Binance Square

hackers

305,466 προβολές
90 άτομα συμμετέχουν στη συζήτηση
Moon5labs
--
North Korean Hackers Are Becoming More Dangerous: The Crypto Industry Faces Billion-Dollar AttacksCyberwarfare Escalates – North Korean Groups Are Getting Smarter Than Ever North Korean hacking groups are stepping up their attacks on the crypto world. In just the past two years, they've stolen a staggering $1.7 billion from major cryptocurrency exchanges like WazirX and Bybit. A new report by Paradigm, titled Demystifying the North Korean Threat, warns that these attacks are not only becoming more frequent but also increasingly sophisticated. The Largest Crypto Hack in History: $1.5 Billion Stolen from Bybit The most dramatic incident occurred in February 2025. Hackers infiltrated the digital wallet system Safe{Wallet}, used by Bybit users. While it was initially suspected to be a simple phishing scam, deeper investigation revealed a highly targeted attack on the infrastructure supporting the exchange, rather than the exchange itself. Hackers from the General Reconnaissance Bureau covertly inserted a backdoor into the wallet software, gaining access to billions of dollars without being immediately detected. Who's Behind It? Lazarus, AppleJeus, and More Notorious North Korean cybercrime groups like Lazarus, AppleJeus, Dangerous Password, and Spinout each use unique tactics—ranging from phishing emails and fake job offers to malware disguised as legitimate software. Their ultimate goal is not just profit, but also funding North Korea’s military and nuclear programs. Where Do the Stolen Billions Go? Once the crypto is stolen, hackers launder the funds by splitting them into smaller amounts, moving them through hundreds of digital wallets, and eventually converting them to Bitcoin, which can be traded or sold more easily. This method makes it extremely difficult for authorities to trace the funds. Lazarus Group is known to hold stolen crypto for months or even years before using it, increasing their chances of avoiding detection. U.S. Pursues the Hackers, but the Threat Persists The FBI has identified and charged several Lazarus Group members. In 2021, the U.S. Department of Justice filed charges against two individuals for global cybercrimes. Still, North Korean cybercriminals continue to evolve and find new ways to infiltrate the financial world. The cyberwar with Pyongyang’s regime is far from over. On the contrary—new technologies bring new threats. #CryptoSecurity , #hackers , #HackerAlert , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Are Becoming More Dangerous: The Crypto Industry Faces Billion-Dollar Attacks

Cyberwarfare Escalates – North Korean Groups Are Getting Smarter Than Ever
North Korean hacking groups are stepping up their attacks on the crypto world. In just the past two years, they've stolen a staggering $1.7 billion from major cryptocurrency exchanges like WazirX and Bybit.
A new report by Paradigm, titled Demystifying the North Korean Threat, warns that these attacks are not only becoming more frequent but also increasingly sophisticated.
The Largest Crypto Hack in History: $1.5 Billion Stolen from Bybit
The most dramatic incident occurred in February 2025. Hackers infiltrated the digital wallet system Safe{Wallet}, used by Bybit users. While it was initially suspected to be a simple phishing scam, deeper investigation revealed a highly targeted attack on the infrastructure supporting the exchange, rather than the exchange itself.
Hackers from the General Reconnaissance Bureau covertly inserted a backdoor into the wallet software, gaining access to billions of dollars without being immediately detected.
Who's Behind It? Lazarus, AppleJeus, and More
Notorious North Korean cybercrime groups like Lazarus, AppleJeus, Dangerous Password, and Spinout each use unique tactics—ranging from phishing emails and fake job offers to malware disguised as legitimate software.
Their ultimate goal is not just profit, but also funding North Korea’s military and nuclear programs.
Where Do the Stolen Billions Go?
Once the crypto is stolen, hackers launder the funds by splitting them into smaller amounts, moving them through hundreds of digital wallets, and eventually converting them to Bitcoin, which can be traded or sold more easily.
This method makes it extremely difficult for authorities to trace the funds. Lazarus Group is known to hold stolen crypto for months or even years before using it, increasing their chances of avoiding detection.
U.S. Pursues the Hackers, but the Threat Persists
The FBI has identified and charged several Lazarus Group members. In 2021, the U.S. Department of Justice filed charges against two individuals for global cybercrimes. Still, North Korean cybercriminals continue to evolve and find new ways to infiltrate the financial world.
The cyberwar with Pyongyang’s regime is far from over. On the contrary—new technologies bring new threats.

#CryptoSecurity , #hackers , #HackerAlert , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 BREAKING NEWS: Hackers Sell 14,064 ETH for $27.5 Million DAI! 💰 🔥 ETH Downfall? Hackers Take Over the Market! 🔥 In a shocking turn of events, hackers have managed to sell a massive 14,064 ETH worth a staggering $27.5 million DAI! 🤑 This is a significant blow to the Ethereum community as it sends ripples through the market. 🌐 What Happened? We all know about the Ethereum Foundation's massive sell-offs, which once shook the market. But now, it seems hackers have taken the lead, and they're dumping ETH like never before. 😱 💥 Is This the New Norm? With the Ethereum Foundation no longer the only big seller, hackers are now controlling the narrative, leaving traders wondering if this is just the beginning of a new era for ETH. 📉 ⚠️ What Does This Mean for Ethereum? As the market reacts to this unexpected news, we're seeing the price of ETH take a hit, and it's unclear if the coin can recover anytime soon. Traders are on high alert, and the focus is shifting to how the community will handle such attacks. 🔍 💭 Will We See More of This? With hackers now actively influencing the market, it's more important than ever for Ethereum holders to stay vigilant. Keep an eye on the market and be prepared for anything. 🚨 #Ethereum #ETH #CryptoNews #Hackers #Blockchain $ETH $TUT $PARTI
🚨 BREAKING NEWS: Hackers Sell 14,064 ETH for $27.5 Million DAI! 💰

🔥 ETH Downfall? Hackers Take Over the Market! 🔥

In a shocking turn of events, hackers have managed to sell a massive 14,064 ETH worth a staggering $27.5 million DAI! 🤑 This is a significant blow to the Ethereum community as it sends ripples through the market.

