Binance Square

hack

941,593 visningar
545 diskuterar
ImCryptOpus
·
--
🥷 #STEP Step: We announce the cessation of operations for Step Finance, SolanaFloor, and Remora Markets. Following the hack in late January, we explored all possible solutions to the issue, including funding and acquisition opportunities. Unfortunately, we were unable to find a viable option, and we have made the difficult decision to immediately cease all operations. #hack #crypto
🥷 #STEP Step: We announce the cessation of operations for Step Finance, SolanaFloor, and Remora Markets. Following the hack in late January, we explored all possible solutions to the issue, including funding and acquisition opportunities. Unfortunately, we were unable to find a viable option, and we have made the difficult decision to immediately cease all operations. #hack

#crypto
SOLANA SHOCKWAVE: 40 MILLION DRAINED, MAJOR PLATFORMS SHUTTERED Step Finance, SolanaFloor, and Remora Markets are GONE. A massive $40 million hack has crippled the Solana ecosystem. Recovery efforts failed. Operations have ceased. The project team is enacting a buyout plan for $STEP holders and a 1:1 redemption for $rToken holders. This is a brutal market reset. News is for reference, not investment advice. #Solana #DeFi #CryptoNews #Hack 💥
SOLANA SHOCKWAVE: 40 MILLION DRAINED, MAJOR PLATFORMS SHUTTERED

Step Finance, SolanaFloor, and Remora Markets are GONE. A massive $40 million hack has crippled the Solana ecosystem. Recovery efforts failed. Operations have ceased. The project team is enacting a buyout plan for $STEP holders and a 1:1 redemption for $rToken holders. This is a brutal market reset.

News is for reference, not investment advice.

#Solana #DeFi #CryptoNews #Hack 💥
🚨 MAJOR SOLANA DEFI PLATFORM SHUTS DOWN AFTER $26M HACK Step Finance — known as the “front page of Solana” — is officially winding down. The team tried: ❌ New funding ❌ Acquisition talks Nothing worked. One exploit was enough to end it. Security is still the biggest risk in DeFi. ⚠️ #Solana #DeFi #Crypto #Hack #SOL #CryptoNews #Blockchain #Web3 #SmartContracts #CyberSecurity #Altcoins #CryptoInvesting #OnChain #DigitalAssets #Rekt #CryptoRisk #Bearish #CryptoMarket
🚨 MAJOR SOLANA DEFI PLATFORM SHUTS DOWN AFTER $26M HACK

Step Finance — known as the “front page of Solana” — is officially winding down.

The team tried:
❌ New funding
❌ Acquisition talks

Nothing worked.

One exploit was enough to end it.

Security is still the biggest risk in DeFi. ⚠️

#Solana #DeFi #Crypto #Hack #SOL #CryptoNews #Blockchain #Web3 #SmartContracts #CyberSecurity #Altcoins #CryptoInvesting #OnChain #DigitalAssets #Rekt #CryptoRisk #Bearish #CryptoMarket
SOLANA EXPLODES: $40 MILLION HACK SHUTS DOWN MAJOR PROJECTS Step Finance, SolanaFloor, and Remora Markets are GONE. A devastating $40 million hack has forced them to cease all operations. The Solana DeFi landscape is reeling. This is a brutal cleansing of the market. Funds are irretrievable. The team is scrambling to implement a buyout for $STEP holders and a 1:1 redemption for rToken holders. This signals extreme risk in current DeFi. Disclaimer: This is not financial advice. #Solana #DeFi #CryptoNews #Hack 💥
SOLANA EXPLODES: $40 MILLION HACK SHUTS DOWN MAJOR PROJECTS

Step Finance, SolanaFloor, and Remora Markets are GONE. A devastating $40 million hack has forced them to cease all operations. The Solana DeFi landscape is reeling. This is a brutal cleansing of the market. Funds are irretrievable. The team is scrambling to implement a buyout for $STEP holders and a 1:1 redemption for rToken holders. This signals extreme risk in current DeFi.

Disclaimer: This is not financial advice.

