Binance Square
cybersecurity
375,728 views
221 Posts
Hot
Latest
LIVE
Moon5labs
--
German Watchdog Orders Worldcoin to Delete Illegally Collected DataWorldcoin Faces BayLDA Mandate Over Biometric Data The Bavarian State Office for Data Protection Supervision (BayLDA), Germany’s data protection authority, has issued corrective measures against Worldcoin (now known as World) regarding its handling of biometric data. Following an investigation, the agency has ordered the company to delete data collected in violation of GDPR rules. Compliance Deadline Set for One Month On December 19, BayLDA announced the conclusion of its GDPR compliance investigation into World. The regulator instructed Worldcoin to implement a data deletion process in alignment with European standards within one month. However, the World Foundation has appealed the decision, seeking clarification from regulators on whether its technology meets the EU’s legal definition of anonymization. Enhancing User Rights with World ID Launched in July 2023 by Tools for Humanity (TFH), Worldcoin utilizes iris recognition technology for identity verification. BayLDA’s investigation, initiated in 2023, highlighted concerns regarding the collection and handling of biometric data. BayLDA President Michael Will stated that the recent decision aims to enhance the rights of users who shared their biometric information. “With this decision, we are upholding European standards for data privacy and individual rights,” said Will. “All users will have the right to have their data deleted.” Additional Obligations for Worldcoin Beyond the data deletion mandate, Worldcoin must ensure explicit user consent for certain data processing activities. The company is also required to erase data records collected in the early stages of its operations. BayLDA clarified that these changes address data obtained between summer 2023 and the point when the project was adjusted to comply with legal requirements. World Foundation Calls for Clarification on Anonymization in the EU The World Foundation emphasized the need for a clear and consistent legal definition of anonymization in the EU. According to Damien Kieran, the company’s Chief Legal Officer, anonymization is a critical element for secure identity verification in the digital age. The foundation’s appeal aims to confirm whether its technology complies with European regulations. “Without a clear definition of anonymization, we risk losing a vital tool for protecting privacy in the era of artificial intelligence,” Kieran stated. The World Foundation and TFH plan to continue working closely with regulators in the EU and beyond to ensure that innovation and privacy protection go hand in hand. #worldcoin , #wld , #cryptonewss , #cybersecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

German Watchdog Orders Worldcoin to Delete Illegally Collected Data

Worldcoin Faces BayLDA Mandate Over Biometric Data
The Bavarian State Office for Data Protection Supervision (BayLDA), Germany’s data protection authority, has issued corrective measures against Worldcoin (now known as World) regarding its handling of biometric data. Following an investigation, the agency has ordered the company to delete data collected in violation of GDPR rules.
Compliance Deadline Set for One Month
On December 19, BayLDA announced the conclusion of its GDPR compliance investigation into World. The regulator instructed Worldcoin to implement a data deletion process in alignment with European standards within one month. However, the World Foundation has appealed the decision, seeking clarification from regulators on whether its technology meets the EU’s legal definition of anonymization.
Enhancing User Rights with World ID
Launched in July 2023 by Tools for Humanity (TFH), Worldcoin utilizes iris recognition technology for identity verification. BayLDA’s investigation, initiated in 2023, highlighted concerns regarding the collection and handling of biometric data. BayLDA President Michael Will stated that the recent decision aims to enhance the rights of users who shared their biometric information.

“With this decision, we are upholding European standards for data privacy and individual rights,” said Will. “All users will have the right to have their data deleted.”
Additional Obligations for Worldcoin
Beyond the data deletion mandate, Worldcoin must ensure explicit user consent for certain data processing activities. The company is also required to erase data records collected in the early stages of its operations. BayLDA clarified that these changes address data obtained between summer 2023 and the point when the project was adjusted to comply with legal requirements.

World Foundation Calls for Clarification on Anonymization in the EU
The World Foundation emphasized the need for a clear and consistent legal definition of anonymization in the EU. According to Damien Kieran, the company’s Chief Legal Officer, anonymization is a critical element for secure identity verification in the digital age. The foundation’s appeal aims to confirm whether its technology complies with European regulations.

“Without a clear definition of anonymization, we risk losing a vital tool for protecting privacy in the era of artificial intelligence,” Kieran stated. The World Foundation and TFH plan to continue working closely with regulators in the EU and beyond to ensure that innovation and privacy protection go hand in hand.

#worldcoin , #wld , #cryptonewss , #cybersecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Arizona Man Posed as Uber Driver to Steal $300,000 in CryptocurrencyDetectives from Scottsdale, in collaboration with U.S. Secret Service agents, arrested a man on December 11 for charges of theft, fraud, and money laundering. The suspect allegedly stole $300,000 worth of cryptocurrency from two unsuspecting passengers. Fake Uber Driver as a Trap According to Fox10 Phoenix, Nuruhussein Hussein pretended to be an Uber driver in Scottsdale, Arizona. The thefts reportedly occurred in March and October when Hussein lured victims waiting outside the W Hotel, posing as their ordered Uber ride. First Incident: Hussein allegedly asked to borrow a passenger's phone, claiming his device was broken.Second Incident: He offered to resolve issues with the Uber app after the victim questioned why the app showed the driver hadn’t arrived yet. Stealing Cryptocurrency from Coinbase Hussein reportedly used the opportunity to access the victims' Coinbase accounts while holding their phones. The stolen cryptocurrency was transferred from phone to phone and moved to cold storage (offline wallets). Court documents do not specify how Hussein knew the names of the passengers waiting for their Uber. Threatening the Victims When one victim grew suspicious, Hussein allegedly threatened them, saying: “Calm down, or something bad will happen.” Arrest and Charges Hussein was arrested by Scottsdale detectives and U.S. Secret Service agents on December 11. The judge set a $200,000 cash bond and ordered electronic monitoring if Hussein were to secure his release. The court imposed restrictions, including: No internet usage,No international travel, due to concerns that Hussein might destroy evidence or flee to Ethiopia, where he allegedly travels frequently. Hussein is scheduled to appear in court again on December 18. Rising Cases of Cryptocurrency Robberies According to GitHub, there have been at least 19 cases of offline crypto thefts worldwide in the past year. This compares to 17 cases in 2023 and 32 in 2021. One of the most notable incidents occurred in 2014, when an unknown attacker attempted to extort 1,000 bitcoins from computer scientist and cryptographer Hal Finney. At the time, the stolen amount was valued at $400,000. Recent Case in Australia In the latest recorded incident on December 3, thieves in Melbourne, Australia, crashed through a shopping center window and stole a Bitcoin ATM. Police later found the ATM pried open and burning in a park. #cryptofraud , #cryptocrime , #CryptoNewss , #cybersecurity , #Cryptoscam Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Arizona Man Posed as Uber Driver to Steal $300,000 in Cryptocurrency

Detectives from Scottsdale, in collaboration with U.S. Secret Service agents, arrested a man on December 11 for charges of theft, fraud, and money laundering. The suspect allegedly stole $300,000 worth of cryptocurrency from two unsuspecting passengers.
Fake Uber Driver as a Trap
According to Fox10 Phoenix, Nuruhussein Hussein pretended to be an Uber driver in Scottsdale, Arizona. The thefts reportedly occurred in March and October when Hussein lured victims waiting outside the W Hotel, posing as their ordered Uber ride.
First Incident: Hussein allegedly asked to borrow a passenger's phone, claiming his device was broken.Second Incident: He offered to resolve issues with the Uber app after the victim questioned why the app showed the driver hadn’t arrived yet.

