Binance Square

hackers

319,923 views
113 Discussing
AN_Bitcoin
--
🄸 Not all hacks need code, some just need your trust. Social engineering plays on fear and FOMO. ā€œYour wallet’s compromised.ā€ ā€œUpdate now.ā€ ā€œBuy this before it moons.ā€ Sounds urgent, feels real. That’s the trick. Don’t click random links. Don’t trust DMs. And never share your private key. #hackers #scamers #privatekey
🄸 Not all hacks need code, some just need your trust. Social engineering plays on fear and FOMO. ā€œYour wallet’s compromised.ā€ ā€œUpdate now.ā€ ā€œBuy this before it moons.ā€ Sounds urgent, feels real. That’s the trick.

Don’t click random links. Don’t trust DMs. And never share your private key.
#hackers #scamers #privatekey
#hackers hackers News The term ā€œcomputer hackerā€ refers to an individual or group of individuals skilled in manipulating computer systems, often breaking through layers of security to achieve their goals. These goals can range from exploring systems out of curiosity, stealing sensitive data and defacing websites to illegally profiting from system manipulation. In the context of cryptocurrencies, hackers target exchanges, wallets and users to steal funds. The latest news on hackers shows that no one is protected from their schemes, with several cases of exchange hacks. In 2014, Mt. Gox, once the world’s largest Bitcoin exchanges, declared bankruptcy after losing 850,000 Bitcoin (BTC). In March 2022, hackers targeted the Axie Infinity gaming platform’s network, Ronin, stealing approximately $625 million in Ether (ETH) and USD Coin (USDC), marking the largest cryptocurrency hack to date. Other notable hacks include the Poly Network heist, where over $600 million was stolen. FTX also faced a massive breach, losing $600 million in crypto assets. Binance, a major exchange, fell victim to a $570 million hack, and Coincheck suffered a $523 million attack in 2018.
#hackers hackers News
The term ā€œcomputer hackerā€ refers to an individual or group of individuals skilled in manipulating computer systems, often breaking through layers of security to achieve their goals. These goals can range from exploring systems out of curiosity, stealing sensitive data and defacing websites to illegally profiting from system manipulation.

In the context of cryptocurrencies, hackers target exchanges, wallets and users to steal funds. The latest news on hackers shows that no one is protected from their schemes, with several cases of exchange hacks.

In 2014, Mt. Gox, once the world’s largest Bitcoin exchanges, declared bankruptcy after losing 850,000 Bitcoin (BTC). In March 2022, hackers targeted the Axie Infinity gaming platform’s network, Ronin, stealing approximately $625 million in Ether (ETH) and USD Coin (USDC), marking the largest cryptocurrency hack to date.

Other notable hacks include the Poly Network heist, where over $600 million was stolen. FTX also faced a massive breach, losing $600 million in crypto assets. Binance, a major exchange, fell victim to a $570 million hack, and Coincheck suffered a $523 million attack in 2018.
šŸ“¢Hacker use macdonald's insta to promote the meme coin šŸŖ™On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called ā€œGRIMACE.ā€ This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts. The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.# The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards

šŸ“¢Hacker use macdonald's insta to promote the meme coin šŸŖ™

On August 21, 2024,b# McDonald's faced a significant security breach when a hacker hijacked the company's official Instagram account to promote a fraudulent cryptocurrency. The hacker leveraged the global reach and credibility of McDonald's to promote a fake Solana-based meme coin called ā€œGRIMACE.ā€ This event quickly drew widespread attention as it demonstrated the increasing frequency and sophistication of cyber-attacks targeting major corporations' social media accounts.
The hacker's campaign was both audacious and cunning. By exploiting the McDonald's brand, they aimed to deceive unsuspecting followers into believing that the fast-food giant was endorsing the new cryptocurrency. The posts on McDonald's Instagram account featured flashy graphics and promises of high returns, a common tactic used in crypto scams. The use of "GRIMACE" as the meme coin's name was a direct reference to one of McDonald's iconic mascots, further adding a layer of deception to the campaign.#
The fraudulent promotion was designed to lure followers into purchasing the fake coin, likely through links provided in the hacked posts. Once followers clicked on these links, they were probably directed to a phishing site designed to collect personal information or facilitate fraudulent transactions. The hacker’s strategy relied on the trust that McDonald's followers had in the brand, making the scam more convincing and potentially more damaging.McDonald's quickly responded to the breach, issuing a statement that their Instagram account had been compromised and that the posts promoting "GRIMACE" were fraudulent. The company urged followers not to engage with the content or click on any links. They also worked with Instagram to regain control of the account and remove the malicious posts.This incident underscores the vulnerability of even the largest and most established brands to cyber-attacks. It also highlights the growing trend of cybercriminals targeting social media platforms to execute their schemes, particularly in the rapidly evolving world of cryptocurrency. As businesses continue to expand their digital presence, ensuring robust cybersecurity measures will be crucial to protecting their brand integrity and safeguarding their customers from similar attacks.#hackers #BinanceCreatorAwards
Crypto Scams: Beware! ā€¼ļøšŸšØā€¼ļøšŸšØā€¼ļøšŸšØā€¼ļøšŸšØā€¼ļøšŸšØ - FTX: Collapsed in 2022, $ billions missing - Luna/TerraUSD: $60 billion loss, founder arrested - QuadrigaCX: $215 million inaccessible after founder's death - Africrypt: 70,000 BTC stolen, founders investigated - SafeMoon: Executives withdrew $200 million, SEC charges - Pro-deum: Exit scam, investors lost all funds - Pincoin/iFan: $660 million Ponzi scheme - Celsius Network: Bankruptcy, $4.7 billion owed - Centra Tech: Fraudulent promises, founders jailed - Mining Max: $250 million scam, 18,000 investors affected Protect yourself: 🫵🫵🫵🫵 research, verify, diversify, and stay informed. Watch for red flags: ā€¼ļøā€¼ļøā€¼ļøā€¼ļøā€¼ļøā€¼ļø unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market! $BTC $ETH $BNB #Write2Earn! #scamriskwarning #hackers #AlertšŸ”“ #CPI_BTC_Watch
Crypto Scams: Beware! ā€¼ļøšŸšØā€¼ļøšŸšØā€¼ļøšŸšØā€¼ļøšŸšØā€¼ļøšŸšØ