🌐 What Happened?
We all know about the Ethereum Foundation's massive sell-offs, which once shook the market. But now, it seems hackers have taken the lead, and they're dumping ETH like never before. 😱

💥 Is This the New Norm?
With the Ethereum Foundation no longer the only big seller, hackers are now controlling the narrative, leaving traders wondering if this is just the beginning of a new era for ETH. 📉

⚠️ What Does This Mean for Ethereum?
As the market reacts to this unexpected news, we're seeing the price of ETH take a hit, and it's unclear if the coin can recover anytime soon. Traders are on high alert, and the focus is shifting to how the community will handle such attacks. 🔍

💭 Will We See More of This?
With hackers now actively influencing the market, it's more important than ever for Ethereum holders to stay vigilant. Keep an eye on the market and be prepared for anything. 🚨

#Ethereum #ETH #CryptoNews #Hackers #Blockchain
$ETH $TUT $PARTI
🚨 HACK ALERT: Microsoft Warns of a MASSIVE Crypto Wallet Breach! 🚨 💀 Your Bitcoin, Ethereum, and altcoins could be at risk! A new malware called StilachiRAT is hijacking crypto wallets and draining funds without warning! 😱💸 🔥 What’s Happening? 🔴 Hackers are using advanced techniques to steal private keys & passwords from over 20+ crypto wallets like MetaMask, Trust Wallet, Coinbase Wallet, and more! 🔴 The malware is invisible to most antivirus software and spreads through fake downloads & phishing sites! 🔴 Once infected, your funds are GONE FOREVER! 💡 How to Stay Safe: ✅ NEVER store private keys in your browser! ✅ ONLY download wallets from official sources! ✅ TURN ON Two-Factor Authentication (2FA)! ✅ USE a cold wallet for large funds! 🚀 Spread the word! If you hold crypto, you NEED to see this! Tag your friends and SHARE this NOW before it’s too late! ⏳⚠️ 💬 Have you seen any suspicious activity in your wallet? Drop a comment below! 🛑👇 #CryptoAlert #Hackers #CryptoSecurity #blockchains #StaySafe
🚨 HACK ALERT: Microsoft Warns of a MASSIVE Crypto Wallet Breach! 🚨

💀 Your Bitcoin, Ethereum, and altcoins could be at risk! A new malware called StilachiRAT is hijacking crypto wallets and draining funds without warning! 😱💸

🔥 What’s Happening?
🔴 Hackers are using advanced techniques to steal private keys & passwords from over 20+ crypto wallets like MetaMask, Trust Wallet, Coinbase Wallet, and more!
🔴 The malware is invisible to most antivirus software and spreads through fake downloads & phishing sites!
🔴 Once infected, your funds are GONE FOREVER!

💡 How to Stay Safe:
✅ NEVER store private keys in your browser!
✅ ONLY download wallets from official sources!
✅ TURN ON Two-Factor Authentication (2FA)!
✅ USE a cold wallet for large funds!

🚀 Spread the word! If you hold crypto, you NEED to see this! Tag your friends and SHARE this NOW before it’s too late! ⏳⚠️

💬 Have you seen any suspicious activity in your wallet? Drop a comment below! 🛑👇

#CryptoAlert #Hackers #CryptoSecurity #blockchains #StaySafe
--
Ανατιμητική
HACKERS’ FAVORITE CURRENCY? IT'S $ETH AGAIN. The notorious Zoth hacker has made their move. Just 17 hours ago, the attacker swapped stolen funds worth $8.32M for 4,223 #ETH at an average price of $1,968. The wallet address involved is 0x7b0cd0d83565adbb57585d0265b7d15d6d9f60cf. Zoth, a DeFi protocol focused on real-world assets (RWAs), was hacked for approximately $8.85M. After the heist, the hacker swapped the funds for 8.32M DAI and later converted it all to ETH. Interestingly, the hacker’s wallet was funded with 0.546 ETH from ChangeNow just 7 days ago. This incident once again highlights how ETH remains the top choice for #hackers looking to cover their tracks.
HACKERS’ FAVORITE CURRENCY? IT'S $ETH AGAIN.
The notorious Zoth hacker has made their move. Just 17 hours ago, the attacker swapped stolen funds worth $8.32M for 4,223 #ETH at an average price of $1,968. The wallet address involved is 0x7b0cd0d83565adbb57585d0265b7d15d6d9f60cf.
Zoth, a DeFi protocol focused on real-world assets (RWAs), was hacked for approximately $8.85M. After the heist, the hacker swapped the funds for 8.32M DAI and later converted it all to ETH.
Interestingly, the hacker’s wallet was funded with 0.546 ETH from ChangeNow just 7 days ago. This incident once again highlights how ETH remains the top choice for #hackers looking to cover their tracks.
North Korea is behind the Bybit HACK🙄Hack A group of DPRK #hackers #LazarusGroup hacked a cold wallet on the exchange for 400k $ETH ($1.5 billion dollars) Now they have more ether than Vitaliy Buterin, the creator of the token himself 😀The channels are already screaming that North Korea has announced a strategic reserve of ether😂 #BybitHack #BybitWalletHack

North Korea is behind the Bybit HACK

🙄Hack A group of DPRK #hackers #LazarusGroup hacked a cold wallet on the exchange for 400k $ETH ($1.5 billion dollars)
Now they have more ether than Vitaliy Buterin, the creator of the token himself
😀The channels are already screaming that North Korea has announced a strategic reserve of ether😂

#BybitHack #BybitWalletHack
U.S. Agency Warns About the Dangerous Trinity RansomwareThe Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure. The Threat of Trinity Ransomware and How It Works A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities. Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key. Hackers’ Demands: 24-Hour Deadline for Payment In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery. "Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers. Attacks on Healthcare Institutions The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector. Crypto Ransom Payments Reached $1 Billion in 2023 According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates. The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks. #cyberattacks Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“  

U.S. Agency Warns About the Dangerous Trinity Ransomware

The Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure.
The Threat of Trinity Ransomware and How It Works
A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities.
Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key.
Hackers’ Demands: 24-Hour Deadline for Payment
In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery.
"Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers.
Attacks on Healthcare Institutions
The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector.
Crypto Ransom Payments Reached $1 Billion in 2023
According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates.
The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks.
#cyberattacks

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

 
🚨I Lost My Whole Capital! Now Let’s Talk About Bybit Wallet Security! 🔐😂I'm 💯 sure you didn't read any post or article like my article, it will blow your mind. Ok let's start discussing So, imagine waking up one day, logging into your wallet, and BAM 💥—your ETH is gone! Just like that! Vanished into the abyss! 😭 Well, after experiencing this nightmare (hypothetically... hopefully), I decided it's time to talk about Bybit Wallet Security and how hackers steal ETH! 🕵️‍♂️ 👾 How Hackers Steal Your ETH? Hackers don’t just wave a magic wand and steal your crypto (I wish it was that simple 😅). Instead, they use tricks like: 🔹 Phishing Attacks – Fake websites that look EXACTLY like Bybit, waiting for you to enter your details. 🤦‍♂️ 🔹 Malware & Keyloggers – That "free airdrop" you clicked on? Yeah, that just gave someone access to your private keys. 🤷‍♂️ 🔹 Smart Contract Exploits – Ever heard of those "too-good-to-be-true" DeFi projects? Well, hackers use dodgy contracts to drain your funds. 🚀💀 🔹 SIM Swapping & Social Engineering – If your 2FA is linked to your phone number, hackers might just "convince" your mobile provider to hand over your SIM. 🧐 💀 So… Can Hackers Even Use Stolen ETH? Short answer: NO! ❌ Once ETH is stolen, it’s tracked on every exchange like a wanted criminal! 🚔 Most exchanges, including Bybit, Binance, OKX, and others, mark stolen ETH as “tainted”—making it IMPOSSIBLE to cash out. Every transaction gets flagged like 🚨 "SPAM ALERT!" 🚨 But wait… there’s a catch! 😨 🐍 The BTC Loophole Hackers can use mixers like Tornado Cash (until regulators shut it down) or simply convert ETH into BTC! Why? Because Bitcoin’s blockchain doesn’t have a built-in "spam" or "blacklist" system. So, if they swap ETH → BTC, they might just get away with it. 😱 (Don't tell that f**** trick to hacker's 😁 ✅ How to Secure Your Wallet? Alright, enough scary talk—let's make sure YOU don’t end up like me (hypothetically, of course 😜): 🔹 Enable 2FA! Don’t be lazy. Google Authenticator > SMS (Always!) 🔑 🔹 Use a Hardware Wallet (Ledger/Trezor) to store large amounts. 🏦 🔹 NEVER click random links! Even if it’s from "Bybit Support" (Spoiler: It’s NOT). 🚫 🔹 Check Contract Approvals – Use tools like revoke.cash to remove unnecessary permissions. 🧐 🔹 Stay Updated! Follow Bybit’s official security alerts and crypto security news. 📰 Final Words: Don’t Learn the Hard Way! 😅 If I had secured my Bybit wallet better, maybe I wouldn’t be writing this post with tears in my eyes. 😭😂 So, be smart, stay safe, and don’t let hackers enjoy your hard-earned crypto! 🚀🔒 #Bybit #CryptoSecurity #Ethereum #Hackers #StaySafe

🚨I Lost My Whole Capital! Now Let’s Talk About Bybit Wallet Security! 🔐😂

I'm 💯 sure you didn't read any post or article like my article, it will blow your mind.
Ok let's start discussing
So, imagine waking up one day, logging into your wallet, and BAM 💥—your ETH is gone! Just like that! Vanished into the abyss! 😭 Well, after experiencing this nightmare (hypothetically... hopefully), I decided it's time to talk about Bybit Wallet Security and how hackers steal ETH! 🕵️‍♂️

👾 How Hackers Steal Your ETH?

