Binance Square

hack

941,101 مشاهدات
536 يقومون بالنقاش
Nataly new season
·
--
🚀 ESTRATEGIA BINANCE 2026: ¡Súbete a la Tendencia! 1. 💎 El "Hack" de BNB No solo holdees. Mantén tus $BNBen Simple Earn. ¿Por qué? Te da acceso automático a Launchpools y HODLer Airdrops. Estás recibiendo los nuevos tokens de IA y Gaming antes que nadie y sin costo adicional. 2. 🤖 IA y Privacidad (La narrativa real) El capital se está moviendo de las "viejas" monedas a la IA Descentralizada (como ZAMA). Tip: Ve a la sección "Zonas" en Binance y busca IA o FHE. Ahí es donde está el volumen fuerte este trimestre. 3. 📉 Cero Estrés con Inversión Automática ¿Bitcoin en $78,000 te da miedo? Usa el Bot de Inversión Automática (DCA). Configura compras diarias o semanales. Así promedias tu precio de entrada y eliminas el factor emocional de comprar "caro". 4. 🛡️ Protección de Capital Mercado volátil = Peligro en Futuros. Regla de oro: Nunca operes sin Stop Loss. Si el mercado se gira, una pérdida del 2% es una lección; una cuenta liquidada es un error. 🔥 TOP WATCHLIST FEBRERO: $BNB : Para farmear airdrops. $SOL : El rey de las memecoins y el volumen rápido. $BTC : Consolidando camino a nuevos máximos. #BitcoinDropMarketImpact #EstratégiaCrypto #Hack
🚀 ESTRATEGIA BINANCE 2026: ¡Súbete a la Tendencia!
1. 💎 El "Hack" de BNB
No solo holdees. Mantén tus $BNBen Simple Earn.

¿Por qué? Te da acceso automático a Launchpools y HODLer Airdrops. Estás recibiendo los nuevos tokens de IA y Gaming antes que nadie y sin costo adicional.

2. 🤖 IA y Privacidad (La narrativa real)
El capital se está moviendo de las "viejas" monedas a la IA Descentralizada (como ZAMA).

Tip: Ve a la sección "Zonas" en Binance y busca IA o FHE. Ahí es donde está el volumen fuerte este trimestre.

3. 📉 Cero Estrés con Inversión Automática
¿Bitcoin en $78,000 te da miedo? Usa el Bot de Inversión Automática (DCA).
Configura compras diarias o semanales. Así promedias tu precio de entrada y eliminas el factor emocional de comprar "caro".

4. 🛡️ Protección de Capital
Mercado volátil = Peligro en Futuros.
Regla de oro: Nunca operes sin Stop Loss. Si el mercado se gira, una pérdida del 2% es una lección; una cuenta liquidada es un error.

