Binance Square
Hacked
134,346 views
82 Posts
Hot
Latest
LIVE
LIVE
Voice Of Crypto
--
Binance's Dual Crisis: Software Breach & $2.7B Fine Unveil Data Exposures1. A hacker asserts possession of crucial Binance software housing user information such as emails, phone numbers, and wallet IDs. 2. The hacker purportedly gained entry to this software via phishing emails aimed at law enforcement officials in Uganda, Taiwan, and the Philippines. 3. The hacker intends to sell the software for approximately $10,000. 4. Binance encountered a substantial $2.7 billion fine, while CX confronts a parallel fine amounting to $150 million. Binance, a major cryptocurrency exchange, finds itself in a series of setbacks yet again, exacerbating its ongoing challenges. The recent incident involves a cyber attacker who claims to have acquired access to Binance's software used for facilitating law enforcement requests. This software aids the exchange in collaborating with governmental bodies on criminal investigations. The hacker is purportedly selling access to this software for $10,000 in Bitcoin or Monero on Breach Forums, a dark web forum. Reports suggest that the breach occurred through phishing emails sent to law enforcement officers in Uganda, the Philippines, and Taiwan. These emails contained malware that infiltrated the officers' devices, allowing the hacker to obtain browser credentials. With this illicit access, the hacker breached Binance's law enforcement portal on kodexglobal.com. Allegedly, the compromised access includes sensitive information such as emails, phone numbers, wallet IDs, and potentially more details about Binance's customers. The hacker even shared screenshots of the breached portal on the aforementioned forum as evidence. Despite the claims, Binance has not confirmed the veracity of the hacker's assertions. The exchange, however, assured that its customers' funds have remained secure thus far. Moreover, Binance is grappling with legal troubles in the United States. A recent announcement by the Commodity Futures Trading Commission (CFTC) disclosed a court order for Binance to pay a substantial $2.7 billion fine. This penalty stems from alleged "ill-gotten fees" amounting to $1.35 billion collected from customers associated with US-designated terrorist groups, such as ISIS and al-Qaeda. Consequently, Binance's CEO, Changpeng CZ Zhao, has faced a staggering $150 million fine for his purported involvement in the scheme. He had earlier stepped down from his CEO position under coercion earlier in the year. In response to the court's decision, Binance has acknowledged and accepted the ruling. The exchange claims to have taken measures to enhance its compliance and risk management systems. Disclaimer: Voice of Crypto strives to present accurate and current information; however, it disclaims responsibility for any potential omissions or inaccuracies. Given the high volatility of cryptocurrencies, prudent research is advised before making any financial decisions. #BinanceWish #binance #Hack #Hacked

Binance's Dual Crisis: Software Breach & $2.7B Fine Unveil Data Exposures

1. A hacker asserts possession of crucial Binance software housing user information such as emails, phone numbers, and wallet IDs.
2. The hacker purportedly gained entry to this software via phishing emails aimed at law enforcement officials in Uganda, Taiwan, and the Philippines.
3. The hacker intends to sell the software for approximately $10,000.
4. Binance encountered a substantial $2.7 billion fine, while CX confronts a parallel fine amounting to $150 million.

Binance, a major cryptocurrency exchange, finds itself in a series of setbacks yet again, exacerbating its ongoing challenges.
The recent incident involves a cyber attacker who claims to have acquired access to Binance's software used for facilitating law enforcement requests. This software aids the exchange in collaborating with governmental bodies on criminal investigations. The hacker is purportedly selling access to this software for $10,000 in Bitcoin or Monero on Breach Forums, a dark web forum.
Reports suggest that the breach occurred through phishing emails sent to law enforcement officers in Uganda, the Philippines, and Taiwan. These emails contained malware that infiltrated the officers' devices, allowing the hacker to obtain browser credentials. With this illicit access, the hacker breached Binance's law enforcement portal on kodexglobal.com.
Allegedly, the compromised access includes sensitive information such as emails, phone numbers, wallet IDs, and potentially more details about Binance's customers. The hacker even shared screenshots of the breached portal on the aforementioned forum as evidence.
Despite the claims, Binance has not confirmed the veracity of the hacker's assertions. The exchange, however, assured that its customers' funds have remained secure thus far.
Moreover, Binance is grappling with legal troubles in the United States. A recent announcement by the Commodity Futures Trading Commission (CFTC) disclosed a court order for Binance to pay a substantial $2.7 billion fine. This penalty stems from alleged "ill-gotten fees" amounting to $1.35 billion collected from customers associated with US-designated terrorist groups, such as ISIS and al-Qaeda.
Consequently, Binance's CEO, Changpeng CZ Zhao, has faced a staggering $150 million fine for his purported involvement in the scheme. He had earlier stepped down from his CEO position under coercion earlier in the year.
In response to the court's decision, Binance has acknowledged and accepted the ruling. The exchange claims to have taken measures to enhance its compliance and risk management systems.
Disclaimer: Voice of Crypto strives to present accurate and current information; however, it disclaims responsibility for any potential omissions or inaccuracies. Given the high volatility of cryptocurrencies, prudent research is advised before making any financial decisions.

#BinanceWish #binance #Hack #Hacked
Ripple Faces $112 Million Hack. 😱 In a shocking development, Ripple, a leading cryptocurrency entity, has fallen victim to a significant security breach, resulting in the loss of around 213 million XRP, valued at a staggering $112.5 million. This alarming incident, brought to light by crypto digital detective ZachXBT on January 31, 2024, has sparked widespread concerns regarding security protocols in the cryptocurrency industry. The source address implicated in the hack, identified as rJNLz3A1qPKfWCtJLPhmMZAfBkutC2Qojm, served as the origin of the illicit activity. The stolen funds were subsequently funneled through multiple cryptocurrency exchanges, including MEXC, Gate, Binance, Kraken, OKX, HTX, HitBTC, heightening the complexity of tracking. Ripple's Co-founder and Executive Chairman, Chris Larsen, issued an official statement acknowledging the breach. He clarified that the unauthorized access targeted his personal XRP accounts, not those of Ripple. Prompt measures were taken to identify and freeze the affected addresses, with law enforcement actively engaged in the investigation. The hacking incident aligns with Ripple's scheduled release of 1 billion XRP from its escrow account. While this routine release typically triggers speculation about its impact on XRP's market value, the security breach introduces an added layer of uncertainty. Concerns escalate regarding investor confidence and the market's response to the impending escrow release. With the cryptocurrency market already on edge due to potential XRP sell-offs following the escrow release, the security breach intensifies anxieties. The community closely watches for how this event might influence investor confidence and exacerbate reactions to the substantial upcoming XRP release. #xrp #ripple #Hacked #RippleUpdate #zachxbt
Ripple Faces $112 Million Hack. 😱

In a shocking development, Ripple, a leading cryptocurrency entity, has fallen victim to a significant security breach, resulting in the loss of around 213 million XRP, valued at a staggering $112.5 million. This alarming incident, brought to light by crypto digital detective ZachXBT on January 31, 2024, has sparked widespread concerns regarding security protocols in the cryptocurrency industry.

The source address implicated in the hack, identified as rJNLz3A1qPKfWCtJLPhmMZAfBkutC2Qojm, served as the origin of the illicit activity. The stolen funds were subsequently funneled through multiple cryptocurrency exchanges, including MEXC, Gate, Binance, Kraken, OKX, HTX, HitBTC, heightening the complexity of tracking.

Ripple's Co-founder and Executive Chairman, Chris Larsen, issued an official statement acknowledging the breach. He clarified that the unauthorized access targeted his personal XRP accounts, not those of Ripple. Prompt measures were taken to identify and freeze the affected addresses, with law enforcement actively engaged in the investigation.

The hacking incident aligns with Ripple's scheduled release of 1 billion XRP from its escrow account. While this routine release typically triggers speculation about its impact on XRP's market value, the security breach introduces an added layer of uncertainty. Concerns escalate regarding investor confidence and the market's response to the impending escrow release.

With the cryptocurrency market already on edge due to potential XRP sell-offs following the escrow release, the security breach intensifies anxieties. The community closely watches for how this event might influence investor confidence and exacerbate reactions to the substantial upcoming XRP release.

#xrp #ripple #Hacked #RippleUpdate #zachxbt
LIVE
--
Bearish
🚨 Crypto Chronicles Unveiled! The @raft_fi hack unfolds, birthing an unbacked treasure of ~$6.7M #stablecoin R! 💎💸 💡 Intricate Maneuvers: Our analysis unveils a masterful hack dance, playing with round issues and donations to manipulate the rcbETH-c collateral token's index rate. Result? A slick $6.7M R minted! 🎭💰 🔄 Crafty Redemption: The hack's brilliance lies in minting extra rcbETH-c for a flawless redemption of the donation. Artistry in action! 🌟🔗 🔍 Trace the Trail: For the curious minds, the related transaction hash: 👇👇👇 0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7. Explore the saga, but tread carefully! 🕵️‍♂️🔐 #cryptocurrency #HackerAlert #Hacked Disclaimer: Navigate the crypto landscape with awareness. The unexpected may be just around the corner! 🌐🚀 😍 A small LIKE and FOLLOW, Motivates me a lot 😍
🚨 Crypto Chronicles Unveiled! The @raft_fi hack unfolds, birthing an unbacked treasure of ~$6.7M #stablecoin R! 💎💸

💡 Intricate Maneuvers: Our analysis unveils a masterful hack dance, playing with round issues and donations to manipulate the rcbETH-c collateral token's index rate. Result? A slick $6.7M R minted! 🎭💰

🔄 Crafty Redemption: The hack's brilliance lies in minting extra rcbETH-c for a flawless redemption of the donation. Artistry in action! 🌟🔗

🔍 Trace the Trail: For the curious minds, the related transaction hash:
👇👇👇
0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7.

