Binance Square

hack

941,109 views
536 Discussing
Nataly new season
·
--
🚀 BINANCE STRATEGY 2026: Get on the Trend! 1. 💎 The "Hack" of BNB Not just hold. Keep your $BNB in Simple Earn. Why? It gives you automatic access to Launchpools and HODLer Airdrops. You are receiving the new AI and Gaming tokens before anyone else and at no additional cost. 2. 🤖 AI and Privacy (The real narrative) Capital is moving from the "old" coins to Decentralized AI (like ZAMA). Tip: Go to the "Zones" section in Binance and look for AI or FHE. That's where the strong volume is this quarter. 3. 📉 Zero Stress with Automatic Investment Is Bitcoin at $78,000 scaring you? Use the Automatic Investment Bot (DCA). Set up daily or weekly purchases. This way you average your entry price and eliminate the emotional factor of buying "high". 4. 🛡️ Capital Protection Volatile market = Danger in Futures. Golden rule: Never trade without Stop Loss. If the market turns, a 2% loss is a lesson; a liquidated account is a mistake. 🔥 TOP WATCHLIST FEBRUARY: $BNB : To farm airdrops. $SOL : The king of memecoins and quick volume. $BTC : Consolidating its way to new highs. #BitcoinDropMarketImpact #EstratégiaCrypto #Hack
🚀 BINANCE STRATEGY 2026: Get on the Trend!
1. 💎 The "Hack" of BNB
Not just hold. Keep your $BNB in Simple Earn.

Why? It gives you automatic access to Launchpools and HODLer Airdrops. You are receiving the new AI and Gaming tokens before anyone else and at no additional cost.

2. 🤖 AI and Privacy (The real narrative)
Capital is moving from the "old" coins to Decentralized AI (like ZAMA).

Tip: Go to the "Zones" section in Binance and look for AI or FHE. That's where the strong volume is this quarter.

3. 📉 Zero Stress with Automatic Investment
Is Bitcoin at $78,000 scaring you? Use the Automatic Investment Bot (DCA).
Set up daily or weekly purchases. This way you average your entry price and eliminate the emotional factor of buying "high".

4. 🛡️ Capital Protection
Volatile market = Danger in Futures.
Golden rule: Never trade without Stop Loss. If the market turns, a 2% loss is a lesson; a liquidated account is a mistake.

🔥 TOP WATCHLIST FEBRUARY:
$BNB : To farm airdrops.
$SOL : The king of memecoins and quick volume.
$BTC : Consolidating its way to new highs.
#BitcoinDropMarketImpact #EstratégiaCrypto #Hack
CrossCurve HACKED! $3M GONE! Warning: Halt all CrossCurve interactions NOW. Critical vulnerability exploited. Funds drained. Hackers used fake cross-chain messages. Gateway authentication bypassed. PortalV2 contract emptied. 10 hacker wallets identified. CrossCurve offers 10% bounty for return. 72-hour ultimatum issued. Legal action threatened. Curve Finance advises caution on Eywa pools. This is the second major hack in weeks. Bridges remain prime targets. This is for informational purposes only. #crosschain #defi #hack 🚨
CrossCurve HACKED! $3M GONE!

Warning: Halt all CrossCurve interactions NOW.
Critical vulnerability exploited. Funds drained.
Hackers used fake cross-chain messages.
Gateway authentication bypassed.
PortalV2 contract emptied.
10 hacker wallets identified.
CrossCurve offers 10% bounty for return.
72-hour ultimatum issued. Legal action threatened.
Curve Finance advises caution on Eywa pools.
This is the second major hack in weeks.
Bridges remain prime targets.

This is for informational purposes only.

