Binance Square
#securityalert

securityalert

484,929 προβολές
896 άτομα συμμετέχουν στη συζήτηση
Fibonacci Flow
·
--
Hyperbridge exploit jolts $BROCCOLI714 ⚠️ A major breach on Hyperbridge has triggered a sudden liquidity shock, with an attacker minting 1 billion bridged $DOT on Ethereum and extracting about $237,000 before the situation was flagged. CertiK says the incident is still under active investigation, and that uncertainty is exactly what can keep spreads wide and whipsaws sharp while the market digests the damage. Not financial advice. Manage your risk and protect your capital. #Crypto #DeFi #SecurityAlert #Ethereum #DOT 🛡️ {future}(DOTUSDT) {future}(BROCCOLI714USDT)
Hyperbridge exploit jolts $BROCCOLI714 ⚠️

A major breach on Hyperbridge has triggered a sudden liquidity shock, with an attacker minting 1 billion bridged $DOT on Ethereum and extracting about $237,000 before the situation was flagged. CertiK says the incident is still under active investigation, and that uncertainty is exactly what can keep spreads wide and whipsaws sharp while the market digests the damage.

Not financial advice. Manage your risk and protect your capital.

#Crypto #DeFi #SecurityAlert #Ethereum #DOT

🛡️
$BROCCOLI714 catches a liquidity shock after the Hyperbridge exploit ⚡ A bridge breach minted 1 billion bridged DOT on Ethereum and pulled roughly $237,000 before CertiK confirmed the incident is under active investigation. The market is now breathing faster, with liquidity thinning and sharp volatility likely as traders price in bridge risk and whale-sized opportunistic flows. Not financial advice. Manage your risk and protect your capital. #Crypto #DeFi #SecurityAlert #DOT #Blockchain ✦ {future}(BROCCOLI714USDT)
$BROCCOLI714 catches a liquidity shock after the Hyperbridge exploit ⚡

A bridge breach minted 1 billion bridged DOT on Ethereum and pulled roughly $237,000 before CertiK confirmed the incident is under active investigation. The market is now breathing faster, with liquidity thinning and sharp volatility likely as traders price in bridge risk and whale-sized opportunistic flows.

Not financial advice. Manage your risk and protect your capital.
#Crypto #DeFi #SecurityAlert #DOT #Blockchain
Deepfake Musk Streams Draining Millions! 🛑 Scammers are using AI deepfakes to create realistic YouTube/X livestreams of Elon Musk and Vitalik Buterin promising "1 BTC for 2 BTC" giveaways. One recent stream collected over $5M in 20 minutes before being taken down. If you send crypto to "verify" your wallet, you lose it instantly. There is NO matching giveaway. #DeepfakeScam #SecurityAlert #ElonMusk
Deepfake Musk Streams Draining Millions! 🛑

Scammers are using AI deepfakes to create realistic YouTube/X livestreams of Elon Musk and Vitalik Buterin promising "1 BTC for 2 BTC" giveaways.

One recent stream collected over $5M in 20 minutes before being taken down.

If you send crypto to "verify" your wallet, you lose it instantly. There is NO matching giveaway.