Explore the saga, but tread carefully! 🕵️‍♂️🔐

#cryptocurrency #HackerAlert #Hacked
Disclaimer: Navigate the crypto landscape with awareness. The unexpected may be just around the corner! 🌐🚀

😍 A small LIKE and FOLLOW, Motivates me a lot 😍
🚨 Breaking News: Ripple Suffers Major Security Breach 🚨 In a startling development, Ripple ($XRP ) , has been hit by a massive security breach. According to the latest reports from noted cryptocurrency investigator ZachXBT, the platform has lost a staggering 213 million XRP tokens, amounting to over 112.5 million USD. #Write2Earn #TradeNTell #Hacked
🚨 Breaking News: Ripple Suffers Major Security Breach 🚨

In a startling development, Ripple ($XRP ) , has been hit by a massive security breach. According to the latest reports from noted cryptocurrency investigator ZachXBT, the platform has lost a staggering 213 million XRP tokens, amounting to over 112.5 million USD.

#Write2Earn #TradeNTell #Hacked
🔴Hacker Hacked $100 Million Worth of $SHIB 🔴 ZachXBT said in a Telegram message in the “Investigations by ZachXBT” channel that the attacker’s address still has over $100 million to dump. ZachXBT stated, “the attacker still has $100M+ worth of SHIB and $4.7M+ $FLOKI to sell where liquidated 7.6 million worh of $PEPE .” On-chain data shows the attacker possessed $100 million in Shiba Inu. Unlike other hackers who returned assets to exchanges, the WazirX hacker shows no remorse. The hacker made $618K in SHIB in their first transaction within hours. Lookonchain data shows the hacker has 5.4T SHIB, worth over $95M. The WazirX team halted crypto and INR withdrawals after the security compromise. In an X post, WazirX said the team is “actively investigating the incident #Hacked #alert #Mt_Gox_BTC_Dip #ETH_ETF_Approval_23July #bitcoin☀️
🔴Hacker Hacked $100 Million Worth of $SHIB 🔴

ZachXBT said in a Telegram message in the “Investigations by ZachXBT” channel that the attacker’s address still has over $100 million to dump. ZachXBT stated, “the attacker still has $100M+ worth of SHIB and $4.7M+ $FLOKI to sell where liquidated 7.6 million worh of $PEPE .” On-chain data shows the attacker possessed $100 million in Shiba Inu. Unlike other hackers who returned assets to exchanges, the WazirX hacker shows no remorse. The hacker made $618K in SHIB in their first transaction within hours.
Lookonchain data shows the hacker has 5.4T SHIB, worth over $95M. The WazirX team halted crypto and INR withdrawals after the security compromise. In an X post, WazirX said the team is “actively investigating the incident

#Hacked #alert #Mt_Gox_BTC_Dip #ETH_ETF_Approval_23July #bitcoin☀️
👉👉👉 South Korea’s crypto karaoke platform #Hacked for over $11.5 million Somesing, a blockchain-based social karaoke platform in South Korea, experienced a security breach on Saturday resulting in the loss of 730 million of its native token SSX, equivalent to $11.58 million, as per the platform's official announcement. The compromised amount includes 504 million undistributed SSX tokens intended for circulation by the end of 2025, along with 226 million SSX held by the Somesing foundation, already part of its existing circulation. Somesing clarified that the hacking incident is unrelated to any member of the SOMESING team and is believed to be the work of professional hackers specializing in virtual asset breaches. The platform promptly reported the incident to the National Police Agency and plans to involve Interpol in the investigation. To trace the attacker, Somesing is collaborating with the local #blockchain​ entity #Klaytn Foundation and Interpol partner firm Uppsala Security. The platform aims to freeze the assets and pursue legal action once the perpetrator is identified. In response to Somesing's request, major South Korean crypto exchanges, including Upbit, Bithumb, and Coinone, have temporarily suspended deposit and withdrawal services for SSX. Users are cautioned about potential price volatility resulting from the security breach. While the token is also listed on HTX and Gate.io, they have not issued similar warnings. Somesing, a Klaytn-based platform rewarding users for karaoke recordings, faced a security breach losing 730 million SSX tokens (equivalent to $11.58 million). Major South Korean exchanges temporarily halted SSX deposit and withdrawal services. Somesing, known for incentivizing users with tokens, is collaborating with authorities and blockchain entities to trace the attacker. While the incident raises cybersecurity concerns, data shows a 50% reduction in crypto hacks in 2023 compared to 2022. Despite inquiries, Somesing has not provided additional comments on the breach. Source - theblock.co #CryptoNews #BinanceSquare
👉👉👉 South Korea’s crypto karaoke platform #Hacked for over $11.5 million