#crosschain #defi #hack 🚨
·
--
Bullish
🔥🦅 THE PHOENIX OF ETHEREUM ⚡️ THE DAO RESURGES WITH US💲 220 MILLION❗ 🚀🛡️ 😱 Almost ten years after the historic hack of 2016 that split the network, the name that nearly destroyed Ethereum is back. But this time, not as a vulnerability, but as a Security Fund of $220 million. 🧵👇 🧨 1. From "Hack" to Security Treasury Do you remember the hard fork that created Ethereum Classic ❓ That's right, about 75.109 $ETH (equivalent to ~US$ 220M) were "forgotten" or unclaimed in legacy contracts from that event. The Big Idea ⥱ Instead of leaving these funds idle, pioneers like Griff Green and the Ethereum Foundation are reviving The DAO as a permanent security endowment. 📊 2. The "One Trillion Dollar Security" Plan The goal is not just to audit code, but to protect YOU, the end user Permanent Staking ⥱ ~69.420 $ETH will be staked to generate an annual yield of $8 million, which will fund ongoing audits and security research. User Focus ⥱ The fund will heavily invest in combating phishing, wallet recovery mechanisms, and withdrawal limits to prevent hackers from draining entire accounts. 🕵️‍♂️🔒 📈 3. Who's in Command ❓ This is not an amateur project. The board of curators includes heavyweights like Vitalik Buterin, experts from MetaMask and ENS. What was once a painful lesson about "code is law" now becomes the foundation for Ethereum to achieve global banking scale. 📢 I WANT TO HEAR FROM YOU Do you think this "redemption" of The DAO is the final step for Ethereum to be accepted as the definitive financial infrastructure of the world? 🏛️ vs 🚀 👇 Comment "SECURITY" if you believe that crypto $ETH is stronger than ever in 2026❗ 💡 @Fumao 📣 This is not financial advice. Always do your own research before investing in any crypto project. #BinanceSquareFamily #Ethereum #EthereumNews #VitalikButerin #Hack
🔥🦅 THE PHOENIX OF ETHEREUM ⚡️ THE DAO RESURGES WITH US💲 220 MILLION❗ 🚀🛡️

😱 Almost ten years after the historic hack of 2016 that split the network, the name that nearly destroyed Ethereum is back. But this time, not as a vulnerability, but as a Security Fund of $220 million. 🧵👇

🧨 1. From "Hack" to Security Treasury

Do you remember the hard fork that created Ethereum Classic ❓ That's right, about 75.109 $ETH (equivalent to ~US$ 220M) were "forgotten" or unclaimed in legacy contracts from that event.

The Big Idea ⥱ Instead of leaving these funds idle, pioneers like Griff Green and the Ethereum Foundation are reviving The DAO as a permanent security endowment.

📊 2. The "One Trillion Dollar Security" Plan

The goal is not just to audit code, but to protect YOU, the end user

Permanent Staking ⥱ ~69.420 $ETH will be staked to generate an annual yield of $8 million, which will fund ongoing audits and security research.

User Focus ⥱ The fund will heavily invest in combating phishing, wallet recovery mechanisms, and withdrawal limits to prevent hackers from draining entire accounts. 🕵️‍♂️🔒

📈 3. Who's in Command ❓

This is not an amateur project. The board of curators includes heavyweights like Vitalik Buterin, experts from MetaMask and ENS. What was once a painful lesson about "code is law" now becomes the foundation for Ethereum to achieve global banking scale.

📢 I WANT TO HEAR FROM YOU

Do you think this "redemption" of The DAO is the final step for Ethereum to be accepted as the definitive financial infrastructure of the world? 🏛️ vs 🚀

👇 Comment "SECURITY" if you believe that crypto $ETH is stronger than ever in 2026❗

💡 @Fumão Crypto 📣 This is not financial advice. Always do your own research before investing in any crypto project.

#BinanceSquareFamily #Ethereum #EthereumNews #VitalikButerin #Hack
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk. The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance. 72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical. Disclaimer: This is not financial advice. #CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk.

The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance.

72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical.

Disclaimer: This is not financial advice.

#CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
·
--
Bullish
🍔 McDonald's Memecoin Hack: Cyber ​​Thieves Steal Around $700,000 in Solana In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered. 💀 The Grimace Memecoin Scam 👾 Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes. 📊 Pump & Dump The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes. 💸 The Payout In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana." ⚠️ Aftermath The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
🍔 McDonald's Memecoin Hack: Cyber ​​Thieves Steal Around $700,000 in Solana

In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered.

💀 The Grimace Memecoin Scam 👾

Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes.

📊 Pump & Dump

The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes.

💸 The Payout

In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana."

⚠️ Aftermath

The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams.

#scam #hack #Solana⁩ $SOL #RiskManagement
WazirX #hack Approximately 230 million #dolar hacked, if you have balance #metamask move it to your wallet or binance account!
WazirX #hack

Approximately 230 million #dolar hacked, if you have balance #metamask move it to your wallet or binance account!
·
--
Update on the DeFi Hack: Is there an "ethical" hacker? 🤔😇 News about the $40M hack on Vector Finance: The attacker has returned $15 million in ETH to the protocol's wallet this morning. Along with the transaction, the hacker left an on-chain message stating that they only wanted to "expose a critical vulnerability" and that they would keep 10% as a "reward for the bug". The Vector team is trying to negotiate the return of the rest of the funds. #DeFi #Hack #Seguridad #Arbitrum #WhiteHats $BTC {future}(BTCUSDT) $ETH {future}(ETHUSDT) $BNB {future}(BNBUSDT)
Update on the DeFi Hack: Is there an "ethical" hacker? 🤔😇
News about the $40M hack on Vector Finance: The attacker has returned $15 million in ETH to the protocol's wallet this morning.
Along with the transaction, the hacker left an on-chain message stating that they only wanted to "expose a critical vulnerability" and that they would keep 10% as a "reward for the bug". The Vector team is trying to negotiate the return of the rest of the funds.
#DeFi #Hack #Seguridad #Arbitrum #WhiteHats $BTC
$ETH
$BNB
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
·
--
Stay #SAFU on X and other socials. @JasonYanowitz on X narrates his #hack odeal. I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked. Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole. I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed. This was the real hack. I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address. But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it. Some takeaways: - Don't click links - If you do click a link, review the actual email address - Set up non-text 2FA on everything - If you've done that, trust your own security process - If you think you've been hacked, slow down and think about how this could have happened Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly. If you're still reading, go read the self-audit series from @samczsun. And this best practices from @bobbyong. Lot more you can do but start there. #phishing
Stay #SAFU on X and other socials.

@JasonYanowitz on X narrates his #hack odeal.

I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked.
Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole.
I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed.

This was the real hack.

I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address.
But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it.

Some takeaways:
- Don't click links
- If you do click a link, review the actual email address
- Set up non-text 2FA on everything
- If you've done that, trust your own security process
- If you think you've been hacked, slow down and think about how this could have happened
Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly.
If you're still reading, go read the self-audit series from @samczsun.
And this best practices from @bobbyong.
Lot more you can do but start there. #phishing
Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in EthereumOn Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter. Theft Details: 3,250 ETH Moved by Unknown Perpetrators A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability. Personal Accounts of Jeff 'Jiho' Zirlin Compromised Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it. Security of Ronin and Sky Mavis Unaffected In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals. Impact on Ronin's Market Value As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97. Historical Context: Ronin Bridge Attack The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack. $ETH #Ronin #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in Ethereum

On Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter.
Theft Details: 3,250 ETH Moved by Unknown Perpetrators
A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability.
Personal Accounts of Jeff 'Jiho' Zirlin Compromised
Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it.

Security of Ronin and Sky Mavis Unaffected
In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals.
Impact on Ronin's Market Value
As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97.
Historical Context: Ronin Bridge Attack
The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack.