Stealing Cryptocurrency from Coinbase
Hussein reportedly used the opportunity to access the victims' Coinbase accounts while holding their phones. The stolen cryptocurrency was transferred from phone to phone and moved to cold storage (offline wallets).
Court documents do not specify how Hussein knew the names of the passengers waiting for their Uber.
Threatening the Victims
When one victim grew suspicious, Hussein allegedly threatened them, saying: “Calm down, or something bad will happen.”
Arrest and Charges
Hussein was arrested by Scottsdale detectives and U.S. Secret Service agents on December 11. The judge set a $200,000 cash bond and ordered electronic monitoring if Hussein were to secure his release.
The court imposed restrictions, including:
No internet usage,No international travel, due to concerns that Hussein might destroy evidence or flee to Ethiopia, where he allegedly travels frequently.
Hussein is scheduled to appear in court again on December 18.
Rising Cases of Cryptocurrency Robberies
According to GitHub, there have been at least 19 cases of offline crypto thefts worldwide in the past year. This compares to 17 cases in 2023 and 32 in 2021.
One of the most notable incidents occurred in 2014, when an unknown attacker attempted to extort 1,000 bitcoins from computer scientist and cryptographer Hal Finney. At the time, the stolen amount was valued at $400,000.
Recent Case in Australia
In the latest recorded incident on December 3, thieves in Melbourne, Australia, crashed through a shopping center window and stole a Bitcoin ATM. Police later found the ATM pried open and burning in a park.

#cryptofraud , #cryptocrime , #CryptoNewss , #cybersecurity , #Cryptoscam

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
US Bitcoin ATM Operator Byte Federal Reports Data Breach Affecting 58,000 CustomersMassive Data Breach Impacts Thousands of Clients Byte Federal, one of the largest bitcoin ATM operators in the US, disclosed a security breach that may have affected up to 58,000 customers. The company, which operates 1,356 ATMs, revealed the incident more than a month after it occurred. Details of the Security Breach According to a report filed with the Maine Attorney General, the attack happened on September 30 but was discovered on November 18. An unknown attacker exploited a third-party software vulnerability to gain unauthorized access to client data. The potentially exposed data includes personal identifiers such as names, dates of birth, addresses, phone numbers, Social Security numbers, and even user photographs. Byte Federal stated, however, that there is no evidence of misuse of this data. Immediate Response by Byte Federal Upon discovering the breach, the company promptly shut down its platform and implemented preventive security measures to protect its clients. Byte Federal urged all users to reset their passwords and updated its internal security protocols, including password management systems, tokens, and access keys. Ongoing Forensic Investigation With the support of an external cybersecurity team, Byte Federal has launched a comprehensive investigation into the cause and scope of the incident. The company also noted that legal investigations are underway, and customers may be required to verify their identity upon login. Byte Federal's Market Presence Byte Federal operates 4.3% of all bitcoin ATMs in the US, making it a significant player in the industry. However, the market leader is Bitcoin Depot, which manages over 8,100 cryptocurrency ATMs. Rising Security Challenges in Bitcoin ATMs Bitcoin ATMs are a popular method for exchanging fiat currencies for cryptocurrencies, but their increasing popularity brings new security risks. According to the Federal Trade Commission, fraud involving bitcoin ATMs has surged by over 1,000% since 2020. This incident underscores the importance of strengthening security measures in cryptocurrency services. #Bitcoin❗ , #cryptofraud , #cybersecurity , #CryptoHack , #BTC☀ Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

US Bitcoin ATM Operator Byte Federal Reports Data Breach Affecting 58,000 Customers

Massive Data Breach Impacts Thousands of Clients
Byte Federal, one of the largest bitcoin ATM operators in the US, disclosed a security breach that may have affected up to 58,000 customers. The company, which operates 1,356 ATMs, revealed the incident more than a month after it occurred.
Details of the Security Breach
According to a report filed with the Maine Attorney General, the attack happened on September 30 but was discovered on November 18. An unknown attacker exploited a third-party software vulnerability to gain unauthorized access to client data.
The potentially exposed data includes personal identifiers such as names, dates of birth, addresses, phone numbers, Social Security numbers, and even user photographs. Byte Federal stated, however, that there is no evidence of misuse of this data.

Immediate Response by Byte Federal
Upon discovering the breach, the company promptly shut down its platform and implemented preventive security measures to protect its clients. Byte Federal urged all users to reset their passwords and updated its internal security protocols, including password management systems, tokens, and access keys.
Ongoing Forensic Investigation
With the support of an external cybersecurity team, Byte Federal has launched a comprehensive investigation into the cause and scope of the incident. The company also noted that legal investigations are underway, and customers may be required to verify their identity upon login.
Byte Federal's Market Presence
Byte Federal operates 4.3% of all bitcoin ATMs in the US, making it a significant player in the industry. However, the market leader is Bitcoin Depot, which manages over 8,100 cryptocurrency ATMs.

Rising Security Challenges in Bitcoin ATMs
Bitcoin ATMs are a popular method for exchanging fiat currencies for cryptocurrencies, but their increasing popularity brings new security risks. According to the Federal Trade Commission, fraud involving bitcoin ATMs has surged by over 1,000% since 2020. This incident underscores the importance of strengthening security measures in cryptocurrency services.

#Bitcoin❗ , #cryptofraud , #cybersecurity , #CryptoHack , #BTC☀

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Coinbase Exploiter Flaunts $16 Million Loot and Lavish Lifestyle$16 Million Exploit: Coinbase Commerce Breached A fraudster known as "Excite" has gained attention after exploiting a flaw in Coinbase Commerce, stealing nearly $16 million. The exploit involved 1,700 transactions on the Polygon layer-2 network, allowing the attacker to convert stolen USDC from Polygon to Ethereum. How the Attack Was Executed The perpetrators employed a common tactic: splitting stolen funds across multiple wallets to obscure blockchain tracking. According to blockchain investigator ZachXBT, most of the stolen funds remain inactive, but some were funneled into crypto gambling platforms like eXch and Stake. Boasting on Social Media In May, a Telegram user with the handle "tezedasads12" claimed ownership of a wallet holding $6 million from the hack. This individual also took credit for managing the Instagram account "Excite," where they flaunted a lavish lifestyle, including a pet monkey and expensive watches allegedly purchased in Denmark with stolen funds. Questions About Coinbase's Security ZachXBT raised concerns about why Coinbase's Anti-Money Laundering (AML) monitoring system failed to flag the suspicious activity during the 16-hour window when the exploit occurred. There is also speculation that more individuals may have been involved, as the funds were divided in multiple ways. Other Discovered Heists This is not the first case uncovered by ZachXBT. In November, he revealed a $6.5 million theft from Coinbase users, allegedly orchestrated by a scammer named Ronald Spektor. Shortly after the report, Spektor deactivated his social media accounts, fueling suspicions of his involvement. ZachXBT also assisted an elderly victim in recovering $275,000 lost to Indian scammers posing as Coinbase support staff. Major Arrests Thanks to Investigations ZachXBT's investigations have led to significant arrests, including a $238 million crypto heist. This case involved scammers impersonating Coinbase support agents to defraud Genesis lender, stealing 4,064 BTC, as reported in August. Conclusion This case highlights severe security vulnerabilities in the crypto space, showing that even major platforms like Coinbase are not immune to sophisticated attacks. ZachXBT plays a crucial role in uncovering these crimes and helping victims recover their funds. #CryptoNewss , #cybersecurity , #BlockchainNews , #Cryptoscam , #CryptoHack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Coinbase Exploiter Flaunts $16 Million Loot and Lavish Lifestyle

$16 Million Exploit: Coinbase Commerce Breached
A fraudster known as "Excite" has gained attention after exploiting a flaw in Coinbase Commerce, stealing nearly $16 million. The exploit involved 1,700 transactions on the Polygon layer-2 network, allowing the attacker to convert stolen USDC from Polygon to Ethereum.

