Binance Square

CyberSecurity

740,578 views
415 Discussing
K-Syeda
--
BREAKING: MegaETH Secures X Account After HACK! 🚨💻*MegaETH is back in control! 🚀 After a security breach on June 1, the company swiftly regained access to its X account. A delegated account was compromised, but MegaETH acted fast to remove it and revoke authorization. The good news? Administrative privileges were never compromised! 🔒💸 *Stay Safe, Stay Secure!* 💡 #MegaETH #BlockchainNews #CyberSecurity #TradingTypes101 $ETH $BNB $PEPE {spot}(ETHUSDT)

BREAKING: MegaETH Secures X Account After HACK! 🚨💻*

MegaETH is back in control! 🚀 After a security breach on June 1, the company swiftly regained access to its X account. A delegated account was compromised, but MegaETH acted fast to remove it and revoke authorization. The good news? Administrative privileges were never compromised! 🔒💸

*Stay Safe, Stay Secure!* 💡

#MegaETH #BlockchainNews #CyberSecurity #TradingTypes101 $ETH $BNB $PEPE
Хакери злили дані співзасновника Solana після відмови сплатити викуп у 40 BTC27 травня 2025 року хакери оприлюднили особисті дані співзасновника Solana Раджа Гокала, включно з його посвідченням особи та номером телефону, на зламаній Instagram-сторінці гурту Migos із 13 млн підписників. У повідомленні хакери зазначили, що Гокал відмовився сплатити викуп у 40 $BTC (приблизно $4,36 млн). Зловмисники також опублікували фото, ймовірно, дружини Гокала з документами та закликали учасників Telegram-чату атакувати його. Інцидент, імовірно, пов’язаний із невдалим шантажем, про що повідомляє The Block. Ця подія підкреслює зростаючу загрозу кіберзлочинності у криптоіндустрії. Solana Labs поки не прокоментувала ситуацію, але такі атаки стають дедалі частішими. Експерти наголошують на необхідності посилення заходів безпеки для ключових осіб у блокчейн-проєктах. У 2024 році хакери вже атакували екосистему Solana, зокрема через шкідливі npm-пакети, що призвело до крадіжки активів. $SOL Цей інцидент є попередженням для всієї криптоіндустрії. Слідкуйте за новинами, щоб бути в курсі! Підписуйтесь на #MiningUpdates для актуальних новин про криптовалюти! #solana #cryptohacks #CyberSecurity #Bitcoin #Blockchain #CryptoNews #DataBreach

Хакери злили дані співзасновника Solana після відмови сплатити викуп у 40 BTC

27 травня 2025 року хакери оприлюднили особисті дані співзасновника Solana Раджа Гокала, включно з його посвідченням особи та номером телефону, на зламаній Instagram-сторінці гурту Migos із 13 млн підписників. У повідомленні хакери зазначили, що Гокал відмовився сплатити викуп у 40 $BTC (приблизно $4,36 млн). Зловмисники також опублікували фото, ймовірно, дружини Гокала з документами та закликали учасників Telegram-чату атакувати його. Інцидент, імовірно, пов’язаний із невдалим шантажем, про що повідомляє The Block.
Ця подія підкреслює зростаючу загрозу кіберзлочинності у криптоіндустрії. Solana Labs поки не прокоментувала ситуацію, але такі атаки стають дедалі частішими. Експерти наголошують на необхідності посилення заходів безпеки для ключових осіб у блокчейн-проєктах. У 2024 році хакери вже атакували екосистему Solana, зокрема через шкідливі npm-пакети, що призвело до крадіжки активів.
$SOL
Цей інцидент є попередженням для всієї криптоіндустрії. Слідкуйте за новинами, щоб бути в курсі!
Підписуйтесь на #MiningUpdates для актуальних новин про криптовалюти!
#solana #cryptohacks #CyberSecurity #Bitcoin #Blockchain #CryptoNews #DataBreach
🚨 New Linux malware is targeting unsecured Docker servers to mine $DERO, according to @CoinDesk. 🧨 Attack highlights: Exploits exposed Docker API on port 2375 Deploys 2 Golang-based implants: fake nginx + cloud miner Infected nodes self-propagate across the internet — no C2 needed 🌐 Over 520 public Docker APIs were exposed as of early May. 🔁 Wallets & nodes match past Kubernetes attacks — likely same actors. 💡 Another wake-up call for #Web3 infrastructure: Decentralized ≠ Immune to threats. #CyberSecurity #Docker
🚨 New Linux malware is targeting unsecured Docker servers to mine $DERO, according to @CoinDesk.

🧨 Attack highlights:

Exploits exposed Docker API on port 2375

Deploys 2 Golang-based implants: fake nginx + cloud miner

Infected nodes self-propagate across the internet — no C2 needed

🌐 Over 520 public Docker APIs were exposed as of early May.
🔁 Wallets & nodes match past Kubernetes attacks — likely same actors.

💡 Another wake-up call for #Web3 infrastructure:
Decentralized ≠ Immune to threats.

#CyberSecurity #Docker
🔐🤖 Okta CEO Issues 🔥AI SECURITY ALERT🔥 – “Treat AI Agents Like Coworkers!” 🚨 👨‍💼 Todd McKinnon, CEO of identity titan Okta, just sounded the alarm on the next BIG cybersecurity threat: AI Agents in Live Systems ⚠️ These bots aren’t playing in test mode anymore... They’re inside your real tools, seeing your real data, and making real decisions 😨💼📊 💬 “AI agents are coworkers now — if they have access, they MUST be verified, tracked, and trusted.” — Todd McKinnon 🧠🔍 🚨 WHAT’S AT STAKE? 💣 AI can now act alone 🤖 💼 Access sensitive biz systems 🕵️ Leak customer data 🧯 Misuse internal files 🎭 Be spoofed by hackers if not locked down --- 🛡️ SOLUTION = IDENTITY-FIRST SECURITY 🔐 ✅ Know WHO is accessing WHAT 👁️ Monitor both humans + AI agents 🔒 Block access unless fully verified 📡 Continuous tracking = safety 🧬 Okta lets companies create a digital identity shield for both humans AND AI bots 🔥 📉 Earnings Up 📈 – But Guidance Stays Cautious 💵 Okta beat on earnings 📉 Stock dropped 11% post-hours 🧠 McKinnon: “We won’t chase hype. We’re building STRONG, not fast.” 🌪️ Global market = too unpredictable for aggressive forecasts ☢️ AI = The New Nuclear Risk? Max Tegmark warns: “Highly advanced AI could be a 90% existential threat” 🧠💥 Like Oppenheimer’s first test – except this time it’s algorithms, not atoms ⚛️📉 💡 WHY THIS MATTERS FOR CRYPTO USERS: 🧠 AI bots now touch DeFi wallets, smart contracts, customer support tools 💣 If not secured, they could trigger access breaches, trade manipulation, or fund loss 🚨 Every AI agent = a potential point of failure — or a breach in disguise #AIThreat #CyberSecurity #CryptoSafety #IdentityFirst #OktaNews
🔐🤖 Okta CEO Issues 🔥AI SECURITY ALERT🔥 – “Treat AI Agents Like Coworkers!” 🚨

👨‍💼 Todd McKinnon, CEO of identity titan Okta, just sounded the alarm on the next BIG cybersecurity threat: AI Agents in Live Systems ⚠️

These bots aren’t playing in test mode anymore...
They’re inside your real tools, seeing your real data, and making real decisions 😨💼📊

💬 “AI agents are coworkers now — if they have access, they MUST be verified, tracked, and trusted.”
— Todd McKinnon 🧠🔍

🚨 WHAT’S AT STAKE?
💣 AI can now act alone 🤖
💼 Access sensitive biz systems
🕵️ Leak customer data
🧯 Misuse internal files
🎭 Be spoofed by hackers if not locked down

---

🛡️ SOLUTION = IDENTITY-FIRST SECURITY 🔐
✅ Know WHO is accessing WHAT
👁️ Monitor both humans + AI agents
🔒 Block access unless fully verified
📡 Continuous tracking = safety

🧬 Okta lets companies create a digital identity shield for both humans AND AI bots 🔥

📉 Earnings Up 📈 – But Guidance Stays Cautious
💵 Okta beat on earnings
📉 Stock dropped 11% post-hours
🧠 McKinnon: “We won’t chase hype. We’re building STRONG, not fast.”
🌪️ Global market = too unpredictable for aggressive forecasts

☢️ AI = The New Nuclear Risk?
Max Tegmark warns: “Highly advanced AI could be a 90% existential threat” 🧠💥
Like Oppenheimer’s first test – except this time it’s algorithms, not atoms ⚛️📉

💡 WHY THIS MATTERS FOR CRYPTO USERS:
🧠 AI bots now touch DeFi wallets, smart contracts, customer support tools
💣 If not secured, they could trigger access breaches, trade manipulation, or fund loss
🚨 Every AI agent = a potential point of failure — or a breach in disguise