- FTX: Collapsed in 2022, $ billions missing
- Luna/TerraUSD: $60 billion loss, founder arrested
- QuadrigaCX: $215 million inaccessible after founder's death
- Africrypt: 70,000 BTC stolen, founders investigated
- SafeMoon: Executives withdrew $200 million, SEC charges
- Pro-deum: Exit scam, investors lost all funds
- Pincoin/iFan: $660 million Ponzi scheme
- Celsius Network: Bankruptcy, $4.7 billion owed
- Centra Tech: Fraudulent promises, founders jailed
- Mining Max: $250 million scam, 18,000 investors affected

Protect yourself: 🫵🫵🫵🫵
research, verify, diversify, and stay informed.

Watch for red flags: ā€¼ļøā€¼ļøā€¼ļøā€¼ļøā€¼ļøā€¼ļø

unregistered projects, lack of transparency, unusual payment methods. Stay safe in the crypto market!
$BTC $ETH $BNB
#Write2Earn! #scamriskwarning #hackers #AlertšŸ”“ #CPI_BTC_Watch
This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto HacksCrypto hackers have stolen $4+ billion in the last 2 years. If you are not careful, you'll be next. This article shares 8 security practices that everyone should be using. If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen. Then you won’t need this guide, For everyone else let's begin. 1. Crypto Storage Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time. Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal. 2. Emails Old emails with weak passwords are a common point of entry for hackers. If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it. 3. VPN Most main providers are good enough (nord / express). You can take your privacy even further and try something like Mullvad. 4. 2FA 2FA everything. Cold 2fa Device (Tier 1) - Yubikey or Google Titan Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever. Note: 2FA can be circumvented, it is not an absolute defence.\ 5. Passwords This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself. There are two tiers of data. Level 1 Data Level 2 Data Level 1 Data To determine if your data is level 1 ask yourself this. "If a hacker had access to only this information, would they be able to attack me?" For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency. Level 1 Data Rules - Keep offline - Never be stored on your laptop - When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard - These passwords will be a minimum of 15 keys long and as complex as possible - Have back ups Level 2 Data Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2. This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable. Level 2 Data Rules You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged. 6. EXCHANGES Don't trust any sketchy exchanges with your crypto. -Deposit only what you need to buy/sell. -Use reputable exchanges like Binance. - Use 2FA -Set a global lock that requires a minimum wait time before settings are changed -Whitelist your addresses and set a lock on adding new addresses -Use leverage to reduce counterparty risk 7. Advanced: Separate computers Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets. -High Security Computer -Low Security Computer High Security Computer Used only for handling crypto, banking, trading and other sensitive activities. Your high security device is never to deviate from essential websites or click on any links. All it takes is one mistake to compromise your security. Low Security Computer For all other activities, you can use your low security device. There should never be crossover between these two devices. 8. PROTECT OTHERS Someone you care about getting attacked can be leveraged against you. Share this with others and make sure they are as protected as you. #hackers #BitEagleNews

This Article Shares 8 Security Practices That Everyone Should Be Using to Avoid Crypto Hacks

Crypto hackers have stolen $4+ billion in the last 2 years.
If you are not careful, you'll be next.
This article shares 8 security practices that everyone should be using.
If you already have multisig, virtual machines, 3 identities, your own email servers, a nuclear bunker and a lifetime supply of ramen.
Then you won’t need this guide,
For everyone else let's begin.

1. Crypto Storage
Hardware Wallets (Tier 1) - Ledger, NGRAVE, Trezor
Paper Wallet (Tier 2) - Easily lost and damaged. But costs only time.
Desktop wallet (Tier 3) - Only as safe as the system they are on. Not Ideal.

2. Emails
Old emails with weak passwords are a common point of entry for hackers.
If you’ve had it for a while and used it for multiple websites, chances are you want to get rid of it.