Somesing, a blockchain-based social karaoke platform in South Korea, experienced a security breach on Saturday resulting in the loss of 730 million of its native token SSX, equivalent to $11.58 million, as per the platform's official announcement.

The compromised amount includes 504 million undistributed SSX tokens intended for circulation by the end of 2025, along with 226 million SSX held by the Somesing foundation, already part of its existing circulation.

Somesing clarified that the hacking incident is unrelated to any member of the SOMESING team and is believed to be the work of professional hackers specializing in virtual asset breaches.

The platform promptly reported the incident to the National Police Agency and plans to involve Interpol in the investigation. To trace the attacker, Somesing is collaborating with the local #blockchain​ entity #Klaytn Foundation and Interpol partner firm Uppsala Security. The platform aims to freeze the assets and pursue legal action once the perpetrator is identified.

In response to Somesing's request, major South Korean crypto exchanges, including Upbit, Bithumb, and Coinone, have temporarily suspended deposit and withdrawal services for SSX. Users are cautioned about potential price volatility resulting from the security breach. While the token is also listed on HTX and Gate.io, they have not issued similar warnings.

Somesing, a Klaytn-based platform rewarding users for karaoke recordings, faced a security breach losing 730 million SSX tokens (equivalent to $11.58 million). Major South Korean exchanges temporarily halted SSX deposit and withdrawal services. Somesing, known for incentivizing users with tokens, is collaborating with authorities and blockchain entities to trace the attacker. While the incident raises cybersecurity concerns, data shows a 50% reduction in crypto hacks in 2023 compared to 2022. Despite inquiries, Somesing has not provided additional comments on the breach.

Source - theblock.co

#CryptoNews #BinanceSquare
How Can Rapidly Revoke Third-party Provider Access During an Exploit?In times of potential exploit, it is of utmost importance to quickly revoke access to third-party providers. Third-party providers often have access to sensitive data and systems, and any breach or compromise in their security can lead to significant damage. By promptly revoking their access, organizations can minimize the potential impact of an exploit and prevent further unauthorized access or data breaches. It is crucial for organizations to have robust processes in place to swiftly identify and respond to potential threats and vulnerabilities, ensuring the protection of their systems and data. Delayed action can give hackers more time to exploit vulnerabilities, leading to a larger-scale breach with far-reaching consequences. Additionally, a delayed response may also result in regulatory violations and fines, further damaging the organization's reputation and financial stability. Therefore, organizations must prioritize swift action and regular reviews of third-party access to mitigate potential risks effectively. One effective strategy is to establish clear protocols and procedures for revoking third-party access immediately upon detection of suspicious activity. This includes regularly reviewing and updating access privileges to ensure that only trusted individuals or entities have access to sensitive data. Furthermore, organizations should consider implementing automated monitoring systems that can detect and alert them to any unusual or unauthorized access attempts. By taking these proactive measures, organizations can minimize the impact of security breaches and protect themselves from the serious consequences that can result from delayed action. Understanding Potential Exploits Organizations should stay up-to-date with the latest hacking techniques and vulnerabilities to better understand the potential risks they face. By conducting regular security audits and penetration testing, organizations can identify and address any weaknesses in their systems before they can be exploited. Additionally, educating employees about the different types of exploits, such as phishing or social engineering, can help them recognize and avoid potential threats, further strengthening the organization's overall security posture. This includes monitoring network traffic for any unusual patterns or spikes in activity, as well as regularly reviewing logs and alerts for any suspicious behavior. Organizations should also establish incident response plans and train employees on how to properly report and handle security incidents. By staying vigilant and proactive, organizations can minimize the impact of a potential exploit and protect their sensitive data from falling into the wrong hands. In the event of a cyber attack, every second counts, as hackers can quickly infiltrate systems and cause irreparable harm. By promptly identifying and containing the breach, organizations can limit the spread of malware or unauthorized access, preventing further compromise of critical systems and data. Additionally, swift action allows for effective communication with stakeholders and authorities, enabling a coordinated response that helps to restore normal operations and maintain trust with customers and partners. Ultimately, the ability to act swiftly and decisively is paramount in minimizing the financial, reputational, and legal consequences of a cyber attack. Establishing a Robust Access Revocation Protocol By clearly identifying all external entities with access privileges, organizations can quickly revoke access in the event of a breach or when a third-party's trustworthiness is called into question. This proactive approach ensures that only authorized individuals and organizations have access to critical systems, reducing the potential for unauthorized access and minimizing the risk of a cyber attack. This system can provide real-time monitoring and control over access permissions, allowing organizations to promptly revoke access when necessary. Additionally, regular audits and assessments of the access control system can help identify any vulnerabilities or weaknesses that need to be addressed, further enhancing the overall security of the organization's critical systems. By continuously improving and refining the access revocation protocol, organizations can stay one step ahead of potential threats and ensure the protection of sensitive data and resources. As organizations often rely on third-party providers for various services, it is crucial to regularly evaluate their access permissions and revoke them when necessary. This practice helps mitigate the risk of unauthorized access through these providers and ensures that only trusted entities have access to critical systems. By regularly reviewing and updating this list, organizations can ensure that their access control protocols remain robust and aligned with their security needs. Monitoring and Alert Systems These systems can detect and notify organizations of any suspicious activities or unusual behavior, allowing them to respond promptly and mitigate potential threats. By continuously monitoring their networks and systems, organizations can stay one step ahead of cybercriminals and prevent significant data breaches or unauthorized access. Additionally, implementing automated alert systems enables organizations to respond quickly to any security incidents, minimizing the potential impact on their operations and reputation. #Security #Hacked