How the Attack Was Executed
The perpetrators employed a common tactic: splitting stolen funds across multiple wallets to obscure blockchain tracking. According to blockchain investigator ZachXBT, most of the stolen funds remain inactive, but some were funneled into crypto gambling platforms like eXch and Stake.
Boasting on Social Media
In May, a Telegram user with the handle "tezedasads12" claimed ownership of a wallet holding $6 million from the hack. This individual also took credit for managing the Instagram account "Excite," where they flaunted a lavish lifestyle, including a pet monkey and expensive watches allegedly purchased in Denmark with stolen funds.
Questions About Coinbase's Security
ZachXBT raised concerns about why Coinbase's Anti-Money Laundering (AML) monitoring system failed to flag the suspicious activity during the 16-hour window when the exploit occurred. There is also speculation that more individuals may have been involved, as the funds were divided in multiple ways.
Other Discovered Heists
This is not the first case uncovered by ZachXBT. In November, he revealed a $6.5 million theft from Coinbase users, allegedly orchestrated by a scammer named Ronald Spektor. Shortly after the report, Spektor deactivated his social media accounts, fueling suspicions of his involvement.
ZachXBT also assisted an elderly victim in recovering $275,000 lost to Indian scammers posing as Coinbase support staff.
Major Arrests Thanks to Investigations
ZachXBT's investigations have led to significant arrests, including a $238 million crypto heist. This case involved scammers impersonating Coinbase support agents to defraud Genesis lender, stealing 4,064 BTC, as reported in August.
Conclusion
This case highlights severe security vulnerabilities in the crypto space, showing that even major platforms like Coinbase are not immune to sophisticated attacks. ZachXBT plays a crucial role in uncovering these crimes and helping victims recover their funds.

#CryptoNewss , #cybersecurity , #BlockchainNews , #Cryptoscam , #CryptoHack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Scam Sniffer: Crypto Scams on X Nearly Double, Affecting Over 300 Accounts DailyA Sharp Rise in Fake Accounts Crypto scams on the social platform X (formerly Twitter) are gaining momentum once again. According to analysts from blockchain firm Scam Sniffer, the number of accounts impersonating others has surged by 87%, exceeding 300 daily, a significant jump from the November average of 160 accounts. Millions Lost to Fraudulent Schemes Scammers exploit high-profile accounts to promote fake tokens, resulting in massive financial losses. In one recent incident, two victims lost over $3 million worth of cryptocurrency after interacting with malicious links and signing transactions tied to fake accounts. The Solana blockchain has been particularly affected, with compromised accounts, including those of major entities like Yahoo News UK, Lenovo India, and Money Control, being used to promote a fraudulent meme coin called HACKED. ZachXBT Warns About Dangerous Links Blockchain investigator ZachXBT, who actively tracks these scams, has issued a warning to the crypto community, urging heightened caution. He noted that while scammers have earned less this time (the HACKED token's market cap reached only $67,000), the potential harm to users remains significant. ZachXBT also discovered that the compromised accounts were linked to the same malicious website or app. As a precaution, he advises users to immediately revoke access permissions to any unfamiliar websites or applications. Scams Target High-Profile Individuals This incident is just one of many. Recently, the account of football star Kylian Mbappé was exploited to promote a fake meme coin named MBAPPE. Similarly, in early September, hackers targeted accounts of family members of newly elected U.S. President Donald Trump in a scam involving a fake coin called World Liberty Financial. Conclusion: Caution Is Key Scams on the X platform pose a serious risk to the crypto community. Users should remain vigilant, regularly review account permissions, and avoid suspicious links or transactions. This trend highlights how sophisticated and dangerous social media scams have become. #cryptoscams , #cybersecurity , #CryptoNewss , #scamalert , #HackerNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Scam Sniffer: Crypto Scams on X Nearly Double, Affecting Over 300 Accounts Daily

A Sharp Rise in Fake Accounts
Crypto scams on the social platform X (formerly Twitter) are gaining momentum once again. According to analysts from blockchain firm Scam Sniffer, the number of accounts impersonating others has surged by 87%, exceeding 300 daily, a significant jump from the November average of 160 accounts.

Millions Lost to Fraudulent Schemes
Scammers exploit high-profile accounts to promote fake tokens, resulting in massive financial losses. In one recent incident, two victims lost over $3 million worth of cryptocurrency after interacting with malicious links and signing transactions tied to fake accounts.
The Solana blockchain has been particularly affected, with compromised accounts, including those of major entities like Yahoo News UK, Lenovo India, and Money Control, being used to promote a fraudulent meme coin called HACKED.
ZachXBT Warns About Dangerous Links
Blockchain investigator ZachXBT, who actively tracks these scams, has issued a warning to the crypto community, urging heightened caution. He noted that while scammers have earned less this time (the HACKED token's market cap reached only $67,000), the potential harm to users remains significant.
ZachXBT also discovered that the compromised accounts were linked to the same malicious website or app. As a precaution, he advises users to immediately revoke access permissions to any unfamiliar websites or applications.
Scams Target High-Profile Individuals
This incident is just one of many. Recently, the account of football star Kylian Mbappé was exploited to promote a fake meme coin named MBAPPE. Similarly, in early September, hackers targeted accounts of family members of newly elected U.S. President Donald Trump in a scam involving a fake coin called World Liberty Financial.
Conclusion: Caution Is Key
Scams on the X platform pose a serious risk to the crypto community. Users should remain vigilant, regularly review account permissions, and avoid suspicious links or transactions. This trend highlights how sophisticated and dangerous social media scams have become.