Hackers don’t just wave a magic wand and steal your crypto (I wish it was that simple 😅). Instead, they use tricks like:

🔹 Phishing Attacks – Fake websites that look EXACTLY like Bybit, waiting for you to enter your details. 🤦‍♂️
🔹 Malware & Keyloggers – That "free airdrop" you clicked on? Yeah, that just gave someone access to your private keys. 🤷‍♂️
🔹 Smart Contract Exploits – Ever heard of those "too-good-to-be-true" DeFi projects? Well, hackers use dodgy contracts to drain your funds. 🚀💀
🔹 SIM Swapping & Social Engineering – If your 2FA is linked to your phone number, hackers might just "convince" your mobile provider to hand over your SIM. 🧐

💀 So… Can Hackers Even Use Stolen ETH?

Short answer: NO! ❌

Once ETH is stolen, it’s tracked on every exchange like a wanted criminal! 🚔 Most exchanges, including Bybit, Binance, OKX, and others, mark stolen ETH as “tainted”—making it IMPOSSIBLE to cash out. Every transaction gets flagged like 🚨 "SPAM ALERT!" 🚨

But wait… there’s a catch! 😨

🐍 The BTC Loophole

Hackers can use mixers like Tornado Cash (until regulators shut it down) or simply convert ETH into BTC! Why? Because Bitcoin’s blockchain doesn’t have a built-in "spam" or "blacklist" system. So, if they swap ETH → BTC, they might just get away with it. 😱
(Don't tell that f**** trick to hacker's 😁
✅ How to Secure Your Wallet?

Alright, enough scary talk—let's make sure YOU don’t end up like me (hypothetically, of course 😜):

🔹 Enable 2FA! Don’t be lazy. Google Authenticator > SMS (Always!) 🔑
🔹 Use a Hardware Wallet (Ledger/Trezor) to store large amounts. 🏦
🔹 NEVER click random links! Even if it’s from "Bybit Support" (Spoiler: It’s NOT). 🚫
🔹 Check Contract Approvals – Use tools like revoke.cash to remove unnecessary permissions. 🧐
🔹 Stay Updated! Follow Bybit’s official security alerts and crypto security news. 📰

Final Words: Don’t Learn the Hard Way! 😅

If I had secured my Bybit wallet better, maybe I wouldn’t be writing this post with tears in my eyes. 😭😂 So, be smart, stay safe, and don’t let hackers enjoy your hard-earned crypto! 🚀🔒

#Bybit #CryptoSecurity #Ethereum #Hackers #StaySafe
👉👉👉 #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam. Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility. “Due to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,” explained a MailerLite spokesperson today. “As a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.” We extend our sincere apologies to MailerLite for our hasty misjudgment. We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails. While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains! Source - decrypt.co #CryptoNews🔒📰🚫 #BinanceSquareTalks
👉👉👉 #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest

In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam.

Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility.

“Due to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,” explained a MailerLite spokesperson today. “As a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.”

We extend our sincere apologies to MailerLite for our hasty misjudgment.

We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails.

While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains!

Source - decrypt.co

#CryptoNews🔒📰🚫 #BinanceSquareTalks
This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto HacksCrypto hackers have stolen $4+ billion in the last 2 years. If you are not careful, you'll be next. This article shares 8 security practices that everyone should be using. If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen. Then you won’t need this guide, For everyone else let's begin. 1. Crypto Storage Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time. Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal. 2. Emails Old emails with weak passwords are a common point of entry for hackers. If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it. 3. VPN Most main providers are good enough (nord / express). You can take your privacy even further and try something like Mullvad. 4. 2FA 2FA everything. Cold 2fa Device (Tier 1) - Yubikey or Google Titan Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever. Note: 2FA can be circumvented, it is not an absolute defence.\ 5. Passwords This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself. There are two tiers of data. Level 1 Data Level 2 Data Level 1 Data To determine if your data is level 1 ask yourself this. "If a hacker had access to only this information, would they be able to attack me?" For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency. Level 1 Data Rules - Keep offline - Never be stored on your laptop - When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard - These passwords will be a minimum of 15 keys long and as complex as possible - Have back ups Level 2 Data Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2. This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable. Level 2 Data Rules You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged. 6. EXCHANGES Don't trust any sketchy exchanges with your crypto. -Deposit only what you need to buy/sell. -Use reputable exchanges like Binance. - Use 2FA -Set a global lock that requires a minimum wait time before settings are changed -Whitelist your addresses and set a lock on adding new addresses -Use leverage to reduce counterparty risk 7. Advanced: Separate computers Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets. -High Security Computer -Low Security Computer High Security Computer Used only for handling crypto, banking, trading and other sensitive activities. Your high security device is never to deviate from essential websites or click on any links. All it takes is one mistake to compromise your security. Low Security Computer For all other activities, you can use your low security device. There should never be crossover between these two devices. 8. PROTECT OTHERS Someone you care about getting attacked can be leveraged against you. Share this with others and make sure they are as protected as you. #hackers #BitEagleNews

This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto Hacks

Crypto hackers have stolen $4+ billion in the last 2 years.
If you are not careful, you'll be next.
This article shares 8 security practices that everyone should be using.
If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen.
Then you won’t need this guide,
For everyone else let's begin.

1. Crypto Storage
Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor
Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time.
Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal.

2. Emails
Old emails with weak passwords are a common point of entry for hackers.
If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it.

3. VPN
Most main providers are good enough (nord / express).
You can take your privacy even further and try something like Mullvad.

4. 2FA
2FA everything.
Cold 2fa Device (Tier 1) - Yubikey or Google Titan
Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever.
Note: 2FA can be circumvented, it is not an absolute defence.\

5. Passwords
This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself.
There are two tiers of data.
Level 1 Data
Level 2 Data

Level 1 Data
To determine if your data is level 1 ask yourself this.
"If a hacker had access to only this information, would they be able to attack me?"
For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency.