#AIThreat
#CyberSecurity
#CryptoSafety
#IdentityFirst
#OktaNews
Solana Co-Founder’s Personal Data Leaked in Instagram Hack Amid Alleged Extortion AttemptCrypto hacks surge over 130% in Q1 2025 Raj Gokal, co-founder of the Solana blockchain, has become the target of a serious cyberattack. Hackers published his personal identification documents on the compromised Instagram account of rapper Migos. The leak appears to be tied to an unsuccessful extortion attempt — reportedly demanding over $4.3 million. 🔐 Extortion Message: “You Should Have Paid the 40 BTC” Circulating online are photos of Gokal and his wife, alongside their IDs and passports — resembling typical KYC (Know Your Customer) data used on regulated crypto platforms. The sensitive documents were shared on the official Instagram page of rapper Migos, which was apparently hacked as well. A caption under one of the posts read: “You should have paid the 40 BTC” — a statement that led many to speculate the leak followed a failed ransom attempt. At current Bitcoin prices, that would equate to a ransom demand of over $4.3 million. Instagram has since removed the post. 🧠 Social Engineering Suspected Renowned Web3 investigator ZachXBT believes the attack was a result of social engineering — where cybercriminals tricked their way into accessing Gokal’s personal accounts and data. “Raj’s accounts were likely compromised and used in an extortion attempt. Since he didn’t pay, the attackers trolled him by leaking the data through Migos’ Instagram,” said ZachXBT. Interestingly, a week before the incident, Gokal had already warned his followers on X that someone was trying to access his email and social media accounts. 📈 Crypto Hacks in 2025: A Dangerous Spike This attack is just one in a wave of escalating crypto hacks in 2025. 🔹 Q1 2025: According to security firm PeckShield, there were over 60 major hacking incidents, resulting in $1.63 billion in losses — a 131% increase from $706 million in Q1 2024. 🔹 The largest breach targeted Bybit, while Q2 saw the Cetus Protocol on the Sui network lose over $223 million. 🔹 Following the Coinbase data breach confirmed on May 15, reported compensation claims could exceed $400 million — further highlighting that DeFi and centralized platforms remain prime targets. ⚠️ A Call for Caution With the rising number of cyberattacks, the need for increased vigilance is critical — especially when dealing with unknown links or individuals posing as support staff from crypto exchanges. #solana , #CryptoHack , #HackerAlert , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Solana Co-Founder’s Personal Data Leaked in Instagram Hack Amid Alleged Extortion Attempt

Crypto hacks surge over 130% in Q1 2025
Raj Gokal, co-founder of the Solana blockchain, has become the target of a serious cyberattack. Hackers published his personal identification documents on the compromised Instagram account of rapper Migos. The leak appears to be tied to an unsuccessful extortion attempt — reportedly demanding over $4.3 million.

🔐 Extortion Message: “You Should Have Paid the 40 BTC”
Circulating online are photos of Gokal and his wife, alongside their IDs and passports — resembling typical KYC (Know Your Customer) data used on regulated crypto platforms.
The sensitive documents were shared on the official Instagram page of rapper Migos, which was apparently hacked as well. A caption under one of the posts read: “You should have paid the 40 BTC” — a statement that led many to speculate the leak followed a failed ransom attempt.
At current Bitcoin prices, that would equate to a ransom demand of over $4.3 million. Instagram has since removed the post.

🧠 Social Engineering Suspected
Renowned Web3 investigator ZachXBT believes the attack was a result of social engineering — where cybercriminals tricked their way into accessing Gokal’s personal accounts and data.
“Raj’s accounts were likely compromised and used in an extortion attempt. Since he didn’t pay, the attackers trolled him by leaking the data through Migos’ Instagram,” said ZachXBT.

Interestingly, a week before the incident, Gokal had already warned his followers on X that someone was trying to access his email and social media accounts.

📈 Crypto Hacks in 2025: A Dangerous Spike
This attack is just one in a wave of escalating crypto hacks in 2025.
🔹 Q1 2025: According to security firm PeckShield, there were over 60 major hacking incidents, resulting in $1.63 billion in losses — a 131% increase from $706 million in Q1 2024.
🔹 The largest breach targeted Bybit, while Q2 saw the Cetus Protocol on the Sui network lose over $223 million.
🔹 Following the Coinbase data breach confirmed on May 15, reported compensation claims could exceed $400 million — further highlighting that DeFi and centralized platforms remain prime targets.

⚠️ A Call for Caution
With the rising number of cyberattacks, the need for increased vigilance is critical — especially when dealing with unknown links or individuals posing as support staff from crypto exchanges.

#solana , #CryptoHack , #HackerAlert , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Russian Citizen Arrested in South Korea for Attempted Crypto Heist Worth 1 Billion WonA Russian citizen was arrested in South Korea for assault and attempted robbery during a fake cryptocurrency transaction, which led to an attempted theft of cryptocurrencies worth approximately $728,000 (1 billion won). The incident involved three Russian nationals, who were involved in a scam that turned violent and involved an attempted heist in a hotel in Seoul. Fake Cryptocurrency Trading Led to Violence The incident occurred on May 21, 2025, at a hotel in the Gangseo district of western Seoul. Three Russian suspects lured 10 Korean men into a fake P2P cryptocurrency transaction, which was supposed to involve a large sum of money. Eight victims were told to wait in the hotel lobby, while two men were brought into a room where they were ambushed. The attackers, equipped with bulletproof vests and hiding in the bathroom, ambushed the two unsuspecting victims. They threatened the men with a gun replica and beat them with a telescopic baton and fists. The victims were bound with zip ties, and one of them sustained injuries before managing to escape. Robbers Fled, but Theft Attempt Failed The victim who escaped returned to the hotel lobby and alerted the others waiting downstairs. The attackers attempted to steal a bag containing 1 billion won prepared for the transaction, but after interference from the rest of the group, they were forced to flee the scene without the money. Police were called after an emergency report at 8:30 PM, and when they arrived at the scene, they found a safe, bulletproof vests, a gun replica, and a baton used in the attack in the suspects' hotel room. International Manhunt for Fugitives After the incident, two of the suspects, who were Russian nationals, fled the country. Just hours after the crime, one of them boarded a flight out of South Korea, while the other fled shortly after the incident. South Korea has requested Interpol's assistance in tracking them down. A police spokesperson from Gangseo stated, "We are currently questioning the detained suspect about the motive and details of the crime and are considering applying for an arrest warrant." The investigation continues, with police examining hotel security footage, digital communication records, and immigration data to determine whether the crime was pre-planned by an organized group or was a one-off theft attempt. Risks of P2P Cryptocurrency Transactions Although P2P cryptocurrency transactions are legal in many jurisdictions, they often lack adequate security, making them an ideal target for criminals. This incident highlights how illegal cryptocurrency transactions can easily escalate into violent crimes, endangering not only the victims but also the cryptocurrency marketplace itself. #CryptoCrime , #Cryptoscam , #CyberSecurity , #russia , #DigitalAssets Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Russian Citizen Arrested in South Korea for Attempted Crypto Heist Worth 1 Billion Won

A Russian citizen was arrested in South Korea for assault and attempted robbery during a fake cryptocurrency transaction, which led to an attempted theft of cryptocurrencies worth approximately $728,000 (1 billion won). The incident involved three Russian nationals, who were involved in a scam that turned violent and involved an attempted heist in a hotel in Seoul.

Fake Cryptocurrency Trading Led to Violence
The incident occurred on May 21, 2025, at a hotel in the Gangseo district of western Seoul. Three Russian suspects lured 10 Korean men into a fake P2P cryptocurrency transaction, which was supposed to involve a large sum of money. Eight victims were told to wait in the hotel lobby, while two men were brought into a room where they were ambushed.
The attackers, equipped with bulletproof vests and hiding in the bathroom, ambushed the two unsuspecting victims. They threatened the men with a gun replica and beat them with a telescopic baton and fists. The victims were bound with zip ties, and one of them sustained injuries before managing to escape.

Robbers Fled, but Theft Attempt Failed
The victim who escaped returned to the hotel lobby and alerted the others waiting downstairs. The attackers attempted to steal a bag containing 1 billion won prepared for the transaction, but after interference from the rest of the group, they were forced to flee the scene without the money. Police were called after an emergency report at 8:30 PM, and when they arrived at the scene, they found a safe, bulletproof vests, a gun replica, and a baton used in the attack in the suspects' hotel room.

International Manhunt for Fugitives
After the incident, two of the suspects, who were Russian nationals, fled the country. Just hours after the crime, one of them boarded a flight out of South Korea, while the other fled shortly after the incident. South Korea has requested Interpol's assistance in tracking them down. A police spokesperson from Gangseo stated, "We are currently questioning the detained suspect about the motive and details of the crime and are considering applying for an arrest warrant."
The investigation continues, with police examining hotel security footage, digital communication records, and immigration data to determine whether the crime was pre-planned by an organized group or was a one-off theft attempt.