#DeepfakeScam #SecurityAlert #ElonMusk
Article
​⚡️ Екстрений дамп DOT: Злам мосту Hyperbridge та емісія 1 млрд токенів​Сьогодні Polkadot ($DOT ) опинився під жорстким тиском. Курс встановив добовий мінімум на позначці $1,148 після новин про критичний експлойт крос-чейн мосту Hyperbridge. ​🛠 Що відомо на цю хвилину? ​Зловмисник скористався технічною лазівкою (параметр challengePeriod = 0), що дозволило йому миттєво отримати права адміністратора. ​Головні факти атаки: ​Фейкова емісія: Хакер «надрукував» 1 000 000 000 DOT через функцію mint.​Злив у стакани: Величезний обсяг було скинуто через Uniswap. Хоча ліквідності не вистачило на весь мільярд, хакер встиг вивести близько $237,000 (108.2 ETH).​Сліди: Кошти вже проходять через міксер Railgun. Аналітики пов’язують цей інцидент із серією зламів ARGN, MANTA та CERE. ​📊 Аналіз графіка (DOT/USDT) ​На поточному графіку Binance ми бачимо класичний Flash Crash: ​Пролив: Ціна миттєво втратила понад 4%, пробивши локальну підтримку.​Спроба відновлення: Зараз актив торгується по $1,188. Ринок намагається «відкупити» паніку, але тиск залишається високим.​Рівні: Supertrend вказує на зону $1,164 як ключову лінію оборони для биків. ​⚠️ Що робити інвесторам? ​Важливо розуміти: проблема не в самій мережі Polkadot, а в сторонньому мосту. Проте такі події б’ють по репутації та ліквідності активу. Будьте обережні з лонг-позиціями, поки волатильність не вщухне. ​#Polkadot #DOT #CryptoNews #Hyperbridge #SecurityAlert #BinanceSquare

​⚡️ Екстрений дамп DOT: Злам мосту Hyperbridge та емісія 1 млрд токенів

​Сьогодні Polkadot ($DOT ) опинився під жорстким тиском. Курс встановив добовий мінімум на позначці $1,148 після новин про критичний експлойт крос-чейн мосту Hyperbridge.
​🛠 Що відомо на цю хвилину?
​Зловмисник скористався технічною лазівкою (параметр challengePeriod = 0), що дозволило йому миттєво отримати права адміністратора.
​Головні факти атаки:
​Фейкова емісія: Хакер «надрукував» 1 000 000 000 DOT через функцію mint.​Злив у стакани: Величезний обсяг було скинуто через Uniswap. Хоча ліквідності не вистачило на весь мільярд, хакер встиг вивести близько $237,000 (108.2 ETH).​Сліди: Кошти вже проходять через міксер Railgun. Аналітики пов’язують цей інцидент із серією зламів ARGN, MANTA та CERE.
​📊 Аналіз графіка (DOT/USDT)
​На поточному графіку Binance ми бачимо класичний Flash Crash:

​Пролив: Ціна миттєво втратила понад 4%, пробивши локальну підтримку.​Спроба відновлення: Зараз актив торгується по $1,188. Ринок намагається «відкупити» паніку, але тиск залишається високим.​Рівні: Supertrend вказує на зону $1,164 як ключову лінію оборони для биків.
​⚠️ Що робити інвесторам?
​Важливо розуміти: проблема не в самій мережі Polkadot, а в сторонньому мосту. Проте такі події б’ють по репутації та ліквідності активу. Будьте обережні з лонг-позиціями, поки волатильність не вщухне.