#cryptoscams , #cybersecurity , #CryptoNewss , #scamalert , #HackerNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Explained : Dusting Attack (Must Read)Dusting attack is a type of cyber attack that involves sending small amounts of cryptocurrency to a large number of addresses. The goal of a dusting attack is to track the movement of the cryptocurrency and potentially identify the owners of the addresses. In this article, we will explore the various aspects of dusting attacks, including its definition, types, and prevention measures. What is Dusting Attack? A dusting attack is a type of #cybersecurity attack that involves sending small amounts of cryptocurrency to a large number of addresses. The amount of cryptocurrency sent in a dusting attack is usually very small, sometimes less than the transaction fee required to process the transaction. The goal of a dusting attack is to track the movement of the cryptocurrency and potentially identify the owners of the addresses. Types of Dusting Attack There are two main types of dusting attack, including: Cluster Analysis: Cluster analysis involves tracking the movement of cryptocurrency between addresses to identify clusters of related addresses. This can help attackers to identify the owners of the addresses and potentially steal their cryptocurrency. Deanonymization: Deanonymization involves tracking the movement of cryptocurrency to identify the real-world identities of the owners of the addresses. This can be done by correlating cryptocurrency transactions with other data sources, such as social media profiles or public records. Prevention Measures There are several prevention measures that can be taken to protect against dusting attacks, including: Use Multiple Addresses: By using multiple addresses to receive #cryptocurrency , it can be more difficult for attackers to track the movement of the cryptocurrency and identify the owners of the addresses. Use Privacy Tools: Privacy tools such as Tor and VPNs can be used to protect the identity of the user and make it more difficult for attackers to identify the owners of the addresses. Use Coin Control: Coin control is a feature of some cryptocurrency wallets that allows users to choose which addresses to use for #transactions . By using coin control, users can avoid using addresses that have been targeted in dusting attacks. Be Vigilant: It is important to be vigilant and monitor cryptocurrency transactions for any suspicious activity. If a user receives a small amount of cryptocurrency that they cannot account for, it may be a sign of a dusting attack. Risks of Dusting Attacks Dusting attacks pose several risks to cryptocurrency users, including: Privacy Risks: Dusting attacks can compromise the privacy of cryptocurrency users by revealing information about their transactions and potentially their real-world identities. #Security Risks: Dusting attacks can be used as a precursor to more advanced cyber attacks, such as #phishing attacks or #malware infections. Financial Risks: Dusting attacks can be used to steal cryptocurrency from unsuspecting users, which can result in financial losses. Final Words Dusting attacks are a type of cyber attack that involve sending small amounts of cryptocurrency to a large number of addresses. The goal of a dusting attack is to track the movement of the cryptocurrency and potentially identify the owners of the addresses. There are several prevention measures that can be taken to protect against dusting attacks, including using multiple addresses and privacy tools, using coin control, and being vigilant. As with any type of cyber attack, it is important to stay informed and take steps to protect against potential risks.

Explained : Dusting Attack (Must Read)

Dusting attack is a type of cyber attack that involves sending small amounts of cryptocurrency to a large number of addresses. The goal of a dusting attack is to track the movement of the cryptocurrency and potentially identify the owners of the addresses. In this article, we will explore the various aspects of dusting attacks, including its definition, types, and prevention measures.

What is Dusting Attack?

A dusting attack is a type of #cybersecurity attack that involves sending small amounts of cryptocurrency to a large number of addresses. The amount of cryptocurrency sent in a dusting attack is usually very small, sometimes less than the transaction fee required to process the transaction. The goal of a dusting attack is to track the movement of the cryptocurrency and potentially identify the owners of the addresses.

Types of Dusting Attack

There are two main types of dusting attack, including:

Cluster Analysis: Cluster analysis involves tracking the movement of cryptocurrency between addresses to identify clusters of related addresses. This can help attackers to identify the owners of the addresses and potentially steal their cryptocurrency.

Deanonymization: Deanonymization involves tracking the movement of cryptocurrency to identify the real-world identities of the owners of the addresses. This can be done by correlating cryptocurrency transactions with other data sources, such as social media profiles or public records.

Prevention Measures

There are several prevention measures that can be taken to protect against dusting attacks, including:

Use Multiple Addresses: By using multiple addresses to receive #cryptocurrency , it can be more difficult for attackers to track the movement of the cryptocurrency and identify the owners of the addresses.

Use Privacy Tools: Privacy tools such as Tor and VPNs can be used to protect the identity of the user and make it more difficult for attackers to identify the owners of the addresses.

Use Coin Control: Coin control is a feature of some cryptocurrency wallets that allows users to choose which addresses to use for #transactions . By using coin control, users can avoid using addresses that have been targeted in dusting attacks.

Be Vigilant: It is important to be vigilant and monitor cryptocurrency transactions for any suspicious activity. If a user receives a small amount of cryptocurrency that they cannot account for, it may be a sign of a dusting attack.

Risks of Dusting Attacks

Dusting attacks pose several risks to cryptocurrency users, including:

Privacy Risks: Dusting attacks can compromise the privacy of cryptocurrency users by revealing information about their transactions and potentially their real-world identities.

#Security Risks: Dusting attacks can be used as a precursor to more advanced cyber attacks, such as #phishing attacks or #malware infections.

Financial Risks: Dusting attacks can be used to steal cryptocurrency from unsuspecting users, which can result in financial losses.

Final Words

Dusting attacks are a type of cyber attack that involve sending small amounts of cryptocurrency to a large number of addresses. The goal of a dusting attack is to track the movement of the cryptocurrency and potentially identify the owners of the addresses. There are several prevention measures that can be taken to protect against dusting attacks, including using multiple addresses and privacy tools, using coin control, and being vigilant. As with any type of cyber attack, it is important to stay informed and take steps to protect against potential risks.

🚨🔒 How Hackers Target Your Binance Account: Stay Alert! ⚠️💡 Hackers are constantly finding new ways to compromise Binance accounts and steal your assets. Here’s how they do it: • Social Engineering: Hackers trick you into revealing passwords or 2FA codes through fake emails, calls, or messages. Always verify who you're communicating with! • Password Hacking: They use brute force attacks to guess your password. Make sure yours is strong and unique! • Phishing Emails: Fake emails mimic Binance to lure you into clicking malicious links or entering credentials on fake sites. Double-check the sender’s address and links! • SIM Swapping: Hackers take control of your phone number to intercept 2FA codes. Protect your number and contact your provider if you suspect anything. • Malware: Keyloggers and other malicious software capture your login details. Avoid unknown software and keep your system secure. • MITM Attacks: These intercept communications between you and Binance, especially on unsecured networks. Use secure connections and avoid public Wi-Fi. • API Exploits: Hackers exploit poorly secured APIs linked to your account. Be cautious with third-party services and review API permissions. • Dusting Attacks: Small amounts of crypto are sent to your wallet to track your transactions and identity. Regularly check for unexpected transactions. Stay safe with strong passwords, 2FA, cautious link-clicking, and secure devices. Protect your assets and stay informed! #BinanceSecurity #CryptoSafetyFirst #HackerAlert #cybersecurity #stayvigilant

🚨🔒 How Hackers Target Your Binance Account: Stay Alert! ⚠️💡

Hackers are constantly finding new ways to compromise Binance accounts and steal your assets. Here’s how they do it:

• Social Engineering: Hackers trick you into revealing passwords or 2FA codes through fake emails, calls, or messages. Always verify who you're communicating with!

• Password Hacking: They use brute force attacks to guess your password. Make sure yours is strong and unique!

• Phishing Emails: Fake emails mimic Binance to lure you into clicking malicious links or entering credentials on fake sites. Double-check the sender’s address and links!

• SIM Swapping: Hackers take control of your phone number to intercept 2FA codes. Protect your number and contact your provider if you suspect anything.

• Malware: Keyloggers and other malicious software capture your login details. Avoid unknown software and keep your system secure.

• MITM Attacks: These intercept communications between you and Binance, especially on unsecured networks. Use secure connections and avoid public Wi-Fi.

• API Exploits: Hackers exploit poorly secured APIs linked to your account. Be cautious with third-party services and review API permissions.

• Dusting Attacks: Small amounts of crypto are sent to your wallet to track your transactions and identity. Regularly check for unexpected transactions.

Stay safe with strong passwords, 2FA, cautious link-clicking, and secure devices. Protect your assets and stay informed!

#BinanceSecurity #CryptoSafetyFirst #HackerAlert #cybersecurity #stayvigilant
🚨 The $6 Billion Bitcoin Heist 🚨In 2010, Wei Zhang, a Chinese investor, bought thousands of #bitcoin☀️ for less than a penny each, spending just $10. As Bitcoin's value soared, Wei's investment turned into a fortune worth billions.By 2017, Wei had amassed a staggering 99,000 $BTC . However, in early 2018, a sophisticated phishing attack breached the security of Wei's #crypto margin exchange, CryptoLeap, which he had built in 2014. Hackers stole Wei's entire #BTC fortune, then valued at a jaw-dropping $6 billion.The incident led to the collapse of CryptoLeap and Wei's resignation. Despite the catastrophic loss, Wei channeled his experience into #cybersecurity , becoming a mentor and advocate for stronger protections in the crypto industry.Wei's hard-learned lessons now serve to protect future investors from similar attacks. 🔐 $NOT $FET
🚨 The $6 Billion Bitcoin Heist

🚨In 2010, Wei Zhang, a Chinese investor, bought thousands of #bitcoin☀️ for less than a penny each, spending just $10. As Bitcoin's value soared, Wei's investment turned into a fortune worth billions.By 2017, Wei had amassed a staggering 99,000 $BTC . However, in early 2018, a sophisticated phishing attack breached the security of Wei's #crypto margin exchange, CryptoLeap, which he had built in 2014. Hackers stole Wei's entire #BTC fortune, then valued at a jaw-dropping $6 billion.The incident led to the collapse of CryptoLeap and Wei's resignation. Despite the catastrophic loss, Wei channeled his experience into #cybersecurity , becoming a mentor and advocate for stronger protections in the crypto industry.Wei's hard-learned lessons now serve to protect future investors from similar attacks. 🔐

$NOT $FET
⚠️ Satoshi’s email was hacked 10 years ago. ⚠️ 💡 If it can happen to him, it can happen to anyone.💡 🔐 Protect yourself:- Turn on 2FA (Two-Factor Authentication) NOW! 🔒 - Safeguard your accounts from potential hacks. 🛡️ - Stay one step ahead of the hackers. 🧠Don’t wait until it’s too late! ⏳#cybersecurity #2FA #StayProtected
⚠️ Satoshi’s email was hacked 10 years ago. ⚠️

💡 If it can happen to him, it can happen to anyone.💡

🔐 Protect yourself:- Turn on 2FA (Two-Factor Authentication) NOW!

🔒 - Safeguard your accounts from potential hacks.

🛡️ - Stay one step ahead of the hackers.

🧠Don’t wait until it’s too late!

#cybersecurity #2FA #StayProtected
U.S. Agency Warns About the Dangerous Trinity RansomwareThe Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure. The Threat of Trinity Ransomware and How It Works A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities. Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key. Hackers’ Demands: 24-Hour Deadline for Payment In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery. "Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers. Attacks on Healthcare Institutions The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector. Crypto Ransom Payments Reached $1 Billion in 2023 According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates. The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks. #cyberattacks Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“  

U.S. Agency Warns About the Dangerous Trinity Ransomware

The Health Sector #cybersecurity Coordination Center (HC3) in the United States has announced that at least one healthcare institution in the U.S. has been hit by the Trinity ransomware, a new threat targeting critical infrastructure.
The Threat of Trinity Ransomware and How It Works
A U.S. government agency issued a warning regarding the Trinity ransomware, which targets victims and extorts them for #CryptocurrencyPayments in exchange for not leaking sensitive data. This ransomware uses various attack methods, including phishing emails, malicious websites, and exploiting software vulnerabilities.
Once it infiltrates a system, the ransomware scans the victim's computer, collects sensitive information, and encrypts files using advanced encryption algorithms, rendering them unreadable. #hackers then leave a message in the computer informing the victim that their data has been encrypted and demanding a ransom in exchange for a decryption key.
Hackers’ Demands: 24-Hour Deadline for Payment
In the ransom note, victims are warned that they have only 24 hours to pay the ransom in cryptocurrency, or their data will be leaked or sold. HC3 noted that there are currently no available decryption tools for Trinity ransomware, leaving victims with few options for recovery.
"Victims have 24 hours to contact the cybercriminals, and if they fail to do so, the stolen data will be leaked or sold," HC3 reported. The ransomware primarily targets critical infrastructure, including healthcare providers.
Attacks on Healthcare Institutions
The Trinity ransomware has already affected seven organizations, with healthcare facilities being one of its primary targets. HC3 reported that at least one healthcare entity in the U.S. was recently impacted by this ransomware, raising concerns about cybersecurity in the healthcare sector.
Crypto Ransom Payments Reached $1 Billion in 2023
According to the Chainalysis 2024 #cryptocrime Report, ransomware attackers received approximately $1.1 billion in cryptocurrency payments in 2023. These ransoms were paid by high-profile institutions and critical infrastructure, with attacks ranging from small criminal groups to large syndicates.
The report also revealed that 538 new ransomware variants were created in 2023, with major corporations like BBC and British Airways being among the primary targets of these attacks.
#cyberattacks

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

 
🚨 The $6 Billion #Bitcoin Theft 🚨 In 2010, Chinese investor Wei Zhang purchased thousands of #Bitcoins for less than a penny each, investing only $10. As Bitcoin's value skyrocketed, Wei's investment turned into a multibillion-dollar fortune. By 2017, Wei had accumulated an impressive 99,000 $BTC . However, in early 2018, a sophisticated phishing attack compromised the security of CryptoLeap, the #crypto margin exchange he founded in 2014. The hackers stole Wei's entire #BTC holdings, which were then valued at an astonishing $6 billion. This incident led to the collapse of CryptoLeap and Wei's subsequent resignation. Despite this devastating loss, Wei redirected his efforts towards #cybersecurity , becoming a mentor and advocate for enhanced protections in the crypto industry. Wei's hard-earned lessons now help safeguard future investors from similar threats. 🔐 $FET $BTC #BinanceTournament #ETHETFsApproved #Megadrop
🚨 The $6 Billion #Bitcoin Theft 🚨

In 2010, Chinese investor Wei Zhang purchased thousands of #Bitcoins for less than a penny each, investing only $10. As Bitcoin's value skyrocketed, Wei's investment turned into a multibillion-dollar fortune.
By 2017, Wei had accumulated an impressive 99,000 $BTC . However, in early 2018, a sophisticated phishing attack compromised the security of CryptoLeap, the #crypto margin exchange he founded in 2014. The hackers stole Wei's entire #BTC holdings, which were then valued at an astonishing $6 billion.
This incident led to the collapse of CryptoLeap and Wei's subsequent resignation. Despite this devastating loss, Wei redirected his efforts towards #cybersecurity , becoming a mentor and advocate for enhanced protections in the crypto industry.
Wei's hard-earned lessons now help safeguard future investors from similar threats. 🔐
$FET $BTC

#BinanceTournament #ETHETFsApproved #Megadrop
Crazy! $71 Million Lost: How a Phishing Scam Emptied a Crypto WalletIn a shocking development, an individual lost a staggering 1,155 Wrapped Bitcoin (WBTC), worth approximately $71 million, in a sophisticated phishing attack. Here's a breakdown of how this devastating scam unfolded: The Setup The victim created a new cryptocurrency address: 0xd9A1b0B1e1aE382DbDc898Ea68012FfcB2853a91To initiate the address, they transferred a small amount of Ethereum (0.05 ETH).A scammer generated a similar address, carefully ensuring the beginning and ending characters were the same.The scammer then transferred 0 ETH to the victim's address, making it appear in the transaction history. The Scam Many cryptocurrency wallets truncate addresses, displaying only the beginning and ending characters with "..." in the middle. This visual shortcut is designed for user convenience.The victim, intending to transfer WBTC to their new address, mistakenly copied the scammer's address due to the visual similarity.The victim unknowingly transferred 1,155 WBTC ($71 million) directly into the scammer's wallet. Key Takeaways Always double-check (and triple-check) addresses: Crypto transactions are irreversible. Meticulously verify the full address before authorizing transfers.Be wary of seemingly familiar transactions: Scammers exploit UI shortcuts to trick users. Don't trust addresses based on appearances alone.Security best practices: Use hardware wallets for large holdings, enable two-factor authentication, and stay vigilant. Source The transaction details can be verified on Etherscan: https://etherscan.io/address/0x1e227979f0b5bc691a70deaed2e0f39a6f538fd5 The cryptocurrency community is abuzz with this devastating loss. It serves as a stark reminder to exercise extreme caution and vigilance when handling cryptocurrency transactions. #altcoins #WBTC #scammeralert #security #cybersecurity

Crazy! $71 Million Lost: How a Phishing Scam Emptied a Crypto Wallet

In a shocking development, an individual lost a staggering 1,155 Wrapped Bitcoin (WBTC), worth approximately $71 million, in a sophisticated phishing attack. Here's a breakdown of how this devastating scam unfolded:
The Setup
The victim created a new cryptocurrency address: 0xd9A1b0B1e1aE382DbDc898Ea68012FfcB2853a91To initiate the address, they transferred a small amount of Ethereum (0.05 ETH).A scammer generated a similar address, carefully ensuring the beginning and ending characters were the same.The scammer then transferred 0 ETH to the victim's address, making it appear in the transaction history.

The Scam
Many cryptocurrency wallets truncate addresses, displaying only the beginning and ending characters with "..." in the middle. This visual shortcut is designed for user convenience.The victim, intending to transfer WBTC to their new address, mistakenly copied the scammer's address due to the visual similarity.The victim unknowingly transferred 1,155 WBTC ($71 million) directly into the scammer's wallet.

Key Takeaways
Always double-check (and triple-check) addresses: Crypto transactions are irreversible. Meticulously verify the full address before authorizing transfers.Be wary of seemingly familiar transactions: Scammers exploit UI shortcuts to trick users. Don't trust addresses based on appearances alone.Security best practices: Use hardware wallets for large holdings, enable two-factor authentication, and stay vigilant.
Source
The transaction details can be verified on Etherscan: https://etherscan.io/address/0x1e227979f0b5bc691a70deaed2e0f39a6f538fd5
The cryptocurrency community is abuzz with this devastating loss. It serves as a stark reminder to exercise extreme caution and vigilance when handling cryptocurrency transactions.
#altcoins #WBTC #scammeralert #security #cybersecurity
🔒 Unveiling the Reality of Social Engineering 🔍 Let's shed light on a crucial aspect often overlooked – social engineering. It's not just an academic subject; it's a sophisticated cybercrime tactic used to deceive and manipulate individuals for malicious intent. Social engineering is the art of manipulating people to divulge confidential information, perform actions, or compromise security measures through psychological manipulation rather than technical means. By exploiting human vulnerabilities such as trust, authority, and ignorance, cybercriminals can gain unauthorized access to sensitive data or systems. Stay vigilant and educated about the dangers of social engineering. Awareness is the first line of defense in safeguarding yourself and your information from falling prey to such deceptive tactics. Protect yourself and your digital assets by staying informed and practicing caution in your interactions both online and offline. Together, we can combat social engineering and create a safer digital environment for all. Stay aware, stay secure! 🔒🔍 #SocialEngineering #cybersecurity #StayProtected
🔒 Unveiling the Reality of Social Engineering 🔍

Let's shed light on a crucial aspect often overlooked – social engineering. It's not just an academic subject; it's a sophisticated cybercrime tactic used to deceive and manipulate individuals for malicious intent.

Social engineering is the art of manipulating people to divulge confidential information, perform actions, or compromise security measures through psychological manipulation rather than technical means. By exploiting human vulnerabilities such as trust, authority, and ignorance, cybercriminals can gain unauthorized access to sensitive data or systems.

Stay vigilant and educated about the dangers of social engineering. Awareness is the first line of defense in safeguarding yourself and your information from falling prey to such deceptive tactics.

Protect yourself and your digital assets by staying informed and practicing caution in your interactions both online and offline. Together, we can combat social engineering and create a safer digital environment for all. Stay aware, stay secure! 🔒🔍

#SocialEngineering #cybersecurity #StayProtected
🛡️How to #Protect Yourself from "Dirty" Cryptocurrency ❌How you can lose crypto assets: ⚠️Cryptocurrency exchanges verify incoming cryptocurrency in accordance with AML. If they identify risks associated with dirty cryptocurrency, funds may be blocked or frozen. ✅How to protect yourself: 👨‍💻Before accepting cryptocurrency assets, you should check the sender's address to identify potential risks associated with it and reduce the likelihood of your account being blocked on the exchange. 🔍 One service that allows for cryptocurrency verification is the #Telegram bot.  🏢 📲 For businesses, it is advisable to hire a personal #AML officer who can conduct checks on counterparty addresses. #CryptoSecurity #cybersecurity
🛡️How to #Protect Yourself from "Dirty" Cryptocurrency

❌How you can lose crypto assets:

⚠️Cryptocurrency exchanges verify incoming cryptocurrency in accordance with AML. If they identify risks associated with dirty cryptocurrency, funds may be blocked or frozen.

✅How to protect yourself:

👨‍💻Before accepting cryptocurrency assets, you should check the sender's address to identify potential risks associated with it and reduce the likelihood of your account being blocked on the exchange. 🔍 One service that allows for cryptocurrency verification is the #Telegram bot. 

🏢 📲 For businesses, it is advisable to hire a personal #AML officer who can conduct checks on counterparty addresses.

#CryptoSecurity #cybersecurity
Coinbase Layer 2 Chain Base Attacked, Approximately $1 Million LostThe Layer 2 "Base" network on the Coinbase platform has been the target of a large-scale price manipulation attack. This attack focused on an unverified loan contract, leading to a loss of approximately $1 million. CertiK Warned of the Attack Early this morning, CertiK Alert monitoring system informed users on the X platform about the ongoing attack. According to the report, the attack targeted the Base chain and affected an unverified loan contract starting with the address 0x5c52. According to CertiK’s post on X: "The exploiter manipulated the price of WETH and Sui and gained approximately $1 million in tokens through excessive borrowing." CertiK also noted that the oracle used to verify this loan contract, which was deployed only six days ago, has a liquidity of only around $400,000. Repeated Contract Manipulation Incident This attack marks the second similar incident in the last two days. On October 24, suspicious transactions were detected on the Polygon network, affecting an unverified NAS contract with the address 0x5d6084Bf..F36Ac7. In that case, the attacker obtained a large amount of NAS tokens, which were later exchanged for USDT. Base Has Yet to Comment The Base platform has not yet commented on the incident. However, on October 30, Base announced the launch of Fault Proofs, which aims to provide a more secure environment by removing trusted third parties. The new update will also allow users to monitor and challenge invalid withdrawals. #hackers , #cyberattacks , #CoinbaseExchange. , #cybersecurity , #CryptoHack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Coinbase Layer 2 Chain Base Attacked, Approximately $1 Million Lost

The Layer 2 "Base" network on the Coinbase platform has been the target of a large-scale price manipulation attack. This attack focused on an unverified loan contract, leading to a loss of approximately $1 million.
CertiK Warned of the Attack
Early this morning, CertiK Alert monitoring system informed users on the X platform about the ongoing attack. According to the report, the attack targeted the Base chain and affected an unverified loan contract starting with the address 0x5c52.

According to CertiK’s post on X: "The exploiter manipulated the price of WETH and Sui and gained approximately $1 million in tokens through excessive borrowing." CertiK also noted that the oracle used to verify this loan contract, which was deployed only six days ago, has a liquidity of only around $400,000.

Repeated Contract Manipulation Incident
This attack marks the second similar incident in the last two days. On October 24, suspicious transactions were detected on the Polygon network, affecting an unverified NAS contract with the address 0x5d6084Bf..F36Ac7. In that case, the attacker obtained a large amount of NAS tokens, which were later exchanged for USDT.
Base Has Yet to Comment
The Base platform has not yet commented on the incident. However, on October 30, Base announced the launch of Fault Proofs, which aims to provide a more secure environment by removing trusted third parties. The new update will also allow users to monitor and challenge invalid withdrawals.

#hackers , #cyberattacks , #CoinbaseExchange. , #cybersecurity , #CryptoHack
Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Crypto Money Launderer Admits Role in $73 Million SchemeDaren Li, facing up to 20 years in prison, has admitted to his role in laundering money in a $73 million cryptocurrency scam. This dual Chinese-American citizen has been charged with laundering funds obtained through various cryptocurrency scams. Confession to Money Laundering Conspiracy Daren Li, 41, pleaded guilty to conspiracy to commit money laundering. According to prosecutors, he was involved in a scheme that generated millions of dollars from cryptocurrency investment scams, including "pig butchering," from August 2021 to April 2024. The plea agreement was filed on November 11 in a California federal court. Use of Fake Accounts and Crypto Transfers Li admitted to orchestrating the opening of bank accounts in the U.S. under fake companies to "conceal or disguise the nature, location, source, and ownership" of the funds. After victims transferred money to these accounts, the funds were converted to Tether and subsequently distributed to wallets controlled by Li and his accomplices. One wallet involved in the scheme received over $341 million in digital assets. Organized Money Laundering Through Fake Companies Nicole M. Argentieri, head of the Justice Department’s Criminal Division, stated that Li committed the crime from abroad using "a network of shell companies and international bank accounts." Li also admitted that $73.6 million of stolen funds were directly deposited into bank accounts linked to the scheme, with at least $59.8 million deposited from U.S.-based shell companies. Arrest and Sentencing Threat Li was arrested on April 12 at Atlanta Airport, while his alleged accomplice, Yicheng Zhang, was arrested in Los Angeles on May 16. After pleading guilty, Judge R. Gary Klausner scheduled Li's sentencing for March 3, 2025. Potential Sentence and Restitution Li now faces up to 20 years in prison, three years of supervised release, and a fine of $500,000 or twice the amount of proceeds from the crime, whichever is greater. The court may also require Li to pay restitution to the victims, ranging from $4.5 million to $73 million. #Cryptoscam , #cybersecurity , #cryptoregulation , #digitalassets , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Money Launderer Admits Role in $73 Million Scheme

Daren Li, facing up to 20 years in prison, has admitted to his role in laundering money in a $73 million cryptocurrency scam. This dual Chinese-American citizen has been charged with laundering funds obtained through various cryptocurrency scams.
Confession to Money Laundering Conspiracy
Daren Li, 41, pleaded guilty to conspiracy to commit money laundering. According to prosecutors, he was involved in a scheme that generated millions of dollars from cryptocurrency investment scams, including "pig butchering," from August 2021 to April 2024. The plea agreement was filed on November 11 in a California federal court.

Use of Fake Accounts and Crypto Transfers
Li admitted to orchestrating the opening of bank accounts in the U.S. under fake companies to "conceal or disguise the nature, location, source, and ownership" of the funds. After victims transferred money to these accounts, the funds were converted to Tether and subsequently distributed to wallets controlled by Li and his accomplices. One wallet involved in the scheme received over $341 million in digital assets.
Organized Money Laundering Through Fake Companies
Nicole M. Argentieri, head of the Justice Department’s Criminal Division, stated that Li committed the crime from abroad using "a network of shell companies and international bank accounts." Li also admitted that $73.6 million of stolen funds were directly deposited into bank accounts linked to the scheme, with at least $59.8 million deposited from U.S.-based shell companies.
Arrest and Sentencing Threat
Li was arrested on April 12 at Atlanta Airport, while his alleged accomplice, Yicheng Zhang, was arrested in Los Angeles on May 16. After pleading guilty, Judge R. Gary Klausner scheduled Li's sentencing for March 3, 2025.
Potential Sentence and Restitution
Li now faces up to 20 years in prison, three years of supervised release, and a fine of $500,000 or twice the amount of proceeds from the crime, whichever is greater. The court may also require Li to pay restitution to the victims, ranging from $4.5 million to $73 million.

#Cryptoscam , #cybersecurity , #cryptoregulation , #digitalassets , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🌐 World News 🌐 🔹 The global economy remains in flux as central banks in major countries tweak interest rates to tackle persistent inflation. These adjustments ripple across global markets, impacting trade, investments, and everyday consumer spending. The world is watching closely as these changes reshape financial stability. 🔹 Climate change takes center stage ahead of the pivotal COP30 summit. With recent extreme weather disasters highlighting the urgency, nations are ramping up #sustainability efforts and pledging stricter emission controls. The stakes for global cooperation have never been higher. 🔹 Tensions flare among global powers, but diplomatic channels remain active to address conflicts in Eastern Europe and the Middle East. Key topics like nuclear disarmament and #cybersecurity are driving international negotiations, reflecting the balance of risk and opportunity. 🔹 Tech breakthroughs are accelerating, with AI revolutionizing industries and renewable energy making strides in lowering fossil fuel dependency. These innovations offer hope for a greener, more efficient future amidst growing global challenges. 🔹 On the health front, vigilance continues with infectious diseases. COVID-19’s legacy lingers, pushing nations to bolster healthcare systems and fast-track vaccine R&D to prepare for potential outbreaks. #health remains a top priority worldwide. Stay tuned as these interconnected stories shape our world daily! 🌍
🌐 World News 🌐

🔹 The global economy remains in flux as central banks in major countries tweak interest rates to tackle persistent inflation. These adjustments ripple across global markets, impacting trade, investments, and everyday consumer spending. The world is watching closely as these changes reshape financial stability.