Level 1 Data Rules
- Keep offline
- Never be stored on your laptop
- When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard
- These passwords will be a minimum of 15 keys long and as complex as possible
- Have back ups

Level 2 Data
Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2.
This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable.

Level 2 Data Rules
You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged.

6. EXCHANGES
Don't trust any sketchy exchanges with your crypto.
-Deposit only what you need to buy/sell.
-Use reputable exchanges like Binance.
- Use 2FA
-Set a global lock that requires a minimum wait time before settings are changed
-Whitelist your addresses and set a lock on adding new addresses
-Use leverage to reduce counterparty risk

7. Advanced: Separate computers
Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets.
-High Security Computer
-Low Security Computer

High Security Computer
Used only for handling crypto, banking, trading and other sensitive activities.
Your high security device is never to deviate from essential websites or click on any links.
All it takes is one mistake to compromise your security.

Low Security Computer
For all other activities, you can use your low security device.
There should never be crossover between these two devices.

8. PROTECT OTHERS
Someone you care about getting attacked can be leveraged against you.
Share this with others and make sure they are as protected as you.

#hackers #BitEagleNews
Los activos de HTX y Poloniex son '100% seguros', dice Justin Sun después del hackeo de 200 millones de dólares El magnate de las criptomonedas Justin Sun ha dicho que los activos mantenidos en HTX y Poloniex son "100% seguros" después del hack del mes pasado en el que se desviaron más de 200 millones de dólares de ambos intercambios. Ambos intercambios han abierto retiros para ciertos activos, aunque varias altcoins permanecen bloqueadas. Bitcoin (BTC) y Tron (TRX) son los dos activos digitales que podrían retirarse; Esto llevó a que ambos tokens se negociaran con una prima en Poloniex durante las últimas semanas, lo que significaba que los usuarios tendrían que aceptar un recorte de hasta el 10% para liquidar su activo y retirar otro. La congelación de los retiros se produjo después de que los piratas informáticos robaran 114 millones de dólares de las carteras activas de Poloniex el 10 de noviembre; A esto le siguió el robo de 97 millones de dólares de HTX y del protocolo blockchain Heco Chain ."En este momento, Poloniex y HTX se han recuperado del ataque y estamos reanudando los tokens uno por uno", dijo a CoinDesk Justin Sun, inversionista en Poloniex y asesor de HTX. “Creo que para HTX, ya hemos recuperado el 95% en términos de activos por valor de dólares. En Poloniex, hemos recuperado alrededor del 85% en términos del valor de los activos en dólares”. "Y también tenga en cuenta que, dado que ya hemos cubierto todas las pérdidas de tokens en la plataforma, en HTX y Poloniex, el 100% de los activos son 100% seguros", añadió Sun. “Aunque en términos de intercambios en sí, básicamente necesitamos obtener esas ganancias en el futuro. Pero para los activos de los clientes, es 100% seguro”. Un portavoz de HTX dijo a CoinDesk: "La reciente salida representa una pequeña fracción de nuestras reservas totales, y HTX permanece en funcionamiento estable y saludable". #HTXExchange #PoloniexHack #hackers #exploit #BTC
Los activos de HTX y Poloniex son '100% seguros', dice Justin Sun después del hackeo de 200 millones de dólares

El magnate de las criptomonedas Justin Sun ha dicho que los activos mantenidos en HTX y Poloniex son "100% seguros" después del hack del mes pasado en el que se desviaron más de 200 millones de dólares de ambos intercambios.

Ambos intercambios han abierto retiros para ciertos activos, aunque varias altcoins permanecen bloqueadas. Bitcoin (BTC) y Tron (TRX) son los dos activos digitales que podrían retirarse; Esto llevó a que ambos tokens se negociaran con una prima en Poloniex durante las últimas semanas, lo que significaba que los usuarios tendrían que aceptar un recorte de hasta el 10% para liquidar su activo y retirar otro.

La congelación de los retiros se produjo después de que los piratas informáticos robaran 114 millones de dólares de las carteras activas de Poloniex el 10 de noviembre; A esto le siguió el robo de 97 millones de dólares de HTX y del protocolo blockchain Heco Chain ."En este momento, Poloniex y HTX se han recuperado del ataque y estamos reanudando los tokens uno por uno", dijo a CoinDesk Justin Sun, inversionista en Poloniex y asesor de HTX. “Creo que para HTX, ya hemos recuperado el 95% en términos de activos por valor de dólares. En Poloniex, hemos recuperado alrededor del 85% en términos del valor de los activos en dólares”.

"Y también tenga en cuenta que, dado que ya hemos cubierto todas las pérdidas de tokens en la plataforma, en HTX y Poloniex, el 100% de los activos son 100% seguros", añadió Sun. “Aunque en términos de intercambios en sí, básicamente necesitamos obtener esas ganancias en el futuro. Pero para los activos de los clientes, es 100% seguro”.

Un portavoz de HTX dijo a CoinDesk: "La reciente salida representa una pequeña fracción de nuestras reservas totales, y HTX permanece en funcionamiento estable y saludable".
#HTXExchange #PoloniexHack #hackers #exploit #BTC
On January 9, the US Securities and Exchange Commission (SEC) suffered a significant breach of cybersecurity and a loss of public confidence as a result of a social media account hack that led to a fake announcement about the approval of spot Bitcoin exchange-traded funds (ETFs). For a short while, hackers gained access to the SEC's X account and released a statement purporting the organisation had approved the much anticipated products, which momentarily raised the price of Bitcoin. US officials launched a probe into the incident, and the SEC's cybersecurity and position on cryptocurrency came under fresh fire. #ETFApprovalDreams #hackers #SEC #CryptoniteUae #BTCETFSPOT
On January 9, the US Securities and Exchange Commission (SEC) suffered a significant breach of cybersecurity and a loss of public confidence as a result of a social media account hack that led to a fake announcement about the approval of spot Bitcoin exchange-traded funds (ETFs).

For a short while, hackers gained access to the SEC's X account and released a statement purporting the organisation had approved the much anticipated products, which momentarily raised the price of Bitcoin. US officials launched a probe into the incident, and the SEC's cybersecurity and position on cryptocurrency came under fresh fire.

#ETFApprovalDreams #hackers #SEC #CryptoniteUae #BTCETFSPOT
Appeals Court Revives AT&T Lawsuit for $24 Million Cryptocurrency TheftA U.S. appeals court has revived investor Michael Terpin’s lawsuit against telecommunications company #AT&T concerning the theft of $24 million in cryptocurrency following a SIM swap hack. This decision allows Terpin to continue his legal claims under the Federal Communications Act (#FCA ). Key Claims Reconsidered A Ninth Circuit Court of Appeals panel reinstated a key claim in the case, in which Terpin alleges that AT&T allowed hackers to take over his phone account, leading to the loss of his #Cryptocurency portfolio. This ruling reinstates part of the lawsuit that had been previously dismissed and allows Terpin to continue his claims based on federal laws protecting telecommunications data. Fraud and Negligence by AT&T The court ruled that Terpin presented enough evidence to show that AT&T's failure to protect his account resulted in hackers gaining access to his phone number through a fraudulent SIM swap. They then used this number to access his personal data and change his passwords, ultimately stealing $24 million worth of cryptocurrency. The 2018 SIM Swap Hack The hack occurred in January 2018, when a group of #hackers , led by 15-year-old Ellis Pinsky, allegedly paid AT&T employees to transfer Terpin’s phone number to a SIM card under their control. Despite new security measures implemented after a previous breach, the hackers found a way to bypass the protection. Once they gained access to his phone number, they changed his passwords and stole the cryptocurrency. Legal Battles with Hackers Pinsky returned his portion of the stolen funds, but another hacker, Nicholas Truglia, was ordered by a Los Angeles court to pay Terpin $75.8 million in damages. This case highlighted the vulnerability of cryptocurrency accounts during SIM swap attacks. AT&T and Hacking Incidents Around the same time, AT&T faced another issue with hackers allegedly stealing customer information, such as call logs and text messages. AT&T reportedly paid $400,000 in bitcoin to hackers to remove the stolen data, although the company officially neither confirmed nor denied the payment. What’s Next? The reinstatement of Terpin’s claim allows the lawsuit to proceed, with Terpin seeking $24 million in damages, plus interest and legal fees. His legal team believes this verdict may pave the way for other consumers to sue telecommunications companies for insufficient protection during SIM swaps. AT&T has apologized to Terpin but noted that most of the allegations against the company were dismissed, and they remain confident in defending the remaining claims. This case has attracted attention from blockchain experts, as the number of #HackingIncidents related to cryptocurrency continues to rise. Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Appeals Court Revives AT&T Lawsuit for $24 Million Cryptocurrency Theft

A U.S. appeals court has revived investor Michael Terpin’s lawsuit against telecommunications company #AT&T concerning the theft of $24 million in cryptocurrency following a SIM swap hack. This decision allows Terpin to continue his legal claims under the Federal Communications Act (#FCA ).
Key Claims Reconsidered
A Ninth Circuit Court of Appeals panel reinstated a key claim in the case, in which Terpin alleges that AT&T allowed hackers to take over his phone account, leading to the loss of his #Cryptocurency portfolio. This ruling reinstates part of the lawsuit that had been previously dismissed and allows Terpin to continue his claims based on federal laws protecting telecommunications data.
Fraud and Negligence by AT&T
The court ruled that Terpin presented enough evidence to show that AT&T's failure to protect his account resulted in hackers gaining access to his phone number through a fraudulent SIM swap. They then used this number to access his personal data and change his passwords, ultimately stealing $24 million worth of cryptocurrency.
The 2018 SIM Swap Hack
The hack occurred in January 2018, when a group of #hackers , led by 15-year-old Ellis Pinsky, allegedly paid AT&T employees to transfer Terpin’s phone number to a SIM card under their control. Despite new security measures implemented after a previous breach, the hackers found a way to bypass the protection. Once they gained access to his phone number, they changed his passwords and stole the cryptocurrency.
Legal Battles with Hackers
Pinsky returned his portion of the stolen funds, but another hacker, Nicholas Truglia, was ordered by a Los Angeles court to pay Terpin $75.8 million in damages. This case highlighted the vulnerability of cryptocurrency accounts during SIM swap attacks.
AT&T and Hacking Incidents
Around the same time, AT&T faced another issue with hackers allegedly stealing customer information, such as call logs and text messages. AT&T reportedly paid $400,000 in bitcoin to hackers to remove the stolen data, although the company officially neither confirmed nor denied the payment.
What’s Next?
The reinstatement of Terpin’s claim allows the lawsuit to proceed, with Terpin seeking $24 million in damages, plus interest and legal fees. His legal team believes this verdict may pave the way for other consumers to sue telecommunications companies for insufficient protection during SIM swaps.
AT&T has apologized to Terpin but noted that most of the allegations against the company were dismissed, and they remain confident in defending the remaining claims. This case has attracted attention from blockchain experts, as the number of #HackingIncidents related to cryptocurrency continues to rise.