3. VPN
Most main providers are good enough (nord / express).
You can take your privacy even further and try something like Mullvad.

4. 2FA
2FA everything.
Cold 2fa Device (Tier 1) - Yubikey or Google Titan
Custom 2fa Device (Tier 2) - Cheaper option is to buy a cheap phone, download 2fa, swap it to flight mode forever.
Note: 2FA can be circumvented, it is not an absolute defence.\

5. Passwords
This is where we disproportionately limit the damage a successful hack can do to us. I’m going to share a multilevel system I’ve built for myself.
There are two tiers of data.
Level 1 Data
Level 2 Data

Level 1 Data
To determine if your data is level 1 ask yourself this.
"If a hacker had access to only this information, would they be able to attack me?"
For example, if a hacker gained access to your private keys, they could directly access your cryptocurrency.

Level 1 Data Rules
- Keep offline
- Never be stored on your laptop
- When entering these passwords, you will alternate between using your actual keyboard and an on-screen keyboard
- These passwords will be a minimum of 15 keys long and as complex as possible
- Have back ups

Level 2 Data
Any data which on its own cannot grant the hacker access to any of your funds or important data is considered level 2.
This means If a hacker were to gain access to a level 2 password, they would still be unable to actually access anything vulnerable.

Level 2 Data Rules
You can randomly generate by your password manager and should never be typed, always copy and paste from your manager without revealing the password in case you are being watched or key logged.

6. EXCHANGES
Don't trust any sketchy exchanges with your crypto.
-Deposit only what you need to buy/sell.
-Use reputable exchanges like Binance.
- Use 2FA
-Set a global lock that requires a minimum wait time before settings are changed
-Whitelist your addresses and set a lock on adding new addresses
-Use leverage to reduce counterparty risk

7. Advanced: Separate computers
Separate computers are an expensive option so decide if it’s worth the investment relative to the value of your online security and assets.
-High Security Computer
-Low Security Computer

High Security Computer
Used only for handling crypto, banking, trading and other sensitive activities.
Your high security device is never to deviate from essential websites or click on any links.
All it takes is one mistake to compromise your security.

Low Security Computer
For all other activities, you can use your low security device.
There should never be crossover between these two devices.

8. PROTECT OTHERS
Someone you care about getting attacked can be leveraged against you.
Share this with others and make sure they are as protected as you.

#hackers #BitEagleNews
See original
FTX Hack Mystery Possibly Solved: US Charges Trio with Theft, Including Infamous Attack on#CryptocurrencyExchange The federal indictment does not identify Sam Bankman-Fried's FTX as the robbed company, but Bloomberg reported that it was. The US federal government on Wednesday charged three people in a year-long phone hacking conspiracy that culminated in the infamous theft of $400 million from FTX as Sam Bankman-Fried's cryptocurrency exchange collapsed. In an 18-page indictment filed in a D.C. court, prosecutors charged Robert Powell, Carter Rohn and Emily Hernandez with conspiracy to commit wire fraud and identity theft in their operation of a SIM swapping network that targeted fifty victims. between March 2021 and April 2023. Their most notable heist occurred on November 11, 2022, when the trio siphoned $400 million from an unnamed company. Bloomberg, citing sources familiar with the matter, said that company was FTX. They gained access to a cryptocurrency exchange employee through AT&T and transferred hundreds of millions of dollars in cryptocurrency. #ftx #hacks #hackers #FTXUpdate #ftt
FTX Hack Mystery Possibly Solved: US Charges Trio with Theft, Including Infamous Attack on#CryptocurrencyExchange

The federal indictment does not identify Sam Bankman-Fried's FTX as the robbed company, but Bloomberg reported that it was.

The US federal government on Wednesday charged three people in a year-long phone hacking conspiracy that culminated in the infamous theft of $400 million from FTX as Sam Bankman-Fried's cryptocurrency exchange collapsed.

In an 18-page indictment filed in a D.C. court, prosecutors charged Robert Powell, Carter Rohn and Emily Hernandez with conspiracy to commit wire fraud and identity theft in their operation of a SIM swapping network that targeted fifty victims. between March 2021 and April 2023.

Their most notable heist occurred on November 11, 2022, when the trio siphoned $400 million from an unnamed company. Bloomberg, citing sources familiar with the matter, said that company was FTX.

They gained access to a cryptocurrency exchange employee through AT&T and transferred hundreds of millions of dollars in cryptocurrency.
#ftx #hacks #hackers #FTXUpdate #ftt
Appeals Court Revives AT&T Lawsuit for $24 Million Cryptocurrency TheftA U.S. appeals court has revived investor Michael Terpin’s lawsuit against telecommunications company #AT&T concerning the theft of $24 million in cryptocurrency following a SIM swap hack. This decision allows Terpin to continue his legal claims under the Federal Communications Act (#FCA ). Key Claims Reconsidered A Ninth Circuit Court of Appeals panel reinstated a key claim in the case, in which Terpin alleges that AT&T allowed hackers to take over his phone account, leading to the loss of his #Cryptocurency portfolio. This ruling reinstates part of the lawsuit that had been previously dismissed and allows Terpin to continue his claims based on federal laws protecting telecommunications data. Fraud and Negligence by AT&T The court ruled that Terpin presented enough evidence to show that AT&T's failure to protect his account resulted in hackers gaining access to his phone number through a fraudulent SIM swap. They then used this number to access his personal data and change his passwords, ultimately stealing $24 million worth of cryptocurrency. The 2018 SIM Swap Hack The hack occurred in January 2018, when a group of #hackers , led by 15-year-old Ellis Pinsky, allegedly paid AT&T employees to transfer Terpin’s phone number to a SIM card under their control. Despite new security measures implemented after a previous breach, the hackers found a way to bypass the protection. Once they gained access to his phone number, they changed his passwords and stole the cryptocurrency. Legal Battles with Hackers Pinsky returned his portion of the stolen funds, but another hacker, Nicholas Truglia, was ordered by a Los Angeles court to pay Terpin $75.8 million in damages. This case highlighted the vulnerability of cryptocurrency accounts during SIM swap attacks. AT&T and Hacking Incidents Around the same time, AT&T faced another issue with hackers allegedly stealing customer information, such as call logs and text messages. AT&T reportedly paid $400,000 in bitcoin to hackers to remove the stolen data, although the company officially neither confirmed nor denied the payment. What’s Next? The reinstatement of Terpin’s claim allows the lawsuit to proceed, with Terpin seeking $24 million in damages, plus interest and legal fees. His legal team believes this verdict may pave the way for other consumers to sue telecommunications companies for insufficient protection during SIM swaps. AT&T has apologized to Terpin but noted that most of the allegations against the company were dismissed, and they remain confident in defending the remaining claims. This case has attracted attention from blockchain experts, as the number of #HackingIncidents related to cryptocurrency continues to rise. Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Appeals Court Revives AT&T Lawsuit for $24 Million Cryptocurrency Theft

A U.S. appeals court has revived investor Michael Terpin’s lawsuit against telecommunications company #AT&T concerning the theft of $24 million in cryptocurrency following a SIM swap hack. This decision allows Terpin to continue his legal claims under the Federal Communications Act (#FCA ).
Key Claims Reconsidered
A Ninth Circuit Court of Appeals panel reinstated a key claim in the case, in which Terpin alleges that AT&T allowed hackers to take over his phone account, leading to the loss of his #Cryptocurency portfolio. This ruling reinstates part of the lawsuit that had been previously dismissed and allows Terpin to continue his claims based on federal laws protecting telecommunications data.
Fraud and Negligence by AT&T
The court ruled that Terpin presented enough evidence to show that AT&T's failure to protect his account resulted in hackers gaining access to his phone number through a fraudulent SIM swap. They then used this number to access his personal data and change his passwords, ultimately stealing $24 million worth of cryptocurrency.
The 2018 SIM Swap Hack
The hack occurred in January 2018, when a group of #hackers , led by 15-year-old Ellis Pinsky, allegedly paid AT&T employees to transfer Terpin’s phone number to a SIM card under their control. Despite new security measures implemented after a previous breach, the hackers found a way to bypass the protection. Once they gained access to his phone number, they changed his passwords and stole the cryptocurrency.
Legal Battles with Hackers
Pinsky returned his portion of the stolen funds, but another hacker, Nicholas Truglia, was ordered by a Los Angeles court to pay Terpin $75.8 million in damages. This case highlighted the vulnerability of cryptocurrency accounts during SIM swap attacks.
AT&T and Hacking Incidents
Around the same time, AT&T faced another issue with hackers allegedly stealing customer information, such as call logs and text messages. AT&T reportedly paid $400,000 in bitcoin to hackers to remove the stolen data, although the company officially neither confirmed nor denied the payment.
What’s Next?
The reinstatement of Terpin’s claim allows the lawsuit to proceed, with Terpin seeking $24 million in damages, plus interest and legal fees. His legal team believes this verdict may pave the way for other consumers to sue telecommunications companies for insufficient protection during SIM swaps.
AT&T has apologized to Terpin but noted that most of the allegations against the company were dismissed, and they remain confident in defending the remaining claims. This case has attracted attention from blockchain experts, as the number of #HackingIncidents related to cryptocurrency continues to rise.

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
šŸ‘‰šŸ‘‰šŸ‘‰ #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam. Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility. ā€œDue to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,ā€ explained a MailerLite spokesperson today. ā€œAs a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.ā€ We extend our sincere apologies to MailerLite for our hasty misjudgment. We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails. While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains! Source - decrypt.co #CryptoNewsšŸ”’šŸ“°šŸš« #BinanceSquareTalks
šŸ‘‰šŸ‘‰šŸ‘‰ #PhishingScams Targeted Decrypt Newsletter Subscribers—Here’s the Latest

In the early hours of March 27, #hackers posing as Decrypt sent an email to our newsletter subscribers announcing a fabricated token airdrop. Upon discovering the phishing attempt, we promptly sent a follow-up email to alert our readers of the scam.