#Polkadot #DOT #CryptoNews #Hyperbridge #SecurityAlert #BinanceSquare
🚨 Security Alert: AethirOFTAdapter Exploited 🚨 A major security breach has shaken the crypto space as AethirOFTAdapter suffered an exploit resulting in losses exceeding $400,000. 🔍 What Happened? Attackers identified a vulnerability in the adapter contract and executed a targeted exploit, siphoning funds quickly before detection. 💸 Fund Movement The stolen assets were swiftly bridged to the TRON network, making tracking and recovery more challenging. ⚠️ Market Impact Raises concerns over cross-chain bridge security Highlights ongoing risks in DeFi infrastructure Investors urged to stay cautious with new protocols 🛡️ Key Takeaway Always verify smart contract audits and security measures before investing. In DeFi, security is everything. 📊 Stay alert. Stay informed. #CryptoNews #DeFi #SecurityAlert #TRON #Blockchain #CryptoSafety #Binance #Web3 🚀
🚨 Security Alert: AethirOFTAdapter Exploited 🚨
A major security breach has shaken the crypto space as AethirOFTAdapter suffered an exploit resulting in losses exceeding $400,000.
🔍 What Happened?
Attackers identified a vulnerability in the adapter contract and executed a targeted exploit, siphoning funds quickly before detection.
💸 Fund Movement
The stolen assets were swiftly bridged to the TRON network, making tracking and recovery more challenging.
⚠️ Market Impact
Raises concerns over cross-chain bridge security
Highlights ongoing risks in DeFi infrastructure
Investors urged to stay cautious with new protocols
🛡️ Key Takeaway
Always verify smart contract audits and security measures before investing. In DeFi, security is everything.
📊 Stay alert. Stay informed.
#CryptoNews #DeFi #SecurityAlert #TRON #Blockchain #CryptoSafety #Binance #Web3 🚀
STOP SCAMS: ¡Cuidado con el Fake Support! 🛡️ ATTENTION COMMUNITY! ⚠️ Los estafadores están usando perfiles falsos de Binance para engañar en el P2P. Como tu Cripto Teacher, te traigo estos Quick Safety Tips para proteger tus fondos: OFFICIAL CHAT ONLY: El soporte real solo atiende dentro de la App oficial. ¡Binance nunca te escribirá por WhatsApp o Telegram! 🚫 NEVER SHARE CODES: Jamás le des tus códigos 2FA o contraseñas. Binance never asks for your password. 🔑 DON'T RELEASE UNDER PRESSURE: Si te amenazan con bloquear tu cuenta por no liberar, ¡es un SCAM! Mantén la calma y apela. BE SMART, STAY SAFE. 🚀 Educarse es prtegerse. ¿Alguna vez te han contactado por privado? ¡Te leo en los comentarios! 👇 $POL $TLM $BTC #P2P #SecurityAlert #BinanceSquare #venezuela
STOP SCAMS: ¡Cuidado con el Fake Support! 🛡️

ATTENTION COMMUNITY! ⚠️ Los estafadores están usando perfiles falsos de Binance para engañar en el P2P. Como tu Cripto Teacher, te traigo estos Quick Safety Tips para proteger tus fondos:

OFFICIAL CHAT ONLY: El soporte real solo atiende dentro de la App oficial. ¡Binance nunca te escribirá por WhatsApp o Telegram! 🚫
NEVER SHARE CODES: Jamás le des tus códigos 2FA o contraseñas. Binance never asks for your password. 🔑
DON'T RELEASE UNDER PRESSURE: Si te amenazan con bloquear tu cuenta por no liberar, ¡es un SCAM! Mantén la calma y apela.

BE SMART, STAY SAFE. 🚀 Educarse es prtegerse. ¿Alguna vez te han contactado por privado? ¡Te leo en los comentarios! 👇
$POL $TLM $BTC
#P2P #SecurityAlert #BinanceSquare #venezuela
🚨 ¿Binance está baneando sin razón? Lo que NO te dicen para proteger tu cuenta. ​ ​He visto muchas quejas sobre cuentas bloqueadas y baneos repentinos. No es mala suerte, es el nuevo algoritmo de seguridad. 🛡️ ​3 Razones por las que tu cuenta está en riesgo hoy: ​P2P Irresponsable: Recibir pagos de terceros o de cuentas que no coinciden con el titular. Si el nombre no cuadra, ¡CANCELA! ​Abuso de Comentarios: El algoritmo de Square ahora detecta el "spam" de bots. Si solo comentas lo mismo en todos lados, te marcarán como cuenta fantasma. ​Verificación vencida: Muchos ignoran las actualizaciones de sus documentos de identidad. ​Mi consejo: No operen con miedo, operen con información. Prefiero que pierdan un trade a que pierdan su cuenta de Binance. ​💬 ¿A alguien aquí le han bloqueado la cuenta o han tenido problemas con el P2P recientemente? Cuéntennos su caso para ayudarlos. 👇 #BinanceSquare #P2P #SecurityAlert #CryptoSafety #BinanceSupport
🚨 ¿Binance está baneando sin razón? Lo que NO te dicen para proteger tu cuenta.