$ETH
#Ronin #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥 Yesterday, the crypto world exploded with two shocking headlines: 1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack. 2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯 Coincidence? Or something bigger? 🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang. 🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen! 🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots. 💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥 🔔 Follow for more real-time crypto updates! 🚀 #BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥

Yesterday, the crypto world exploded with two shocking headlines:

1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack.

2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯

Coincidence? Or something bigger?
🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang.

🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen!

🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots.

💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥

🔔 Follow for more real-time crypto updates! 🚀

#BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚫 A scam AAVE website was found in Google's ad block – PeckShieldAlert Phishing ads are designed to drain crypto wallets—fake sites like these often contain malware. #Scam #Hack
🚫 A scam AAVE website was found in Google's ad block – PeckShieldAlert

Phishing ads are designed to drain crypto wallets—fake sites like these often contain malware.

#Scam
#Hack
⚠️ MARKET MAYHEM IN JUST 2 HOURS ⚠️ 📈 PPI & Core PPI — Both came in WAY hotter than forecasts, shaking rate-cut hopes. 🚫 US Treasury Secretary — Confirms the government will NOT buy Bitcoin. 💥 Turkish Crypto Exchange Hack — $49M vanished in a major breach. 📉 My Portfolio — Feels like WWIII just started in my account. Stay sharp. Volatility is at DEFCON 1. #CryptoNews #Bitcoin #Inflation #Hack #Markets
⚠️ MARKET MAYHEM IN JUST 2 HOURS ⚠️

📈 PPI & Core PPI — Both came in WAY hotter than forecasts, shaking rate-cut hopes.

🚫 US Treasury Secretary — Confirms the government will NOT buy Bitcoin.

💥 Turkish Crypto Exchange Hack — $49M vanished in a major breach.

📉 My Portfolio — Feels like WWIII just started in my account.

Stay sharp. Volatility is at DEFCON 1.
#CryptoNews #Bitcoin #Inflation #Hack #Markets
🇺🇸 AMERICANS LOST $9.3 BILLION IN CRYPTO FRAUDS DURING 2024. The Internet Crime Complaint Center (IC3) of the Federal Bureau of Investigation (FBI) has published its annual report detailing the complaints and losses due to scams and frauds related to cryptocurrencies in 2024. According to the report published on April 23, the IC3 received over 140,000 complaints mentioning cryptocurrencies in 2024, resulting in approximately $9.3 billion in losses. The bureau reported that individuals over 60 years old were the most affected by cryptocurrency-related frauds, with approximately 33,000 complaints and $2.8 billion in losses. #Fraud_alert #FraudAlert #Hack #crypto $SOL $XRP
🇺🇸 AMERICANS LOST $9.3 BILLION IN CRYPTO FRAUDS DURING 2024.

The Internet Crime Complaint Center (IC3) of the Federal Bureau of Investigation (FBI) has published its annual report detailing the complaints and losses due to scams and frauds related to cryptocurrencies in 2024.

According to the report published on April 23, the IC3 received over 140,000 complaints mentioning cryptocurrencies in 2024, resulting in approximately $9.3 billion in losses.