#Solana #DeFi #CryptoNews #Hack 💥
CRYPTO WEEKEND WRAP: $11B Scandal, $2M Hack & A.I. News You Can’t MissGM, Square family! 🌅 If you checked out for the weekend, you missed a WILD 24 hours. Between geopolitical bombshells, bridge hacks, and a genius idea from Vitalik—here is everything you need to look smart on Monday. 1/ 🇷🇺 THE $11 BILLION SHADOW NETWORK Blockchain sleuths at Elliptic just dropped a nuke. They uncovered a network of Russian crypto exchanges helping sanctioned entities move money. One platform called ABCeX reportedly handled $11 Billion in transactions. This is the big one, guys. Regulators are watching. Is this the moment they crack down—or finally admit crypto is just a tool? Either way, volatility incoming. 2/ 🔓 IOTEX HACKED: $2M Gone Bridge exploits are back, and they are brutal. The IoTeX network was forced to halt after a private key leak let hackers drain $2 Million from the treasury (USDC, USDT, and IOTX). The team says they contained it and are working with cops/exchanges to recover funds. Moral of the story: Not your keys? Not your coins. Stay safe out there. 3/ 🤖 VITALIK’S BIG IDEA: A.I. VOTING Ethereum’s co-founder just gave us hope for the future. Vitalik proposed using Artificial Intelligence to help normal people vote in DAOs. Imagine an A.I. assistant that reads the fine print on those boring governance proposals for you, filters out scams, and lets YOU make the final call. This is how we scale decentralization. Bullish on A.I. x Crypto. 4/ 📉 THE MACRO CLOUD (Trump Edition) Let’s be real—prices are hurting. Bitcoin is hovering near $66k and "Extreme Fear" is back in the chat. 😱 Why? Trump Tariffs: Proposed tariffs jumped from 10% to 15%, spooking global markets.ETF Bleed: Spot Bitcoin ETFs have seen 4 weeks of straight outflows. Institutions are scared. But as Tim Draper says... that just means it's time to buy the dip? 💬 SQUARE TALK: Are these Russia sanctions the start of a new crypto war? Or just FUD before the weekend pump? Drop your hottest take below. 👇 And follow for more news that actually matters. #Bitcoin  #Ethereum  #CryptoNews  #Altcoin  #Hack {spot}(BNBUSDT) {spot}(ETHUSDT) {spot}(BTCUSDT)

CRYPTO WEEKEND WRAP: $11B Scandal, $2M Hack & A.I. News You Can’t Miss

GM, Square family! 🌅
If you checked out for the weekend, you missed a WILD 24 hours. Between geopolitical bombshells, bridge hacks, and a genius idea from Vitalik—here is everything you need to look smart on Monday.
1/ 🇷🇺 THE $11 BILLION SHADOW NETWORK
Blockchain sleuths at Elliptic just dropped a nuke.
They uncovered a network of Russian crypto exchanges helping sanctioned entities move money.
One platform called ABCeX reportedly handled $11 Billion in transactions.
This is the big one, guys. Regulators are watching. Is this the moment they crack down—or finally admit crypto is just a tool?
Either way, volatility incoming.
2/ 🔓 IOTEX HACKED: $2M Gone
Bridge exploits are back, and they are brutal.
The IoTeX network was forced to halt after a private key leak let hackers drain $2 Million from the treasury (USDC, USDT, and IOTX).
The team says they contained it and are working with cops/exchanges to recover funds.
Moral of the story: Not your keys? Not your coins. Stay safe out there.
3/ 🤖 VITALIK’S BIG IDEA: A.I. VOTING
Ethereum’s co-founder just gave us hope for the future.
Vitalik proposed using Artificial Intelligence to help normal people vote in DAOs.
Imagine an A.I. assistant that reads the fine print on those boring governance proposals for you, filters out scams, and lets YOU make the final call.
This is how we scale decentralization. Bullish on A.I. x Crypto.
4/ 📉 THE MACRO CLOUD (Trump Edition)
Let’s be real—prices are hurting.
Bitcoin is hovering near $66k and "Extreme Fear" is back in the chat. 😱
Why?
Trump Tariffs: Proposed tariffs jumped from 10% to 15%, spooking global markets.ETF Bleed: Spot Bitcoin ETFs have seen 4 weeks of straight outflows.
Institutions are scared. But as Tim Draper says... that just means it's time to buy the dip?
💬 SQUARE TALK:
Are these Russia sanctions the start of a new crypto war? Or just FUD before the weekend pump?
Drop your hottest take below. 👇
And follow for more news that actually matters.
#Bitcoin  #Ethereum  #CryptoNews  #Altcoin  #Hack
TREASURY DRAINED. $IOTX HOLDINGS WIPED OUT. Private key exploit. Over $4.3 million VANISHED. Attacker drained USDC, USDT, IOTX, WBTC, BUSD. Swapped for ETH, bridged to Bitcoin. 111 million CIOTX minted. This is a CATASTROPHE. Your assets are NOT safe. Disclaimer: This is not financial advice. #IoTeX #CryptoNews #Exploit #Hack 🚨 {future}(IOTXUSDT)
TREASURY DRAINED. $IOTX HOLDINGS WIPED OUT.

Private key exploit. Over $4.3 million VANISHED. Attacker drained USDC, USDT, IOTX, WBTC, BUSD. Swapped for ETH, bridged to Bitcoin. 111 million CIOTX minted. This is a CATASTROPHE. Your assets are NOT safe.

Disclaimer: This is not financial advice.

#IoTeX #CryptoNews #Exploit #Hack 🚨
·
--
🚨 USD1 E WLFI: DEPEG TEMPORANEO PER IL PROGETTO TRUMP 🚨 La stablecoin USD1 legata a Trump ha subito un depeg improvviso, scivolando a circa $0,98 su Binance prima di recuperare in pochi minuti. Contemporaneamente, il token $WLFI di World Liberty Financial è crollato del 7% circa. World Liberty Financial, progetto crypto della famiglia Trump (con Donald come "chief crypto advocate" e i figli come ambasciatori Web3), ha dichiarato di aver respinto un "attacco coordinato". Coinvolti account X hackerati, disinformazione e short-selling per manipolare il mercato. USD1, ancorata al dollaro USA, è parte delle iniziative crypto trumpiane, collegate al Board of Peace per Gaza. Il depeg evidenzia rischi di volatilità nelle stablecoin non fully collateralizzate o sotto pressione speculativa, nonostante claim di backing solido. WLFI, token DeFi per lending e trading, amplifica l'impatto familiare nel settore. Esperti notano vulnerabilità: hack social, FUD (fear, uncertainty, doubt) e vendite allo scoperto possono causare panic selling. World Liberty insiste sulla resilienza, ma l'episodio solleva dubbi su sicurezza e regolamentazione. Possibile segnale di manipolazione o stress liquidity? Il recupero rapido suggerisce liquidità forte, ma sicuramente, da monitorare. #breakingnews #WLFI #USD1 #Hack
🚨 USD1 E WLFI: DEPEG TEMPORANEO PER IL PROGETTO TRUMP 🚨

La stablecoin USD1 legata a Trump ha subito un depeg improvviso, scivolando a circa $0,98 su Binance prima di recuperare in pochi minuti.
Contemporaneamente, il token $WLFI di World Liberty Financial è crollato del 7% circa.

World Liberty Financial, progetto crypto della famiglia Trump (con Donald come "chief crypto advocate" e i figli come ambasciatori Web3), ha dichiarato di aver respinto un "attacco coordinato".
Coinvolti account X hackerati, disinformazione e short-selling per manipolare il mercato.

USD1, ancorata al dollaro USA, è parte delle iniziative crypto trumpiane, collegate al Board of Peace per Gaza.
Il depeg evidenzia rischi di volatilità nelle stablecoin non fully collateralizzate o sotto pressione speculativa, nonostante claim di backing solido.
WLFI, token DeFi per lending e trading, amplifica l'impatto familiare nel settore.
Esperti notano vulnerabilità: hack social, FUD (fear, uncertainty, doubt) e vendite allo scoperto possono causare panic selling.

World Liberty insiste sulla resilienza, ma l'episodio solleva dubbi su sicurezza e regolamentazione.
Possibile segnale di manipolazione o stress liquidity?
Il recupero rapido suggerisce liquidità forte, ma sicuramente, da monitorare.
#breakingnews #WLFI #USD1 #Hack
MOONWELL DEBACLE: $1.78M GONE IN SECONDS! Oracle error wiped out 1096.317 cbETH. Liquidators feasted on collateral. Protocol is reeling. Borrowing and supply caps slashed to zero. The damage is done. Disclaimer: This is not financial advice. #DeFi #Crypto #Hack #Moonwell #cbETH 🚨
MOONWELL DEBACLE: $1.78M GONE IN SECONDS!

Oracle error wiped out 1096.317 cbETH. Liquidators feasted on collateral. Protocol is reeling. Borrowing and supply caps slashed to zero. The damage is done.

Disclaimer: This is not financial advice.

#DeFi #Crypto #Hack #Moonwell #cbETH 🚨
DATA BREACH EXPOSES $COW CUSTOMERS! $COW insiders hacked. 2.5GB of data leaked. Names, addresses, phone numbers compromised. Figure refused ransom. Users notified. Fallout contained. This is a critical security event. Stay vigilant. Disclaimer: This is not financial advice. #crypto #hack #security #datacrime 🚨 {future}(COWUSDT)
DATA BREACH EXPOSES $COW CUSTOMERS!

$COW insiders hacked. 2.5GB of data leaked. Names, addresses, phone numbers compromised. Figure refused ransom. Users notified. Fallout contained.

This is a critical security event. Stay vigilant.

Disclaimer: This is not financial advice.

#crypto #hack #security #datacrime 🚨
·
--
Hausse
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa. 💀 La estafa del Memecoin de Grimace 👾 Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos. 📊 Pump & Dump Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos. 💸 El desembolso En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana". ⚠️ Consecuencias Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana

En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa.

💀 La estafa del Memecoin de Grimace 👾

Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos.

📊 Pump & Dump

Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos.

💸 El desembolso

En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana".

⚠️ Consecuencias

Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas.

#scam #hack #Solana⁩ $SOL #RiskManagement
·
--
Actualización del Hackeo en DeFi: ¿Un hacker "ético"? 🤔😇 Novedades sobre el hackeo de $40M a Vector Finance: El atacante ha devuelto $15 millones en ETH a la billetera del protocolo esta mañana. Junto con la transacción, el hacker dejó un mensaje on-chain afirmando que solo quería "exponer una vulnerabilidad crítica" y que se quedará con un 10% como "recompensa por el bug". El equipo de Vector está intentando negociar la devolución del resto de los fondos. #DeFi #Hack #Seguridad #Arbitrum #WhiteHats $BTC {future}(BTCUSDT) $ETH {future}(ETHUSDT) $BNB {future}(BNBUSDT)
Actualización del Hackeo en DeFi: ¿Un hacker "ético"? 🤔😇
Novedades sobre el hackeo de $40M a Vector Finance: El atacante ha devuelto $15 millones en ETH a la billetera del protocolo esta mañana.
Junto con la transacción, el hacker dejó un mensaje on-chain afirmando que solo quería "exponer una vulnerabilidad crítica" y que se quedará con un 10% como "recompensa por el bug". El equipo de Vector está intentando negociar la devolución del resto de los fondos.
#DeFi #Hack #Seguridad #Arbitrum #WhiteHats $BTC
$ETH
$BNB
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
·
--
Stay #SAFU on X and other socials. @JasonYanowitz on X narrates his #hack odeal. I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked. Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole. I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed. This was the real hack. I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address. But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it. Some takeaways: - Don't click links - If you do click a link, review the actual email address - Set up non-text 2FA on everything - If you've done that, trust your own security process - If you think you've been hacked, slow down and think about how this could have happened Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly. If you're still reading, go read the self-audit series from @samczsun. And this best practices from @bobbyong. Lot more you can do but start there. #phishing
Stay #SAFU on X and other socials.