Regrettably, in our urgency to caution our subscribers and due to a previous phishing incident in January, we mistakenly attributed fault to our email service provider, MailerLite, for this attack. However, it has since been clarified that the hackers obtained our password key from Decrypt's end—MailerLite bears no responsibility.

ā€œDue to security measures, MailerLite does not retain API key information, making it inaccessible in MailerLite’s admin panel or the account in general,ā€ explained a MailerLite spokesperson today. ā€œAs a result, despite Decrypt Media's account being affected during the data breach on January 23, 2024, perpetrators were unable to access API keys that could facilitate the sending of phishing campaigns on March 27, 2024.ā€

We extend our sincere apologies to MailerLite for our hasty misjudgment.

We'll cooperate with law enforcement as we investigate. MailerLite reported that the phishing campaigns originated from IP address "69.4.234.86" and used user agent "python-requests/2.31.0" via their API. The intruders removed addresses ending in decrypt.co or decryptmedia.com from our list to evade detection before sending the fraudulent emails.

While most readers remain vigilant against phishing attempts, one individual tried to connect their wallet to a bogus address. Even one instance is concerning. #CryptoScams are rampant and sophisticated. Decrypt, like other crypto entities, has been impersonated. Hackers create fake websites, Discord servers, and social media accounts impersonating our team. Note that we only operate under decrypt.co and decryptmedia.com domains—be cautious of other domains!

Source - decrypt.co

#CryptoNewsšŸ”’šŸ“°šŸš« #BinanceSquareTalks
--
Bullish
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code. #northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
SlowMist has reported that the North Korean hacker group Lazarus is targeting individuals on LinkedIn, posing as developers and distributing malware via repository code.

#northkorea #Lazarus #hackers #LinkedIn $BTC $ETH
Nigeria: EFCC Arrests 792 Suspects in Cryptocurrency Fraud SchemeCommission Uncovers Massive Cryptocurrency Scam Nigeria’s Economic and Financial Crimes Commission (EFCC) conducted a raid resulting in the arrest of 792 suspects involved in schemes known as crypto romance scams. The fraudsters convinced victims to invest in fake cryptocurrency projects, leading to significant financial losses. Links to International Groups EFCC spokesperson Wilson Uwujaren revealed that among those arrested were 148 Chinese nationals and 40 Filipino citizens. The scammers operated from a luxury building in Lagos, Nigeria’s commercial hub. Most of the victims were citizens of the United States and Europe. During the raid, agents seized computers, mobile phones, and vehicles. Uwujaren stated that Nigerian fraudsters were recruited by international groups to target victims online using phishing techniques. Once the victims’ trust was gained, their information was handed over to foreign counterparts, who carried out the fraud. Collaboration with International Partners The EFCC announced it is working with international partners to identify potential links to organized crime. This collaboration aims to strengthen actions against similar fraudulent activities. Another Case: Nigerian Scammer Defrauds Australians of $5 Million The arrests follow a separate case involving Osang Otukpa, who allegedly defrauded 139 Australians of $5.04 million (8 million AUD) through a fraudulent cryptocurrency platform called Liquid Asset Group. Otukpa reportedly used five different aliases and lured victims through social media. EFCC agents apprehended Otukpa on December 6, shortly after he landed at Murtala Mohammed International Airport in Lagos. According to reports, he will be charged once the investigation is complete. Conclusion The EFCC continues to intensify its efforts to combat cryptocurrency fraud, working closely with global partners to curb these illegal activities. The crackdown on 792 suspects and cases like Otukpa’s highlight Nigeria’s strengthened fight against financial crimes. #hackers , #Cryptoscam , #cryptofraud , #CryptoSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ

Nigeria: EFCC Arrests 792 Suspects in Cryptocurrency Fraud Scheme

Commission Uncovers Massive Cryptocurrency Scam
Nigeria’s Economic and Financial Crimes Commission (EFCC) conducted a raid resulting in the arrest of 792 suspects involved in schemes known as crypto romance scams. The fraudsters convinced victims to invest in fake cryptocurrency projects, leading to significant financial losses.
Links to International Groups
EFCC spokesperson Wilson Uwujaren revealed that among those arrested were 148 Chinese nationals and 40 Filipino citizens. The scammers operated from a luxury building in Lagos, Nigeria’s commercial hub. Most of the victims were citizens of the United States and Europe.
During the raid, agents seized computers, mobile phones, and vehicles. Uwujaren stated that Nigerian fraudsters were recruited by international groups to target victims online using phishing techniques. Once the victims’ trust was gained, their information was handed over to foreign counterparts, who carried out the fraud.
Collaboration with International Partners
The EFCC announced it is working with international partners to identify potential links to organized crime. This collaboration aims to strengthen actions against similar fraudulent activities.
Another Case: Nigerian Scammer Defrauds Australians of $5 Million
The arrests follow a separate case involving Osang Otukpa, who allegedly defrauded 139 Australians of $5.04 million (8 million AUD) through a fraudulent cryptocurrency platform called Liquid Asset Group.
Otukpa reportedly used five different aliases and lured victims through social media. EFCC agents apprehended Otukpa on December 6, shortly after he landed at Murtala Mohammed International Airport in Lagos. According to reports, he will be charged once the investigation is complete.
Conclusion
The EFCC continues to intensify its efforts to combat cryptocurrency fraud, working closely with global partners to curb these illegal activities. The crackdown on 792 suspects and cases like Otukpa’s highlight Nigeria’s strengthened fight against financial crimes.