🔥 TOP WATCHLIST FEBRERO:
$BNB : Para farmear airdrops.
$SOL : El rey de las memecoins y el volumen rápido.
$BTC : Consolidando camino a nuevos máximos.
#BitcoinDropMarketImpact #EstratégiaCrypto #Hack
·
--
صاعد
🔥🦅 A FÊNIX DO ETHEREUM ⚡️ THE DAO RESSURGE COM US💲 220 MILHÕES❗ 🚀🛡️ 😱 Quase dez anos após o hack histórico de 2016 que dividiu a rede, o nome que quase destruiu o Ethereum está de volta. Mas desta vez, não como uma vulnerabilidade, mas como um Fundo de Segurança de US$ 220 milhões. 🧵👇 🧨 1. De "Hack" a Tesouro de Segurança Você lembra do hard fork que criou o Ethereum Classic ❓ Pois é, cerca de 75.109 $ETH (equivalentes a ~US$ 220M) ficaram "esquecidos" ou não reclamados em contratos legados daquele evento. A Grande Ideia ⥱ Em vez de deixar esses fundos parados, pioneiros como Griff Green e a Ethereum Foundation estão reativando o The DAO como uma dotação de segurança permanente. 📊 2. O Plano de "Segurança de Um Trilhão de Dólares" O objetivo não é apenas auditar código, mas proteger VOCÊ, o usuário final Staking Permanente ⥱ ~69.420 $ETH serão colocados em staking para gerar um rendimento anual de US$ 8 milhões, que financiará auditorias contínuas e pesquisas de segurança. Foco no Usuário ⥱ O fundo vai investir pesado no combate ao phishing, mecanismos de recuperação de carteiras e limites de saques para evitar que hackers limpem contas inteiras. 🕵️‍♂️🔒 📈 3. Quem está no Comando ❓ Este não é um projeto amador. O conselho de curadores inclui nomes de peso como Vitalik Buterin, especialistas da MetaMask e da ENS. O que antes foi uma lição dolorosa sobre "código é lei", agora se torna a base para que o Ethereum atinja escala bancária global. 📢 EU QUERO SABER DE VOCÊ Você acha que essa "redenção" do The DAO é o passo final para o Ethereum ser aceito como a infraestrutura financeira definitiva do mundo ? 🏛️ vs 🚀 👇 Comente "SEGURANÇA" se você acredita que a crypto $ETH está mais forte do que nunca em 2026❗ 💡 @Fumao 📣 Isso não é um conselho financeiro. Sempre faça seu próprio estudo antes de investir em qualquer projeto cripto. #BinanceSquareFamily #Ethereum #EthereumNews #VitalikButerin #Hack
🔥🦅 A FÊNIX DO ETHEREUM ⚡️ THE DAO RESSURGE COM US💲 220 MILHÕES❗ 🚀🛡️

😱 Quase dez anos após o hack histórico de 2016 que dividiu a rede, o nome que quase destruiu o Ethereum está de volta. Mas desta vez, não como uma vulnerabilidade, mas como um Fundo de Segurança de US$ 220 milhões. 🧵👇

🧨 1. De "Hack" a Tesouro de Segurança

Você lembra do hard fork que criou o Ethereum Classic ❓ Pois é, cerca de 75.109 $ETH (equivalentes a ~US$ 220M) ficaram "esquecidos" ou não reclamados em contratos legados daquele evento.

A Grande Ideia ⥱ Em vez de deixar esses fundos parados, pioneiros como Griff Green e a Ethereum Foundation estão reativando o The DAO como uma dotação de segurança permanente.

📊 2. O Plano de "Segurança de Um Trilhão de Dólares"

O objetivo não é apenas auditar código, mas proteger VOCÊ, o usuário final

Staking Permanente ⥱ ~69.420 $ETH serão colocados em staking para gerar um rendimento anual de US$ 8 milhões, que financiará auditorias contínuas e pesquisas de segurança.

Foco no Usuário ⥱ O fundo vai investir pesado no combate ao phishing, mecanismos de recuperação de carteiras e limites de saques para evitar que hackers limpem contas inteiras. 🕵️‍♂️🔒

📈 3. Quem está no Comando ❓

Este não é um projeto amador. O conselho de curadores inclui nomes de peso como Vitalik Buterin, especialistas da MetaMask e da ENS. O que antes foi uma lição dolorosa sobre "código é lei", agora se torna a base para que o Ethereum atinja escala bancária global.

📢 EU QUERO SABER DE VOCÊ

Você acha que essa "redenção" do The DAO é o passo final para o Ethereum ser aceito como a infraestrutura financeira definitiva do mundo ? 🏛️ vs 🚀

👇 Comente "SEGURANÇA" se você acredita que a crypto $ETH está mais forte do que nunca em 2026❗

💡 @Leandro-Fumao 📣 Isso não é um conselho financeiro. Sempre faça seu próprio estudo antes de investir em qualquer projeto cripto.

#BinanceSquareFamily #Ethereum #EthereumNews #VitalikButerin #Hack
CrossCurve HACKED! $3M GONE! Warning: Halt all CrossCurve interactions NOW. Critical vulnerability exploited. Funds drained. Hackers used fake cross-chain messages. Gateway authentication bypassed. PortalV2 contract emptied. 10 hacker wallets identified. CrossCurve offers 10% bounty for return. 72-hour ultimatum issued. Legal action threatened. Curve Finance advises caution on Eywa pools. This is the second major hack in weeks. Bridges remain prime targets. This is for informational purposes only. #crosschain #defi #hack 🚨
CrossCurve HACKED! $3M GONE!

Warning: Halt all CrossCurve interactions NOW.
Critical vulnerability exploited. Funds drained.
Hackers used fake cross-chain messages.
Gateway authentication bypassed.
PortalV2 contract emptied.
10 hacker wallets identified.
CrossCurve offers 10% bounty for return.
72-hour ultimatum issued. Legal action threatened.
Curve Finance advises caution on Eywa pools.
This is the second major hack in weeks.
Bridges remain prime targets.

This is for informational purposes only.

#crosschain #defi #hack 🚨
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk. The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance. 72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical. Disclaimer: This is not financial advice. #CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk.

The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance.

72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical.

Disclaimer: This is not financial advice.

#CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
Step Finance treasury hacked: $29 million in SOL leaves Solana front page wallets📅 January 31 We are not talking about a small protocol, but one that aggregates positions from almost 95% of the network's projects, that organizes the Solana Crossroads conference in Istanbul and that even ventured into the tokenization of stocks like Nvidia and Tesla. 📖The incident was revealed by the Step Finance team itself through a statement on X, where they confirmed a security breach in some of their treasury and commission wallets. Hours before the announcement, onchain data already showed unusual movements: exactly 261,854 SOL were de-staked and transferred out of the addresses linked to the protocol. The security firm CertiK estimated that the value of the funds moved is around $29 million. However, the team is yet to clarify the root cause of the incident. It is not known whether it was a vulnerability in smart contracts, a flaw in access controls or the direct compromise of private keys. It has also not been confirmed whether user funds, beyond the protocol's treasury, were affected. Step Finance is not a minor player within the ecosystem. Founded in 2021, it functions as a visualization dashboard that aggregates LP tokens, yield farm positions, and multiple Solana protocols into a single dashboard. Additionally, it operates the SolanaFloor news outlet, manages a validator node, and allocates 100% of the validator's revenue—after operating costs—to repurchases of the STEP token to distribute to those staking xSTEP. This event adds to a chain of incidents that have hit projects in the Solana ecosystem in the last year. In April 2025, Loopscale lost $5.8 million just two weeks after its launch. In August, CrediX suffered a theft of $4.5 million after controlling an administrative wallet. In November, South Korean exchange Upbit reported a $37 million hack involving assets on the Solana network. Topic Opinion: No matter how big or well-known a project is, security remains the Achilles heel of DeFi. 💬 Do you think these types of incidents continue to slow down institutional adoption in Solana? Leave your comment... #solana #defi #Hack #CryptoSecurity #CryptoNews $SOL {spot}(SOLUSDT)

Step Finance treasury hacked: $29 million in SOL leaves Solana front page wallets

📅 January 31
We are not talking about a small protocol, but one that aggregates positions from almost 95% of the network's projects, that organizes the Solana Crossroads conference in Istanbul and that even ventured into the tokenization of stocks like Nvidia and Tesla.

📖The incident was revealed by the Step Finance team itself through a statement on X, where they confirmed a security breach in some of their treasury and commission wallets. Hours before the announcement, onchain data already showed unusual movements: exactly 261,854 SOL were de-staked and transferred out of the addresses linked to the protocol.
The security firm CertiK estimated that the value of the funds moved is around $29 million. However, the team is yet to clarify the root cause of the incident. It is not known whether it was a vulnerability in smart contracts, a flaw in access controls or the direct compromise of private keys. It has also not been confirmed whether user funds, beyond the protocol's treasury, were affected.
Step Finance is not a minor player within the ecosystem. Founded in 2021, it functions as a visualization dashboard that aggregates LP tokens, yield farm positions, and multiple Solana protocols into a single dashboard. Additionally, it operates the SolanaFloor news outlet, manages a validator node, and allocates 100% of the validator's revenue—after operating costs—to repurchases of the STEP token to distribute to those staking xSTEP.
This event adds to a chain of incidents that have hit projects in the Solana ecosystem in the last year. In April 2025, Loopscale lost $5.8 million just two weeks after its launch. In August, CrediX suffered a theft of $4.5 million after controlling an administrative wallet. In November, South Korean exchange Upbit reported a $37 million hack involving assets on the Solana network.

Topic Opinion:
No matter how big or well-known a project is, security remains the Achilles heel of DeFi.
💬 Do you think these types of incidents continue to slow down institutional adoption in Solana?

Leave your comment...
#solana #defi #Hack #CryptoSecurity #CryptoNews $SOL
⚠️ Step Finance hacked — 261,854 SOL ($27M) stolen DeFi tracker on Solana reports treasury breach, STEP token down 80%. Investigation ongoing with cybersecurity help. $SOL #DeFi #Hack
⚠️ Step Finance hacked — 261,854 SOL ($27M) stolen
DeFi tracker on Solana reports treasury breach, STEP token down 80%. Investigation ongoing with cybersecurity help.

$SOL
#DeFi #Hack
🚨 Massive shockwave on $SOL ! STEP Finance just got breached 261,854 $SOL unstaked and gone 😱 Liquidity shaken, market already reacting fast 📉 Every $SOL holder needs to stay alert this isn’t noise, it’s real. DYOR. NFA. {future}(SOLUSDT) #solana #CryptoAlertX #Hack 🚨
🚨 Massive shockwave on $SOL !

STEP Finance just got breached 261,854 $SOL unstaked and gone 😱
Liquidity shaken, market already reacting fast 📉
Every $SOL holder needs to stay alert this isn’t noise, it’s real.

DYOR. NFA.


#solana #CryptoAlertX #Hack 🚨
·
--
صاعد
🚨MILLION DOLLAR MISTAKE:😭$ETH A victim (0xd674) lost 4556 $ETH ($12.4M) due to a copy-paste address mistake. Victim 0xd674 frequently transfers funds to Galaxy Digital via 0x6D90CC...dD2E48. The attacker generated a poison address with the same first and last 4 characters as Galaxy Digital's deposit address and repeatedly sent dust transactions. 11 hours ago, the victim copied an address directly from transaction history to deposit into Galaxy Digital but copied the poison address instead. As a result, 4,556 $ETH ($12.4M) was sent to the attacker. 💢A painful lesson! Always double-check the address before making a transfer. Don't copy addresses from your transaction history for convenience. Victim address: 0xd6741220a947941bF290799811FcDCeA8AE4A7Da #Mistake #crypto #Hack #HackerAlert #hackers
🚨MILLION DOLLAR MISTAKE:😭$ETH

A victim (0xd674) lost 4556 $ETH ($12.4M) due to a copy-paste address mistake.

Victim 0xd674 frequently transfers funds to Galaxy Digital via
0x6D90CC...dD2E48.

The attacker generated a poison address with the same first and last 4 characters as Galaxy Digital's deposit address and repeatedly sent dust transactions.

11 hours ago, the victim copied an address directly from transaction history to deposit into Galaxy Digital but copied the poison address instead.

As a result, 4,556 $ETH ($12.4M) was sent to the attacker.

💢A painful lesson!

Always double-check the address before making a transfer.

Don't copy addresses from your transaction history for convenience.