@JasonYanowitz on X narrates his #hack odeal.

I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked.
Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole.
I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed.

This was the real hack.

I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address.
But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it.

Some takeaways:
- Don't click links
- If you do click a link, review the actual email address
- Set up non-text 2FA on everything
- If you've done that, trust your own security process
- If you think you've been hacked, slow down and think about how this could have happened
Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly.
If you're still reading, go read the self-audit series from @samczsun.
And this best practices from @bobbyong.
Lot more you can do but start there. #phishing
Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in EthereumOn Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter. Theft Details: 3,250 ETH Moved by Unknown Perpetrators A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability. Personal Accounts of Jeff 'Jiho' Zirlin Compromised Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it. Security of Ronin and Sky Mavis Unaffected In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals. Impact on Ronin's Market Value As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97. Historical Context: Ronin Bridge Attack The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack. $ETH #Ronin #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ronin Wallets of 'Axie Infinity' Founders Hacked, $9.5 Million Loss in Ethereum

On Thursday, Ronin gaming platform wallets were compromised, resulting in the theft of approximately $9.5 million worth of Ethereum. The perpetrators utilized Tornado Cash service to launder the stolen funds, mixing transactions from multiple users to obscure the cryptocurrency's origin. Among the affected individuals is one of the founders of Ronin and Axie Infinity, who disclosed the incident on Twitter.
Theft Details: 3,250 ETH Moved by Unknown Perpetrators
A precise sum of 3,250 ETH was siphoned from gaming wallets on the Ronin network, amounting to $9.5 million. The attackers subsequently transferred these funds to three distinct Ethereum wallets via a network bridge. The ETH was then laundered through the Tornado Cash service, complicating its traceability.
Personal Accounts of Jeff 'Jiho' Zirlin Compromised
Jeff "Jiho" Zirlin, co-founder of Ronin and Axie Infinity, announced on Thursday evening that his personal wallets had been compromised in the attack. He stated that the attack solely targeted his personal accounts and did not impact the security or operations of the Ronin network or the activities of Sky Mavis, the company behind it.

Security of Ronin and Sky Mavis Unaffected
In response to the incident, Aleksander "Psycheout" Larsen, another founder of Sky Mavis, emphasized that the attack has no bearing on the security measures of the Ronin network bridge or the company's financial assets. Larsen highlighted that the bridge itself has undergone several security audits and is equipped with mechanisms to prevent excessive fund withdrawals.
Impact on Ronin's Market Value
As a consequence of the attack and fund depletion, the value of Ronin cryptocurrency (RON) experienced a decline, with its price plummeting from approximately $3.17 to $2.74, marking a decrease of over 13% within minutes. At the time of writing, the price partially recovered to $2.97.
Historical Context: Ronin Bridge Attack
The incident occurs two years after the attack on the Ethereum Ronin bridge, during which cryptocurrency worth $622 million was stolen. The attack was attributed to the Lazarus hacking group from North Korea, exploiting the insufficient decentralization at that time. Subsequently, a portion of the stolen funds was recovered, and Sky Mavis reimbursed users for all losses from the February 2022 attack.

$ETH
#Ronin #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥 Yesterday, the crypto world exploded with two shocking headlines: 1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack. 2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯 Coincidence? Or something bigger? 🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang. 🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen! 🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots. 💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥 🔔 Follow for more real-time crypto updates! 🚀 #BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚨 Did North Korea Just Pull Off the Biggest Crypto Heist? 🔥

Yesterday, the crypto world exploded with two shocking headlines:

1️⃣ A major exchange lost $1.5 billion in Ethereum after a massive hack.

2️⃣ Just hours later, North Korea claimed it had a $1.5 billion ETH reserve. 🤯

Coincidence? Or something bigger?
🔹 The Hack: Hackers drained 400,000 ETH from the exchange’s secure wallet. Experts suspect North Korea’s Lazarus Group, a well-known cybercrime gang.

