Binance Square
#hack

hack

964,768 показвания
685 обсъждат
Altcoinna
·
--
🤔 Ronin Set to Transition From Gaming Sidechain to $OP Stack-Based #Ethereum Layer 2 on May 12 Ronin will officially migrate from its standalone gaming sidechain into an #Ethereum Layer 2 network powered by the $OP Stack on May 12, marking the end of its independent sidechain era that began in 2021. The upgrade is expected to bring nearly 10 hours of downtime while also slashing $RONIN annual inflation from above 20% to under 1%. Ronin previously suffered a massive $625 million bridge exploit in 2022 — one of the biggest cross-chain bridge hacks ever recorded in #DeFi . #hack #cryptofactske ethereum:native
🤔 Ronin Set to Transition From Gaming Sidechain to $OP Stack-Based #Ethereum Layer 2 on May 12
Ronin will officially migrate from its standalone gaming sidechain into an #Ethereum Layer 2 network powered by the $OP Stack on May 12, marking the end of its independent sidechain era that began in 2021. The upgrade is expected to bring nearly 10 hours of downtime while also slashing $RONIN annual inflation from above 20% to under 1%.
Ronin previously suffered a massive $625 million bridge exploit in 2022 — one of the biggest cross-chain bridge hacks ever recorded in #DeFi . #hack
#cryptofactske
ethereum:native
·
--
Бичи
1📊 2.000 millones en protocolo TVL pasan de LayerZero a Chainlink CCIP El analista Tom Wan señala que protocolos con aproximadamente 2.000 millones de dólares en TVL combinado -incluidos KelpDAO (1.500 millones de dólares), SolvProtocol (600 millones de dólares) y re (200 millones de dólares)- están migrando a Chainlink CCIP a pesar de la reciente disculpa de LayerZero. Activos importantes como el USDe de Ethena, el weETH de Etherfi y el WBTC de Bitgo siguen utilizando el estándar OFT de LayerZero. Este éxodo sigue a la admisión por parte de LayerZero de una mala comunicación durante un reciente exploit, donde revelaron que su RPC interno fue atacado por el Grupo Lazarus y reconocieron una mala configuración DVN 1/1 que creó un punto único de fallo crítico. #hack
1📊 2.000 millones en protocolo TVL pasan de LayerZero a Chainlink CCIP

El analista Tom Wan señala que protocolos con aproximadamente 2.000 millones de dólares en TVL combinado -incluidos KelpDAO (1.500 millones de dólares), SolvProtocol (600 millones de dólares) y re (200 millones de dólares)- están migrando a Chainlink CCIP a pesar de la reciente disculpa de LayerZero. Activos importantes como el USDe de Ethena, el weETH de Etherfi y el WBTC de Bitgo siguen utilizando el estándar OFT de LayerZero.