The bureau reported that individuals over 60 years old were the most affected by cryptocurrency-related frauds, with approximately 33,000 complaints and $2.8 billion in losses.
#Fraud_alert #FraudAlert #Hack #crypto
$SOL $XRP
·
--
Bullish
█░█░█ █▀█ █░█░█ ▀▄▀▄▀ █▄█ ▀▄▀▄▀ there is growth potential in this currency take advantage of the opportunity since there are liquidity cuts secure your pocket #fyp #hack
█░█░█ █▀█ █░█░█
▀▄▀▄▀ █▄█ ▀▄▀▄▀ there is growth potential in this currency take advantage of the opportunity since there are liquidity cuts secure your pocket #fyp #hack
·
--
Bullish
🥷💸 Over $280 million was stolen this summer due to crypto hacks! 🔟 This is a list of the top 10 hacks and security breaches: 1️⃣ Nobitex – ‎$82M (Hot Wallet hack) 2️⃣ BtcTurk – ‎$48M (Private key hack) 3️⃣ CoinDCX – ‎$44.2M (Access rights loss) 4️⃣ GMX – ‎$42M (Re-entrancy vulnerability) 5️⃣ BigONE – ‎$27M (Access rights loss) 6️⃣ WOO X – ‎$14M (Phishing) 7️⃣ Resupply – ‎$9.6M (Price oracle manipulation) 8️⃣ ALEX – ‎$8.4M (Malicious transfers) 9️⃣ BetterBank – ‎$5M (Protocol vulnerability) 🔟 CrediX – ‎$4.5M (Private key hack) ⚠️ Total: +280M$ during the summer alone! 👉 Lesson: Security risks in the crypto world are still extremely high, and protection must be a top priority for every investor or institution. #Hack #Crypto #Security #DeFi #Hacks #Blockchain #Binance #crypto #Digital_Currencies #ضرار_الحضري
🥷💸 Over $280 million was stolen this summer due to crypto hacks!

🔟 This is a list of the top 10 hacks and security breaches:
1️⃣ Nobitex – ‎$82M (Hot Wallet hack)
2️⃣ BtcTurk – ‎$48M (Private key hack)
3️⃣ CoinDCX – ‎$44.2M (Access rights loss)
4️⃣ GMX – ‎$42M (Re-entrancy vulnerability)
5️⃣ BigONE – ‎$27M (Access rights loss)
6️⃣ WOO X – ‎$14M (Phishing)
7️⃣ Resupply – ‎$9.6M (Price oracle manipulation)
8️⃣ ALEX – ‎$8.4M (Malicious transfers)
9️⃣ BetterBank – ‎$5M (Protocol vulnerability)
🔟 CrediX – ‎$4.5M (Private key hack)

⚠️ Total: +280M$ during the summer alone!
👉 Lesson: Security risks in the crypto world are still extremely high, and protection must be a top priority for every investor or institution.
#Hack
#Crypto #Security #DeFi #Hacks #Blockchain #Binance #crypto #Digital_Currencies #ضرار_الحضري
The Largest NPM Attack in Crypto History Stole Less Than $50Hackers launched a massive supply-chain attack targeting widely used JavaScript libraries downloaded billions of times worldwide. The incident had the potential to compromise thousands of crypto projects and millions of developer workstations. Yet the attackers walked away with a laughably small amount – less than $50 in crypto. An Attack That Could Have Shaken the Crypto World According to findings from Security Alliance, hackers gained access to the account of a developer managing NPM packages and inserted malware into popular libraries aimed at crypto wallets, specifically Ethereum and Solana. NPM serves developers much like an app store – a central repository for small code utilities used in JavaScript projects. The compromised packages included chalk, strip-ansi, and color-convert, utilities deeply embedded in dependency trees. Even developers who never installed them directly could have been exposed. The Damage: So Far Under $50 Security researchers identified a single malicious Ethereum wallet address, 0xFc4a48. To date, it has collected only about $50 worth of crypto. Just a few hours earlier, the amount was a mere five cents, hinting that the total losses could rise slightly. “Imagine this: you compromise an NPM developer account with more than two billion weekly downloads. You could gain unlimited access to millions of developer machines. Endless riches await. And you make less than $50,” Security Alliance wrote on X. Samczsun, a security researcher at SEAL, compared the attack to finding the keys to Fort Knox and using them as a bookmark: “The malware was widespread, but at this point it is almost completely neutralized.” What Was Stolen? According to Etherscan, the malicious wallet has received small amounts of: Ethereum (ETH) – just a few cents initiallyBrett (BRETT)Andy (ANDY)Dork Lord (DORK)Ethervista (VISTA)Gondola (GONDOLA) Altogether, the value does not exceed $50. Who Is Safe and Who Isn’t? The attack deployed a crypto clipper malware designed to silently replace wallet addresses during transactions. This means users had to approve the malicious transaction for the theft to occur. Fortunately, major crypto wallet providers quickly reassured users: Ledger and MetaMask confirmed their apps were unaffected, citing multiple security layers.Phantom Wallet said it does not use any vulnerable packages.Uniswap reported no impact on its applications.Other unaffected platforms included Aerodrome, Blast, Blockstream Jade, and Revoke.cash. According to pseudonymous DefiLlama founder 0xngmi, only projects updated after the malicious package was published could be at risk. Advice for Users Experts, including Ledger CTO Charles Guillemet, urged crypto users to be extra cautious when approving on-chain transactions. Some even suggested avoiding crypto websites temporarily until developers fully remove the compromised packages. Conclusion The NPM hack highlighted how vulnerable the software supply chain can be – even for projects that never directly used the compromised code. Ironically, it became one of the least profitable hacks in crypto history. While the potential losses could have been astronomical, the attackers only netted a few dozen dollars. #CyberSecurity , #Hack , #Cryptoscam , #CyberSecurity , #CryptoNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