🔹 North Korea’s Announcement: Out of nowhere, North Korea declared a massive Ethereum reserve—the exact same amount stolen!

🔹 Social Media Buzz: "Did North Korea just rob an exchange and call it a reserve?" Many are connecting the dots.

💬 What do you think? A wild coincidence or the biggest crypto heist ever? Drop your thoughts below! 👇🔥

🔔 Follow for more real-time crypto updates! 🚀

#BybitSecurityBreach #Binance #HackerAlert #Hack #ETH
🚫 A scam AAVE website was found in Google's ad block – PeckShieldAlert Phishing ads are designed to drain crypto wallets—fake sites like these often contain malware. #Scam #Hack
🚫 A scam AAVE website was found in Google's ad block – PeckShieldAlert

Phishing ads are designed to drain crypto wallets—fake sites like these often contain malware.

#Scam
#Hack
⚠️ MARKET MAYHEM IN JUST 2 HOURS ⚠️ 📈 PPI & Core PPI — Both came in WAY hotter than forecasts, shaking rate-cut hopes. 🚫 US Treasury Secretary — Confirms the government will NOT buy Bitcoin. 💥 Turkish Crypto Exchange Hack — $49M vanished in a major breach. 📉 My Portfolio — Feels like WWIII just started in my account. Stay sharp. Volatility is at DEFCON 1. #CryptoNews #Bitcoin #Inflation #Hack #Markets
⚠️ MARKET MAYHEM IN JUST 2 HOURS ⚠️

📈 PPI & Core PPI — Both came in WAY hotter than forecasts, shaking rate-cut hopes.

🚫 US Treasury Secretary — Confirms the government will NOT buy Bitcoin.

💥 Turkish Crypto Exchange Hack — $49M vanished in a major breach.

📉 My Portfolio — Feels like WWIII just started in my account.

Stay sharp. Volatility is at DEFCON 1.
#CryptoNews #Bitcoin #Inflation #Hack #Markets
🇺🇸 ESTADOUNIDENSES PERDIERON 9.300 MILLONES EN FRAUDES CRIPTO DURANTE 2024. El Centro de Denuncias de Delitos en Internet (IC3) del Buró Federal de Investigación (FBI) ha publicado su informe anual que detalla las denuncias y pérdidas debido a estafas y fraudes relacionados con criptomonedas en 2024. Según el informe publicado el 23 de abril, el IC3 recibió más de 140.000 denuncias que mencionaban criptomonedas en 2024, lo que resultó en aproximadamente 9.300 millones de dólares en pérdidas. El buró informó que las personas mayores de 60 años fueron las más afectadas por fraudes relacionados con criptomonedas, con aproximadamente 33.000 denuncias y 2.800 millones de dólares en pérdidas. #Fraud_alert #FraudAlert #Hack #crypto $SOL $XRP
🇺🇸 ESTADOUNIDENSES PERDIERON 9.300 MILLONES EN FRAUDES CRIPTO DURANTE 2024.

El Centro de Denuncias de Delitos en Internet (IC3) del Buró Federal de Investigación (FBI) ha publicado su informe anual que detalla las denuncias y pérdidas debido a estafas y fraudes relacionados con criptomonedas en 2024.

Según el informe publicado el 23 de abril, el IC3 recibió más de 140.000 denuncias que mencionaban criptomonedas en 2024, lo que resultó en aproximadamente 9.300 millones de dólares en pérdidas.

El buró informó que las personas mayores de 60 años fueron las más afectadas por fraudes relacionados con criptomonedas, con aproximadamente 33.000 denuncias y 2.800 millones de dólares en pérdidas.
#Fraud_alert #FraudAlert #Hack #crypto
$SOL $XRP
Logga in för att utforska mer innehåll
Utforska de senaste kryptonyheterna
⚡️ Var en del av de senaste diskussionerna inom krypto
💬 Interagera med dina favoritkreatörer
👍 Ta del av innehåll som intresserar dig
E-post/telefonnummer