Risks of P2P Cryptocurrency Transactions
Although P2P cryptocurrency transactions are legal in many jurisdictions, they often lack adequate security, making them an ideal target for criminals. This incident highlights how illegal cryptocurrency transactions can easily escalate into violent crimes, endangering not only the victims but also the cryptocurrency marketplace itself.

#CryptoCrime , #Cryptoscam , #CyberSecurity , #russia , #DigitalAssets

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
القبض على مواطن روسي في كوريا الجنوبية لمحاولة سرقة التشفير بقيمة مليار وونألقي القبض على مواطن روسي في كوريا الجنوبية بتهمة الاعتداء ومحاولة السرقة خلال معاملة عملة مشفرة مزيفة، مما أدى إلى محاولة سرقة العملات المشفرة بقيمة حوالي 728،000 دولار (1 مليار وون). شمل الحادث ثلاثة مواطنين روس، تورطوا في عملية احتيال تحولت إلى عنف وشملت محاولة سطو في فندق في سيول. أدى تداول العملات المشفرة المزيفة إلى العنف وقع الحادث في 21 مايو 2025، في فندق في منطقة جانجسيو في غرب سيول. جذب ثلاثة مشتبه بهم روس 10 رجال كوريين إلى معاملة عملة مشفرة مزيفة P2P، والتي كان من المفترض أن تنطوي على مبلغ كبير من المال. طلب من ثمانية ضحايا الانتظار في بهو الفندق، بينما تم إحضار رجلين إلى غرفة حيث تم نصب كمين لهما. قام المهاجمون، المزودون بسترات مضادة للرصاص والمختبئين في الحمام، بنص كمين للضحيتين المطمئنين. هددوا الرجال بنسخة طبق الأصل من البندقية وضربوهم بعصا وقبضات تلسكوبية. كان الضحايا مقيدين بأربطة بسحاب، وأصيب أحدهم بجروح قبل أن يتمكن من الفرار. هرب اللصوص، لكن محاولة السرقة فشلت عادت الضحية التي هربت إلى بهو الفندق ونبهت الآخرين الذين ينتظرون في الطابق السفلي. حاول المهاجمون سرقة حقيبة تحتوي على مليار وون تم إعدادها للمعاملة، ولكن بعد تدخل بقية المجموعة، أجبروا على الفرار من مكان الحادث دون المال. تم استدعاء الشرطة بعد تقرير الطوارئ في الساعة 8:30 مساء، وعندما وصلوا إلى مكان الحادث، وجدوا سترات آمنة مضادة للرصاص، ونسخة طبق الأصل من البندقية، وهراة استخدمت في الهجوم في غرفة فندق المشتبه بهم. مطاردة دولية للهاربين بعد الحادث، فر اثنان من المشتبه بهم، وهما مواطنان روس، من البلاد. بعد ساعات فقط من الجريمة، استقل أحدهم رحلة من كوريا الجنوبية، بينما فر الآخر بعد وقت قصير من الحادث. طلبت كوريا الجنوبية مساعدة الإنتربول في تعقبهم. صرح متحدث باسم الشرطة من جانغسيو: "نحن نستجوب حاليا المشتبه به المحتجز حول دافع الجريمة وتفاصيلها ونفكر في التقدم بطلب للحصول على أمر اعتقال". يستمر التحقيق، حيث تفحص الشرطة لقطات أمن الفندق وسجلات الاتصالات الرقمية وبيانات الهجرة لتحديد ما إذا كانت الجريمة مخططة مسبقا من قبل مجموعة منظمة أو كانت محاولة سرقة لمرة واحدة. مخاطر معاملات العملات المشفرة P2P على الرغم من أن معاملات العملات المشفرة P2P قانونية في العديد من الولايات القضائية، إلا أنها غالبا ما تفتقر إلى الأمان الكافي، مما يجعلها هدفا مثاليا للمجرمين. يسلط هذا الحادث الضوء على كيف يمكن لمعاملات العملات المشفرة غير القانونية أن تتصاعد بسهولة إلى جرائم عنيفة، مما يعرض ليس فقط الضحايا للخطر ولكن أيضا سوق العملات المشفرة نفسه. #CryptoCrime ، #Cryptoscam ، #CyberSecurity ، #russia ، #DigitalAssets ابق متقدما بخطوة واحدة - اتبع ملفنا الشخصي وابق على اطلاع بكل شيء مهم في عالم العملات المشفرة! إشعار: المعلومات والآراء المقدمة في هذه المقالة مخصصة فقط لأغراض تعليمية ولا ينبغي اعتبارها نصيحة استثمارية في أي موقف. لا ينبغي اعتبار محتوى هذه الصفحات ماليا أو استثماريا أو أي شكل آخر من أشكال المشورة. نحذر من أن الاستثمار في العملات المشفرة يمكن أن يكون محفوفا بالمخاطر وقد يؤدي إلى خسائر مالية."

القبض على مواطن روسي في كوريا الجنوبية لمحاولة سرقة التشفير بقيمة مليار وون

ألقي القبض على مواطن روسي في كوريا الجنوبية بتهمة الاعتداء ومحاولة السرقة خلال معاملة عملة مشفرة مزيفة، مما أدى إلى محاولة سرقة العملات المشفرة بقيمة حوالي 728،000 دولار (1 مليار وون). شمل الحادث ثلاثة مواطنين روس، تورطوا في عملية احتيال تحولت إلى عنف وشملت محاولة سطو في فندق في سيول.

أدى تداول العملات المشفرة المزيفة إلى العنف

وقع الحادث في 21 مايو 2025، في فندق في منطقة جانجسيو في غرب سيول. جذب ثلاثة مشتبه بهم روس 10 رجال كوريين إلى معاملة عملة مشفرة مزيفة P2P، والتي كان من المفترض أن تنطوي على مبلغ كبير من المال. طلب من ثمانية ضحايا الانتظار في بهو الفندق، بينما تم إحضار رجلين إلى غرفة حيث تم نصب كمين لهما.

قام المهاجمون، المزودون بسترات مضادة للرصاص والمختبئين في الحمام، بنص كمين للضحيتين المطمئنين. هددوا الرجال بنسخة طبق الأصل من البندقية وضربوهم بعصا وقبضات تلسكوبية. كان الضحايا مقيدين بأربطة بسحاب، وأصيب أحدهم بجروح قبل أن يتمكن من الفرار.

هرب اللصوص، لكن محاولة السرقة فشلت

عادت الضحية التي هربت إلى بهو الفندق ونبهت الآخرين الذين ينتظرون في الطابق السفلي. حاول المهاجمون سرقة حقيبة تحتوي على مليار وون تم إعدادها للمعاملة، ولكن بعد تدخل بقية المجموعة، أجبروا على الفرار من مكان الحادث دون المال. تم استدعاء الشرطة بعد تقرير الطوارئ في الساعة 8:30 مساء، وعندما وصلوا إلى مكان الحادث، وجدوا سترات آمنة مضادة للرصاص، ونسخة طبق الأصل من البندقية، وهراة استخدمت في الهجوم في غرفة فندق المشتبه بهم.

مطاردة دولية للهاربين

بعد الحادث، فر اثنان من المشتبه بهم، وهما مواطنان روس، من البلاد. بعد ساعات فقط من الجريمة، استقل أحدهم رحلة من كوريا الجنوبية، بينما فر الآخر بعد وقت قصير من الحادث. طلبت كوريا الجنوبية مساعدة الإنتربول في تعقبهم. صرح متحدث باسم الشرطة من جانغسيو: "نحن نستجوب حاليا المشتبه به المحتجز حول دافع الجريمة وتفاصيلها ونفكر في التقدم بطلب للحصول على أمر اعتقال".

يستمر التحقيق، حيث تفحص الشرطة لقطات أمن الفندق وسجلات الاتصالات الرقمية وبيانات الهجرة لتحديد ما إذا كانت الجريمة مخططة مسبقا من قبل مجموعة منظمة أو كانت محاولة سرقة لمرة واحدة.

مخاطر معاملات العملات المشفرة P2P

على الرغم من أن معاملات العملات المشفرة P2P قانونية في العديد من الولايات القضائية، إلا أنها غالبا ما تفتقر إلى الأمان الكافي، مما يجعلها هدفا مثاليا للمجرمين. يسلط هذا الحادث الضوء على كيف يمكن لمعاملات العملات المشفرة غير القانونية أن تتصاعد بسهولة إلى جرائم عنيفة، مما يعرض ليس فقط الضحايا للخطر ولكن أيضا سوق العملات المشفرة نفسه.

#CryptoCrime ، #Cryptoscam ، #CyberSecurity ، #russia ، #DigitalAssets

ابق متقدما بخطوة واحدة - اتبع ملفنا الشخصي وابق على اطلاع بكل شيء مهم في عالم العملات المشفرة!