#hackers , #Cryptoscam , #cryptofraud , #CryptoSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.ā€œ
--
Bullish
šŸ”“ Hackers Steal $1.5bn from Crypto Exchange in ā€˜Biggest Digital Heist Ever’ šŸ’øšŸ’» The crypto world has been rocked by a massive security breach! 😱 Hackers have stolen a staggering $1.5 billion from a major cryptocurrency exchange, making it the largest digital heist in history. šŸ“ā€ā˜ ļøšŸ’° 🚨 What Happened? Cybercriminals managed to bypass security protocols and siphon off funds from the exchange’s wallets. šŸ”āž”ļøšŸ’ø Here’s what we know: āš ļø Unprecedented breach – A sophisticated attack exploited vulnerabilities in the exchange’s system. šŸ›‘šŸ”“ šŸ’° $1.5 billion lost – One of the biggest crypto thefts ever recorded. šŸ“‰šŸ”„ 🌐 Impact on the crypto market – Prices of major cryptocurrencies fluctuated as news broke. šŸ“ŠšŸ“‰ šŸ•µļø How Did the Hackers Do It? Security experts believe the attack was executed through: šŸ” Phishing & social engineering – Tricking employees into revealing credentials. šŸŽ­šŸ”‘ šŸ› ļø Exploiting smart contract flaws – Manipulating weaknesses in blockchain protocols. šŸ—ļøāš ļø šŸŒ Global cyber network – A well-organized hacker group likely behind the attack. šŸ’»šŸŒ šŸ¦ How to Protect Your Crypto? With cybercrime on the rise, here’s how you can keep your crypto assets safe: šŸ›”ļøšŸ”’ 1ļøāƒ£ Use Cold Wallets – Store your crypto offline to prevent online breaches. šŸ¦ā„ļø 2ļøāƒ£ Enable 2FA – Add an extra layer of security to your accounts. šŸ”‘šŸ” 3ļøāƒ£ Be Wary of Phishing – Avoid suspicious emails and messages. šŸš«šŸ“§ 4ļøāƒ£ Use Reputable Exchanges – Stick to platforms with strong security measures. šŸ›ļøāœ… 5ļøāƒ£ Stay Informed – Follow cybersecurity updates to spot potential threats. šŸ“¢šŸ“° šŸ What’s Next? Authorities and cybersecurity firms are working around the clock to track down the hackers and recover stolen funds. ā³āš–ļø Will they succeed? Only time will tell. šŸ•°ļøšŸ‘€ #Crypto #Hackers #CyberSecurity #Bitcoin #CryptoExchange $SOL $BNB $XRP
šŸ”“ Hackers Steal $1.5bn from Crypto Exchange in ā€˜Biggest Digital Heist Ever’ šŸ’øšŸ’»

The crypto world has been rocked by a massive security breach! 😱 Hackers have stolen a staggering $1.5 billion from a major cryptocurrency exchange, making it the largest digital heist in history. šŸ“ā€ā˜ ļøšŸ’°

🚨 What Happened?

Cybercriminals managed to bypass security protocols and siphon off funds from the exchange’s wallets. šŸ”āž”ļøšŸ’ø Here’s what we know:

āš ļø Unprecedented breach – A sophisticated attack exploited vulnerabilities in the exchange’s system. šŸ›‘šŸ”“
šŸ’° $1.5 billion lost – One of the biggest crypto thefts ever recorded. šŸ“‰šŸ”„
🌐 Impact on the crypto market – Prices of major cryptocurrencies fluctuated as news broke. šŸ“ŠšŸ“‰

šŸ•µļø How Did the Hackers Do It?

Security experts believe the attack was executed through:

šŸ” Phishing & social engineering – Tricking employees into revealing credentials. šŸŽ­šŸ”‘
šŸ› ļø Exploiting smart contract flaws – Manipulating weaknesses in blockchain protocols. šŸ—ļøāš ļø
šŸŒ Global cyber network – A well-organized hacker group likely behind the attack. šŸ’»šŸŒ

šŸ¦ How to Protect Your Crypto?

With cybercrime on the rise, here’s how you can keep your crypto assets safe: šŸ›”ļøšŸ”’

1ļøāƒ£ Use Cold Wallets – Store your crypto offline to prevent online breaches. šŸ¦ā„ļø
2ļøāƒ£ Enable 2FA – Add an extra layer of security to your accounts. šŸ”‘šŸ”
3ļøāƒ£ Be Wary of Phishing – Avoid suspicious emails and messages. šŸš«šŸ“§
4ļøāƒ£ Use Reputable Exchanges – Stick to platforms with strong security measures. šŸ›ļøāœ…
5ļøāƒ£ Stay Informed – Follow cybersecurity updates to spot potential threats. šŸ“¢šŸ“°

šŸ What’s Next?