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
--
Υποτιμητική
Ripple CEO Claims No Wallets Compromised in Recent Cyberattack💁 Earlier today, Ripple experienced a significant cyberattack resulting in the loss of 112.5 million dollars' worth of XRP coins. Following the incident, the news caused a 4% decrease in the price of XRP tokens. ZachXBT stated that the initial attack was linked to an address labeled "rJNLz3…ojm". Following the Ripple attack, the perpetrators initiated a sophisticated laundering process, transferring the stolen XRP to various exchanges, including MEXC and Binance, the world's largest exchange by volume. These distribution methods are designed to conceal the cryptocurrency's origin, making tracking and recovery more challenging. Cautionary Notice Released😳 It is clear that hackers are continually developing new tactics for their illicit operations. Recently, a deepfake video depicting Ripple's CEO sent shockwaves throughout the cryptocurrency market. Hackers utilized a fabricated video, which did not feature Garlinghouse but was created to deceive viewers, in order to trick people into sending funds to their addresses under the false pretense that their XRP holdings would be doubled. Deceptive schemes are advancing regularly, and it would be prudent for investors and traders to exercise vigilance in light of these developments.$BTC $XRP $SOL #xrp #BTC #hackers #scams #TradeNTell
Ripple CEO Claims No Wallets Compromised in Recent Cyberattack💁

Earlier today, Ripple experienced a significant cyberattack resulting in the loss of 112.5 million dollars' worth of XRP coins. Following the incident, the news caused a 4% decrease in the price of XRP tokens.

ZachXBT stated that the initial attack was linked to an address labeled "rJNLz3…ojm". Following the Ripple attack, the perpetrators initiated a sophisticated laundering process, transferring the stolen XRP to various exchanges, including MEXC and Binance, the world's largest exchange by volume. These distribution methods are designed to conceal the cryptocurrency's origin, making tracking and recovery more challenging.

Cautionary Notice Released😳

It is clear that hackers are continually developing new tactics for their illicit operations. Recently, a deepfake video depicting Ripple's CEO sent shockwaves throughout the cryptocurrency market.

Hackers utilized a fabricated video, which did not feature Garlinghouse but was created to deceive viewers, in order to trick people into sending funds to their addresses under the false pretense that their XRP holdings would be doubled.

Deceptive schemes are advancing regularly, and it would be prudent for investors and traders to exercise vigilance in light of these developments.$BTC $XRP $SOL #xrp #BTC #hackers #scams #TradeNTell
#hackers stole 4,064 $BTC ($238 million) from a crypto investor! 🙀 🕵️‍♂️This information was shared by the well-known blockchain researcher ZachXBT on his profile on X. The perpetrators laundered the money through ThorChain, eXch, Kucoin, ChangeNow, Railgun, and Avalanche Bridge. Previously, transfers to the victim's wallet were made from a Genesis Trading address. 🧐 #HackerAlert #Web3 #BinanceSquareFamily #bitcoin {spot}(BTCUSDT)
#hackers stole 4,064 $BTC ($238 million) from a crypto investor! 🙀

🕵️‍♂️This information was shared by the well-known blockchain researcher ZachXBT on his profile on X.

The perpetrators laundered the money through ThorChain, eXch, Kucoin, ChangeNow, Railgun, and Avalanche Bridge.

Previously, transfers to the victim's wallet were made from a Genesis Trading address. 🧐

#HackerAlert #Web3 #BinanceSquareFamily #bitcoin
Crypto Scams: Beware! ‼️🚨‼️🚨‼️🚨‼️🚨‼️🚨 - FTX: Collapsed in 2022, $ billions missing - Luna/TerraUSD: $60 billion loss, founder arrested - QuadrigaCX: $215 million inaccessible after founder's death - Africrypt: 70,000 BTC stolen, founders investigated - SafeMoon: Executives withdrew $200 million, SEC charges - Pro-deum: Exit scam, investors lost all funds - Pincoin/iFan: $660 million Ponzi scheme - Celsius Network: Bankruptcy, $4.7 billion owed - Centra Tech: Fraudulent promises, founders jailed - Mining Max: $250 million scam, 18,000 investors affected Protect yourself: 🫵🫵🫵🫵 research, verify, diversify, and stay informed. Watch for red flags: ‼️‼️‼️‼️‼️‼️ unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market! $BTC $ETH $BNB #Write2Earn! #scamriskwarning #hackers #Alert🔴 #CPI_BTC_Watch
Crypto Scams: Beware! ‼️🚨‼️🚨‼️🚨‼️🚨‼️🚨

- FTX: Collapsed in 2022, $ billions missing
- Luna/TerraUSD: $60 billion loss, founder arrested
- QuadrigaCX: $215 million inaccessible after founder's death
- Africrypt: 70,000 BTC stolen, founders investigated
- SafeMoon: Executives withdrew $200 million, SEC charges
- Pro-deum: Exit scam, investors lost all funds
- Pincoin/iFan: $660 million Ponzi scheme
- Celsius Network: Bankruptcy, $4.7 billion owed
- Centra Tech: Fraudulent promises, founders jailed
- Mining Max: $250 million scam, 18,000 investors affected

Protect yourself: 🫵🫵🫵🫵
research, verify, diversify, and stay informed.

