”น North Koreaโ€™s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserveโ€”the exact same amount stolen! ๐Ÿ”น Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots. ๐Ÿ’ฌ What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! ๐Ÿ‘‡๐Ÿ”ฅ ๐Ÿ”” Follow for more real-time crypto updates! ๐Ÿš€ #BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
๐Ÿšจ Did North Korea Just Pull Off the Biggest Crypto Heist? ๐Ÿ”ฅ

Yesterday, the crypto world exploded with two shocking headlines:

1๏ธโƒฃ A major exchange lost $1.5 billion in Ethereum after a massive hack.

2๏ธโƒฃ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. ๐Ÿคฏ

Coincidence? Or something bigger?
๐Ÿ”น The Hack: Hackers drained 400,000 ETH from the exchangeโ€™s secure wallet. Experts suspect North Koreaโ€™s Lazarus Group, a well-known cybercrime gang.

๐Ÿ”น North Koreaโ€™s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserveโ€”the exact same amount stolen!

๐Ÿ”น Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots.

๐Ÿ’ฌ What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! ๐Ÿ‘‡๐Ÿ”ฅ

๐Ÿ”” Follow for more real-time crypto updates! ๐Ÿš€

#BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in EthereumOn Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter. Theft Details: 3,250 ETH Moved by Unknown Perpetrators A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability. Personal Accounts of Jeff 'Jiho' Zirlin Compromised Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it. Security of Ronin and Sky Mavis Unaffected In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals. Impact on Ronin's Market Value As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97. Historical Context: Ronin Bridge Attack The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack. $ETH #Ronin #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.โ€œ

Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in Ethereum

On Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter.
Theft Details: 3,250 ETH Moved by Unknown Perpetrators
A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability.
Personal Accounts of Jeff 'Jiho' Zirlin Compromised
Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it.

Security of Ronin and Sky Mavis Unaffected
In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals.
Impact on Ronin's Market Value
As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97.
Historical Context: Ronin Bridge Attack
The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack.

$ETH
#Ronin #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.โ€œ
30.1K #BTC ($2.1B) of #Silk Road #hack funds controlled by US government is on the move right now. 0.001 BTC ($69) transferred to a Coinbase deposit address so itโ€™s a test transfer possibly. txn hash 9c3af4b48e66565f1da1da8278036fa1dbb09f2beaaca99c3504475390ba4590 Coinbase deposit address 3KrZVU9Jz4UKHpKUtuvkEMX1tY8zeiTvX2
30.1K #BTC ($2.1B) of #Silk Road #hack funds controlled by US government is on the move right now.

0.001 BTC ($69) transferred to a Coinbase deposit address so itโ€™s a test transfer possibly.

txn hash
9c3af4b48e66565f1da1da8278036fa1dbb09f2beaaca99c3504475390ba4590

Coinbase deposit address
3KrZVU9Jz4UKHpKUtuvkEMX1tY8zeiTvX2
Login to explore more contents
Explore the latest crypto news
โšก๏ธ Be a part of the latests discussions in crypto
๐Ÿ’ฌ Interact with your favorite creators
๐Ÿ‘ Enjoy content that interests you
Email / Phone number