Authorities and cybersecurity firms are working around the clock to track down the hackers and recover stolen funds. ā³āš–ļø Will they succeed? Only time will tell. šŸ•°ļøšŸ‘€

#Crypto #Hackers #CyberSecurity #Bitcoin #CryptoExchange

$SOL $BNB $XRP
More about OpenBounty on Shentu Chain! OpenBounty is a decentralized platform that connects white hat hackers and Web3 projects to enhance the security of the decentralized ecosystem. Here's a more detailed breakdown of how it works: 1. Project Registration: Web3 projects register on the OpenBounty platform, providing details about their project and the bounties they offer for identifying and reporting vulnerabilities. 2. Bounty Creation: Projects create bounties for specific vulnerabilities or issues they want to address. The bounty amount is set by the project and can vary depending on the severity of the vulnerability. 3. White Hat Participation: White hat hackers and security researchers review the available bounties and choose the ones they want to work on. They then analyze the project's code and systems to identify potential vulnerabilities. 4. Vulnerability Reporting: Once a white hat hacker identifies a vulnerability, they submit a detailed report to the OpenBounty platform. The report includes a description of the vulnerability, its potential impact, and steps to reproduce the issue. 5. Verification and Resolution: The project team reviews the vulnerability report and verifies its validity. If the vulnerability is confirmed, the project works on fixing the issue. The white hat hacker receives the bounty reward once the vulnerability is resolved. 6. Reputation System: OpenBounty maintains a reputation system for both projects and white hat hackers. Projects with a good reputation are more likely to attract skilled white hat hackers, while white hat hackers with a strong reputation are more likely to be trusted by projects. By utilizing the Shentu Chain, OpenBounty ensures a transparent and tamper-proof environment for bug bounty programs. This fosters collaboration between Web3 protocols and skilled white hat hackers, ultimately enhancing the security of the decentralized ecosystem. #shentu #ShentuChain #openbounty #hackers #write2earn $CTK
More about OpenBounty on Shentu Chain!

OpenBounty is a decentralized platform that connects white hat hackers and Web3 projects to enhance the security of the decentralized ecosystem. Here's a more detailed breakdown of how it works:

1. Project Registration: Web3 projects register on the OpenBounty platform, providing details about their project and the bounties they offer for identifying and reporting vulnerabilities.

2. Bounty Creation: Projects create bounties for specific vulnerabilities or issues they want to address. The bounty amount is set by the project and can vary depending on the severity of the vulnerability.

3. White Hat Participation: White hat hackers and security researchers review the available bounties and choose the ones they want to work on. They then analyze the project's code and systems to identify potential vulnerabilities.

4. Vulnerability Reporting: Once a white hat hacker identifies a vulnerability, they submit a detailed report to the OpenBounty platform. The report includes a description of the vulnerability, its potential impact, and steps to reproduce the issue.

5. Verification and Resolution: The project team reviews the vulnerability report and verifies its validity. If the vulnerability is confirmed, the project works on fixing the issue. The white hat hacker receives the bounty reward once the vulnerability is resolved.

6. Reputation System: OpenBounty maintains a reputation system for both projects and white hat hackers. Projects with a good reputation are more likely to attract skilled white hat hackers, while white hat hackers with a strong reputation are more likely to be trusted by projects.

By utilizing the Shentu Chain, OpenBounty ensures a transparent and tamper-proof environment for bug bounty programs. This fosters collaboration between Web3 protocols and skilled white hat hackers, ultimately enhancing the security of the decentralized ecosystem.

#shentu #ShentuChain #openbounty #hackers #write2earn

$CTK
🚨 Deepfake Alert! šŸ”“ Manta Network's Kenny Li suspects the notorious Lazarus Group tried to target him in a sophisticated deepfake Zoom attack šŸ•µļøā€ā™‚ļø. #Hackers used a fake video to gain trust, then pushed a malicious script download before disappearing šŸ’»šŸ˜±. This incident highlights the growing threat of #deepfakes and social engineering in cybersecurity šŸ¤–šŸ’ø. Prioritize your online security: ✨ Verify identities before sharing sensitive info ✨ Be cautious of unexpected video calls or requests ✨ Keep software and systems up-to-date
🚨 Deepfake Alert!

šŸ”“ Manta Network's Kenny Li suspects the notorious Lazarus Group tried to target him in a sophisticated deepfake Zoom attack šŸ•µļøā€ā™‚ļø.

#Hackers used a fake video to gain trust, then pushed a malicious script download before disappearing šŸ’»šŸ˜±.

This incident highlights the growing threat of #deepfakes and social engineering in cybersecurity šŸ¤–šŸ’ø. Prioritize your online security:

✨ Verify identities before sharing sensitive info
✨ Be cautious of unexpected video calls or requests
✨ Keep software and systems up-to-date
#hackers stole 4,064 $BTC ($238 million) from a crypto investor! šŸ™€ šŸ•µļøā€ā™‚ļøThis information was shared by the well-known blockchain researcher ZachXBT on his profile on X. The perpetrators laundered the money through ThorChain, eXch, Kucoin, ChangeNow, Railgun, and Avalanche Bridge. Previously, transfers to the victim's wallet were made from a Genesis Trading address. 🧐 #HackerAlert #Web3 #BinanceSquareFamily #bitcoin {spot}(BTCUSDT)
#hackers stole 4,064 $BTC ($238 million) from a crypto investor! šŸ™€

šŸ•µļøā€ā™‚ļøThis information was shared by the well-known blockchain researcher ZachXBT on his profile on X.