​He visto muchas quejas sobre cuentas bloqueadas y baneos repentinos. No es mala suerte, es el nuevo algoritmo de seguridad. 🛡️
​3 Razones por las que tu cuenta está en riesgo hoy:
​P2P Irresponsable: Recibir pagos de terceros o de cuentas que no coinciden con el titular. Si el nombre no cuadra, ¡CANCELA!
​Abuso de Comentarios: El algoritmo de Square ahora detecta el "spam" de bots. Si solo comentas lo mismo en todos lados, te marcarán como cuenta fantasma.
​Verificación vencida: Muchos ignoran las actualizaciones de sus documentos de identidad.
​Mi consejo: No operen con miedo, operen con información. Prefiero que pierdan un trade a que pierdan su cuenta de Binance.

​💬 ¿A alguien aquí le han bloqueado la cuenta o han tenido problemas con el P2P recientemente? Cuéntennos su caso para ayudarlos. 👇
#BinanceSquare #P2P #SecurityAlert #CryptoSafety #BinanceSupport
Pancho 53:
dónde se ve la verificación al día ??
STOP SCAMS: ¡Cuidado con el Fake Support! 🛡️ ATTENTION COMMUNITY! ⚠️ Los estafadores están usando perfiles falsos de Binance para engañar en el P2P. Como tu Cripto Teacher, te traigo estos Quick Safety Tips para proteger tus fondos: OFFICIAL CHAT ONLY: El soporte real solo atiende dentro de la App oficial. ¡Binance nunca te escribirá por WhatsApp o Telegram! 🚫 NEVER SHARE CODES: Jamás le des tus códigos 2FA o contraseñas. Binance never asks for your password. 🔑 DON'T RELEASE UNDER PRESSURE: Si te amenazan con bloquear tu cuenta por no liberar, ¡es un SCAM! Mantén la calma y apela. BE SMART, STAY SAFE. 🚀 Educarse es prtegerse. ¿Alguna vez te han contactado por privado? ¡Te leo en los comentarios! 👇 #P2P #SecurityAlert #CandelariaWilham #BinanceSquare #venezuela
STOP SCAMS: ¡Cuidado con el Fake Support! 🛡️

ATTENTION COMMUNITY! ⚠️ Los estafadores están usando perfiles falsos de Binance para engañar en el P2P. Como tu Cripto Teacher, te traigo estos Quick Safety Tips para proteger tus fondos:

OFFICIAL CHAT ONLY: El soporte real solo atiende dentro de la App oficial. ¡Binance nunca te escribirá por WhatsApp o Telegram! 🚫
NEVER SHARE CODES: Jamás le des tus códigos 2FA o contraseñas. Binance never asks for your password. 🔑
DON'T RELEASE UNDER PRESSURE: Si te amenazan con bloquear tu cuenta por no liberar, ¡es un SCAM! Mantén la calma y apela.

BE SMART, STAY SAFE. 🚀 Educarse es prtegerse. ¿Alguna vez te han contactado por privado? ¡Te leo en los comentarios! 👇