How Can Rapidly Revoke Third-party Provider Access During an Exploit?

In times of potential exploit, it is of utmost importance to quickly revoke access to third-party providers. Third-party providers often have access to sensitive data and systems, and any breach or compromise in their security can lead to significant damage. By promptly revoking their access, organizations can minimize the potential impact of an exploit and prevent further unauthorized access or data breaches. It is crucial for organizations to have robust processes in place to swiftly identify and respond to potential threats and vulnerabilities, ensuring the protection of their systems and data.
Delayed action can give hackers more time to exploit vulnerabilities, leading to a larger-scale breach with far-reaching consequences. Additionally, a delayed response may also result in regulatory violations and fines, further damaging the organization's reputation and financial stability. Therefore, organizations must prioritize swift action and regular reviews of third-party access to mitigate potential risks effectively.
One effective strategy is to establish clear protocols and procedures for revoking third-party access immediately upon detection of suspicious activity. This includes regularly reviewing and updating access privileges to ensure that only trusted individuals or entities have access to sensitive data. Furthermore, organizations should consider implementing automated monitoring systems that can detect and alert them to any unusual or unauthorized access attempts. By taking these proactive measures, organizations can minimize the impact of security breaches and protect themselves from the serious consequences that can result from delayed action.
Understanding Potential Exploits
Organizations should stay up-to-date with the latest hacking techniques and vulnerabilities to better understand the potential risks they face. By conducting regular security audits and penetration testing, organizations can identify and address any weaknesses in their systems before they can be exploited. Additionally, educating employees about the different types of exploits, such as phishing or social engineering, can help them recognize and avoid potential threats, further strengthening the organization's overall security posture.
This includes monitoring network traffic for any unusual patterns or spikes in activity, as well as regularly reviewing logs and alerts for any suspicious behavior. Organizations should also establish incident response plans and train employees on how to properly report and handle security incidents. By staying vigilant and proactive, organizations can minimize the impact of a potential exploit and protect their sensitive data from falling into the wrong hands.
In the event of a cyber attack, every second counts, as hackers can quickly infiltrate systems and cause irreparable harm. By promptly identifying and containing the breach, organizations can limit the spread of malware or unauthorized access, preventing further compromise of critical systems and data. Additionally, swift action allows for effective communication with stakeholders and authorities, enabling a coordinated response that helps to restore normal operations and maintain trust with customers and partners. Ultimately, the ability to act swiftly and decisively is paramount in minimizing the financial, reputational, and legal consequences of a cyber attack.
Establishing a Robust Access Revocation Protocol
By clearly identifying all external entities with access privileges, organizations can quickly revoke access in the event of a breach or when a third-party's trustworthiness is called into question. This proactive approach ensures that only authorized individuals and organizations have access to critical systems, reducing the potential for unauthorized access and minimizing the risk of a cyber attack.
This system can provide real-time monitoring and control over access permissions, allowing organizations to promptly revoke access when necessary. Additionally, regular audits and assessments of the access control system can help identify any vulnerabilities or weaknesses that need to be addressed, further enhancing the overall security of the organization's critical systems. By continuously improving and refining the access revocation protocol, organizations can stay one step ahead of potential threats and ensure the protection of sensitive data and resources.
As organizations often rely on third-party providers for various services, it is crucial to regularly evaluate their access permissions and revoke them when necessary. This practice helps mitigate the risk of unauthorized access through these providers and ensures that only trusted entities have access to critical systems. By regularly reviewing and updating this list, organizations can ensure that their access control protocols remain robust and aligned with their security needs.
Monitoring and Alert Systems
These systems can detect and notify organizations of any suspicious activities or unusual behavior, allowing them to respond promptly and mitigate potential threats. By continuously monitoring their networks and systems, organizations can stay one step ahead of cybercriminals and prevent significant data breaches or unauthorized access. Additionally, implementing automated alert systems enables organizations to respond quickly to any security incidents, minimizing the potential impact on their operations and reputation.
#Security #Hacked
Japanese Crypto Exchange DMM Bitcoin Hacked DMM Bitcoin has been hacked, resulting in the loss of 4,502.89 BTC, valued at approximately $305 million. The stolen BTC has been transferred to the following 10 addresses: Address: bc1qegcazuxnp5wxxxamdqvjv345fpve6656vpjln4 Address: bc1qgcv2j80009apvjekph40wagwutfu6l3gcm2fw0 Address: bc1q2u9m2eqy8glvrjeqr5sceqngpad6dnxrtyxlf3 Address: bc1q2tu4dxyvnaquar96mj99yqjanfzgg3fv4gzytd Address: bc1q7p3atj3v95k4pd7qxnnqlhjwu843ty2hqn9gy0 Address: bc1qr4vnu4f4tl3gwfxt6a5hgt6vuusgsd0j2cnz74 Address: bc1q3ur23g02rq5w0x6y8vek3xradjgs080nzksfje Address: bc1qrtltlc7zjzj3knde2tqjt7tl2p5l2keh4l2uka Address: bc1qx6jpnnfjrfcx9ehhdmj7qqyzpyd8pek00trrq7 Address: bc1q7pdecv2raf3x84unxlv9ghtpjfpwlam6dx27xd The investigation into the hack is ongoing, and authorities are working to trace the stolen funds. #exchange #Hacked
Japanese Crypto Exchange DMM Bitcoin Hacked
DMM Bitcoin has been hacked, resulting in the loss of 4,502.89 BTC, valued at approximately $305 million. The stolen BTC has been transferred to the following 10 addresses:

Address: bc1qegcazuxnp5wxxxamdqvjv345fpve6656vpjln4
Address: bc1qgcv2j80009apvjekph40wagwutfu6l3gcm2fw0
Address: bc1q2u9m2eqy8glvrjeqr5sceqngpad6dnxrtyxlf3
Address: bc1q2tu4dxyvnaquar96mj99yqjanfzgg3fv4gzytd
Address: bc1q7p3atj3v95k4pd7qxnnqlhjwu843ty2hqn9gy0
Address: bc1qr4vnu4f4tl3gwfxt6a5hgt6vuusgsd0j2cnz74
Address: bc1q3ur23g02rq5w0x6y8vek3xradjgs080nzksfje
Address: bc1qrtltlc7zjzj3knde2tqjt7tl2p5l2keh4l2uka
Address: bc1qx6jpnnfjrfcx9ehhdmj7qqyzpyd8pek00trrq7
Address: bc1q7pdecv2raf3x84unxlv9ghtpjfpwlam6dx27xd

The investigation into the hack is ongoing, and authorities are working to trace the stolen funds.

#exchange #Hacked
UNEXPECTED WINDFALL💀🚨‼️ I thought I'd lost all my money! But then I saw an email that made my heart race. I had forgotten about a small investment I made a while back. When I checked, I couldn't believe it - my $500 had grown to $1,200! I had made a profit of $700 without even realizing it. It all came back to me - the evening I took a chance on a new cryptocurrency. I meant to check on it later, but life got busy and I forgot. Weeks turned into months, and it slipped my mind. Seeing that profit was an amazing feeling - excitement, happiness, and pride. It showed me that taking smart risks can lead to big rewards. I shared the news with friends and family, and they were just as excited as I was. That small risk paid off in a big way! Don't forget to vote for me $SOL $BNB $BTC #Write2Earn! #Saminakhan #Hacked #ScamAware #Alert🔴
UNEXPECTED WINDFALL💀🚨‼️

I thought I'd lost all my money! But then I saw an email that made my heart race. I had forgotten about a small investment I made a while back. When I checked, I couldn't believe it - my $500 had grown to $1,200! I had made a profit of $700 without even realizing it.

It all came back to me - the evening I took a chance on a new cryptocurrency. I meant to check on it later, but life got busy and I forgot. Weeks turned into months, and it slipped my mind.