إشعار:

المعلومات والآراء المقدمة في هذه المقالة مخصصة فقط لأغراض تعليمية ولا ينبغي اعتبارها نصيحة استثمارية في أي موقف. لا ينبغي اعتبار محتوى هذه الصفحات ماليا أو استثماريا أو أي شكل آخر من أشكال المشورة. نحذر من أن الاستثمار في العملات المشفرة يمكن أن يكون محفوفا بالمخاطر وقد يؤدي إلى خسائر مالية."
Solana Co-Founder Targeted by Hackers: Personal Data Leaked via Migos’ InstagramRaj Gokal, the co-founder of the Solana blockchain, has become the latest high-profile target of a major cyberattack. On May 27, unknown hackers gained access to the official Instagram account of U.S. rap group Migos (with over 13 million followers) and published sensitive personal information about Gokal in what appears to be an attempted blackmail. 📸 ID Documents and Doxxing Posted for Millions to See The compromised account shared seven photos showing Gokal holding his driver’s license and passport, both completely visible and unedited. Another post featured a woman — allegedly Gokal’s wife — also with her identification card in full view. One of the posts included Gokal’s personal phone number, and the caption urged users to “spam” him, a textbook case of doxxing. 🪙 Was This a $4.3M Blackmail Attempt? One caption suggested that this might not have been a random attack, but rather a failed extortion scheme. The post read: “You should’ve paid the 40 BTC,” implying Gokal was being pressured to pay a ransom. At current prices, that’s more than $4.3 million. 🧠 Gokal Had Warned About Ongoing Hacks Alarmingly, Gokal had already warned his followers just one week prior that hackers were attempting to breach his email, Google, Apple ID, and social accounts. He urged people to be skeptical of any suspicious content or requests on his platforms. “If you see a token launch, a fund request, or anything suspicious — it means they succeeded,” he posted on X. 🤐 No Official Statement from Solana Yet As of publishing, neither Solana’s official channels nor Gokal’s X account have responded publicly to the incident. The posts were removed from the Migos Instagram account at 5:12 UTC, but by then, the leaked images had already spread rapidly online. ⚠️ A Surge in Crypto-Related Hacks This incident adds to the growing list of cyberattacks targeting the crypto industry, many of which involve hacked social media accounts being used to promote fake coins, scams, or disinformation. Recent attacks have hit platforms like Pump.fun, a popular meme coin launchpad, and Watcher Guru, a well-known crypto media outlet. 🔍 Final Thoughts: Crypto Leaders Under Fire This hack serves as a stark reminder that even prominent blockchain leaders are vulnerable to targeted cyberattacks. It underscores the critical need for advanced security protocols, both for protecting assets and personal identity in today’s hyper-connected digital space. #solana , #cryptohacks , #CyberSecurity , #CryptoSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Solana Co-Founder Targeted by Hackers: Personal Data Leaked via Migos’ Instagram

Raj Gokal, the co-founder of the Solana blockchain, has become the latest high-profile target of a major cyberattack. On May 27, unknown hackers gained access to the official Instagram account of U.S. rap group Migos (with over 13 million followers) and published sensitive personal information about Gokal in what appears to be an attempted blackmail.

📸 ID Documents and Doxxing Posted for Millions to See
The compromised account shared seven photos showing Gokal holding his driver’s license and passport, both completely visible and unedited. Another post featured a woman — allegedly Gokal’s wife — also with her identification card in full view.
One of the posts included Gokal’s personal phone number, and the caption urged users to “spam” him, a textbook case of doxxing.

🪙 Was This a $4.3M Blackmail Attempt?
One caption suggested that this might not have been a random attack, but rather a failed extortion scheme. The post read: “You should’ve paid the 40 BTC,” implying Gokal was being pressured to pay a ransom. At current prices, that’s more than $4.3 million.

🧠 Gokal Had Warned About Ongoing Hacks
Alarmingly, Gokal had already warned his followers just one week prior that hackers were attempting to breach his email, Google, Apple ID, and social accounts. He urged people to be skeptical of any suspicious content or requests on his platforms.
“If you see a token launch, a fund request, or anything suspicious — it means they succeeded,” he posted on X.

🤐 No Official Statement from Solana Yet
As of publishing, neither Solana’s official channels nor Gokal’s X account have responded publicly to the incident. The posts were removed from the Migos Instagram account at 5:12 UTC, but by then, the leaked images had already spread rapidly online.

⚠️ A Surge in Crypto-Related Hacks
This incident adds to the growing list of cyberattacks targeting the crypto industry, many of which involve hacked social media accounts being used to promote fake coins, scams, or disinformation.
Recent attacks have hit platforms like Pump.fun, a popular meme coin launchpad, and Watcher Guru, a well-known crypto media outlet.

🔍 Final Thoughts: Crypto Leaders Under Fire
This hack serves as a stark reminder that even prominent blockchain leaders are vulnerable to targeted cyberattacks. It underscores the critical need for advanced security protocols, both for protecting assets and personal identity in today’s hyper-connected digital space.

#solana , #cryptohacks , #CyberSecurity , #CryptoSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Scammed Twice in Three Hours: Crypto Investor Loses $2.6 Million to Invisible Phishing🔹 A shocking loss in just one morning: A cryptocurrency investor fell victim to an unusual double phishing attack, losing a total of $2.6 million in stablecoins — all within just three hours. The attackers used a clever method known as zero-value transfers, a more advanced form of address poisoning that’s becoming an increasingly serious threat in the crypto space. 🔹 Two attacks, one target: user trust According to the cybersecurity firm Cyvers, which specializes in on-chain compliance, the victim sent two large payments within hours: 🔹 first, $843,000 USDT, 🔹 followed by another $1.75 million USDT. Both transactions were executed using a deceptive phishing method involving zero-value transfers — a subtle and sophisticated technique that is often overlooked by even seasoned users. 🔹 How do zero-value transfers work? This attack exploits token transfer functions to insert a fake transaction with a zero token value into the victim’s on-chain history. Since the transfer amount is zero, it doesn’t require a signature from the victim’s private key. As a result, the fake recipient address appears in the victim’s transaction history, giving the illusion that it’s a trusted or previously used address. 📌 Then the real danger begins: The victim, believing they are sending funds to a familiar recipient, copies the address directly from history. The result? The transaction goes straight to the scammer. 🔹 Not the first case – and likely not the last This trick isn’t new — in 2023, a hacker using the same zero-transfer phishing tactic stole $20 million in USDT before being blacklisted by the stablecoin’s issuer. Zero-value transfers are considered an advanced form of “address poisoning,” where attackers send a tiny amount of crypto from a wallet that closely resembles the victim’s (sharing similar first and last characters). The goal is to trick users into copying and reusing the wrong address in future transactions — resulting in major losses. 🔹 A growing threat across blockchains A January 2025 study revealed that between July 2022 and June 2024, there were more than 270 million attempted phishing attacks on BNB Chain and Ethereum. While most were unsuccessful, 6,000 succeeded, leading to over $83 million in losses. 🔹 AI to the rescue: New defense tools emerge To fight this threat, cybersecurity firms are stepping up. Trugard, in collaboration with the trust protocol Webacy, introduced a new AI-powered system for detecting address poisoning in crypto wallets. Their tool reportedly achieved a 97% success rate during tests on known attack scenarios. 🛡️ The lesson? Don’t trust your transaction history blindly. Always double-check recipient addresses, and use advanced tools to catch subtle scams. In the world of crypto, even one click can cost millions. #CryptoScamAlert , #CyberSecurity , #CryptoNewss , #phishing , #CryptoSecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Scammed Twice in Three Hours: Crypto Investor Loses $2.6 Million to Invisible Phishing

🔹 A shocking loss in just one morning: A cryptocurrency investor fell victim to an unusual double phishing attack, losing a total of $2.6 million in stablecoins — all within just three hours. The attackers used a clever method known as zero-value transfers, a more advanced form of address poisoning that’s becoming an increasingly serious threat in the crypto space.

🔹 Two attacks, one target: user trust
According to the cybersecurity firm Cyvers, which specializes in on-chain compliance, the victim sent two large payments within hours:

🔹 first, $843,000 USDT,

🔹 followed by another $1.75 million USDT.
Both transactions were executed using a deceptive phishing method involving zero-value transfers — a subtle and sophisticated technique that is often overlooked by even seasoned users.

🔹 How do zero-value transfers work?
This attack exploits token transfer functions to insert a fake transaction with a zero token value into the victim’s on-chain history. Since the transfer amount is zero, it doesn’t require a signature from the victim’s private key.
As a result, the fake recipient address appears in the victim’s transaction history, giving the illusion that it’s a trusted or previously used address.
📌 Then the real danger begins: The victim, believing they are sending funds to a familiar recipient, copies the address directly from history. The result? The transaction goes straight to the scammer.

🔹 Not the first case – and likely not the last
This trick isn’t new — in 2023, a hacker using the same zero-transfer phishing tactic stole $20 million in USDT before being blacklisted by the stablecoin’s issuer.
Zero-value transfers are considered an advanced form of “address poisoning,” where attackers send a tiny amount of crypto from a wallet that closely resembles the victim’s (sharing similar first and last characters). The goal is to trick users into copying and reusing the wrong address in future transactions — resulting in major losses.

🔹 A growing threat across blockchains
A January 2025 study revealed that between July 2022 and June 2024, there were more than 270 million attempted phishing attacks on BNB Chain and Ethereum. While most were unsuccessful, 6,000 succeeded, leading to over $83 million in losses.

🔹 AI to the rescue: New defense tools emerge
To fight this threat, cybersecurity firms are stepping up. Trugard, in collaboration with the trust protocol Webacy, introduced a new AI-powered system for detecting address poisoning in crypto wallets. Their tool reportedly achieved a 97% success rate during tests on known attack scenarios.

🛡️ The lesson? Don’t trust your transaction history blindly. Always double-check recipient addresses, and use advanced tools to catch subtle scams. In the world of crypto, even one click can cost millions.

#CryptoScamAlert , #CyberSecurity , #CryptoNewss , #phishing , #CryptoSecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
BiyaPay不冻卡出金:
需要仔细小心不能盲目
China’s Underground Banks: The Hidden Engine Behind Global Organized CrimeAccording to a new report by TRM Labs, China’s underground banking networks have become a critical financial infrastructure powering international organized crime. Far from being marginal players, these covert systems are now the financial lifeline for Mexican drug cartels, North Korean hackers, and wealthy Chinese nationals seeking to bypass strict capital controls. 🔍 "Flying Money" Outside the System These informal networks, known as “fei qian” or “flying money,” operate entirely outside traditional financial oversight. They use systems such as mirror exchanges, where massive sums are shifted across borders without triggering any official banking alerts. A common method: a broker in the U.S. collects cartel cash, while their counterpart in China releases an equivalent amount to a client — often in cryptocurrency. No banks involved, no digital trail. 🤝 Criminal-Banker Symbiosis TRM Labs describes the relationship between these underground banks and global crime syndicates as a mutually beneficial ecosystem. Cartels can repatriate illegal drug profits, while Chinese clients evade strict financial restrictions. Brokers typically earn small fees (1–2%), but the volumes are enormous. The network is growing rapidly and facilitates a wide range of criminal activity — from fentanyl trafficking to sanctions evasion by Russian and North Korean entities. The system thrives on encrypted communication platforms like WeChat and Telegram, exploiting weak regulatory frameworks across various jurisdictions. 💊 Drug Money Pipeline Between China and America Perhaps the most alarming revelation is how these networks serve as a dark financial conduit for the booming U.S.–China drug trade. The Sinaloa cartel, for instance, is believed to launder hundreds of millions of dollars each year through underground Chinese banking services. TRM Labs details how cartel-linked operatives in the U.S. deposit drug money into crypto ATMs or exchanges, convert it into bitcoin, and then transfer it to Chinese-controlled wallets. These funds are then used to purchase precursor chemicals for fentanyl production or other goods reinvested into the drug supply chain. 💣 Blockchain: A Tool for Crime and Enforcement The speed, anonymity, and global reach of cryptocurrencies make them ideal for large-scale laundering. The only way to disrupt this ecosystem, TRM says, is through advanced blockchain forensics targeting key players — particularly OTC brokers who act as conversion points between crypto and fiat. There have been wins, such as the freezing of North Korean-linked accounts on Binance in 2022, but TRM warns that these networks are evolving rapidly, and law enforcement must innovate faster to keep up. 📉 A Global Challenge for Regulators China’s underground banks are no longer a domestic issue — they’ve become a globalized financial shadow system that links digital finance with the criminal underworld. They act as a silent bridge between illegal profits and real-world commerce, all while evading traditional controls. #CryptoCrime , #MoneyLaundering , #Cryptoscam , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

China’s Underground Banks: The Hidden Engine Behind Global Organized Crime

According to a new report by TRM Labs, China’s underground banking networks have become a critical financial infrastructure powering international organized crime. Far from being marginal players, these covert systems are now the financial lifeline for Mexican drug cartels, North Korean hackers, and wealthy Chinese nationals seeking to bypass strict capital controls.

🔍 "Flying Money" Outside the System

These informal networks, known as “fei qian” or “flying money,” operate entirely outside traditional financial oversight. They use systems such as mirror exchanges, where massive sums are shifted across borders without triggering any official banking alerts.
A common method: a broker in the U.S. collects cartel cash, while their counterpart in China releases an equivalent amount to a client — often in cryptocurrency. No banks involved, no digital trail.

🤝 Criminal-Banker Symbiosis

TRM Labs describes the relationship between these underground banks and global crime syndicates as a mutually beneficial ecosystem. Cartels can repatriate illegal drug profits, while Chinese clients evade strict financial restrictions. Brokers typically earn small fees (1–2%), but the volumes are enormous.
The network is growing rapidly and facilitates a wide range of criminal activity — from fentanyl trafficking to sanctions evasion by Russian and North Korean entities. The system thrives on encrypted communication platforms like WeChat and Telegram, exploiting weak regulatory frameworks across various jurisdictions.

💊 Drug Money Pipeline Between China and America

Perhaps the most alarming revelation is how these networks serve as a dark financial conduit for the booming U.S.–China drug trade. The Sinaloa cartel, for instance, is believed to launder hundreds of millions of dollars each year through underground Chinese banking services.
TRM Labs details how cartel-linked operatives in the U.S. deposit drug money into crypto ATMs or exchanges, convert it into bitcoin, and then transfer it to Chinese-controlled wallets. These funds are then used to purchase precursor chemicals for fentanyl production or other goods reinvested into the drug supply chain.

💣 Blockchain: A Tool for Crime and Enforcement

The speed, anonymity, and global reach of cryptocurrencies make them ideal for large-scale laundering. The only way to disrupt this ecosystem, TRM says, is through advanced blockchain forensics targeting key players — particularly OTC brokers who act as conversion points between crypto and fiat.
There have been wins, such as the freezing of North Korean-linked accounts on Binance in 2022, but TRM warns that these networks are evolving rapidly, and law enforcement must innovate faster to keep up.

📉 A Global Challenge for Regulators

China’s underground banks are no longer a domestic issue — they’ve become a globalized financial shadow system that links digital finance with the criminal underworld. They act as a silent bridge between illegal profits and real-world commerce, all while evading traditional controls.

#CryptoCrime , #MoneyLaundering , #Cryptoscam , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Massive Hack Hits Cetus: Overflow Bug Leads to $223 Million LossA seemingly minor yet critical bug in the code of the decentralized protocol Cetus has cost users a staggering $223 million. A detailed analysis by the cybersecurity firm Dedaub revealed a serious flaw in the logic of Cetus' automated market maker (AMM), which hackers were able to exploit on a massive scale. ⚠️ Subtle Bug, Devastating Consequences According to Dedaub, the main cause of the exploit was an "overflow" bug—a technical vulnerability that arises when a system fails to handle large numerical inputs correctly during mathematical operations. Instead of rejecting these oversized values, the system improperly truncated them, which made the resulting output appear far smaller than it actually should have been. The attacker exploited this flaw by depositing only a single token, yet the protocol mistakenly credited them with a massive liquidity position. That position was then used to withdraw substantial real assets from liquidity pools. 💻 The Bug Survived Migration to Sui Network Even after the Cetus codebase was migrated to the Sui blockchain, the critical vulnerability remained intact. Developers did attempt to implement security checks, but the overflow protection was flawed, allowing the same type of exploit to slip through unnoticed once again. “This incident highlights why edge cases in DeFi cannot be overlooked,” Dedaub warned, emphasizing that the complex math behind decentralized finance systems requires rigorous manual auditing and extreme caution. 📉 Fallout: Token Crash and Market Panic The Cetus exploit occurred in the early hours of May 22, marking one of the largest financial losses ever recorded within the Sui ecosystem. Initial reports pointed to a potential Oracle error, but deeper investigation revealed that the core issue was much more serious. The exploit led to over $223 million in losses across various liquidity pools. The breach immediately triggered a massive token sell-off, with SUI and CETUS tokens plummeting over 40% in just a few hours. Smaller memecoins and low-cap tokens suffered even more dramatic drops—some losing more than 90% of their value. 🔒 Response: Freezing Funds and Bounty Offer In a coordinated response, the Sui Foundation worked with validators in an attempt to freeze approximately $163 million of the stolen assets. Cetus also announced a $5 million bounty for information that could lead to identifying the attacker. 📌 Summary 🔹 A simple code bug caused one of the biggest DeFi thefts 🔹 The attacker exploited an overflow bug to gain a huge liquidity position 🔹 Token prices plunged as panic spread across the market 🔹 Efforts are underway to freeze stolen funds and track the perpetrator What’s your take on this? Are DeFi protocols still too vulnerable to replace traditional financial systems? #defi , #CryptoNewss , #BlockchainSecurity , #CryptoSecurity , #CyberSecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Massive Hack Hits Cetus: Overflow Bug Leads to $223 Million Loss

A seemingly minor yet critical bug in the code of the decentralized protocol Cetus has cost users a staggering $223 million. A detailed analysis by the cybersecurity firm Dedaub revealed a serious flaw in the logic of Cetus' automated market maker (AMM), which hackers were able to exploit on a massive scale.

⚠️ Subtle Bug, Devastating Consequences
According to Dedaub, the main cause of the exploit was an "overflow" bug—a technical vulnerability that arises when a system fails to handle large numerical inputs correctly during mathematical operations.
Instead of rejecting these oversized values, the system improperly truncated them, which made the resulting output appear far smaller than it actually should have been. The attacker exploited this flaw by depositing only a single token, yet the protocol mistakenly credited them with a massive liquidity position. That position was then used to withdraw substantial real assets from liquidity pools.

💻 The Bug Survived Migration to Sui Network
Even after the Cetus codebase was migrated to the Sui blockchain, the critical vulnerability remained intact. Developers did attempt to implement security checks, but the overflow protection was flawed, allowing the same type of exploit to slip through unnoticed once again.
“This incident highlights why edge cases in DeFi cannot be overlooked,” Dedaub warned, emphasizing that the complex math behind decentralized finance systems requires rigorous manual auditing and extreme caution.

📉 Fallout: Token Crash and Market Panic
The Cetus exploit occurred in the early hours of May 22, marking one of the largest financial losses ever recorded within the Sui ecosystem. Initial reports pointed to a potential Oracle error, but deeper investigation revealed that the core issue was much more serious.
The exploit led to over $223 million in losses across various liquidity pools. The breach immediately triggered a massive token sell-off, with SUI and CETUS tokens plummeting over 40% in just a few hours. Smaller memecoins and low-cap tokens suffered even more dramatic drops—some losing more than 90% of their value.

🔒 Response: Freezing Funds and Bounty Offer
In a coordinated response, the Sui Foundation worked with validators in an attempt to freeze approximately $163 million of the stolen assets. Cetus also announced a $5 million bounty for information that could lead to identifying the attacker.

📌 Summary
🔹 A simple code bug caused one of the biggest DeFi thefts

🔹 The attacker exploited an overflow bug to gain a huge liquidity position

🔹 Token prices plunged as panic spread across the market

🔹 Efforts are underway to freeze stolen funds and track the perpetrator

What’s your take on this? Are DeFi protocols still too vulnerable to replace traditional financial systems?

#defi , #CryptoNewss , #BlockchainSecurity , #CryptoSecurity , #CyberSecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 DeFi Security Alert: DNS Hijacking Threatens Curve Finance Again On May 12, 2025, Curve Finance fell victim to a DNS hijacking attack, marking the second breach in a week. Hackers took control of Curve’s domain, redirecting users to a fake website to drain funds—without compromising smart contracts. 🔍 How DNS Hijacking Works • Attackers manipulate domain records at the registrar level. • Users are sent to phishing sites that mimic legitimate platforms. • Funds are stolen when users interact with the malicious frontend. ⚠️ Why This Matters for DeFi • Centralized weak points (like DNS) remain a major risk, even for decentralized protocols. • Curve faced a similar attack in 2022, proving this is a recurring threat. • Backend security doesn’t matter if the frontend is compromised. 🔒How to Stay Safe • Bookmark official URLs & avoid clicking links from untrusted sources. • Use ENS/IPFS for decentralized frontends (e.g., curve.eth). • Double-check URLs* before connecting wallets or signing transactions. The incident highlights the urgent need for stronger web security in DeFi. While smart contracts may be safe, users remain at risk due to traditional web vulnerabilities. #Ethereum #CyberSecurity #CurveFinance #DNSAttack #DYOR
🚨 DeFi Security Alert: DNS Hijacking Threatens Curve Finance Again

On May 12, 2025, Curve Finance fell victim to a DNS hijacking attack, marking the second breach in a week. Hackers took control of Curve’s domain, redirecting users to a fake website to drain funds—without compromising smart contracts.

🔍 How DNS Hijacking Works
• Attackers manipulate domain records at the registrar level.
• Users are sent to phishing sites that mimic legitimate platforms.
• Funds are stolen when users interact with the malicious frontend.

⚠️ Why This Matters for DeFi
• Centralized weak points (like DNS) remain a major risk, even for decentralized protocols.
• Curve faced a similar attack in 2022, proving this is a recurring threat.
• Backend security doesn’t matter if the frontend is compromised.

🔒How to Stay Safe
• Bookmark official URLs & avoid clicking links from untrusted sources.
• Use ENS/IPFS for decentralized frontends (e.g., curve.eth).
• Double-check URLs* before connecting wallets or signing transactions.

The incident highlights the urgent need for stronger web security in DeFi. While smart contracts may be safe, users remain at risk due to traditional web vulnerabilities.

#Ethereum #CyberSecurity #CurveFinance #DNSAttack #DYOR
🚨 COINBASE BREACHED – UP TO $400M AT RISK! One of the biggest names in crypto just got smoked. Coinbase confirms a targeted cyberattack hitting a "small subset" of users — with sensitive info like names, addresses & emails exposed. No passwords leaked (yet), but total risk? Estimated at $180M–$400M. Stay alert. If you’re on Coinbase, check your activity, change that password, and slap on 2FA. Fast. This wave isn’t over. Follow me to stay ahead of the next hit — before it hits you. #CryptoNewss #coinbase #Hacked #CryptoAlert #CyberSecurity
🚨 COINBASE BREACHED – UP TO $400M AT RISK!

One of the biggest names in crypto just got smoked.
Coinbase confirms a targeted cyberattack hitting a "small subset" of users — with sensitive info like names, addresses & emails exposed. No passwords leaked (yet), but total risk? Estimated at $180M–$400M.

Stay alert. If you’re on Coinbase, check your activity, change that password, and slap on 2FA. Fast.

This wave isn’t over.

Follow me to stay ahead of the next hit — before it hits you.

#CryptoNewss #coinbase #Hacked #CryptoAlert #CyberSecurity
🚨BREAKING NEWS🚨 ‎A crypto investor has been arrested and charged with kidnapping and torturing an Italian national in an attempt to obtain sensitive passwords linked to digital assets. According to law enforcement, the suspect allegedly orchestrated the abduction to gain access to the victim’s cryptocurrency holdings. Authorities acted swiftly, apprehending the individual and ensuring the victim’s safety. This shocking case highlights the growing risks associated with digital assets and the importance of robust security measures in the crypto space. ‎ ‎ Stay vigilant and always protect your passwords! 🔒 ‎ ‎#CryptoNews #CyberSecurity #Bitcoin❗ #CryptoCrime #breakingnews $BTC ‎ ‎
🚨BREAKING NEWS🚨

‎A crypto investor has been arrested and charged with kidnapping and torturing an Italian national in an attempt to obtain sensitive passwords linked to digital assets. According to law enforcement, the suspect allegedly orchestrated the abduction to gain access to the victim’s cryptocurrency holdings. Authorities acted swiftly, apprehending the individual and ensuring the victim’s safety. This shocking case highlights the growing risks associated with digital assets and the importance of robust security measures in the crypto space.

‎ Stay vigilant and always protect your passwords! 🔒

#CryptoNews #CyberSecurity #Bitcoin❗ #CryptoCrime #breakingnews $BTC

Md Shariar Shanaz Shuvon, a 17-year-old self-taught ethical hacker from Bangladesh, has discovered a serious privacy bug in NASA’s system. The flaw allowed access to sensitive Earth data. Shuvon responsibly reported the bug through NASA’s Vulnerability Disclosure Program, earning an official letter of appreciation in February 2025. Currently studying IT in Malaysia and working as a cybersecurity analyst, Shuvon has also found bugs in Sony and Meta. He specializes in IDOR and data disclosure vulnerabilities and was ranked top 1 globally on TryHackMe. Despite global success, Shuvon dreams of strengthening cybersecurity in Bangladesh and raising awareness about digital threats. His journey began in Class 7 using YouTube and free resources. “Bug hunting is just the beginning,” he says. #CyberSecurity #EthicalHacking #NASA #TeenHacker
Md Shariar Shanaz Shuvon, a 17-year-old self-taught ethical hacker from Bangladesh, has discovered a serious privacy bug in NASA’s system. The flaw allowed access to sensitive Earth data. Shuvon responsibly reported the bug through NASA’s Vulnerability Disclosure Program, earning an official letter of appreciation in February 2025.

Currently studying IT in Malaysia and working as a cybersecurity analyst, Shuvon has also found bugs in Sony and Meta. He specializes in IDOR and data disclosure vulnerabilities and was ranked top 1 globally on TryHackMe.

Despite global success, Shuvon dreams of strengthening cybersecurity in Bangladesh and raising awareness about digital threats. His journey began in Class 7 using YouTube and free resources. “Bug hunting is just the beginning,” he says.

