Binance Square
cyberattack
3,411 visningar
13 Inlägg
Rekommenderas
Senaste
LIVE
LIVE
kaymyg
--
A study has revealed that in the third quarter of 2023, there were a total of 117 hacks, resulting in the theft of $720 million. These attacks included access control breaches, reentrancy #exploits , and rug pulls. Notably, while the losses stemming from rug-pull incidents amounted to $49.80 million, they were considerably lower than the $449 million lost due to access control breaches and reentrancy attacks. However, the study data indicates that #rugpull incidents were the most common type of #cyberattack during this period.
A study has revealed that in the third quarter of 2023, there were a total of 117 hacks, resulting in the theft of $720 million. These attacks included access control breaches, reentrancy #exploits , and rug pulls. Notably, while the losses stemming from rug-pull incidents amounted to $49.80 million, they were considerably lower than the $449 million lost due to access control breaches and reentrancy attacks. However, the study data indicates that #rugpull incidents were the most common type of #cyberattack during this period.
Trezor Discovers Email Provider Breach Resulting in Malicious EmailsTrezor, a hardware #wallet provider, recently acknowledged that a security breach involving their third-party email service resulted in a series of fraudulent emails being sent to their customers over the last 12 hours. On January 24, #Trezor issued a statement revealing that they had identified an unauthorized email, which falsely claimed to be from the company, disseminated by a third-party email service they use. The deceptive email, sent from "noreply@trezor.io," falsely instructed users to update their "network" or face the risk of losing their funds. The email contained a link leading to a website that asked users to input their seed phrase. Trezor has reported no instances of users losing funds due to this phishing scam, and there are no indications that any Trezor users have been duped by this fraudulent scheme. Trezor Says it Has Deactivated the Malicious Link Trezor has informed its customers that they have effectively neutralized the harmful link and assured them that their funds are secure as long as they haven't entered their recovery seed. "We rapidly disabled the malicious link in the email, significantly reducing the threat's potential impact!" However, Trezor has advised customers who did input their recovery seed to move their funds to a new wallet immediately. According to Trezor's ongoing inquiry, an unauthorized party accessed their email address database, primarily used for newsletters, and then sent the fraudulent emails using a third-party email service. Recently, on January 23, MailerLite, an email marketing software company, reported a security breach. This incident led to a spate of phishing emails exploiting the branded domains of various companies, including Cointelegraph, WalletConnect, and Token Terminal. It remains uncertain whether Trezor uses the same email domain provider as those affected. Digital asset attorney Joe Carlasare recounted his experience of receiving the phishing email in a post, labeling it as a “sophisticated scam.” Exploring the Link Between Support Portal Breach and Recent Hack There is speculation that the recent #cyberattack might be connected to a prior security breach involving Trezor's support portal, where the personal information of approximately 66,000 users was exposed on January 17. Despite this breach, the company has stressed that no recovery seed phrases were compromised as a result of the incident. At that time, Trezor, the hardware wallet provider, took immediate action to limit unauthorized access and has been actively reaching out to affected users. It's important to highlight that this is not the first instance where Trezor has encountered attempts to compromise user assets. Despite its reputable standing in the cryptocurrency hardware wallet industry, Trezor has faced various security challenges in recent years. In February of the previous year, Trezor issued a warning to users about a phishing attack designed to deceive investors into disclosing their recovery phrase on a counterfeit Trezor website. Additionally, in May, the cybersecurity firm Kaspersky reported the emergence of a counterfeit hardware wallet posing as a genuine Trezor product. This deceptive device used a substituted microcontroller to gain access to a user's private keys, enabling fraudsters to steal funds. Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Trezor Discovers Email Provider Breach Resulting in Malicious Emails

Trezor, a hardware #wallet provider, recently acknowledged that a security breach involving their third-party email service resulted in a series of fraudulent emails being sent to their customers over the last 12 hours.
On January 24, #Trezor issued a statement revealing that they had identified an unauthorized email, which falsely claimed to be from the company, disseminated by a third-party email service they use.
The deceptive email, sent from "noreply@trezor.io," falsely instructed users to update their "network" or face the risk of losing their funds.
The email contained a link leading to a website that asked users to input their seed phrase.
Trezor has reported no instances of users losing funds due to this phishing scam, and there are no indications that any Trezor users have been duped by this fraudulent scheme.