Seeing that profit was an amazing feeling - excitement, happiness, and pride. It showed me that taking smart risks can lead to big rewards. I shared the news with friends and family, and they were just as excited as I was. That small risk paid off in a big way!

Don't forget to vote for me

$SOL $BNB $BTC
#Write2Earn! #Saminakhan #Hacked #ScamAware #Alert🔴
🔴🔴 Yesterday's UwU_Lend hack leads to $19.4m loss 🔴🔴 The root cause is a price oracle issue. In particular, the sUSDe asset is priced as median from multiple sources. Five of them, i.e., FRAXUSDe, USDeUSDC, USDeDAI, USDecrvUSD, and GHOUSDe, were manipulated during the hack. 🔼 Data Credit - DefiPrime 🅃🄴🄲🄷🄰🄽🄳🅃🄸🄿🅂123 #Hacked #Binance
🔴🔴 Yesterday's UwU_Lend hack leads to $19.4m loss 🔴🔴

The root cause is a price oracle issue. In particular, the sUSDe asset is priced as median from multiple sources. Five of them, i.e., FRAXUSDe, USDeUSDC, USDeDAI, USDecrvUSD, and GHOUSDe, were manipulated during the hack.

🔼 Data Credit - DefiPrime

🅃🄴🄲🄷🄰🄽🄳🅃🄸🄿🅂123
#Hacked #Binance
MicroStrategy lost $425,000 in a crypto phishing scam involving $134,000 wBAI, $122,000 CHEX, $45,000 wPOKT, and $329,000 in Ethereum-based tokens. The incident at 12:43 am UTC led to skepticism as influencers questioned the improbable launch of an Ethereum token by MicroStrategy. This highlights the importance of vigilance in the crypto space, urging caution against scams exploiting reputable brands. The community emphasizes due diligence amid the evolving cryptocurrency landscape. #MicroStrategy #BTC #Hacked #hack #hacking
MicroStrategy lost $425,000 in a crypto phishing scam involving $134,000 wBAI, $122,000 CHEX, $45,000 wPOKT, and $329,000 in Ethereum-based tokens.

The incident at 12:43 am UTC led to skepticism as influencers questioned the improbable launch of an Ethereum token by MicroStrategy.

This highlights the importance of vigilance in the crypto space, urging caution against scams exploiting reputable brands.

The community emphasizes due diligence amid the evolving cryptocurrency landscape.

#MicroStrategy #BTC #Hacked #hack #hacking
LIVE
--
Bearish
Breaking: Justin Sun’s Poloniex exchange (0xA9...22ba) was suspected of being stolen, and the loss of assets may exceed 60 million US dollars. Poloniex stated that the exchange wallet has been disabled for maintenance and will be updated once the wallet is re-enabled.
Breaking: Justin Sun’s Poloniex exchange (0xA9...22ba) was suspected of being stolen, and the loss of assets may exceed 60 million US dollars.

Poloniex stated that the exchange wallet has been disabled for maintenance and will be updated once the wallet is re-enabled.
📰Breaking: Velocore Suspected #Hacked $10M in User LPs Stolen: DEX Velocore on zkSync and Linea is suspected to have been hacked, with $10 million in users’ LPs stolen. Linea temporarily stopped producing blocks but has since resumed. Hackers have transferred part of the stolen ETH to the Ethereum mainnet.
📰Breaking: Velocore Suspected #Hacked $10M in User LPs Stolen:

DEX Velocore on zkSync and Linea is suspected to have been hacked, with $10 million in users’ LPs stolen. Linea temporarily stopped producing blocks but has since resumed. Hackers have transferred part of the stolen ETH to the Ethereum mainnet.
LIVE
--
Bullish
Quick recap ‣ McDonald's IG got hacked ‣ $700k rugged via $GRIMACE token ‣ Hackers claim to be "India_X_Kr3w" Next step 🔺 ‣ @India_X_Kr3w handle was available ‣ Someone grabbed it, created the account ‣ It's already pushing another scam crypto is too much fun 😂😂😂😂😂 #mcdonald #TRX #solana #Hacked #grimace
Quick recap

‣ McDonald's IG got hacked
‣ $700k rugged via $GRIMACE token
‣ Hackers claim to be "India_X_Kr3w"

Next step
🔺

‣ @India_X_Kr3w handle was available
‣ Someone grabbed it, created the account
‣ It's already pushing another scam

crypto is too much fun 😂😂😂😂😂

#mcdonald #TRX #solana #Hacked #grimace
#Alert🔴 #Hacked Danger as wave of crypto influencers and celeb X accounts are hacked. The social media accounts of famous traders, rappers and even Caitlyn Jenner are shilling tokens in what many believe is part of an orchestrated string of hacks.
#Alert🔴 #Hacked

Danger as wave of crypto influencers and celeb X accounts are hacked.