#CyberSecurity #EthicalHacking #NASA #TeenHacker
Haedal Protocol on Sui Suspends haeVault Following $223M Exploit on CetusHaedal Protocol, a liquidity staking project built on the Sui blockchain, has temporarily disabled its haeVault feature. The decision comes after a massive $223 million exploit on Cetus Protocol, which provides the core liquidity infrastructure for many Sui-based applications. haeVault on Hold – User Security Comes First In an official statement, the Haedal team confirmed that haeVault will remain offline until all security concerns are resolved. Since this vault relies on liquidity from the now-compromised Cetus pools, developers opted to pause the service as a precaution. “User safety is our top priority,” Haedal stated. “haeVault will resume once the environment is secure and stable.” The team assured users that all other protocol functions and on-chain funds are fully safe and unaffected by the breach. Haedal is now working closely with Cetus and other projects within the Sui ecosystem to support recovery efforts. Major Impact: Tokens Plummet Amid Liquidity Loss The exploit sent shockwaves across the Sui ecosystem. Tokens like AXOL, HIPPO, and SQUIRT lost nearly all of their value within 24 hours as liquidity was drained from Cetus. CETUS fell nearly 30% in 24 hours, now trading at $0.169HAEDAL remained relatively stable, down just 0.7%, at $0.17SUI dropped over 4.7%, sliding from a daily high of $4.18 to $3.85 – still 28% below its all-time high of $5.35 from January 2025 Cetus Offers Bounty Deal to Hacker In a bid to recover the stolen funds, Cetus has proposed a $6 million bounty if the attacker agrees to return 20,920 ETH (~$55.7M) and all frozen assets on Sui. If the hacker accepts, they would be allowed to keep 2,324 ETH and be granted immunity from legal action. However, Cetus has made it clear that the offer is time-limited — if the attacker uses coin mixers or attempts to obfuscate funds, the deal is void. Summary 🔹 Haedal suspends haeVault after Cetus exploit 🔹 Hacker drained $223M in liquidity, shaking the Sui ecosystem 🔹 AXOL, HIPPO, and SQUIRT crashed; CETUS down 30% 🔹 Cetus proposes return-for-immunity deal to hacker 🔹 Sui-based projects face a major test of trust and resilience #CryptoSecurity , #defi , #sui , #CryptoNewss , #CyberSecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Haedal Protocol on Sui Suspends haeVault Following $223M Exploit on Cetus

Haedal Protocol, a liquidity staking project built on the Sui blockchain, has temporarily disabled its haeVault feature. The decision comes after a massive $223 million exploit on Cetus Protocol, which provides the core liquidity infrastructure for many Sui-based applications.

haeVault on Hold – User Security Comes First
In an official statement, the Haedal team confirmed that haeVault will remain offline until all security concerns are resolved. Since this vault relies on liquidity from the now-compromised Cetus pools, developers opted to pause the service as a precaution.
“User safety is our top priority,” Haedal stated. “haeVault will resume once the environment is secure and stable.”

The team assured users that all other protocol functions and on-chain funds are fully safe and unaffected by the breach. Haedal is now working closely with Cetus and other projects within the Sui ecosystem to support recovery efforts.

Major Impact: Tokens Plummet Amid Liquidity Loss
The exploit sent shockwaves across the Sui ecosystem. Tokens like AXOL, HIPPO, and SQUIRT lost nearly all of their value within 24 hours as liquidity was drained from Cetus.
CETUS fell nearly 30% in 24 hours, now trading at $0.169HAEDAL remained relatively stable, down just 0.7%, at $0.17SUI dropped over 4.7%, sliding from a daily high of $4.18 to $3.85 – still 28% below its all-time high of $5.35 from January 2025

Cetus Offers Bounty Deal to Hacker
In a bid to recover the stolen funds, Cetus has proposed a $6 million bounty if the attacker agrees to return 20,920 ETH (~$55.7M) and all frozen assets on Sui.
If the hacker accepts, they would be allowed to keep 2,324 ETH and be granted immunity from legal action. However, Cetus has made it clear that the offer is time-limited — if the attacker uses coin mixers or attempts to obfuscate funds, the deal is void.

Summary
🔹 Haedal suspends haeVault after Cetus exploit

🔹 Hacker drained $223M in liquidity, shaking the Sui ecosystem

🔹 AXOL, HIPPO, and SQUIRT crashed; CETUS down 30%

🔹 Cetus proposes return-for-immunity deal to hacker

🔹 Sui-based projects face a major test of trust and resilience

#CryptoSecurity , #defi , #sui , #CryptoNewss , #CyberSecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Global Darknet Crackdown: Authorities Seize $200 Million in Crypto and CashAn international law enforcement operation called Operation RapTor has led to the arrest of 270 individuals across 10 countries and the seizure of over $200 million in cash and cryptocurrencies. It marks the largest enforcement action to date under the U.S. Justice Department’s J-CODE initiative, targeting criminal groups operating through the darknet. 🔹 Global Drug Network Dismantled Led by U.S. authorities in cooperation with Europol and international agencies, the operation targeted illegal marketplaces and drug networks in Austria, Brazil, France, Germany, the Netherlands, South Korea, Spain, Switzerland, the UK, and the USA. Seized in the raids: 🔹 Over two metric tons of drugs 🔹 144 kilograms of fentanyl-laced substances 🔹 180 firearms 🔹 Cryptocurrencies worth hundreds of millions of dollars “This historic seizure of weapons, lethal drugs, and illicit funds will save lives,” said U.S. Attorney General Pam Bondi. “Criminals can no longer hide behind screens or seek refuge on the dark web.” 🔹 Cryptocurrencies and Stablecoins Fueling Illicit Trade Authorities are increasingly concerned about the use of cryptocurrencies and stablecoins — particularly USDT — in global drug trade and money laundering. 🔹 A report by Chainalysis revealed that at least $5.5 million in stablecoins was sent by money mules to Chinese suppliers of fentanyl precursors. 🔹 According to TRM Labs, 97% of surveyed Chinese chemical suppliers accept crypto payments, showing that stablecoins have become essential infrastructure for trafficking networks. These blockchain patterns mirror the behavior of individuals already prosecuted under Operation RapTor. 🔹 Key Figures and Markets Busted The operation also brought down several high-profile darknet actors: 🔹 Behrouz Parsarad, an Iranian national, was indicted in Ohio and sanctioned by the U.S. Treasury’s OFAC. He operated Nemesis Market, a darknet platform for selling opioids and hiding profits in crypto wallets. 🔹 Rui-Siang Lin, operator of Incognito Market, one of the largest online drug markets, pleaded guilty in December to drug trafficking, money laundering, and selling misbranded drugs. 🔹 Telegram Closes Down $27 Billion Black Market This week, Telegram shut down Haowang Guarantee, described by blockchain firm Elliptic as the most active crypto-powered black market ever seen online. The platform traded: 🔹 Laundered USDT 🔹 Fake identification documents 🔹 Tools for industrial-scale online scams It served as a hub for what Elliptic called a “cyber slavery-based scam economy”, often exploiting victims trapped in fraudulent digital networks. 🔹 Cryptocurrencies Under Growing Scrutiny Also this week, in California, Pedro Inzunza Noriega and his son Pedro Inzunza Coronel were indicted for fentanyl trafficking and crypto-based money laundering. They are allegedly linked to a faction of the notorious Sinaloa Cartel and laundered profits via Chinese crypto brokers. Conclusion Operation RapTor shows that while cryptocurrencies enable financial innovation, they also facilitate global organized crime. Although blockchain provides transparency, its tools are being abused at scale. This global enforcement sends a clear message: the digital asset space is not beyond the reach of the law. #CryptoNewss , #CyberSecurity , #CryptoCrime , #StaySafe , #darknet Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Global Darknet Crackdown: Authorities Seize $200 Million in Crypto and Cash

An international law enforcement operation called Operation RapTor has led to the arrest of 270 individuals across 10 countries and the seizure of over $200 million in cash and cryptocurrencies. It marks the largest enforcement action to date under the U.S. Justice Department’s J-CODE initiative, targeting criminal groups operating through the darknet.

🔹 Global Drug Network Dismantled
Led by U.S. authorities in cooperation with Europol and international agencies, the operation targeted illegal marketplaces and drug networks in Austria, Brazil, France, Germany, the Netherlands, South Korea, Spain, Switzerland, the UK, and the USA.
Seized in the raids:

🔹 Over two metric tons of drugs

🔹 144 kilograms of fentanyl-laced substances

🔹 180 firearms

🔹 Cryptocurrencies worth hundreds of millions of dollars
“This historic seizure of weapons, lethal drugs, and illicit funds will save lives,” said U.S. Attorney General Pam Bondi. “Criminals can no longer hide behind screens or seek refuge on the dark web.”

🔹 Cryptocurrencies and Stablecoins Fueling Illicit Trade
Authorities are increasingly concerned about the use of cryptocurrencies and stablecoins — particularly USDT — in global drug trade and money laundering.
🔹 A report by Chainalysis revealed that at least $5.5 million in stablecoins was sent by money mules to Chinese suppliers of fentanyl precursors.

🔹 According to TRM Labs, 97% of surveyed Chinese chemical suppliers accept crypto payments, showing that stablecoins have become essential infrastructure for trafficking networks.
These blockchain patterns mirror the behavior of individuals already prosecuted under Operation RapTor.