🔹 Climate change takes center stage ahead of the pivotal COP30 summit. With recent extreme weather disasters highlighting the urgency, nations are ramping up #sustainability efforts and pledging stricter emission controls. The stakes for global cooperation have never been higher.

🔹 Tensions flare among global powers, but diplomatic channels remain active to address conflicts in Eastern Europe and the Middle East. Key topics like nuclear disarmament and #cybersecurity are driving international negotiations, reflecting the balance of risk and opportunity.

🔹 Tech breakthroughs are accelerating, with AI revolutionizing industries and renewable energy making strides in lowering fossil fuel dependency. These innovations offer hope for a greener, more efficient future amidst growing global challenges.

🔹 On the health front, vigilance continues with infectious diseases. COVID-19’s legacy lingers, pushing nations to bolster healthcare systems and fast-track vaccine R&D to prepare for potential outbreaks. #health remains a top priority worldwide.

Stay tuned as these interconnected stories shape our world daily! 🌍
U.S. Lawmakers Demand Answers on Tornado Cash SanctionsDemocratic members of the U.S. Congress have called on the Treasury Department to explain the current situation surrounding Tornado Cash, a cryptocurrency mixing service sanctioned in 2022 but still operational. Request for Information on Continued Operations In a letter dated November 14, lawmakers, including prominent crypto critic Brad Sherman, expressed concerns about Tornado Cash's continued functionality. “We are writing to request additional information on the ongoing operation of the Tornado Cash cryptocurrency mixing service despite the sanctions imposed,” the lawmakers stated. They highlighted that Tornado Cash remains functional due to its decentralized nature, distinguishing it from centralized mixers like Blender and Sinbad, which were also sanctioned. Increased Usage of Tornado Cash Lawmakers noted a significant rise in the use of crypto mixers this year. Tornado Cash processed deposits worth $1.8 billion in the first half of 2024, a 45% increase compared to the entire year of 2023. This trend, they stated, shows no signs of slowing down. Allegations of Illegal Activities The letter cited instances of Tornado Cash being used for illicit activities, including money laundering for cybercriminals, terrorist organizations, and sanctioned states. Tornado Cash was sanctioned in 2022 for allegedly facilitating the laundering of over $7 billion in cryptocurrency, including funds stolen by North Korean hacker groups. Request for Detailed Information Lawmakers asked the Treasury Department to provide the following: Estimates of illegal activities conducted through Tornado Cash since sanctions were imposed.Details on enforcement actions against users and exchanges that utilized the service.Reports on suspicious activities and statistical data.Potential secondary sanctions against non-U.S. individuals or entities interacting with Tornado Cash’s mixed funds. Call for New Regulations and Enforcement Tools The lawmakers also inquired about progress on regulations for cryptocurrency mixers, particularly FinCEN's efforts to implement rules requiring financial institutions to maintain records of transactions involving mixers. They questioned whether the Treasury Department has sufficient tools to enforce these rules effectively and requested a response and staff briefing by December 2. Legal Challenges and Ongoing Litigation Tornado Cash faces not only political scrutiny but also legal battles. Advocates of crypto privacy have challenged the sanctions, arguing that a decentralized service should not be classified as an “entity” for the purpose of sanctions. Roman Storm, a co-founder of Tornado Cash, is also facing legal challenges. His trial for money laundering and sanctions violations was recently postponed to April 2025. Storm was arrested in 2023 and accused of aiding the operation of the service. The Future of Tornado Cash Despite sanctions and legal obstacles, Tornado Cash remains active, thanks to its decentralized framework. Lawmakers are now pressing the Treasury Department to develop more effective measures to combat illicit activities associated with the platform. #TornadoCash , #CryptoSecurity , #cryptoregulation , #digitalassets , #cybersecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

U.S. Lawmakers Demand Answers on Tornado Cash Sanctions

Democratic members of the U.S. Congress have called on the Treasury Department to explain the current situation surrounding Tornado Cash, a cryptocurrency mixing service sanctioned in 2022 but still operational.
Request for Information on Continued Operations
In a letter dated November 14, lawmakers, including prominent crypto critic Brad Sherman, expressed concerns about Tornado Cash's continued functionality.
“We are writing to request additional information on the ongoing operation of the Tornado Cash cryptocurrency mixing service despite the sanctions imposed,” the lawmakers stated. They highlighted that Tornado Cash remains functional due to its decentralized nature, distinguishing it from centralized mixers like Blender and Sinbad, which were also sanctioned.
Increased Usage of Tornado Cash
Lawmakers noted a significant rise in the use of crypto mixers this year. Tornado Cash processed deposits worth $1.8 billion in the first half of 2024, a 45% increase compared to the entire year of 2023. This trend, they stated, shows no signs of slowing down.

Allegations of Illegal Activities
The letter cited instances of Tornado Cash being used for illicit activities, including money laundering for cybercriminals, terrorist organizations, and sanctioned states. Tornado Cash was sanctioned in 2022 for allegedly facilitating the laundering of over $7 billion in cryptocurrency, including funds stolen by North Korean hacker groups.
Request for Detailed Information
Lawmakers asked the Treasury Department to provide the following:
Estimates of illegal activities conducted through Tornado Cash since sanctions were imposed.Details on enforcement actions against users and exchanges that utilized the service.Reports on suspicious activities and statistical data.Potential secondary sanctions against non-U.S. individuals or entities interacting with Tornado Cash’s mixed funds.
Call for New Regulations and Enforcement Tools
The lawmakers also inquired about progress on regulations for cryptocurrency mixers, particularly FinCEN's efforts to implement rules requiring financial institutions to maintain records of transactions involving mixers. They questioned whether the Treasury Department has sufficient tools to enforce these rules effectively and requested a response and staff briefing by December 2.
Legal Challenges and Ongoing Litigation
Tornado Cash faces not only political scrutiny but also legal battles. Advocates of crypto privacy have challenged the sanctions, arguing that a decentralized service should not be classified as an “entity” for the purpose of sanctions.
Roman Storm, a co-founder of Tornado Cash, is also facing legal challenges. His trial for money laundering and sanctions violations was recently postponed to April 2025. Storm was arrested in 2023 and accused of aiding the operation of the service.
The Future of Tornado Cash
Despite sanctions and legal obstacles, Tornado Cash remains active, thanks to its decentralized framework. Lawmakers are now pressing the Treasury Department to develop more effective measures to combat illicit activities associated with the platform.

#TornadoCash , #CryptoSecurity , #cryptoregulation , #digitalassets , #cybersecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number