Este éxodo sigue a la admisión por parte de LayerZero de una mala comunicación durante un reciente exploit, donde revelaron que su RPC interno fue atacado por el Grupo Lazarus y reconocieron una mala configuración DVN 1/1 que creó un punto único de fallo crítico. #hack
🚨🤯 $DEFI DRAMA OF THE YEAR 🍿💥 A hacker allegedly pulled off a mind-blowing $293 MILLION exploit from KelpDAO 😱💸 The attacker reportedly minted fake rsETH tokens 🪙⚠️ and then walked straight into Aave like he owned the blockchain 🌐😎 💰 The hacker opened a gigantic $123M borrowed position using the fake collateral… looking unstoppable for a moment 🚀👀 BUT THEN… THE PLOT TWIST HIT HARD 🎬⚡ 🛑 Aave’s team reportedly reacted fast by manually lowering the rsETH oracle price 📉 💥 The move triggered a massive liquidation 🔥 And the attacker’s entire position got wiped out using the very funds he allegedly stole 🤡💸 📉 Imagine hacking $293M… only to get COMPLETELY REKT by the same protocol you tried to exploit 💀😂 🏆 Karma speedrun any% world record achieved ⚡🎮 🍿 DeFi justice has never looked this satisfying. ⚠️ Reminder: DeFi remains highly risky. Always stay cautious and manage your security carefully 🔐 #DeFi #Crypto #Aave #KelpDAO #Hack #Blockchain #Ethereum #CryptoNews 🚀🔥
🚨🤯 $DEFI DRAMA OF THE YEAR 🍿💥
A hacker allegedly pulled off a mind-blowing $293 MILLION exploit from KelpDAO 😱💸
The attacker reportedly minted fake rsETH tokens 🪙⚠️ and then walked straight into Aave like he owned the blockchain 🌐😎
💰 The hacker opened a gigantic $123M borrowed position using the fake collateral… looking unstoppable for a moment 🚀👀
BUT THEN… THE PLOT TWIST HIT HARD 🎬⚡
🛑 Aave’s team reportedly reacted fast by manually lowering the rsETH oracle price 📉
💥 The move triggered a massive liquidation
🔥 And the attacker’s entire position got wiped out using the very funds he allegedly stole 🤡💸
📉 Imagine hacking $293M…
only to get COMPLETELY REKT by the same protocol you tried to exploit 💀😂
🏆 Karma speedrun any% world record achieved ⚡🎮
🍿 DeFi justice has never looked this satisfying.
⚠️ Reminder: DeFi remains highly risky. Always stay cautious and manage your security carefully 🔐
#DeFi #Crypto #Aave #KelpDAO #Hack #Blockchain #Ethereum #CryptoNews 🚀🔥
🛡️ Mission Accomplished! Aave Liquidates Attacker's rsETH Positions ✅ The team successfully activated the "Recovery Guardian" feature to liquidate the hacker's funds on both Ethereum and Arbitrum, recovering the assets back to the protocol! 💸🔒 🔍 What happened: • The attacker tried to manipulate the system using rsETH leverage. • The team acted instantly to close all positions before any major damage occurred. • Proves that the security mechanisms are fast and highly effective. ⚡️ Result: User funds are SAFU! Aave once again showed its ability to protect the ecosystem and respond to threats like a pro 👊 $AAVE $ETH $ARB #Aave #DeFi #Security #Hack #Recovery
🛡️ Mission Accomplished! Aave Liquidates Attacker's rsETH Positions ✅

The team successfully activated the "Recovery Guardian" feature to liquidate the hacker's funds on both Ethereum and Arbitrum, recovering the assets back to the protocol! 💸🔒

🔍 What happened:
• The attacker tried to manipulate the system using rsETH leverage.
• The team acted instantly to close all positions before any major damage occurred.
• Proves that the security mechanisms are fast and highly effective.

⚡️ Result:
User funds are SAFU! Aave once again showed its ability to protect the ecosystem and respond to threats like a pro 👊
$AAVE $ETH $ARB
#Aave #DeFi #Security #Hack #Recovery
callmesae187:
check my pinned post and claim your free two red package and also win quiz in just two click in the link🎁🎁💥
·
--
Бичи
1🥷 #ZRO Kelp DAO afirma que los empleados de LayerZero aprobaron la configuración de un verificador 1-de-1. Este verificador fue identificado más tarde por LayerZero como la causa del hackeo de 292 millones de dólares del puente rsETH. #hack
1🥷 #ZRO Kelp DAO afirma que los empleados de LayerZero aprobaron la configuración de un verificador 1-de-1. Este verificador fue identificado más tarde por LayerZero como la causa del hackeo de 292 millones de dólares del puente rsETH. #hack
🥷 #ZRO Kelp DAO claims that LayerZero employees approved the setup of a 1-of-1 verifier. This verifier was later identified by LayerZero as the cause of the $292 million hack of the rsETH bridge. #hack #crypto
🥷 #ZRO Kelp DAO claims that LayerZero employees approved the setup of a 1-of-1 verifier. This verifier was later identified by LayerZero as the cause of the $292 million hack of the rsETH bridge. #hack