The Largest NPM Attack in Crypto History Stole Less Than $50

Hackers launched a massive supply-chain attack targeting widely used JavaScript libraries downloaded billions of times worldwide. The incident had the potential to compromise thousands of crypto projects and millions of developer workstations. Yet the attackers walked away with a laughably small amount – less than $50 in crypto.

An Attack That Could Have Shaken the Crypto World
According to findings from Security Alliance, hackers gained access to the account of a developer managing NPM packages and inserted malware into popular libraries aimed at crypto wallets, specifically Ethereum and Solana.
NPM serves developers much like an app store – a central repository for small code utilities used in JavaScript projects. The compromised packages included chalk, strip-ansi, and color-convert, utilities deeply embedded in dependency trees. Even developers who never installed them directly could have been exposed.

The Damage: So Far Under $50
Security researchers identified a single malicious Ethereum wallet address, 0xFc4a48. To date, it has collected only about $50 worth of crypto. Just a few hours earlier, the amount was a mere five cents, hinting that the total losses could rise slightly.
“Imagine this: you compromise an NPM developer account with more than two billion weekly downloads. You could gain unlimited access to millions of developer machines. Endless riches await. And you make less than $50,” Security Alliance wrote on X.
Samczsun, a security researcher at SEAL, compared the attack to finding the keys to Fort Knox and using them as a bookmark: “The malware was widespread, but at this point it is almost completely neutralized.”

What Was Stolen?
According to Etherscan, the malicious wallet has received small amounts of:
Ethereum (ETH) – just a few cents initiallyBrett (BRETT)Andy (ANDY)Dork Lord (DORK)Ethervista (VISTA)Gondola (GONDOLA)
Altogether, the value does not exceed $50.

Who Is Safe and Who Isn’t?
The attack deployed a crypto clipper malware designed to silently replace wallet addresses during transactions. This means users had to approve the malicious transaction for the theft to occur.
Fortunately, major crypto wallet providers quickly reassured users:
Ledger and MetaMask confirmed their apps were unaffected, citing multiple security layers.Phantom Wallet said it does not use any vulnerable packages.Uniswap reported no impact on its applications.Other unaffected platforms included Aerodrome, Blast, Blockstream Jade, and Revoke.cash.
According to pseudonymous DefiLlama founder 0xngmi, only projects updated after the malicious package was published could be at risk.

Advice for Users
Experts, including Ledger CTO Charles Guillemet, urged crypto users to be extra cautious when approving on-chain transactions. Some even suggested avoiding crypto websites temporarily until developers fully remove the compromised packages.

Conclusion
The NPM hack highlighted how vulnerable the software supply chain can be – even for projects that never directly used the compromised code. Ironically, it became one of the least profitable hacks in crypto history. While the potential losses could have been astronomical, the attackers only netted a few dozen dollars.

#CyberSecurity , #Hack , #Cryptoscam , #CyberSecurity , #CryptoNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number