Victim address:
0xd6741220a947941bF290799811FcDCeA8AE4A7Da

#Mistake #crypto #Hack #HackerAlert #hackers
·
--
هابط
🚨💸 $7M LOSS AND 80% DIVE FOR HACKED HLG TOKEN 💸🚨 Holograph, a leading omnichain tokenization platform which recently was part of the BINANCE AIRDROPS, recently experienced a major smart contract exploit, resulting in the loss of 1 billion HLG tokens valued at approximately $7 million. This incident has caused a significant drop in the value of the HLG token. 📉 Token Impact: Following the exploit, the project’s native HLG token plunged by about 80% within 24 hours after the attack, dropping to as low as $0.0029 before slightly recovering to $0.0068. The tokens had been airdropped to the community in May. 🔍 The Hack: The platform confirmed on X (formerly Twitter) that its Holograph Operator Contract had been compromised by a malicious actor who minted 1 billion HLG tokens. Initial Response: The exploit has been patched, and Holograph’s team is working with exchanges to lock compromised accounts. The team has also launched an investigation and is in the process of contacting law enforcement. Value at Theft: On-chain data indicates the stolen tokens were valued at around $7 million at the time of the incident. 🕵️‍♂️ Hacker Strategy: Blockchain security platform Cyvers reported that some of the stolen tokens were swapped for the USDT stablecoin, which the attacker used to acquire 300 ETH. The hacker then distributed the funds to various addresses, including those linked to privacy protocols like Tornado Cash and Railgun. Current Holdings: On-chain data shows the exploiter’s address still holds about 47.59 ETH, valued at around $167,000 at press time. 📊 Analysis: Matt Casto, a DeFi researcher at CMT Digital, suggested that the attacker was likely “a rogue dev who funded the address 26 days ago,” noting that the address used to receive the minted supply. 👇 What are your thoughts on the recent Holograph hack? I guess it shows us that no project is totally save! #HLG #Binanceairdrops #airdrop #hack #alert $SHIB $PEPE $DOGE
🚨💸 $7M LOSS AND 80% DIVE FOR HACKED HLG TOKEN 💸🚨

Holograph, a leading omnichain tokenization platform which recently was part of the BINANCE AIRDROPS, recently experienced a major smart contract exploit, resulting in the loss of 1 billion HLG tokens valued at approximately $7 million. This incident has caused a significant drop in the value of the HLG token.

📉 Token Impact:
Following the exploit, the project’s native HLG token plunged by about 80% within 24 hours after the attack, dropping to as low as $0.0029 before slightly recovering to $0.0068. The tokens had been airdropped to the community in May.

🔍 The Hack:
The platform confirmed on X (formerly Twitter) that its Holograph Operator Contract had been compromised by a malicious actor who minted 1 billion HLG tokens.

Initial Response: The exploit has been patched, and Holograph’s team is working with exchanges to lock compromised accounts. The team has also launched an investigation and is in the process of contacting law enforcement.

Value at Theft: On-chain data indicates the stolen tokens were valued at around $7 million at the time of the incident.

🕵️‍♂️ Hacker Strategy:
Blockchain security platform Cyvers reported that some of the stolen tokens were swapped for the USDT stablecoin, which the attacker used to acquire 300 ETH. The hacker then distributed the funds to various addresses, including those linked to privacy protocols like Tornado Cash and Railgun.

Current Holdings: On-chain data shows the exploiter’s address still holds about 47.59 ETH, valued at around $167,000 at press time.

📊 Analysis:
Matt Casto, a DeFi researcher at CMT Digital, suggested that the attacker was likely “a rogue dev who funded the address 26 days ago,” noting that the address used to receive the minted supply.

👇 What are your thoughts on the recent Holograph hack?
I guess it shows us that no project is totally save!

#HLG #Binanceairdrops #airdrop #hack #alert

$SHIB $PEPE $DOGE
WazirX #hack Yaklaşık 230 milyon #dolar hacklendi, bakiyeniz varsa #metamask cüzdanınıza ya da binance hesabınıza taşıyın!
WazirX #hack