#crypto
🚨 Critical Bitcoin Vulnerability Found! 💻🔴 Researchers discovered a severe bug that allowed miners to remotely run code and take over other people's Bitcoin nodes! 😱 🔍 What happened? • The flaw existed in how the network processed block headers. • Hackers could create malicious blocks to inject code into users' systems. • It was dangerous enough to hijack computers, delete files, or install malware remotely. ✅ FIXED! Update Now Good news: The issue has been patched in the latest version Bitcoin Core v28.0. 👉 If you are running a node, update immediately to protect your system! ⛑️ Safety first! 👮‍♂️🛡️ $BTC $ORDI $1000SATS {future}(BTCUSDT) #Bitcoin #Bug #Security #Hack #Node
🚨 Critical Bitcoin Vulnerability Found! 💻🔴

Researchers discovered a severe bug that allowed miners to remotely run code and take over other people's Bitcoin nodes! 😱

🔍 What happened?
• The flaw existed in how the network processed block headers.
• Hackers could create malicious blocks to inject code into users' systems.
• It was dangerous enough to hijack computers, delete files, or install malware remotely.

✅ FIXED! Update Now
Good news: The issue has been patched in the latest version Bitcoin Core v28.0.
👉 If you are running a node, update immediately to protect your system! ⛑️

Safety first! 👮‍♂️🛡️
$BTC $ORDI $1000SATS

#Bitcoin #Bug #Security #Hack #Node
شهد الغامدي:
جائزة مني لك تجدها مثبت في اول منشور🎁
⚡️ Kelp Migrates Immediately! After LayerZero Bridge Hack 🚪💨 Following the massive exploit, Kelp didn't wait around. They announced an instant switch to Chainlink CCIP for maximum security 🔒 🔍 Situation Summary: • The LayerZero bridge was exploited, resulting in a loss of $292 Million. • Kelp confirms they were $NOT directly affected or harmed by this incident. • However, to ensure the highest safety standards, they are moving their cross-chain infrastructure to Chainlink instead. 🛡️ Safety First: This decision shows the project prioritizes user funds above all else and is always ready to adapt for better security ✅ $LINK $ZRO #LayerZero #Chainlink #CCIP #Hack #Bridge
⚡️ Kelp Migrates Immediately! After LayerZero Bridge Hack 🚪💨

Following the massive exploit, Kelp didn't wait around. They announced an instant switch to Chainlink CCIP for maximum security 🔒

🔍 Situation Summary:
• The LayerZero bridge was exploited, resulting in a loss of $292 Million.
• Kelp confirms they were $NOT directly affected or harmed by this incident.
• However, to ensure the highest safety standards, they are moving their cross-chain infrastructure to Chainlink instead.

🛡️ Safety First:
This decision shows the project prioritizes user funds above all else and is always ready to adapt for better security ✅

$LINK $ZRO #LayerZero #Chainlink #CCIP #Hack #Bridge
💸 Drift Protocol Announces Recovery Token! After $285M Exploit 🚨 The team has launched a full recovery plan, introducing a new "Recovery Token" specifically to compensate affected users 💰 🔍 Plan Summary: • Users who lost funds will receive these new tokens as compensation. • Future protocol revenues will be used to back or distribute profits to token holders. • A strategic move to keep the project alive and make users whole again. ⚠️ The Situation: This was one of the biggest hacks recently, but the team is doing everything possible to fix it and rebuild trust 👊 If you were affected, stay tuned for distribution details! 📢 $DRIFT $4 #DriftProtocol #Hack #RecoveryToken #DeFi
💸 Drift Protocol Announces Recovery Token! After $285M Exploit 🚨

The team has launched a full recovery plan, introducing a new "Recovery Token" specifically to compensate affected users 💰

🔍 Plan Summary:
• Users who lost funds will receive these new tokens as compensation.
• Future protocol revenues will be used to back or distribute profits to token holders.
• A strategic move to keep the project alive and make users whole again.