#P2P #SecurityAlert #CandelariaWilham #BinanceSquare #venezuela
·
--
Ανατιμητική
⚠️ $ETH {future}(ETHUSDT) Short Setup — Watch Closely! ⚠️ Trade Plan — SHORT: Entry: 2138 – 2190 Stop Loss: 2219 Targets: 🎯 TP1: 2107 🎯 TP2: 2089 🎯 TP3: 2064 Security Note: Reports indicate a nation-state hacking group may be profiting from ETH swing trading and using funds to infiltrate other protocols, raising broader ecosystem security concerns. 💡 Trade smart, manage risk, and stay aware of potential market manipulations. #ETH #CryptoTrading #ShortSetup #SecurityAlert
⚠️ $ETH
Short Setup — Watch Closely! ⚠️
Trade Plan — SHORT:
Entry: 2138 – 2190
Stop Loss: 2219
Targets:
🎯 TP1: 2107
🎯 TP2: 2089
🎯 TP3: 2064
Security Note:
Reports indicate a nation-state hacking group may be profiting from ETH swing trading and using funds to infiltrate other protocols, raising broader ecosystem security concerns.
💡 Trade smart, manage risk, and stay aware of potential market manipulations.
#ETH #CryptoTrading #ShortSetup #SecurityAlert
Article
EXCLUSIVE: One Computer Key. $285 Million. That's All It Took.The Exploit That Changes Everything Just 72 hours ago, Solana's largest lending protocol, Drift, was gutted. $285 million gone. Not by complex code. Not by a flash loan genius. By a single compromised admin key. Here's what Binance users need to know right now — because the same vulnerability exists in dozens of protocols you might be using. How One Key Broke DeFi's Back The attacker didn't hack smart contracts. They hacked permissions. Step-by-step breakdown: 1. Attacker obtained Drift's admin key (method still unknown — internal leak? phishing? malware?) 2. Listed a fake token called "CarbonVote Token" (CVT) on Drift 3. Manipulated CVT's price on Raydium from $0.0001 to $1 4. Deposited worthless CVT as collateral 5. Raised withdrawal limits using the same admin key 6. Drained $285M in USDC, SOL, and other real assets No exploit code. No smart contract bug. Just one key with too much power. The Part Nobody Is Talking About Circle refused to freeze the stolen USDC during U.S. business hours. The exploit happened Thursday evening (Asia time). By Friday morning in New York, funds were already mixed through bridges. Circle's official response: "We follow lawful process, not market panic." Translation: $285M is gone forever. Binance's Internal Alert — Leaked to Us A Binance security memo (shared with our team on condition of anonymity) now warns all listing reviewers to: "Flag any protocol using single-admin key architecture or lacking timelocks. Add to high-risk watchlist immediately." This is the first time Binance has publicly acknowledged admin key risk as a listing criterion. Expect faster delistings for protocols without multi-sig or timelock protections. The Human Cost — One Trader's Story "I lost my entire position. $40,000. Not even a warning from Drift." — @SOLwhale_4, a Binance user since 2022 Drift had passed an audit by ClawSecure just six weeks ago. The audit reviewed smart contracts — not admin permissions. A distinction that cost real people their savings. Your 3-Step Protection Plan (Right Now) Before you trade or lend on any DeFi protocol connected to Binance: 1. Check admin keys — Look for "multi-sig" or "timelock" in docs. Single key = single point of failure. 2. Verify recent audit scope — Did they audit permissions or just code? Ask before depositing. 3. Set withdrawal limits manually — If protocol allows, cap daily withdrawals. It won't stop a hack, but it slows the bleed. What Happens Next · DRIFT token — Down 67% from pre-hack levels. Liquidity is vanishing. · Solana TVL — Dropped $900M in three days. Fear is spreading. · Binance action — Expect an official statement within 48 hours. Some Solana projects may face accelerated delisting reviews. Finally: The Drift hack wasn't a failure of code. It was a failure of trust. Until protocols prove they can't be drained by a single compromised laptop, treat every deposit like it could vanish overnight. Stay sharp. Stay paranoid. And never assume "audited" means "safe." #DriftProtocol #Solana #DeFiHack #SecurityAlert #BinanceAlert

EXCLUSIVE: One Computer Key. $285 Million. That's All It Took.

The Exploit That Changes Everything
Just 72 hours ago, Solana's largest lending protocol, Drift, was gutted. $285 million gone.
Not by complex code.
Not by a flash loan genius.
By a single compromised admin key.
Here's what Binance users need to know right now — because the same vulnerability exists in dozens of protocols you might be using.
How One Key Broke DeFi's Back
The attacker didn't hack smart contracts. They hacked permissions.
Step-by-step breakdown:
1. Attacker obtained Drift's admin key (method still unknown — internal leak? phishing? malware?)
2. Listed a fake token called "CarbonVote Token" (CVT) on Drift
3. Manipulated CVT's price on Raydium from $0.0001 to $1
4. Deposited worthless CVT as collateral
5. Raised withdrawal limits using the same admin key
6. Drained $285M in USDC, SOL, and other real assets
No exploit code. No smart contract bug. Just one key with too much power.
The Part Nobody Is Talking About
Circle refused to freeze the stolen USDC during U.S. business hours.
The exploit happened Thursday evening (Asia time). By Friday morning in New York, funds were already mixed through bridges. Circle's official response: "We follow lawful process, not market panic."
Translation: $285M is gone forever.
Binance's Internal Alert — Leaked to Us
A Binance security memo (shared with our team on condition of anonymity) now warns all listing reviewers to:
"Flag any protocol using single-admin key architecture or lacking timelocks. Add to high-risk watchlist immediately."
This is the first time Binance has publicly acknowledged admin key risk as a listing criterion. Expect faster delistings for protocols without multi-sig or timelock protections.
The Human Cost — One Trader's Story
"I lost my entire position. $40,000. Not even a warning from Drift."
— @SOLwhale_4, a Binance user since 2022
Drift had passed an audit by ClawSecure just six weeks ago. The audit reviewed smart contracts — not admin permissions. A distinction that cost real people their savings.
Your 3-Step Protection Plan (Right Now)
Before you trade or lend on any DeFi protocol connected to Binance:
1. Check admin keys — Look for "multi-sig" or "timelock" in docs. Single key = single point of failure.
2. Verify recent audit scope — Did they audit permissions or just code? Ask before depositing.
3. Set withdrawal limits manually — If protocol allows, cap daily withdrawals. It won't stop a hack, but it slows the bleed.
What Happens Next
· DRIFT token — Down 67% from pre-hack levels. Liquidity is vanishing.
· Solana TVL — Dropped $900M in three days. Fear is spreading.
· Binance action — Expect an official statement within 48 hours. Some Solana projects may face accelerated delisting reviews.
Finally:
The Drift hack wasn't a failure of code.
It was a failure of trust.
Until protocols prove they can't be drained by a single compromised laptop, treat every deposit like it could vanish overnight.
Stay sharp. Stay paranoid. And never assume "audited" means "safe."
#DriftProtocol #Solana #DeFiHack #SecurityAlert #BinanceAlert
Article
🚨Solana Tests Quantum Resistant security🚨 SOLANA TESTS QUANTUM-RESISTANT SECURITY 🚨 🔐 Solana ($SOL ) teams up with Project Eleven ⚡ WHAT’S HAPPENING? • Testing next-gen quantum-safe signatures • Aim: protect against future quantum computer threats 📊 EARLY RESULTS: • 📈 Signatures up to 40× larger • 🐢 Network becomes ~90% slower 🧠 WHAT IT MEANS: • 🟢 Strong future security upgrade • 🔴 Major performance trade-offs for now 🚀 BOTTOM LINE: • Long-term = BULLISH (future-proof tech) • Short-term = challenging (speed & efficiency issues) #quantumcomputers #SecurityAlert #bullish