Watch for red flags: ‼️‼️‼️‼️‼️‼️

unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market!
$BTC $ETH $BNB
#Write2Earn! #scamriskwarning #hackers #Alert🔴 #CPI_BTC_Watch
📢Hacker use macdonald's insta to promote the meme coin 🪙On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called “GRIMACE.” This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts. The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.# The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards

📢Hacker use macdonald's insta to promote the meme coin 🪙

On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called “GRIMACE.” This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts.
The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.#
The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards
--
Ανατιμητική
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code. #northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code.

#northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
--
Ανατιμητική
🔓 Hackers Steal $1.5bn from Crypto Exchange in ‘Biggest Digital Heist Ever’ 💸💻 The crypto world has been rocked by a massive security breach! 😱 Hackers have stolen a staggering $1.5 billion from a major cryptocurrency exchange, making it the largest digital heist in history. 🏴‍☠️💰 🚨 What Happened? Cybercriminals managed to bypass security protocols and siphon off funds from the exchange’s wallets. 🔐➡️💸 Here’s what we know: ⚠️ Unprecedented breach – A sophisticated attack exploited vulnerabilities in the exchange’s system. 🛑🔓 💰 $1.5 billion lost – One of the biggest crypto thefts ever recorded. 📉🔥 🌐 Impact on the crypto market – Prices of major cryptocurrencies fluctuated as news broke. 📊📉 🕵️ How Did the Hackers Do It? Security experts believe the attack was executed through: 🔍 Phishing & social engineering – Tricking employees into revealing credentials. 🎭🔑 🛠️ Exploiting smart contract flaws – Manipulating weaknesses in blockchain protocols. 🏗️⚠️ 🌍 Global cyber network – A well-organized hacker group likely behind the attack. 💻🌐 🏦 How to Protect Your Crypto? With cybercrime on the rise, here’s how you can keep your crypto assets safe: 🛡️🔒 1️⃣ Use Cold Wallets – Store your crypto offline to prevent online breaches. 🏦❄️ 2️⃣ Enable 2FA – Add an extra layer of security to your accounts. 🔑🔐 3️⃣ Be Wary of Phishing – Avoid suspicious emails and messages. 🚫📧 4️⃣ Use Reputable Exchanges – Stick to platforms with strong security measures. 🏛️✅ 5️⃣ Stay Informed – Follow cybersecurity updates to spot potential threats. 📢📰 🏁 What’s Next? Authorities and cybersecurity firms are working around the clock to track down the hackers and recover stolen funds. ⏳⚖️ Will they succeed? Only time will tell. 🕰️👀 #Crypto #Hackers #CyberSecurity #Bitcoin #CryptoExchange $SOL $BNB $XRP
🔓 Hackers Steal $1.5bn from Crypto Exchange in ‘Biggest Digital Heist Ever’ 💸💻

The crypto world has been rocked by a massive security breach! 😱 Hackers have stolen a staggering $1.5 billion from a major cryptocurrency exchange, making it the largest digital heist in history. 🏴‍☠️💰

🚨 What Happened?

Cybercriminals managed to bypass security protocols and siphon off funds from the exchange’s wallets. 🔐➡️💸 Here’s what we know:

⚠️ Unprecedented breach – A sophisticated attack exploited vulnerabilities in the exchange’s system. 🛑🔓
💰 $1.5 billion lost – One of the biggest crypto thefts ever recorded. 📉🔥
🌐 Impact on the crypto market – Prices of major cryptocurrencies fluctuated as news broke. 📊📉

🕵️ How Did the Hackers Do It?

Security experts believe the attack was executed through:

🔍 Phishing & social engineering – Tricking employees into revealing credentials. 🎭🔑
🛠️ Exploiting smart contract flaws – Manipulating weaknesses in blockchain protocols. 🏗️⚠️
🌍 Global cyber network – A well-organized hacker group likely behind the attack. 💻🌐

🏦 How to Protect Your Crypto?

With cybercrime on the rise, here’s how you can keep your crypto assets safe: 🛡️🔒

1️⃣ Use Cold Wallets – Store your crypto offline to prevent online breaches. 🏦❄️
2️⃣ Enable 2FA – Add an extra layer of security to your accounts. 🔑🔐
3️⃣ Be Wary of Phishing – Avoid suspicious emails and messages. 🚫📧
4️⃣ Use Reputable Exchanges – Stick to platforms with strong security measures. 🏛️✅
5️⃣ Stay Informed – Follow cybersecurity updates to spot potential threats. 📢📰

🏁 What’s Next?

Authorities and cybersecurity firms are working around the clock to track down the hackers and recover stolen funds. ⏳⚖️ Will they succeed? Only time will tell. 🕰️👀

#Crypto #Hackers #CyberSecurity #Bitcoin #CryptoExchange

$SOL $BNB $XRP
Συνδεθείτε για να εξερευνήσετε περισσότερα περιεχόμενα
Εξερευνήστε τα τελευταία νέα για τα κρύπτο
⚡️ Συμμετέχετε στις πιο πρόσφατες συζητήσεις για τα κρύπτο
💬 Αλληλεπιδράστε με τους αγαπημένους σας δημιουργούς
👍 Απολαύστε περιεχόμενο που σας ενδιαφέρει
Διεύθυνση email/αριθμός τηλεφώνου