⚠️ The Situation:
This was one of the biggest hacks recently, but the team is doing everything possible to fix it and rebuild trust 👊

If you were affected, stay tuned for distribution details! 📢
$DRIFT $4
#DriftProtocol #Hack #RecoveryToken #DeFi
🚨 The $292M Wake-Up Call: Is DeFi Ready for Wall Street? The recent $292 million exploit—the largest crypto hack of the year—has sent shockwaves through the ecosystem, exposing critical vulnerabilities just as institutional giants prepare to move on-chain. This isn't just another headline; it’s a pivotal moment for Decentralized Finance (DeFi) security and market structure. What Went Wrong? Industry insiders suggest that the crisis highlights three "weak spots" that can no longer be ignored: > Smart Contract Fragility: As protocols become more complex, the attack surface grows. Even "audited" code is proving vulnerable to sophisticated logic exploits. > Liquidity Risks: The hack triggered a secondary DeFi crisis, proving that interconnected protocols can create a "domino effect" during high-stress events. > Oracle Dependencies: Manipulating price feeds remains a go-to move for hackers looking to drain $ETH and $USDC pools. {future}(ETHUSDT) The "New Normal" for DeFi Security To attract "Wall Street" levels of capital, the industry is pivoting toward: 1- Real-Time Monitoring: Shifting from "post-hack alerts" to active circuit breakers that pause protocols automatically. 2- Institutional-Grade Risk Frameworks: Moving away from "move fast and break things" toward the rigorous risk management seen in TradFi. 3- Enhanced Auditing Standards: A rethink of how $BNB and $SOL ecosystem projects verify their security layers before launch. {future}(BNBUSDT) {future}(SOLUSDT) 💡 The Bottom Line For DeFi to survive the arrival of big banks, security cannot be an afterthought. This $292M lesson is forcing a "Great Reset" in how we perceive risk on-chain. #writetoearn #defi #CryptoSecurity #Hack #blockchain
🚨 The $292M Wake-Up Call: Is DeFi Ready for Wall Street?

The recent $292 million exploit—the largest crypto hack of the year—has sent shockwaves through the ecosystem, exposing critical vulnerabilities just as institutional giants prepare to move on-chain. This isn't just another headline; it’s a pivotal moment for Decentralized Finance (DeFi) security and market structure.

What Went Wrong?
Industry insiders suggest that the crisis highlights three "weak spots" that can no longer be ignored:

> Smart Contract Fragility: As protocols become more complex, the attack surface grows. Even "audited" code is proving vulnerable to sophisticated logic exploits.

> Liquidity Risks: The hack triggered a secondary DeFi crisis, proving that interconnected protocols can create a "domino effect" during high-stress events.

> Oracle Dependencies: Manipulating price feeds remains a go-to move for hackers looking to drain $ETH and $USDC pools.


The "New Normal" for DeFi Security
To attract "Wall Street" levels of capital, the industry is pivoting toward:

1- Real-Time Monitoring: Shifting from "post-hack alerts" to active circuit breakers that pause protocols automatically.

2- Institutional-Grade Risk Frameworks: Moving away from "move fast and break things" toward the rigorous risk management seen in TradFi.

3- Enhanced Auditing Standards: A rethink of how $BNB and $SOL ecosystem projects verify their security layers before launch.


💡 The Bottom Line
For DeFi to survive the arrival of big banks, security cannot be an afterthought. This $292M lesson is forcing a "Great Reset" in how we perceive risk on-chain.