🚨Solana Tests Quantum Resistant security

🚨 SOLANA TESTS QUANTUM-RESISTANT SECURITY 🚨
🔐 Solana ($SOL ) teams up with Project Eleven
⚡ WHAT’S HAPPENING?
• Testing next-gen quantum-safe signatures
• Aim: protect against future quantum computer threats
📊 EARLY RESULTS:
• 📈 Signatures up to 40× larger
• 🐢 Network becomes ~90% slower
🧠 WHAT IT MEANS:
• 🟢 Strong future security upgrade
• 🔴 Major performance trade-offs for now
🚀 BOTTOM LINE:
• Long-term = BULLISH (future-proof tech)
• Short-term = challenging (speed & efficiency issues) #quantumcomputers #SecurityAlert #bullish
·
--
Segurança no topo: BlockSec e Cobo unem forças! 🛡️ A segurança nos pagamentos globais acaba de ganhar um reforço de peso. A BlockSec (referência em auditoria) e a Cobo anunciaram uma parceria estratégica para integrar tecnologia KYT (Know Your Transaction) diretamente em APIs de pagamento on-chain. O que isso muda na prática? Menos risco de fraude, conformidade total contra lavagem de dinheiro e processos muito mais rápidos para empresas que operam globalmente. O CEO da BlockSec, Zhou Yajin, foi direto: a meta é criar um novo padrão de segurança para o ecossistema. Em um mercado onde a confiança é tudo, ver gigantes da infraestrutura se unindo para blindar nossas transações é um sinal de maturação enorme! Mas quero saber de você aqui no Square: 1️⃣ Você se sente seguro fazendo transações internacionais via blockchain hoje? 2️⃣ Ou acha que a conformidade excessiva pode tirar a liberdade das criptos? Comente sua visão abaixo! 👇 #SecurityAlert #Blockchain #BlockSec #Cobo #Web3 {spot}(BTCUSDT)
Segurança no topo: BlockSec e Cobo unem forças! 🛡️

A segurança nos pagamentos globais acaba de ganhar um reforço de peso. A BlockSec (referência em auditoria) e a Cobo anunciaram uma parceria estratégica para integrar tecnologia KYT (Know Your Transaction) diretamente em APIs de pagamento on-chain.

O que isso muda na prática?

Menos risco de fraude, conformidade total contra lavagem de dinheiro e processos muito mais rápidos para empresas que operam globalmente. O CEO da BlockSec, Zhou Yajin, foi direto: a meta é criar um novo padrão de segurança para o ecossistema.
Em um mercado onde a confiança é tudo, ver gigantes da infraestrutura se unindo para blindar nossas transações é um sinal de maturação enorme!

Mas quero saber de você aqui no Square:
1️⃣ Você se sente seguro fazendo transações internacionais via blockchain hoje?
2️⃣ Ou acha que a conformidade excessiva pode tirar a liberdade das criptos?

Comente sua visão abaixo! 👇
#SecurityAlert #Blockchain #BlockSec #Cobo #Web3
$DRIFT HACK JUST BLEW A $285M HOLE 🚨 A coordinated exploit appears to have hit Drift Protocol after a fake collateral asset, manipulated oracle pricing, and compromised admin keys were used to disable withdrawal safeguards. Onchain analysis suggests the attack was prepared for weeks, with the attacker inflating bogus collateral and then draining multiple vaults in roughly 12 minutes. This is a serious trust shock for DeFi risk engines and admin-control assumptions. Expect institutional attention to center on oracle integrity, privilege management, and whether other protocols share the same attack surface. The market will punish weak security narratives fast. If this spreads across DeFi confidence, I’d expect risk-off behavior toward protocols with thin liquidity and centralized control points. Not financial advice. Manage your risk. #DeFi #CryptoNews #Onchain #SecurityAlert #Drift 🛡️ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
$DRIFT HACK JUST BLEW A $285M HOLE 🚨

A coordinated exploit appears to have hit Drift Protocol after a fake collateral asset, manipulated oracle pricing, and compromised admin keys were used to disable withdrawal safeguards. Onchain analysis suggests the attack was prepared for weeks, with the attacker inflating bogus collateral and then draining multiple vaults in roughly 12 minutes.

This is a serious trust shock for DeFi risk engines and admin-control assumptions. Expect institutional attention to center on oracle integrity, privilege management, and whether other protocols share the same attack surface.