🔹 Key Figures and Markets Busted
The operation also brought down several high-profile darknet actors:
🔹 Behrouz Parsarad, an Iranian national, was indicted in Ohio and sanctioned by the U.S. Treasury’s OFAC. He operated Nemesis Market, a darknet platform for selling opioids and hiding profits in crypto wallets.

🔹 Rui-Siang Lin, operator of Incognito Market, one of the largest online drug markets, pleaded guilty in December to drug trafficking, money laundering, and selling misbranded drugs.

🔹 Telegram Closes Down $27 Billion Black Market
This week, Telegram shut down Haowang Guarantee, described by blockchain firm Elliptic as the most active crypto-powered black market ever seen online. The platform traded:
🔹 Laundered USDT

🔹 Fake identification documents

🔹 Tools for industrial-scale online scams
It served as a hub for what Elliptic called a “cyber slavery-based scam economy”, often exploiting victims trapped in fraudulent digital networks.

🔹 Cryptocurrencies Under Growing Scrutiny
Also this week, in California, Pedro Inzunza Noriega and his son Pedro Inzunza Coronel were indicted for fentanyl trafficking and crypto-based money laundering. They are allegedly linked to a faction of the notorious Sinaloa Cartel and laundered profits via Chinese crypto brokers.

Conclusion
Operation RapTor shows that while cryptocurrencies enable financial innovation, they also facilitate global organized crime. Although blockchain provides transparency, its tools are being abused at scale. This global enforcement sends a clear message: the digital asset space is not beyond the reach of the law.

#CryptoNewss , #CyberSecurity , #CryptoCrime , #StaySafe , #darknet

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Cybercriminals are using fake Ledger Live apps to drain macOS users’ crypto through malware that steals seed phrases, a cybersecurity firm warns.  The malware replaces the legitimate Ledger Live app on victims’ devices and then prompts the user to input their seed phrase through a phony pop-up message, a team from Moonlock said in a May 22 report. “Initially, attackers could use the clone to steal passwords, notes, and wallet details to get a glimpse of the wallet’s assets, but they had no way to extract the funds,” the Moonlock team said. “Now, within a year, they have learned to steal seed phrases and empty the wallets of their victims,” it added.  One way the scammers replace the real Ledger Live app with a clone is through the Atomic macOS Stealer, designed to steal sensitive data, which Moonlock said it has found lurking on at least 2,800 hacked websites. #CyberSecurity #MarketPullback
Cybercriminals are using fake Ledger Live apps to drain macOS users’ crypto through malware that steals seed phrases, a cybersecurity firm warns. 

The malware replaces the legitimate Ledger Live app on victims’ devices and then prompts the user to input their seed phrase through a phony pop-up message, a team from Moonlock said in a May 22 report.

“Initially, attackers could use the clone to steal passwords, notes, and wallet details to get a glimpse of the wallet’s assets, but they had no way to extract the funds,” the Moonlock team said.
“Now, within a year, they have learned to steal seed phrases and empty the wallets of their victims,” it added. 

One way the scammers replace the real Ledger Live app with a clone is through the Atomic macOS Stealer, designed to steal sensitive data, which Moonlock said it has found lurking on at least 2,800 hacked websites.
#CyberSecurity #MarketPullback
Security Scam Alerts** **Title**: *URGENT Fake Ledger Live Apps Stealing Crypto How to Protect Yourself* **Content**: - Scam Tactics Fake app updates phishing emails posing as Ledger - Protection Steps 1 Only download apps from official stores 2 Enable 2FA on all exchanges 3 Use a hardware wallet for large holdings - CTA Share this to protect others **Hashtags**: `#CryptoSecurity #ScamAlert #Phishing #HardwareWallet #Ledger #Trezor #2FA #CryptoProtection #SecureCrypto #CryptoEducation #CryptoNewbies #CryptoRisks #DYOR #CryptoCommunity #Crypto2024 #Blockchain #CryptoInvesting #CryptoNews #CryptoScams #CryptoRecovery #CryptoAwareness #CryptoSafety #BinanceSquare #CryptoTips #CryptoAssets #HODL #CryptoStrategies #CyberSecurity
Security Scam Alerts**
**Title**: *URGENT Fake Ledger Live Apps Stealing Crypto How to Protect Yourself*
**Content**:
- Scam Tactics Fake app updates phishing emails posing as Ledger
- Protection Steps
1 Only download apps from official stores
2 Enable 2FA on all exchanges
3 Use a hardware wallet for large holdings
- CTA Share this to protect others

**Hashtags**:
`#CryptoSecurity #ScamAlert #Phishing #HardwareWallet #Ledger #Trezor #2FA #CryptoProtection #SecureCrypto #CryptoEducation #CryptoNewbies #CryptoRisks #DYOR #CryptoCommunity #Crypto2024 #Blockchain #CryptoInvesting #CryptoNews #CryptoScams #CryptoRecovery #CryptoAwareness #CryptoSafety #BinanceSquare #CryptoTips #CryptoAssets #HODL #CryptoStrategies #CyberSecurity
Insider Betrayal at Coinbase: 69,000 Users ExposedCoinbase data breach impacted 69,461 users’ personal information. Insiders bribed to leak names, addresses, and bank details. No funds or passwords stolen; Prime accounts unaffected. Coinbase offers $20M reward to catch attackers.Enhanced security and user reimbursements promised. #Coinbase #DataTheftAlert #cybersecurity #insider threat On December 26, 2024, Coinbase, a leading cryptocurrency exchange, suffered a significant data breach. Cybercriminals bribed rogue overseas support agents to access sensitive customer information. The breach, detailed in a Maine Attorney General filing, impacted 69,461 users, exposing names, addresses, and phone numbers. The incident remained undetected until May 11, 2025. Coinbase confirmed that less than 1% of its monthly transacting users were affected. No passwords, private keys, or funds were compromised. Prime accounts remained secure. How the Breach Occurred Cybercriminals targeted Coinbase’s outsourced support team. They recruited agents through bribes, gaining unauthorized access to customer data. The stolen information was used to facilitate social engineering attacks. Attackers demanded $20 million in Bitcoin to withhold the data. Coinbase refused the ransom. Instead, the company offered a $20 million reward for information leading to the attackers’ arrest and conviction. The breached data included sensitive details like government-issued IDs and bank information for some users. The company identified and terminated the rogue employees. Legal consequences for those involved remain uncertain due to their overseas locations. Coinbase is working with authorities to investigate further. Coinbase’s Response and User Impact Coinbase acted swiftly upon discovering the breach. The company notified affected users and promised full reimbursement for any losses. Enhanced security measures are being implemented to prevent future incidents. The Maine Attorney General’s filing highlighted the scale of the breach. It emphasized the risks of outsourcing sensitive operations. Coinbase assured users that no financial assets were stolen. The company is providing credit monitoring services to affected customers. The breach raises concerns about data security in the cryptocurrency industry. Users are urged to remain vigilant against phishing attempts and social engineering scams. Coinbase has pledged to strengthen its internal controls.

Insider Betrayal at Coinbase: 69,000 Users Exposed

Coinbase data breach impacted 69,461 users’ personal information. Insiders bribed to leak names, addresses, and bank details. No funds or passwords stolen; Prime accounts unaffected. Coinbase offers $20M reward to catch attackers.Enhanced security and user reimbursements promised.
#Coinbase #DataTheftAlert #cybersecurity #insider threat
On December 26, 2024, Coinbase, a leading cryptocurrency exchange, suffered a significant data breach. Cybercriminals bribed rogue overseas support agents to access sensitive customer information. The breach, detailed in a Maine Attorney General filing, impacted 69,461 users, exposing names, addresses, and phone numbers.
The incident remained undetected until May 11, 2025. Coinbase confirmed that less than 1% of its monthly transacting users were affected. No passwords, private keys, or funds were compromised. Prime accounts remained secure.
How the Breach Occurred
Cybercriminals targeted Coinbase’s outsourced support team. They recruited agents through bribes, gaining unauthorized access to customer data. The stolen information was used to facilitate social engineering attacks. Attackers demanded $20 million in Bitcoin to withhold the data.
Coinbase refused the ransom. Instead, the company offered a $20 million reward for information leading to the attackers’ arrest and conviction. The breached data included sensitive details like government-issued IDs and bank information for some users.
The company identified and terminated the rogue employees. Legal consequences for those involved remain uncertain due to their overseas locations. Coinbase is working with authorities to investigate further.
Coinbase’s Response and User Impact
Coinbase acted swiftly upon discovering the breach. The company notified affected users and promised full reimbursement for any losses. Enhanced security measures are being implemented to prevent future incidents.
The Maine Attorney General’s filing highlighted the scale of the breach. It emphasized the risks of outsourcing sensitive operations. Coinbase assured users that no financial assets were stolen. The company is providing credit monitoring services to affected customers.
The breach raises concerns about data security in the cryptocurrency industry. Users are urged to remain vigilant against phishing attempts and social engineering scams. Coinbase has pledged to strengthen its internal controls.
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number