#writetoearn #defi #CryptoSecurity #Hack #blockchain
·
--
Бичи
$NAORIS ** is showing a strong bullish reversal on the 4-hour chart, currently gaining over 28% as it bounces back from recent support levels. After a period of healthy correction, the price has regained momentum with a sharp vertical move, supported by a 24-hour trading volume of over 57 million USDT. This indicates that buyers are aggressively stepping in to defend the trend. The current price action is approaching recent highs, and a successful break above the 0.13576 level could trigger a fresh wave of price discovery. As long as the bulls maintain control of the 0.12000 support zone, the trend remains decidedly positive for further upside targets. Target 1: 0.14800 Target 2: 0.16500 Target 3: 0.18200 #NAORIS #CYBER #HACK #Security #CryptoTrading #Altcoins #Bullish {alpha}(560x1b379a79c91a540b2bcd612b4d713f31de1b80cc)
$NAORIS ** is showing a strong bullish reversal on the 4-hour chart, currently gaining over 28% as it bounces back from recent support levels. After a period of healthy correction, the price has regained momentum with a sharp vertical move, supported by a 24-hour trading volume of over 57 million USDT. This indicates that buyers are aggressively stepping in to defend the trend. The current price action is approaching recent highs, and a successful break above the 0.13576 level could trigger a fresh wave of price discovery. As long as the bulls maintain control of the 0.12000 support zone, the trend remains decidedly positive for further upside targets.
Target 1: 0.14800
Target 2: 0.16500
Target 3: 0.18200
#NAORIS #CYBER #HACK #Security #CryptoTrading #Altcoins #Bullish
·
--
Бичи
·
--
Бичи
🚨🚨Balancer DeFi Protocol Hit by Suspected $70M Hacker Attack🚨🚨 Today, Balancer, a decentralized finance (DeFi) protocol, has reportedly suffered a significant suspected hacker attack resulting in asset losses exceeding $70 million. On-chain data and monitoring by blockchain analytics firms indicate that over $70 million worth of assets were transferred from Balancer's vault to new addresses. The stolen assets include large quantities of WETH, Staked ETH (stETH), and wrapped stETH (wstETH), among other ERC-20 tokens. The exact nature and method of the attack remain under investigation, but it aligns with a broader trend of sophisticated DeFi exploits involving flash loans and manipulation of protocol vulnerabilities. Additionally, the attack on Balancer appears to be ongoing or evolving, with some reports putting total losses across Balancer and its multiple forked protocols at around $83 to $88 million, including other chains such as Base, Polygon, Arbitrum, and Sonic. This incident highlights the increasing security challenges faced by DeFi platforms, where smart contract vulnerabilities and complex on-chain mechanisms are exploited by attackers, often via flash loan attacks that allow temporary liquidity to orchestrate exploits without upfront capital. Such high-profile attacks underline the critical need for improved security measures in DeFi, including robust smart contract audits, better real-time monitoring, and more secure oracle systems to prevent price manipulation. Balancer has not yet issued an official statement but investigations and further security reviews are expected as the community works to understand the full scope and impact of the attack. #Hack $ETH
🚨🚨Balancer DeFi Protocol Hit by Suspected $70M Hacker Attack🚨🚨

Today, Balancer, a decentralized finance (DeFi) protocol, has reportedly suffered a significant suspected hacker attack resulting in asset losses exceeding $70 million. On-chain data and monitoring by blockchain analytics firms indicate that over $70 million worth of assets were transferred from Balancer's vault to new addresses. The stolen assets include large quantities of WETH, Staked ETH (stETH), and wrapped stETH (wstETH), among other ERC-20 tokens. The exact nature and method of the attack remain under investigation, but it aligns with a broader trend of sophisticated DeFi exploits involving flash loans and manipulation of protocol vulnerabilities.

Additionally, the attack on Balancer appears to be ongoing or evolving, with some reports putting total losses across Balancer and its multiple forked protocols at around $83 to $88 million, including other chains such as Base, Polygon, Arbitrum, and Sonic. This incident highlights the increasing security challenges faced by DeFi platforms, where smart contract vulnerabilities and complex on-chain mechanisms are exploited by attackers, often via flash loan attacks that allow temporary liquidity to orchestrate exploits without upfront capital.

Such high-profile attacks underline the critical need for improved security measures in DeFi, including robust smart contract audits, better real-time monitoring, and more secure oracle systems to prevent price manipulation. Balancer has not yet issued an official statement but investigations and further security reviews are expected as the community works to understand the full scope and impact of the attack.