The social media accounts of famous traders, rappers and even Caitlyn Jenner are shilling tokens in what many believe is part of an orchestrated string of hacks.
⚡⚡⚡ Poloniex #exchange got #Hacked . Justin Sun confirmed the information. 📃 According to various estimates, from $28 to $114 MM were withdrawn from #Poloniex in different #crypto tokens 👛 After that #hackers bought $20 MM of $TRX 💡Justin promised to reimburse stolen funds.
⚡⚡⚡ Poloniex #exchange got #Hacked . Justin Sun confirmed the information.
📃 According to various estimates, from $28 to $114 MM were withdrawn from #Poloniex in different #crypto tokens
👛 After that #hackers bought $20 MM of $TRX
💡Justin promised to reimburse stolen funds.
🚨 𝘽𝙧𝙚𝙖𝙠𝙞𝙣𝙜 𝙉𝙚𝙬𝙨: 𝙄𝙣𝙙𝙞𝙖𝙣 𝘾𝙧𝙮𝙥𝙩𝙤 𝙀𝙭𝙘𝙝𝙖𝙣𝙜𝙚 𝙒𝙖𝙯𝙞𝙧𝙓 𝙃𝙖𝙘𝙠𝙚𝙙, $230𝙈 𝙎𝙩𝙤𝙡𝙚𝙣 🚨🚨 A devastating security breach has struck WazirX, a prominent Indian cryptocurrency exchange. According to Cyvers, a security platform, multiple suspicious transactions were detected emanating from WazirX's multisig wallet on the Ethereum network.Key highlights of the hack:- WazirX, a leading Indian crypto exchange, has been compromised. - Cyvers identified multiple suspicious transactions from WazirX's multisig wallet. - A staggering $234.9 million worth of cryptocurrency was stolen. - The hackers have already swapped PEPE, GALE, and USDT for ETH. - The stolen funds include: - 5.43T $SHIB ($102M) - 15,298 $ETH ($52.5M) - 20.5M $MATIC ($11.24M) - 640.27B $PEPE ($7.6M) - 5.79M $USDT ($5.79M) - 135M $GALA ($3.5M)This incident highlights the importance of robust security measures in the cryptocurrency space. r #wazirX #Hacked #Write2Earn! #BinanceTournament #BinanceTurns7
🚨 𝘽𝙧𝙚𝙖𝙠𝙞𝙣𝙜 𝙉𝙚𝙬𝙨: 𝙄𝙣𝙙𝙞𝙖𝙣 𝘾𝙧𝙮𝙥𝙩𝙤 𝙀𝙭𝙘𝙝𝙖𝙣𝙜𝙚 𝙒𝙖𝙯𝙞𝙧𝙓 𝙃𝙖𝙘𝙠𝙚𝙙, $230𝙈 𝙎𝙩𝙤𝙡𝙚𝙣 🚨🚨

A devastating security breach has struck WazirX, a prominent Indian cryptocurrency exchange. According to Cyvers, a security platform, multiple suspicious transactions were detected emanating from WazirX's multisig wallet on the Ethereum network.Key highlights of the hack:- WazirX, a leading Indian crypto exchange, has been compromised.

- Cyvers identified multiple suspicious transactions from WazirX's multisig wallet.
- A staggering $234.9 million worth of cryptocurrency was stolen.
- The hackers have already swapped PEPE, GALE, and USDT for ETH.

- The stolen funds include:
- 5.43T $SHIB ($102M)
- 15,298 $ETH ($52.5M)
- 20.5M $MATIC ($11.24M)
- 640.27B $PEPE ($7.6M)
- 5.79M $USDT ($5.79M)
- 135M $GALA ($3.5M)This incident highlights the importance of robust security measures in the cryptocurrency space. r #wazirX #Hacked
#Write2Earn! #BinanceTournament #BinanceTurns7
#RoninBridge was hacked again A white hat MEV bot stole 3,996 #ETH ($10.08M) and 2M #USDC 6 hours ago. Ronin Bridge was #Hacked for $600M in March 2022. Axie/Ronin co-founder was hacked for $9.7M in February 2024. Currently, the 3,996 #Ethereum ($10.08M) has been returned.
#RoninBridge was hacked again

A white hat MEV bot stole 3,996 #ETH ($10.08M) and 2M #USDC 6 hours ago.

Ronin Bridge was #Hacked for $600M in March 2022.

Axie/Ronin co-founder was hacked for $9.7M in February 2024.

Currently, the 3,996 #Ethereum ($10.08M) has been returned.
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number