Yaklaşık 230 milyon #dolar hacklendi, bakiyeniz varsa #metamask cüzdanınıza ya da binance hesabınıza taşıyın!
 🎯️WazirX bị hack, thiệt hại hơn 230 triệu USD 💲Theo nguồn tin từ Cyvers Alerts, ví Safe Multisig trên mạng Ethereum của WazirX vừa bị tấn công. Tổng cộng 234.9 triệu USD tài sản bị chuyển đến địa chỉ mới. Địa chỉ đáng ngờ này hoán đổi PEPE, GALA và USDT thành ETH và tiếp tục giao dịch các tài sản kỹ thuật số khác. 🔓Theo Lookonchain, vụ tấn công lấy đi 17 loại tài sản, Một số cái tên nổi bật bị lấy cắp bao gồm: 5,433 tỷ SHIB trị giá khoảng 102 triệu USD, 15,298 ETH trị giá khoảng 52.5 triệu USD, 20.5 triệu MATIC trị giá khoảng 11.24 triệu USD, 640.27 tỷ PEPE có giá khoảng 7.6 triệu USD, 5.79 triệu USDT trị giá 135 triệu USD, 135 triệu GALA trị giá 3.5 triệu USD. 🏅️Số tài sản chưa xác định khác trị giá khoảng 25.78 triệu USD đang tiếp tục được điều xác minh. Ví có địa chỉ bắt đầu tư "0x04b2" đang bán những tài sản này. 📌Các giao dịch được thực hiện có sự hỗ trợ của nền tảng TornadoCash. Cyvers Alerts phát hiện và cố gắng liên hệ với dự án nhưng không nhận được phản hồi.  ✅Sau thông tin bị tấn công, token của sàn sụt giảm nhanh chóng từ 0.1689 USD xuống 0.1618 USD. Hiện tại, đội ngũ dự án chưa có phản hồi chính thức về vụ việc. ⏰WazirX là sàn giao dịch tiền mã hóa lớn nhất và phát triển nhanh nhất Ấn Độ với hơn 200,000 lượt tải xuống ứng dụng với xếp hạng trung bình là 4.5. Dự án được biết đến nhiều hơn khi mở rộng truy cập cho công chúng toàn cầu vào đầu năm. #Coinbay #WazirX #hack
 🎯️WazirX bị hack, thiệt hại hơn 230 triệu USD

💲Theo nguồn tin từ Cyvers Alerts, ví Safe Multisig trên mạng Ethereum của WazirX vừa bị tấn công. Tổng cộng 234.9 triệu USD tài sản bị chuyển đến địa chỉ mới. Địa chỉ đáng ngờ này hoán đổi PEPE, GALA và USDT thành ETH và tiếp tục giao dịch các tài sản kỹ thuật số khác.

🔓Theo Lookonchain, vụ tấn công lấy đi 17 loại tài sản, Một số cái tên nổi bật bị lấy cắp bao gồm: 5,433 tỷ SHIB trị giá khoảng 102 triệu USD, 15,298 ETH trị giá khoảng 52.5 triệu USD, 20.5 triệu MATIC trị giá khoảng 11.24 triệu USD, 640.27 tỷ PEPE có giá khoảng 7.6 triệu USD, 5.79 triệu USDT trị giá 135 triệu USD, 135 triệu GALA trị giá 3.5 triệu USD.

🏅️Số tài sản chưa xác định khác trị giá khoảng 25.78 triệu USD đang tiếp tục được điều xác minh. Ví có địa chỉ bắt đầu tư "0x04b2" đang bán những tài sản này.

📌Các giao dịch được thực hiện có sự hỗ trợ của nền tảng TornadoCash. Cyvers Alerts phát hiện và cố gắng liên hệ với dự án nhưng không nhận được phản hồi. 

✅Sau thông tin bị tấn công, token của sàn sụt giảm nhanh chóng từ 0.1689 USD xuống 0.1618 USD. Hiện tại, đội ngũ dự án chưa có phản hồi chính thức về vụ việc.

⏰WazirX là sàn giao dịch tiền mã hóa lớn nhất và phát triển nhanh nhất Ấn Độ với hơn 200,000 lượt tải xuống ứng dụng với xếp hạng trung bình là 4.5. Dự án được biết đến nhiều hơn khi mở rộng truy cập cho công chúng toàn cầu vào đầu năm.

#Coinbay #WazirX #hack
·
--
صاعد
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa. 💀 La estafa del Memecoin de Grimace 👾 Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos. 📊 Pump & Dump Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos. 💸 El desembolso En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana". ⚠️ Consecuencias Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana

En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa.

💀 La estafa del Memecoin de Grimace 👾

Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos.

📊 Pump & Dump

Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos.

💸 El desembolso

En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana".

⚠️ Consecuencias

Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas.

#scam #hack #Solana⁩ $SOL #RiskManagement
Trezor X Account Targeted by Hackers: Warning Against Fake OffersThe Trezor hardware wallet account on social network X has become a target for attackers who have been posting enticing posts luring users into fraudulent token offers. This situation raises suspicions of a hack, likely through a SIM card exchange attack. Detectives on the Trail: Alerting Suspicious Activity Independent blockchain expert ZachXBT and security service Scam Sniffer have alerted to a potential security issue with Trezor, followed by several fake token presale offers of "$TRZR" and requests to send cryptocurrencies to a suspicious address. ZachXBT further stated that attackers stole approximately $8,100 from the Trezor account on the Zapper platform. Risks Associated with Unsecured Social Accounts Criticism has been directed at Trezor for the inadequate security of their X account, highlighting the lack of two-factor authentication (2FA). Ironically, a company focused on wallet security failed to protect its own social network accounts from attacks. Community Response and Recent Security Incidents The community's response has been mixed, with some comments pointing out the irony of a security-promoting company being unable to secure its own accounts. Trezor has faced security incidents in the past, including breaches that exposed the data of nearly 66,000 users. Conclusion and User Recommendations This incident serves as a reminder of the importance of securing digital accounts and using two-factor authentication. Users should remain vigilant and avoid sending cryptocurrencies to unknown addresses or engaging in suspicious offers. #trezor #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Trezor X Account Targeted by Hackers: Warning Against Fake Offers

The Trezor hardware wallet account on social network X has become a target for attackers who have been posting enticing posts luring users into fraudulent token offers. This situation raises suspicions of a hack, likely through a SIM card exchange attack.
Detectives on the Trail: Alerting Suspicious Activity
Independent blockchain expert ZachXBT and security service Scam Sniffer have alerted to a potential security issue with Trezor, followed by several fake token presale offers of "$TRZR" and requests to send cryptocurrencies to a suspicious address. ZachXBT further stated that attackers stole approximately $8,100 from the Trezor account on the Zapper platform.

Risks Associated with Unsecured Social Accounts
Criticism has been directed at Trezor for the inadequate security of their X account, highlighting the lack of two-factor authentication (2FA). Ironically, a company focused on wallet security failed to protect its own social network accounts from attacks.
Community Response and Recent Security Incidents
The community's response has been mixed, with some comments pointing out the irony of a security-promoting company being unable to secure its own accounts. Trezor has faced security incidents in the past, including breaches that exposed the data of nearly 66,000 users.
Conclusion and User Recommendations
This incident serves as a reminder of the importance of securing digital accounts and using two-factor authentication. Users should remain vigilant and avoid sending cryptocurrencies to unknown addresses or engaging in suspicious offers.
#trezor #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
🇺🇸 ESTADOUNIDENSES PERDIERON 9.300 MILLONES EN FRAUDES CRIPTO DURANTE 2024. El Centro de Denuncias de Delitos en Internet (IC3) del Buró Federal de Investigación (FBI) ha publicado su informe anual que detalla las denuncias y pérdidas debido a estafas y fraudes relacionados con criptomonedas en 2024. Según el informe publicado el 23 de abril, el IC3 recibió más de 140.000 denuncias que mencionaban criptomonedas en 2024, lo que resultó en aproximadamente 9.300 millones de dólares en pérdidas. El buró informó que las personas mayores de 60 años fueron las más afectadas por fraudes relacionados con criptomonedas, con aproximadamente 33.000 denuncias y 2.800 millones de dólares en pérdidas. #Fraud_alert #FraudAlert #Hack #crypto $SOL $XRP
🇺🇸 ESTADOUNIDENSES PERDIERON 9.300 MILLONES EN FRAUDES CRIPTO DURANTE 2024.

El Centro de Denuncias de Delitos en Internet (IC3) del Buró Federal de Investigación (FBI) ha publicado su informe anual que detalla las denuncias y pérdidas debido a estafas y fraudes relacionados con criptomonedas en 2024.

Según el informe publicado el 23 de abril, el IC3 recibió más de 140.000 denuncias que mencionaban criptomonedas en 2024, lo que resultó en aproximadamente 9.300 millones de dólares en pérdidas.

El buró informó que las personas mayores de 60 años fueron las más afectadas por fraudes relacionados con criptomonedas, con aproximadamente 33.000 denuncias y 2.800 millones de dólares en pérdidas.
#Fraud_alert #FraudAlert #Hack #crypto
$SOL $XRP
·
--
صاعد
🥷💸 أكثر من 280 مليون دولار سُرقت هذا الصيف بسبب اختراقات الكريبتو! 🔟 هذه قائمة بأكبر 10 اختراقات وخروقات أمنية: 1️⃣ Nobitex – ‎$82M (اختراق Hot Wallet) 2️⃣ BtcTurk – ‎$48M (اختراق مفاتيح خاصة) 3️⃣ CoinDCX – ‎$44.2M (فقدان صلاحيات وصول) 4️⃣ GMX – ‎$42M (ثغرة Re-entrancy) 5️⃣ BigONE – ‎$27M (فقدان صلاحيات وصول) 6️⃣ WOO X – ‎$14M (Phishing) 7️⃣ Resupply – ‎$9.6M (التلاعب بأوراكل الأسعار) 8️⃣ ALEX – ‎$8.4M (تحويلات خبيثة) 9️⃣ BetterBank – ‎$5M (ثغرة بروتوكول) 🔟 CrediX – ‎$4.5M (اختراق مفاتيح خاصة) ⚠️ المجموع: +280M$ خلال الصيف فقط! 👉 الدرس: المخاطر الأمنية في عالم الكريبتو ما زالت مرتفعة جدًا، والحماية يجب أن تكون أولوية قصوى لكل مستثمر أو مؤسسة. #Hack #Crypto #Security #DeFi #Hacks #Blockchain #Binance #crypto #عملات_رقمية #ضرار_الحضري
🥷💸 أكثر من 280 مليون دولار سُرقت هذا الصيف بسبب اختراقات الكريبتو!

🔟 هذه قائمة بأكبر 10 اختراقات وخروقات أمنية:
1️⃣ Nobitex – ‎$82M (اختراق Hot Wallet)
2️⃣ BtcTurk – ‎$48M (اختراق مفاتيح خاصة)
3️⃣ CoinDCX – ‎$44.2M (فقدان صلاحيات وصول)
4️⃣ GMX – ‎$42M (ثغرة Re-entrancy)
5️⃣ BigONE – ‎$27M (فقدان صلاحيات وصول)
6️⃣ WOO X – ‎$14M (Phishing)
7️⃣ Resupply – ‎$9.6M (التلاعب بأوراكل الأسعار)
8️⃣ ALEX – ‎$8.4M (تحويلات خبيثة)
9️⃣ BetterBank – ‎$5M (ثغرة بروتوكول)
🔟 CrediX – ‎$4.5M (اختراق مفاتيح خاصة)

⚠️ المجموع: +280M$ خلال الصيف فقط!
👉 الدرس: المخاطر الأمنية في عالم الكريبتو ما زالت مرتفعة جدًا، والحماية يجب أن تكون أولوية قصوى لكل مستثمر أو مؤسسة.
#Hack
#Crypto #Security #DeFi #Hacks #Blockchain #Binance #crypto #عملات_رقمية #ضرار_الحضري
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
سجّل الدخول لاستكشاف المزيد من المُحتوى
استكشف أحدث أخبار العملات الرقمية
⚡️ كُن جزءًا من أحدث النقاشات في مجال العملات الرقمية
💬 تفاعل مع صنّاع المُحتوى المُفضّلين لديك
👍 استمتع بالمحتوى الذي يثير اهتمامك
البريد الإلكتروني / رقم الهاتف