#Hack $ETH
Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥 Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥 📰 Summary The $2.3 million Shibarium Bridge hack has taken a dramatic twist! Developer Kaal Dhairya sarcastically challenged the hacker who drained millions through a flash loan exploit, saying: > “Yo, Shibarium bridge attacker, wake up — grab free cash before the offer expires this time and do something right.” 😏 Meanwhile, K9 Finance, Shibarium’s staking partner, raised its bounty from 5 ETH to 20 ETH if the hacker returns 248 billion stolen KNINE tokens, which are now worthless after being blacklisted on-chain. --- 💡 What is a Flash Loan Exploit? A flash loan lets users borrow massive amounts of crypto instantly — as long as they repay it within the same transaction. Hackers exploit this feature by manipulating system logic or token prices to trick protocols into sending them funds. In this case, the attacker gained control of 10 out of 12 validator keys, fooling the bridge into withdrawing $2.3M in $ETH , SHIB, ROAR, and KNINE tokens. --- {future}(ETHUSDT) ⚙️ What Happened Next To protect the network and investors, the Shibarium team introduced new security measures, including: 🚫 Suspicious wallet blocking to stop blacklisted tokens from moving ⏳ 7-day withdrawal delay for BONE tokens 🤝 Partnership with dRPC.org for secure and reliable RPC systems 🧩 Incident response template to handle future attacks quickly K9 Finance also increased its bounty to 20 ETH, hoping to recover the stolen tokens. --- 📉 Market Impact The hack caused short-term volatility in the SHIB ecosystem. Prices dipped briefly as panic selling hit, but quick action and better security restored investor confidence. Analysts believe that if the hacker returns the KNINE tokens or accepts the bounty, it could improve sentiment and spark a mild price recovery for SHIB. --- 🧠 What This Means for Investors Always verify official announcements before reacting to rumors. Avoid suspicious wallets or tokens recently blacklisted on-chain. Stay informed — transparency and security updates are key to DeFi survival. A hack may shake trust, but redemption can rebuild it. 🐾💸 --- 📊 Key Stats Event Detail Hack Amount $2.3 Million Stolen Tokens $ETH , SHIB, ROAR, KNINE Validator Keys Compromised 10 of 12 Bounty Raised 5 ETH → 20 ETH Attack Date September 12, 2025 Flash Loan Type Instant Borrow & Repay Exploit --- 🔍 Image Search Keywords (for Google) Use these exact phrases to find matching charts or infographics for your article: “Shibarium bridge hack 2025 infographic” “Shibarium flash loan exploit diagram” “SHIB $2.3M hack timeline” “K9 Finance 20 ETH bounty poster” “Validator keys Shibarium hack graphic” “KNINE token blacklist chart” --- 🧩 SEO-Friendly Tags #Shibarium #SHİB #crypto #Hack #DeFi

Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥


Shibarium Bridge Hack: $2.3M Stolen — SHIB Dev Dares Hacker to Take the Cash! 🔥
📰 Summary
The $2.3 million Shibarium Bridge hack has taken a dramatic twist!
Developer Kaal Dhairya sarcastically challenged the hacker who drained millions through a flash loan exploit, saying:
> “Yo, Shibarium bridge attacker, wake up — grab free cash before the offer expires this time and do something right.” 😏
Meanwhile, K9 Finance, Shibarium’s staking partner, raised its bounty from 5 ETH to 20 ETH if the hacker returns 248 billion stolen KNINE tokens, which are now worthless after being blacklisted on-chain.
---
💡 What is a Flash Loan Exploit?
A flash loan lets users borrow massive amounts of crypto instantly — as long as they repay it within the same transaction.
Hackers exploit this feature by manipulating system logic or token prices to trick protocols into sending them funds.
In this case, the attacker gained control of 10 out of 12 validator keys, fooling the bridge into withdrawing $2.3M in $ETH , SHIB, ROAR, and KNINE tokens.
---
⚙️ What Happened Next
To protect the network and investors, the Shibarium team introduced new security measures, including:
🚫 Suspicious wallet blocking to stop blacklisted tokens from moving
⏳ 7-day withdrawal delay for BONE tokens
🤝 Partnership with dRPC.org for secure and reliable RPC systems
🧩 Incident response template to handle future attacks quickly
K9 Finance also increased its bounty to 20 ETH, hoping to recover the stolen tokens.
---
📉 Market Impact
The hack caused short-term volatility in the SHIB ecosystem.
Prices dipped briefly as panic selling hit, but quick action and better security restored investor confidence.
Analysts believe that if the hacker returns the KNINE tokens or accepts the bounty, it could improve sentiment and spark a mild price recovery for SHIB.
---
🧠 What This Means for Investors
Always verify official announcements before reacting to rumors.
Avoid suspicious wallets or tokens recently blacklisted on-chain.
Stay informed — transparency and security updates are key to DeFi survival.
A hack may shake trust, but redemption can rebuild it. 🐾💸
---
📊 Key Stats
Event Detail
Hack Amount $2.3 Million
Stolen Tokens $ETH , SHIB, ROAR, KNINE
Validator Keys Compromised 10 of 12
Bounty Raised 5 ETH → 20 ETH
Attack Date September 12, 2025
Flash Loan Type Instant Borrow & Repay Exploit
---
🔍 Image Search Keywords (for Google)
Use these exact phrases to find matching charts or infographics for your article:
“Shibarium bridge hack 2025 infographic”
“Shibarium flash loan exploit diagram”
“SHIB $2.3M hack timeline”
“K9 Finance 20 ETH bounty poster”
“Validator keys Shibarium hack graphic”
“KNINE token blacklist chart”
---
🧩 SEO-Friendly Tags
#Shibarium #SHİB #crypto #Hack #DeFi
·
--
Мечи
MỚI NHẤT⚡️: Sàn giao dịch @GMX_IO đang đề xuất với tin tặc khoản tiền thưởng 10% để trả lại số $GMX bị đánh cắp Nghe có vẻ còn cái nịt rồi anh em ạ😂 Xong cuối cùng vẫn là hacker Triền Tiên -> Tốt nhất cứ short $GMX cho chắc các bác ạ {future}(GMXUSDT) #gmx #Hack #TrendingTopic
MỚI NHẤT⚡️: Sàn giao dịch @GMX_IO đang đề xuất với tin tặc khoản tiền thưởng 10% để trả lại số $GMX bị đánh cắp

Nghe có vẻ còn cái nịt rồi anh em ạ😂

Xong cuối cùng vẫn là hacker Triền Tiên -> Tốt nhất cứ short $GMX cho chắc các bác ạ

#gmx #Hack #TrendingTopic
Ghost Writer
·
--
Мечи
🔥Má thị trường cứ bull lên tí là lại có tin FUD -> Lần này thì là sàn @GMX_IO bị hacker ghé thăm

Thiệt hại ước tính ban đầu là gần $40,000,000 $GMX

Hacker đã đổi sang $ETH trước khi gửi tới nhiều địa chỉ ví khác nhau
{future}(ETHUSDT)

{future}(GMXUSDT)

#gmx #HackerAlert #TrendingTopic
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk. The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance. 72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical. Disclaimer: This is not financial advice. #CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
BRIDGE HACKED! FUNDS MISSING NOW $CRSCCrossCurve bridge exploit confirmed. Smart contract vulnerability unleashed. All activity MUST halt immediately. Users, pause everything. Your funds are at risk.

The team found tokens mistakenly sent to wrong wallets. No malice suspected yet. Cooperation is key. Return the funds. A bounty is offered for white-hat assistance.

72 hours. That's the deadline. Return funds or face legal action. We are tracing every asset. Exchanges, stablecoins, analytics firms are on standby. Act fast. Contact us or send funds back. Time is critical.

Disclaimer: This is not financial advice.

#CRSC #CryptoNews #BlockchainSecurity #Hack 🚨
Статия
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
Статия
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Влезте, за да разгледате още съдържание
Присъединете се към глобалните крипто потребители в Binance Square
⚡️ Получавайте най-новата и полезна информация за криптовалутите.
💬 С доверието на най-голямата криптоборса в света.
👍 Открийте истински прозрения от проверени създатели.
Имейл/телефонен номер