The perpetrators laundered the money through ThorChain, eXch, Kucoin, ChangeNow, Railgun, and Avalanche Bridge.

Previously, transfers to the victim's wallet were made from a Genesis Trading address. 🧐

#HackerAlert #Web3 #BinanceSquareFamily #bitcoin
See original
How did a well-known centralized exchange get hacked?On February 21st, one of the largest hacks to a centralized #exchange occurred, where #hackers nearly $1.4 billion dollars in ETH were stolen from one of the platform's wallets, but how did this happen and what are the hackers doing with this money? Let's explore. On Friday, February 21, #blockchain researcher "Zach XBT" reported on his main networks that there were some very suspicious money outflows from the By...bit Exchange. Image 1

How did a well-known centralized exchange get hacked?

On February 21st, one of the largest hacks to a centralized #exchange occurred, where #hackers nearly $1.4 billion dollars in ETH were stolen from one of the platform's wallets, but how did this happen and what are the hackers doing with this money? Let's explore.

On Friday, February 21, #blockchain researcher "Zach XBT" reported on his main networks that there were some very suspicious money outflows from the By...bit Exchange.

Image 1
--
Bearish
Ripple CEO Claims No Wallets Compromised in Recent CyberattackšŸ’ Earlier today, Ripple experienced a significant cyberattack resulting in the loss of 112.5 million dollars' worth of XRP coins. Following the incident, the news caused a 4% decrease in the price of XRP tokens. ZachXBT stated that the initial attack was linked to an address labeled "rJNLz3…ojm". Following the Ripple attack, the perpetrators initiated a sophisticated laundering process, transferring the stolen XRP to various exchanges, including MEXC and Binance, the world's largest exchange by volume. These distribution methods are designed to conceal the cryptocurrency's origin, making tracking and recovery more challenging. Cautionary Notice Released😳 It is clear that hackers are continually developing new tactics for their illicit operations. Recently, a deepfake video depicting Ripple's CEO sent shockwaves throughout the cryptocurrency market. Hackers utilized a fabricated video, which did not feature Garlinghouse but was created to deceive viewers, in order to trick people into sending funds to their addresses under the false pretense that their XRP holdings would be doubled. Deceptive schemes are advancing regularly, and it would be prudent for investors and traders to exercise vigilance in light of these developments.$BTC $XRP $SOL #xrp #BTC #hackers #scams #TradeNTell
Ripple CEO Claims No Wallets Compromised in Recent CyberattackšŸ’

Earlier today, Ripple experienced a significant cyberattack resulting in the loss of 112.5 million dollars' worth of XRP coins. Following the incident, the news caused a 4% decrease in the price of XRP tokens.

ZachXBT stated that the initial attack was linked to an address labeled "rJNLz3…ojm". Following the Ripple attack, the perpetrators initiated a sophisticated laundering process, transferring the stolen XRP to various exchanges, including MEXC and Binance, the world's largest exchange by volume. These distribution methods are designed to conceal the cryptocurrency's origin, making tracking and recovery more challenging.

Cautionary Notice Released😳

It is clear that hackers are continually developing new tactics for their illicit operations. Recently, a deepfake video depicting Ripple's CEO sent shockwaves throughout the cryptocurrency market.

Hackers utilized a fabricated video, which did not feature Garlinghouse but was created to deceive viewers, in order to trick people into sending funds to their addresses under the false pretense that their XRP holdings would be doubled.

Deceptive schemes are advancing regularly, and it would be prudent for investors and traders to exercise vigilance in light of these developments.$BTC $XRP $SOL #xrp #BTC #hackers #scams #TradeNTell
šŸ‘Øā€šŸ¦± White hat hacker intercepted $2.6 million from Morpho Labs 🚨 The well-known ethical hacker c0ffeebabe.eth has blocked the withdrawal of approximately $2.6 million worth of crypto assets stolen from the Morpho Labs decentralized finance (DeFi) protocol. Meanwhile, the Morpho Labs team has confirmed that using its application remains safe for clients. #hackers #Hacked
šŸ‘Øā€šŸ¦± White hat hacker intercepted $2.6 million from Morpho Labs

🚨 The well-known ethical hacker c0ffeebabe.eth has blocked the withdrawal of approximately $2.6 million worth of crypto assets stolen from the Morpho Labs decentralized finance (DeFi) protocol.

Meanwhile, the Morpho Labs team has confirmed that using its application remains safe for clients.

#hackers #Hacked
Login to explore more contents
Explore the latest crypto news
āš”ļø Be a part of the latests discussions in crypto
šŸ’¬ Interact with your favorite creators
šŸ‘ Enjoy content that interests you
Email / Phone number