Trezor Says it Has Deactivated the Malicious Link
Trezor has informed its customers that they have effectively neutralized the harmful link and assured them that their funds are secure as long as they haven't entered their recovery seed.
"We rapidly disabled the malicious link in the email, significantly reducing the threat's potential impact!"
However, Trezor has advised customers who did input their recovery seed to move their funds to a new wallet immediately.
According to Trezor's ongoing inquiry, an unauthorized party accessed their email address database, primarily used for newsletters, and then sent the fraudulent emails using a third-party email service.
Recently, on January 23, MailerLite, an email marketing software company, reported a security breach. This incident led to a spate of phishing emails exploiting the branded domains of various companies, including Cointelegraph, WalletConnect, and Token Terminal.
It remains uncertain whether Trezor uses the same email domain provider as those affected.
Digital asset attorney Joe Carlasare recounted his experience of receiving the phishing email in a post, labeling it as a “sophisticated scam.”
Exploring the Link Between Support Portal Breach and Recent Hack
There is speculation that the recent #cyberattack might be connected to a prior security breach involving Trezor's support portal, where the personal information of approximately 66,000 users was exposed on January 17.
Despite this breach, the company has stressed that no recovery seed phrases were compromised as a result of the incident. At that time, Trezor, the hardware wallet provider, took immediate action to limit unauthorized access and has been actively reaching out to affected users.
It's important to highlight that this is not the first instance where Trezor has encountered attempts to compromise user assets. Despite its reputable standing in the cryptocurrency hardware wallet industry, Trezor has faced various security challenges in recent years.
In February of the previous year, Trezor issued a warning to users about a phishing attack designed to deceive investors into disclosing their recovery phrase on a counterfeit Trezor website.
Additionally, in May, the cybersecurity firm Kaspersky reported the emergence of a counterfeit hardware wallet posing as a genuine Trezor product. This deceptive device used a substituted microcontroller to gain access to a user's private keys, enabling fraudsters to steal funds.

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Anyone plz confirm about #cyberattack ? is it going to effect the market ?
Anyone plz confirm about #cyberattack ?
is it going to effect the market ?
#WazirX is accusing wallet provider for the cyberattack. A separate forensic analysis revealed no compromise of WazirX's IT systems, the beleaguered cryptocurrency exchange claimed on Monday, nearly a month after it completed a preliminary investigation into a security breach that resulted in a $230 million loss. WazirX blamed the cyberattack on its wallet service provider Custody. WazirX said that Mandiant Solutions, a cybersecurity company and a division of Google, was in charge of the inquiry. "A comprehensive analysis will soon be available, but the results generally suggest that Liminal was the source of the problem that gave rise to the cyberattack. According to a press release from WazirX, "the wallet that was attacked was managed using Liminal's digital asset custody and wallet infrastructure." Once the cyberattack was discovered, Liminal Custody made it clear that its systems were safe. Given that WazirX was the custodian of five of the six keys, Liminal stated in a statement that "if one were to go by the information WazirX has shared, this actually raises serious questions on the security of their network infrastructure, operational custody controls and overall security posture." The business went on to say that auditors had been assigned to look into the matter. The founder and CEO of WazirX, Nischal Shetty, stated in a post on X (formerly Twitter) that the company had not yet "heard credible answers from Liminal." #cyberattack #CryptoNewss #PowellAtJacksonHole #CryptoMarketMoves
#WazirX is accusing wallet provider for the cyberattack.

A separate forensic analysis revealed no compromise of WazirX's IT systems, the beleaguered cryptocurrency exchange claimed on Monday, nearly a month after it completed a preliminary investigation into a security breach that resulted in a $230 million loss. WazirX blamed the cyberattack on its wallet service provider Custody.
WazirX said that Mandiant Solutions, a cybersecurity company and a division of Google, was in charge of the inquiry.

"A comprehensive analysis will soon be available, but the results generally suggest that Liminal was the source of the problem that gave rise to the cyberattack. According to a press release from WazirX, "the wallet that was attacked was managed using Liminal's digital asset custody and wallet infrastructure."

Once the cyberattack was discovered, Liminal Custody made it clear that its systems were safe.
Given that WazirX was the custodian of five of the six keys, Liminal stated in a statement that "if one were to go by the information WazirX has shared, this actually raises serious questions on the security of their network infrastructure, operational custody controls and overall security posture."
The business went on to say that auditors had been assigned to look into the matter.

The founder and CEO of WazirX, Nischal Shetty, stated in a post on X (formerly Twitter) that the company had not yet "heard credible answers from Liminal."

#cyberattack #CryptoNewss #PowellAtJacksonHole #CryptoMarketMoves
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer