Binance Square

hacking

234,236 προβολές
82 άτομα συμμετέχουν στη συζήτηση
Δημοφ.
Πιο πρόσφατα
Moon5labs
--
Crypto Industry Under Fire! How North Korean Hackers Exploit Pseudo-DeFi Protocols & Evade SecurityZachXBT Warns: "Crypto Laundering Is Out of Control, and the Industry Is on Thin Ice!" Renowned blockchain detective ZachXBT has exposed alarming practices in the crypto world, where pseudo-decentralized protocols not only facilitate money laundering but also profit from it. On March 18, the investigator issued a scathing critique of certain crypto platforms that benefit from illicit transactions, particularly those linked to North Korea. This shocking revelation follows the massive Bybit hack, where cybercriminals stole $1.46 billion. 🔥 Crypto Industry Playing with Fire: “We’re Turning a Blind Eye, but This Could Destroy Us!” According to ZachXBT, some "decentralized" protocols generate nearly all of their monthly volume and profits from illicit transactions, primarily related to laundering money for North Korean hackers. Instead of taking responsibility, they look the other way. Among the suspect services are mixing service eXch and the multi-chain protocol THORChain, which allowed stolen Bybit funds to be funneled through their platforms, helping to launder over $200 million. 📉 Bybit CEO Ben Zhou previously stated that these funds are now untraceable—thanks to crypto protocols that refuse to cooperate and block illicit transactions. 🛑 Centralized Exchanges Under Fire: Reacting Too Late While Hackers Launder Millions in Minutes! ZachXBT also called out centralized exchanges, stating that some take hours to respond to illicit funds moving through their platforms, while laundering takes mere minutes. 💰 "KYC regulations have become nothing more than a honeypot for everyday users," he criticized. Retail investors are subjected to strict compliance, while hackers bypass these measures effortlessly. $1.46 Billion Vanished! How Hackers Compromised Bybit February saw one of the largest crypto hacks in history, as North Korean cybercriminals targeted Bybit, one of the world’s largest crypto exchanges. How did it happen? 🕵️‍♂️ Hackers compromised a computer belonging to an employee at Safe, a technology provider for Bybit’s infrastructure. This allowed them to redirect an astonishing $1.46 billion into untraceable money flows, where the funds were laundered and hidden. What’s Next? Stricter Regulations or a Crisis of Trust in Crypto? ZachXBT warns that if security measures aren’t tightened, the crypto industry could face severe regulation, which could drastically reshape the entire sector. 💬 “If we don’t clean up our act, governments will do it for us—and that will be extremely painful for cryptocurrencies,” the investigator concludes. #crypto , #hacking , #bybit , #defi , #CyberSecurity Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Industry Under Fire! How North Korean Hackers Exploit Pseudo-DeFi Protocols & Evade Security

ZachXBT Warns: "Crypto Laundering Is Out of Control, and the Industry Is on Thin Ice!"
Renowned blockchain detective ZachXBT has exposed alarming practices in the crypto world, where pseudo-decentralized protocols not only facilitate money laundering but also profit from it.
On March 18, the investigator issued a scathing critique of certain crypto platforms that benefit from illicit transactions, particularly those linked to North Korea. This shocking revelation follows the massive Bybit hack, where cybercriminals stole $1.46 billion.
🔥 Crypto Industry Playing with Fire: “We’re Turning a Blind Eye, but This Could Destroy Us!”
According to ZachXBT, some "decentralized" protocols generate nearly all of their monthly volume and profits from illicit transactions, primarily related to laundering money for North Korean hackers. Instead of taking responsibility, they look the other way.
Among the suspect services are mixing service eXch and the multi-chain protocol THORChain, which allowed stolen Bybit funds to be funneled through their platforms, helping to launder over $200 million.
📉 Bybit CEO Ben Zhou previously stated that these funds are now untraceable—thanks to crypto protocols that refuse to cooperate and block illicit transactions.

🛑 Centralized Exchanges Under Fire: Reacting Too Late While Hackers Launder Millions in Minutes!
ZachXBT also called out centralized exchanges, stating that some take hours to respond to illicit funds moving through their platforms, while laundering takes mere minutes.
💰 "KYC regulations have become nothing more than a honeypot for everyday users," he criticized. Retail investors are subjected to strict compliance, while hackers bypass these measures effortlessly.

$1.46 Billion Vanished! How Hackers Compromised Bybit
February saw one of the largest crypto hacks in history, as North Korean cybercriminals targeted Bybit, one of the world’s largest crypto exchanges.
How did it happen?
🕵️‍♂️ Hackers compromised a computer belonging to an employee at Safe, a technology provider for Bybit’s infrastructure. This allowed them to redirect an astonishing $1.46 billion into untraceable money flows, where the funds were laundered and hidden.

What’s Next? Stricter Regulations or a Crisis of Trust in Crypto?
ZachXBT warns that if security measures aren’t tightened, the crypto industry could face severe regulation, which could drastically reshape the entire sector.
💬 “If we don’t clean up our act, governments will do it for us—and that will be extremely painful for cryptocurrencies,” the investigator concludes.

#crypto , #hacking , #bybit , #defi , #CyberSecurity

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Хакеры из КНДР атакуют крипто-разработчиков! 💀💻 Группа Lazarus создала 6 новых вредоносных пакетов, крадущих учетные данные, криптовалюту и доступ к браузерам. 😱 🔻 Что произошло? ⚠️ Атака через NPM – крупнейший репозиторий JavaScript-библиотек. ⚠️ Цель – криптокошельки Solana и Exodus. ⚠️ Вредоносное ПО атакует Chrome, Brave, Firefox, включая keychain в macOS. 🎯 В зоне риска – разработчики, случайно устанавливающие зараженные пакеты. 📢 Совет: проверяйте пакеты перед установкой! Безопасность — прежде всего! 🔐 #CryptoSecurity #Lazarus #Hacking #Blockchain #CyberThreat
🚨 Хакеры из КНДР атакуют крипто-разработчиков! 💀💻

Группа Lazarus создала 6 новых вредоносных пакетов, крадущих учетные данные, криптовалюту и доступ к браузерам. 😱

🔻 Что произошло?
⚠️ Атака через NPM – крупнейший репозиторий JavaScript-библиотек.
⚠️ Цель – криптокошельки Solana и Exodus.
⚠️ Вредоносное ПО атакует Chrome, Brave, Firefox, включая keychain в macOS.

🎯 В зоне риска – разработчики, случайно устанавливающие зараженные пакеты.

📢 Совет: проверяйте пакеты перед установкой! Безопасность — прежде всего! 🔐

#CryptoSecurity #Lazarus #Hacking #Blockchain #CyberThreat
Bybit Breach: How the Lazarus Group Struck Crypto Again—and What It Means for Your Digital Wallet ✍This is Lazarus They just stole $1.46 billion from #bybit And they didn’t break the code — they broke the people Here’s untold story of how they did it (and why no one is truly safe) 👇 1/10 Lazarus is a state-backed North Korean #hacking group They’ve stolen billions from banks, crypto exchanges, and DeFi protocols And now, they’ve pulled off the biggest #crypto heist in history But how? Well... 2/10 There was no code exploit. No leaked private keys. Bybit’s own multisig signers approved the transactions. They thought they were signing a routine transfer. Instead, they were handing over their entire cold wallet... 3/10 But that raises a terrifying question. How did Lazarus know exactly who to target? A multisig wallet requires multiple signers. If even one refused to sign, the hack would fail. But they all signed. That means Lazarus didn’t just hack Bybit… They knew who to manipulate 4/10 There are only a few ways to get that kind of information. • Inside job – Someone leaked the signer list. • Social engineering – Lazarus studied their emails & behavior. • Device compromise – One or more signers were infected with malware. This means other exchanges are at risk too... 5/10 Today Lazarus stole 0.42% of all #Ethereum It means they own More than the Ethereum Foundation. More than Vitalik Buterin. And more than Fidelity. But laundering that much ETH without detection isn’t easy... 6/10 In previous attacks, Lazarus has used: • Bridging to other #blockchain • On-chain mixing services • OTC trading via illicit brokers Would they try the same tactics again? 7/10 Investigators quickly flagged the 53 wallets holding the stolen ETH. Any attempt to cash out or swap funds would immediately raise red flags. But Lazarus are in no hurry... 8/10 In 2022, Chainalysis found Lazarus still held $55M from hacks six years earlier. They don’t cash out fast. They wait. And no one has ever gotten their money back. Not once. Lazarus doesn’t negotiate. They don’t return funds. So what happens to users? 9/10 Bybit’s CEO, Ben Zhou, addressed the crisis publicly: • “Client funds are 1:1 backed.” • “We have enough liquidity to cover withdrawals.” • “All other wallets remain secure.” So far, no bank run... 10/10 But this isn’t the first time this happened And it won’t be the last. So how do you stay safe? Follow these simple steps:

Bybit Breach: How the Lazarus Group Struck Crypto Again—and What It Means for Your Digital Wallet ✍

This is Lazarus
They just stole $1.46 billion from #bybit
And they didn’t break the code — they broke the people
Here’s untold story of how they did it (and why no one is truly safe) 👇

1/10
Lazarus is a state-backed North Korean #hacking group
They’ve stolen billions from banks, crypto exchanges, and DeFi protocols
And now, they’ve pulled off the biggest #crypto heist in history
But how? Well...

2/10
There was no code exploit.
No leaked private keys.
Bybit’s own multisig signers approved the transactions.
They thought they were signing a routine transfer.
Instead, they were handing over their entire cold wallet...

3/10
But that raises a terrifying question.
How did Lazarus know exactly who to target?
A multisig wallet requires multiple signers.
If even one refused to sign, the hack would fail.
But they all signed.
That means Lazarus didn’t just hack Bybit…
They knew who to manipulate
4/10
There are only a few ways to get that kind of information.
• Inside job – Someone leaked the signer list.
• Social engineering – Lazarus studied their emails & behavior.
• Device compromise – One or more signers were infected with malware.
This means other exchanges are at risk too...

5/10
Today Lazarus stole 0.42% of all #Ethereum
It means they own
More than the Ethereum Foundation.
More than Vitalik Buterin.
And more than Fidelity.
But laundering that much ETH without detection isn’t easy...

6/10
In previous attacks, Lazarus has used:
• Bridging to other #blockchain
• On-chain mixing services
• OTC trading via illicit brokers
Would they try the same tactics again?

7/10
Investigators quickly flagged the 53 wallets holding the stolen ETH.
Any attempt to cash out or swap funds would immediately raise red flags.
But Lazarus are in no hurry...

8/10
In 2022, Chainalysis found Lazarus still held $55M from hacks six years earlier.
They don’t cash out fast. They wait.
And no one has ever gotten their money back.
Not once.
Lazarus doesn’t negotiate. They don’t return funds.
So what happens to users?

9/10
Bybit’s CEO, Ben Zhou, addressed the crisis publicly:
• “Client funds are 1:1 backed.”
• “We have enough liquidity to cover withdrawals.”
• “All other wallets remain secure.”
So far, no bank run...

10/10
But this isn’t the first time this happened
And it won’t be the last.
So how do you stay safe? Follow these simple steps:
North Korean Lazarus Cashes Out $300 Million from Its $1.5 Billion ByBit HeistLazarus Launders $300 Million, 20% of Stolen Funds Disappear The North Korean Lazarus hacking group has successfully laundered $300 million from its record-breaking $1.5 billion crypto heist on ByBit, according to blockchain analytics firm Elliptic. Despite global efforts to track and freeze the stolen assets, at least 20% of the funds have now disappeared. Cybersecurity experts warn that these laundered funds are likely being used to finance North Korea’s nuclear and military programs. 🗣️ “For hackers trying to erase their money trail, every minute counts. They are highly sophisticated and know exactly how to bypass security measures,” said Tom Robinson, co-founder of Elliptic. How Did Lazarus Steal the Funds from ByBit? The ByBit hack occurred on February 21, when the Lazarus group infiltrated one of the exchange’s vendors. They secretly altered the recipient address for a massive 401,000 ETH transfer, effectively redirecting the funds into their own wallets instead of ByBit’s intended account. The hackers exploited a security vulnerability before the exchange even realized what had happened. ByBit CEO Ben Zhou confirmed that customer funds were not affected, but the company had to replace the stolen assets through investor loans. 🗣️ “We are waging a war against Lazarus,” said Zhou, announcing a bounty program that rewards individuals who help track and freeze the stolen crypto. So far, 20 people have received a total of $4 million for assisting in the recovery of $40 million. ByBit’s strategy relies on the transparency of blockchain transactions, allowing investigators to trace stolen assets. However, Lazarus remains one of the most skilled groups in laundering digital funds. Crypto Exchanges Helping Lazarus Cash Out? While ByBit and other exchanges are actively freezing stolen funds, not all crypto platforms are cooperating. One exchange, eXch, has been accused of allowing Lazarus to cash out over $90 million. ByBit and other firms have criticized eXch’s owner, Johann Roberts, for not acting quickly enough to block the hackers. However, Roberts denies any wrongdoing, admitting that eXch initially failed to freeze the funds, but claiming his company was in a long-standing dispute with ByBit and was unaware the assets came from a hack. 🗣️ “We are now cooperating with authorities,” Roberts stated, while also criticizing increased regulatory pressure, arguing that it threatens privacy and anonymity in the crypto space. North Korea Uses Crypto Heists to Fund Its Regime The U.S. and its allies have accused North Korea of dozens of crypto-related cyberattacks, which help the sanctioned country evade restrictions and finance its struggling economy. Lazarus initially targeted banks, but over the last five years, cryptocurrency exchanges have become their primary focus. According to Dr. Dorit Dor, a cybersecurity expert from Check Point Research, North Korea has perfected the art of cybercrime. 🗣️ “North Korea operates as a closed economy, so they have developed a highly efficient hacking and money-laundering industry. They don’t care about reputational damage from cybercrime,” Dor explained. Lazarus’ Biggest Crypto Heists: ByBit Is Just the Latest The ByBit hack is Lazarus’ biggest success to date, but it’s far from their only major attack. Their most infamous hacks include: UpBit (2019) – $41 millionKuCoin (2020) – $275 million (most recovered)Ronin Bridge (2022) – $600 millionAtomic Wallet (2023) – $100 million U.S. Places Lazarus on Cyber Most Wanted List The U.S. government has designated Lazarus members as Cyber Most Wanted criminals, but the chances of an arrest remain slim unless they leave North Korea. Despite international sanctions and global law enforcement tracking their activities, Lazarus continues to execute some of the world’s largest financial heists – and profit from them. 📉 Can international regulations stop crypto exchange hacks, or will Lazarus remain untouchable? Share your thoughts! 👇 #LazarusGroup , #HackerAlert , #BybitHack , #CryptoSecurity , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Lazarus Cashes Out $300 Million from Its $1.5 Billion ByBit Heist

Lazarus Launders $300 Million, 20% of Stolen Funds Disappear
The North Korean Lazarus hacking group has successfully laundered $300 million from its record-breaking $1.5 billion crypto heist on ByBit, according to blockchain analytics firm Elliptic.
Despite global efforts to track and freeze the stolen assets, at least 20% of the funds have now disappeared. Cybersecurity experts warn that these laundered funds are likely being used to finance North Korea’s nuclear and military programs.
🗣️ “For hackers trying to erase their money trail, every minute counts. They are highly sophisticated and know exactly how to bypass security measures,” said Tom Robinson, co-founder of Elliptic.

How Did Lazarus Steal the Funds from ByBit?
The ByBit hack occurred on February 21, when the Lazarus group infiltrated one of the exchange’s vendors. They secretly altered the recipient address for a massive 401,000 ETH transfer, effectively redirecting the funds into their own wallets instead of ByBit’s intended account.

The hackers exploited a security vulnerability before the exchange even realized what had happened. ByBit CEO Ben Zhou confirmed that customer funds were not affected, but the company had to replace the stolen assets through investor loans.
🗣️ “We are waging a war against Lazarus,” said Zhou, announcing a bounty program that rewards individuals who help track and freeze the stolen crypto.
So far, 20 people have received a total of $4 million for assisting in the recovery of $40 million. ByBit’s strategy relies on the transparency of blockchain transactions, allowing investigators to trace stolen assets. However, Lazarus remains one of the most skilled groups in laundering digital funds.
Crypto Exchanges Helping Lazarus Cash Out?
While ByBit and other exchanges are actively freezing stolen funds, not all crypto platforms are cooperating. One exchange, eXch, has been accused of allowing Lazarus to cash out over $90 million.
ByBit and other firms have criticized eXch’s owner, Johann Roberts, for not acting quickly enough to block the hackers. However, Roberts denies any wrongdoing, admitting that eXch initially failed to freeze the funds, but claiming his company was in a long-standing dispute with ByBit and was unaware the assets came from a hack.
🗣️ “We are now cooperating with authorities,” Roberts stated, while also criticizing increased regulatory pressure, arguing that it threatens privacy and anonymity in the crypto space.
North Korea Uses Crypto Heists to Fund Its Regime
The U.S. and its allies have accused North Korea of dozens of crypto-related cyberattacks, which help the sanctioned country evade restrictions and finance its struggling economy.
Lazarus initially targeted banks, but over the last five years, cryptocurrency exchanges have become their primary focus. According to Dr. Dorit Dor, a cybersecurity expert from Check Point Research, North Korea has perfected the art of cybercrime.
🗣️ “North Korea operates as a closed economy, so they have developed a highly efficient hacking and money-laundering industry. They don’t care about reputational damage from cybercrime,” Dor explained.
Lazarus’ Biggest Crypto Heists: ByBit Is Just the Latest
The ByBit hack is Lazarus’ biggest success to date, but it’s far from their only major attack. Their most infamous hacks include:

UpBit (2019) – $41 millionKuCoin (2020) – $275 million (most recovered)Ronin Bridge (2022) – $600 millionAtomic Wallet (2023) – $100 million

U.S. Places Lazarus on Cyber Most Wanted List
The U.S. government has designated Lazarus members as Cyber Most Wanted criminals, but the chances of an arrest remain slim unless they leave North Korea.
Despite international sanctions and global law enforcement tracking their activities, Lazarus continues to execute some of the world’s largest financial heists – and profit from them.
📉 Can international regulations stop crypto exchange hacks, or will Lazarus remain untouchable? Share your thoughts! 👇

#LazarusGroup , #HackerAlert , #BybitHack , #CryptoSecurity , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯 Monday news: ✔️ Retail sales and industrial production data from China showed an economic slowdown ✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining ✔️ The Dow Jones stock index reached a new high of $41,558 💵 ✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15 ✔️ Binance warned of a potential threat to user accounts due to malware called Clipper ✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑 ✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million ✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million #BTC #DowJones #ETH #hacking
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯

Monday news:

✔️ Retail sales and industrial production data from China showed an economic slowdown

✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining

✔️ The Dow Jones stock index reached a new high of $41,558 💵

✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15

✔️ Binance warned of a potential threat to user accounts due to malware called Clipper

✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑

✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million

✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million

#BTC #DowJones #ETH #hacking
$WRX #WRX Coin Chart Analysis Despite issues like the #hacking incident and other factors, the chart looks promising. It seems to have formed an impulse wave, and the WXY correction appears to be in progress. Once the correction ends, the bull run should begin, right? However, how high it will rise remains uncertain. I’ll revisit the chart later, but for now, it doesn’t look bad. If you'd like to see more chart analysis, please follow.
$WRX

#WRX Coin Chart Analysis

Despite issues like the #hacking incident and other factors, the chart looks promising.

It seems to have formed an impulse wave, and the WXY correction appears to be in progress.

Once the correction ends, the bull run should begin, right?
However, how high it will rise remains uncertain.

I’ll revisit the chart later, but for now, it doesn’t look bad.

If you'd like to see more chart analysis, please follow.
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Bybit взломан: похищено более $1,46 млрд в Ethereum. Криптовалютная биржа Bybit подверглась тому, что может стать крупнейшим взломом в истории цифровых валют - из горячих кошельков было выведено $1,46 млрд в Ethereum (ETH). Генеральный директор Bybit Бен Чжоу подтвердил факт взлома через социальные сети, заявив, что хакер получил контроль над определенным холодным ETH-кошельком и перевел все его содержимое на неизвестный адрес. Подозрения о взломе возникли, когда данные в блокчейне показали массивный перевод 401 346 ETH, стоимостью примерно $1,13 млрд, с горячего кошелька Bybit на неизвестный кошелек. Этот перевод не только вызвал тревогу о возможном взломе, но и повлиял на рыночную цену Ethereum, которая упала более чем на 4% после того, как украденные средства начали ликвидировать. Чжоу заверил пользователей, что, несмотря на взлом, все остальные холодные кошельки остаются в безопасности, а вывод средств работает в нормальном режиме. Метод, использованный при взломе Bybit, сильно напоминает техники, применявшиеся в предыдущих крупных взломах, таких как взломы WazirX и Radiant Capital в 2024 году. $ETH {spot}(ETHUSDT) #взлом #bybit #hacking
Bybit взломан: похищено более $1,46 млрд в Ethereum.

Криптовалютная биржа Bybit подверглась тому, что может стать крупнейшим взломом в истории цифровых валют - из горячих кошельков было выведено $1,46 млрд в Ethereum (ETH). Генеральный директор Bybit Бен Чжоу подтвердил факт взлома через социальные сети, заявив, что хакер получил контроль над определенным холодным ETH-кошельком и перевел все его содержимое на неизвестный адрес.

Подозрения о взломе возникли, когда данные в блокчейне показали массивный перевод 401 346 ETH, стоимостью примерно $1,13 млрд, с горячего кошелька Bybit на неизвестный кошелек. Этот перевод не только вызвал тревогу о возможном взломе, но и повлиял на рыночную цену Ethereum, которая упала более чем на 4% после того, как украденные средства начали ликвидировать.

Чжоу заверил пользователей, что, несмотря на взлом, все остальные холодные кошельки остаются в безопасности, а вывод средств работает в нормальном режиме.

Метод, использованный при взломе Bybit, сильно напоминает техники, применявшиеся в предыдущих крупных взломах, таких как взломы WazirX и Radiant Capital в 2024 году.
$ETH
#взлом #bybit #hacking
--
Ανατιμητική
@defioasis explains that the #Eigenpie ($EGP ) IDO presents a compelling investment opportunity with several advantages, including a low public sale FDV of $6 million and a #TVL exceeding $1 billion, which suggests significant upside potential compared to similar projects like #Magpie . With a short timeline featuring a 100% unlock at TGE and confirmed listings on #Bitget , KuCoin, and Bybit around the 25th, the project has also secured strong backing from notable investors like the @arbitrum_official and @PancakeSwap . Furthermore, the public sale offers full refunds, with a total investment of $1.03 million ongoing until the 24th. However, potential risks include decreased investor confidence stemming from a previous #hacking incident involving Magpie's Penpie subDAO, as well as possible market fatigue due to ongoing projects. Overall, while EigenPie has attractive features, thorough research (DYOR) is crucial to navigate the associated risks.
@defioasis explains that the #Eigenpie ($EGP ) IDO presents a compelling investment opportunity with several advantages, including a low public sale FDV of $6 million and a #TVL exceeding $1 billion, which suggests significant upside potential compared to similar projects like #Magpie . With a short timeline featuring a 100% unlock at TGE and confirmed listings on #Bitget , KuCoin, and Bybit around the 25th, the project has also secured strong backing from notable investors like the @Arbitrum Foundation and @PancakeSwap . Furthermore, the public sale offers full refunds, with a total investment of $1.03 million ongoing until the 24th. However, potential risks include decreased investor confidence stemming from a previous #hacking incident involving Magpie's Penpie subDAO, as well as possible market fatigue due to ongoing projects. Overall, while EigenPie has attractive features, thorough research (DYOR) is crucial to navigate the associated risks.
Il 21 Febbraio 2025, l' Exchange di criptovaluta Bybit ha subito un attacco hacker,con un furto di 1,5 miliardi di dollari in token . Gli hacker hanno sottratto 400000Ethereum da un portafoglio freddo,sfruttando una vulnerabilità nei contratti intelligenti. Bybit assicura che i mondi degli utenti sono al sicuro e sta collaborando con esperti blockchain per intervenire e investigare.Questo e' uno delle più grandi furti nella storia delle criptovalute. #cosa ne pensate ?Bybit riuscirebbe a gestire la situazione? #Bybit#SicurezzaCrypto #Hacking #Ethereum#
Il 21 Febbraio 2025, l' Exchange di criptovaluta Bybit ha subito un attacco hacker,con un furto di 1,5 miliardi di dollari in token . Gli hacker hanno sottratto 400000Ethereum da un portafoglio freddo,sfruttando una vulnerabilità nei contratti intelligenti.
Bybit assicura che i mondi degli utenti sono al sicuro e sta collaborando con esperti blockchain per intervenire e investigare.Questo e' uno delle più grandi furti nella storia delle criptovalute.
#cosa ne pensate ?Bybit riuscirebbe a gestire la situazione?
#Bybit#SicurezzaCrypto #Hacking #Ethereum#
Хакеры украли с платформы Orbit Chain криптовалюты на $81 млн В канун Нового года южнокорейская криптовалютная платформа Orbit Chain подверглась хакерской атаке, во время которой злоумышленники похитили криптоактивы на сумму более $81 млн. Команда Orbit Chain подтвердила, что 31 декабря к децентрализованному межсетевому мосту Orbit Bridge был получен несанкционированный доступ. Хакеры вывели из протокола ETH, а также стейблкоины USDC и USDT. Orbit Chain заявила, что для расследования кибератаки платформа прибегла к помощи Корейского национального полицейского агентства и Корейского агентства интернета и безопасности (KISA). К расследованию также привлечена компания ChainLight, специализирующаяся на безопасности блокчейнов. Аналитические компании CertiK и PeckShield оценили общие убытки протокола в $81,5 млн, из которых $30 млн приходится на USDT и $10 млн — на USDC. #UFO #hacking
Хакеры украли с платформы Orbit Chain криптовалюты на $81 млн

В канун Нового года южнокорейская криптовалютная платформа Orbit Chain подверглась хакерской атаке, во время которой злоумышленники похитили криптоактивы на сумму более $81 млн.

Команда Orbit Chain подтвердила, что 31 декабря к децентрализованному межсетевому мосту Orbit Bridge был получен несанкционированный доступ. Хакеры вывели из протокола ETH, а также стейблкоины USDC и USDT. Orbit Chain заявила, что для расследования кибератаки платформа прибегла к помощи Корейского национального полицейского агентства и Корейского агентства интернета и безопасности (KISA).

К расследованию также привлечена компания ChainLight, специализирующаяся на безопасности блокчейнов. Аналитические компании CertiK и PeckShield оценили общие убытки протокола в $81,5 млн, из которых $30 млн приходится на USDT и $10 млн — на USDC.
#UFO #hacking
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement. According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts. Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities. “This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.” Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations. Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown
In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement.
According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts.
Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities.
“This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.”
Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations.
Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
Crypto Crime Trends: Rising Threats and Increased Losse The cryptocurrency space continues to attract both innovation and risk, with increasing concerns over cybersecurity. As digital assets like Bitcoin and Ethereum become more mainstream, they are also becoming prime targets for cybercriminals. In 2024, cryptocurrency hack losses have surged by 21%, reaching an eye-watering $2.2 billion, according to recent reports. This marks the fourth consecutive year where cryptocurrency-related crimes have caused massive financial losses. The nature of these attacks is becoming more sophisticated. Cybercriminals now have access to advanced techniques to breach digital wallets, exchanges, and even decentralized platforms. These attacks often occur through phishing, ransomware, or exploiting vulnerabilities in smart contracts. The stolen funds are typically funneled through decentralized exchanges, making it difficult for authorities to trace the illicit movements. As the crypto industry grows, so does the scale of the threat. The decentralized nature of cryptocurrencies, while offering benefits like privacy and security, also makes them vulnerable to misuse. Hackers can act with relative anonymity, moving stolen assets across borders in seconds, making the recovery of stolen funds incredibly challenging. For investors and crypto enthusiasts, these rising threats highlight the need for robust security measures. Using hardware wallets, enabling multi-factor authentication, and choosing exchanges with strong security protocols are essential steps to protect digital assets from cyberattacks. Additionally, vigilance in monitoring accounts for suspicious activity is critical to preventing significant losses. The rise in cybercrime also underscores the importance of regulatory oversight and institutional partnerships to strengthen security frameworks across the cryptocurrency ecosystem. As the industry matures, ensuring that platforms and users adhere to the highest security standards will be crucial to combatting the growing threat of digital crime. #BTCNextMove #Hacking
Crypto Crime Trends: Rising Threats and Increased Losse

The cryptocurrency space continues to attract both innovation and risk, with increasing concerns over cybersecurity. As digital assets like Bitcoin and Ethereum become more mainstream, they are also becoming prime targets for cybercriminals. In 2024, cryptocurrency hack losses have surged by 21%, reaching an eye-watering $2.2 billion, according to recent reports. This marks the fourth consecutive year where cryptocurrency-related crimes have caused massive financial losses.
The nature of these attacks is becoming more sophisticated. Cybercriminals now have access to advanced techniques to breach digital wallets, exchanges, and even decentralized platforms. These attacks often occur through phishing, ransomware, or exploiting vulnerabilities in smart contracts. The stolen funds are typically funneled through decentralized exchanges, making it difficult for authorities to trace the illicit movements.
As the crypto industry grows, so does the scale of the threat. The decentralized nature of cryptocurrencies, while offering benefits like privacy and security, also makes them vulnerable to misuse. Hackers can act with relative anonymity, moving stolen assets across borders in seconds, making the recovery of stolen funds incredibly challenging.

For investors and crypto enthusiasts, these rising threats highlight the need for robust security measures. Using hardware wallets, enabling multi-factor authentication, and choosing exchanges with strong security protocols are essential steps to protect digital assets from cyberattacks. Additionally, vigilance in monitoring accounts for suspicious activity is critical to preventing significant losses.
The rise in cybercrime also underscores the importance of regulatory oversight and institutional partnerships to strengthen security frameworks across the cryptocurrency ecosystem. As the industry matures, ensuring that platforms and users adhere to the highest security standards will be crucial to combatting the growing threat of digital crime.

#BTCNextMove #Hacking
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️* $BTC $NOT $BNB 🌏⤴️🪙 {spot}(BNBUSDT) {spot}(NOTUSDT) {spot}(BTCUSDT) *Key Developments 📊* 1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖. 2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸. 3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈. *Laundering Efforts 🚮* 1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊. 2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰. *Timeline 📆* 1. November 23, 2023: Kyber network exploited 🔥. 2. Today: Hacker resurfaced, transferring $5.83M 📈. *Implications 🤔* 1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒. 2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨. *Expert Insights 💡* "DeFi security requires constant vigilance." "Money laundering prevention is crucial." *Conclusion 🤝* The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes. #CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️*
$BTC $NOT $BNB 🌏⤴️🪙



*Key Developments 📊*

1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖.
2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸.
3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈.

*Laundering Efforts 🚮*

1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊.
2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰.

*Timeline 📆*

1. November 23, 2023: Kyber network exploited 🔥.
2. Today: Hacker resurfaced, transferring $5.83M 📈.

*Implications 🤔*

1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒.
2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨.

*Expert Insights 💡*

"DeFi security requires constant vigilance."
"Money laundering prevention is crucial."

*Conclusion 🤝*

The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes.

#CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
✅ Thursday News: ✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire. ✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌 ✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands. ✔️ Quantity Funds has created a Bitcoin and Gold-based ETF. ✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token. ✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC. ✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million. ✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million. ✔️ BTC open interest set a new record at $20 billion. 🤑 ✔️ Hamster Kombat promises the upcoming launch of its second season. #btc #kraken #hacking #etf #news
✅ Thursday News:

✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire.

✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌

✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands.

✔️ Quantity Funds has created a Bitcoin and Gold-based ETF.

✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token.

✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC.

✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million.

✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million.

✔️ BTC open interest set a new record at $20 billion. 🤑

✔️ Hamster Kombat promises the upcoming launch of its second season.
#btc #kraken #hacking #etf #news
🚨 30-Year Prison Sentence For Crypto Mixer Founder Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges. Disputed Conviction and Sentence: Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft. However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court. A Call for Fairness: Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation. Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment. What do you think about this sentencing? Drop your comment below! #bitcoin #tornadocash #scam #cryptoscam #hacking $BTC
🚨 30-Year Prison Sentence For Crypto Mixer Founder

Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges.

Disputed Conviction and Sentence:

Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft.

However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court.

A Call for Fairness:

Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation.

Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment.

What do you think about this sentencing?

Drop your comment below!

#bitcoin #tornadocash #scam #cryptoscam #hacking
$BTC
Crypto Scammers Hijack Skip Bayless's X Account to Promote SKIP Token and Support TrumpSkip Bayless Becomes a Victim of Crypto Scammers American sports commentator and television personality Skip Bayless became the latest target of crypto scammers who hacked his account on the X platform. The attackers used his account to promote the SKIP token, which operates on the Solana blockchain. Hacker Uses Bayless's Account for Political and Crypto Promotion After taking control of the account, the hacker began posting politically charged messages supporting presidential candidate Donald Trump, while also promoting the SKIP token with slogans like “Make Crypto Great Again” and “Crypto Cities Will Thrive with Trump.” Hacker Sells Tokens Immediately After Posting on Bayless's Account According to data from DEX Screener, the hacker started selling tokens immediately after posting a cartoon image on Bayless's account, showing the Solana logo alongside the SKIP contract address. Despite these efforts, the hacker only made around $8,200. The token briefly reached a market cap of $69,000 on the Raydium platform but then quickly dropped by over 94% to around $4,100. Hacker Targets Kamala Harris and LeBron James The hacker also used the account to post derogatory comments aimed at Vice President Kamala Harris and basketball star LeBron James. These posts are still visible to Bayless’s 3.2 million followers. Bayless Joins the List of Celebrities Exploited for Crypto Scams Skip Bayless is not the first celebrity whose account was exploited for similar scams this year. On November 4, rapper Wiz Khalifa’s account was hacked to promote the WIZ token, which saw a temporary price surge of over 2,000% before crashing. In June, rapper 50 Cent’s account was similarly hijacked to promote the GUNIT token, allowing the attackers to gain over $300 million in just 30 minutes. That same month, hackers targeted Metallica’s account, falsely claiming a partnership with MoonPay and promoting an unrelated token, METAL. #Cryptoscam , #cybersecurity , #HackerAlert , #cryptofraud , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Crypto Scammers Hijack Skip Bayless's X Account to Promote SKIP Token and Support Trump

Skip Bayless Becomes a Victim of Crypto Scammers
American sports commentator and television personality Skip Bayless became the latest target of crypto scammers who hacked his account on the X platform. The attackers used his account to promote the SKIP token, which operates on the Solana blockchain.
Hacker Uses Bayless's Account for Political and Crypto Promotion
After taking control of the account, the hacker began posting politically charged messages supporting presidential candidate Donald Trump, while also promoting the SKIP token with slogans like “Make Crypto Great Again” and “Crypto Cities Will Thrive with Trump.”
Hacker Sells Tokens Immediately After Posting on Bayless's Account
According to data from DEX Screener, the hacker started selling tokens immediately after posting a cartoon image on Bayless's account, showing the Solana logo alongside the SKIP contract address. Despite these efforts, the hacker only made around $8,200. The token briefly reached a market cap of $69,000 on the Raydium platform but then quickly dropped by over 94% to around $4,100.
Hacker Targets Kamala Harris and LeBron James
The hacker also used the account to post derogatory comments aimed at Vice President Kamala Harris and basketball star LeBron James. These posts are still visible to Bayless’s 3.2 million followers.
Bayless Joins the List of Celebrities Exploited for Crypto Scams
Skip Bayless is not the first celebrity whose account was exploited for similar scams this year. On November 4, rapper Wiz Khalifa’s account was hacked to promote the WIZ token, which saw a temporary price surge of over 2,000% before crashing.
In June, rapper 50 Cent’s account was similarly hijacked to promote the GUNIT token, allowing the attackers to gain over $300 million in just 30 minutes. That same month, hackers targeted Metallica’s account, falsely claiming a partnership with MoonPay and promoting an unrelated token, METAL.

#Cryptoscam , #cybersecurity , #HackerAlert , #cryptofraud , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
💡 EXPLAINED: Let's talk about a growing cybersecurity threat – Crimeware-as-a-Service (CaaS). Like legitimate SaaS products but designed for cybercrime, this trend is reshaping online threats. CaaS has industrialized cybercrime by making advanced hacking tools accessible to anyone willing to pay. Think of it as a dark mirror of legitimate cloud services. #hacking #caas
💡 EXPLAINED: Let's talk about a growing cybersecurity threat – Crimeware-as-a-Service (CaaS). Like legitimate SaaS products but designed for cybercrime, this trend is reshaping online threats.

CaaS has industrialized cybercrime by making advanced hacking tools accessible to anyone willing to pay. Think of it as a dark mirror of legitimate cloud services.
#hacking #caas
Crypto hacking case Shakeeb Ahmed: • Sentence Details: Ahmed received a 3-year prison sentence for his crimes, which involved stealing over $12 million from two cryptocurrency exchanges. • Hacks Committed: He hacked Crema Finance and Nirvana Finance, two decentralized exchanges built on Solana, and stole significant amounts of cryptocurrency. • Forfeiture and Restitution: As part of his sentence, Ahmed is required to forfeit $12.3 million and pay $5 million in restitution. • Guilty Plea: Ahmed pleaded guilty to one count of computer fraud in December. • Legal Precedent: This case is noted as the first-ever conviction for the hack of a smart contract, setting a precedent in the legal treatment of such cybercrimes. #FollowForMoreInsights #BullorBearn #hacking #780million #780 #million780
Crypto hacking case Shakeeb Ahmed:
• Sentence Details: Ahmed received a 3-year prison sentence for his crimes, which involved stealing over $12 million from two cryptocurrency exchanges.
• Hacks Committed: He hacked Crema Finance and Nirvana Finance, two decentralized exchanges built on Solana, and stole significant amounts of cryptocurrency.
• Forfeiture and Restitution: As part of his sentence, Ahmed is required to forfeit $12.3 million and pay $5 million in restitution.
• Guilty Plea: Ahmed pleaded guilty to one count of computer fraud in December.
• Legal Precedent: This case is noted as the first-ever conviction for the hack of a smart contract, setting a precedent in the legal treatment of such cybercrimes.
#FollowForMoreInsights #BullorBearn #hacking #780million #780 #million780
--
Υποτιμητική
⚠️ Another hack on OKX — on May 30, $11.6 million was stolen from the account of Singapore-based market maker QuantMatter. The account was created using standalone Google Authenticator. The cause of the hack is currently unknown. It's worth noting that two users whose OKX accounts were hacked received full compensation from the platform. OKX has strengthened its security measures by adding mandatory Google Authenticator, a new generation of AI-powered facial recognition, and dual manual verification. #binance #OKX #hacking
⚠️ Another hack on OKX — on May 30, $11.6 million was stolen from the account of Singapore-based market maker QuantMatter. The account was created using standalone Google Authenticator. The cause of the hack is currently unknown.

It's worth noting that two users whose OKX accounts were hacked received full compensation from the platform.

OKX has strengthened its security measures by adding mandatory Google Authenticator, a new generation of AI-powered facial recognition, and dual manual verification.
#binance #OKX #hacking
Συνδεθείτε για να εξερευνήσετε περισσότερα περιεχόμενα
Εξερευνήστε τα τελευταία νέα για τα κρύπτο
⚡️ Συμμετέχετε στις πιο πρόσφατες συζητήσεις για τα κρύπτο
💬 Αλληλεπιδράστε με τους αγαπημένους σας δημιουργούς
👍 Απολαύστε περιεχόμενο που σας ενδιαφέρει
Διεύθυνση email/αριθμός τηλεφώνου