The market will punish weak security narratives fast. If this spreads across DeFi confidence, I’d expect risk-off behavior toward protocols with thin liquidity and centralized control points.

Not financial advice. Manage your risk.

#DeFi #CryptoNews #Onchain #SecurityAlert #Drift

🛡️
ATENTOS! CUIDEMONOS ENTRE TODOS! Fabricante chino de impresoras estaría esparciendo malware que roba bitcoins El fabricante chino de impresoras Procolored estaría esparciendo malware de secuestro de portapapeles a través de sus controladores oficiales en un ataque a la cadena de suministro que se saldó con más de 950.000 dólares en fondos robados. El fabricante chino de impresoras Procolored distribuyó malware que roba Bitcoin junto con sus controladores oficiales, según informes de medios locales #BinancePizza #SecurityAlert #SecureYourTokens #BinanceSquareFamily #BitcoinSecurity
ATENTOS!
CUIDEMONOS ENTRE TODOS!

Fabricante chino de impresoras estaría esparciendo malware que roba bitcoins

El fabricante chino de impresoras Procolored estaría esparciendo malware de secuestro de portapapeles a través de sus controladores oficiales en un ataque a la cadena de suministro que se saldó con más de 950.000 dólares en fondos robados.

El fabricante chino de impresoras Procolored distribuyó malware que roba Bitcoin junto con sus controladores oficiales, según informes de medios locales

#BinancePizza
#SecurityAlert
#SecureYourTokens
#BinanceSquareFamily
#BitcoinSecurity
¡El futuro del dinero está aquí y es descentralizado, seguro y global! 🌍 Sumérgete en el universo de Bitcoin, la revolución financiera que está cambiando la forma en que interactuamos con el valor. Con cada moneda digital, se abre un mundo de posibilidades: transacciones sin fronteras, seguridad inquebrantable y un sistema empoderado por la gente, no por instituciones. No te quedes atrás. Descubre cómo Bitcoin te conecta con una economía global más justa y eficiente. #bitcoin #FutureTarding #Descentralización #SecurityAlert #Global
¡El futuro del dinero está aquí y es descentralizado, seguro y global! 🌍
Sumérgete en el universo de Bitcoin, la revolución financiera que está cambiando la forma en que interactuamos con el valor. Con cada moneda digital, se abre un mundo de posibilidades: transacciones sin fronteras, seguridad inquebrantable y un sistema empoderado por la gente, no por instituciones.
No te quedes atrás. Descubre cómo Bitcoin te conecta con una economía global más justa y eficiente.
#bitcoin #FutureTarding #Descentralización #SecurityAlert #Global
🚨 Security Alert: x402 Cross-Chain Protocol Breach According to PANews, the GoPlus Chinese community has issued a security alert regarding a potential theft involving the x402 cross-chain protocol (@402bridge). The contract owner transferred control to another address, which then used contract functions to withdraw 17,693 USDC from over 200 user wallets. The stolen funds were later converted to ETH and moved to Arbitrum through cross-chain transactions. 🔒 User Advisory: Immediately revoke related authorizations. Always verify official contract addresses. Avoid unlimited authorizations and review permissions regularly to protect your assets.#SecurityAlert #x402
🚨 Security Alert: x402 Cross-Chain Protocol Breach

According to PANews, the GoPlus Chinese community has issued a security alert regarding a potential theft involving the x402 cross-chain protocol (@402bridge).

The contract owner transferred control to another address, which then used contract functions to withdraw 17,693 USDC from over 200 user wallets. The stolen funds were later converted to ETH and moved to Arbitrum through cross-chain transactions.

🔒 User Advisory:

Immediately revoke related authorizations.

Always verify official contract addresses.

Avoid unlimited authorizations and review permissions regularly to protect your assets.#SecurityAlert #x402
🇺🇸 EE. UU. inicia conversaciones para invertir en empresas de computación cuántica y competir con China 🔬 El gobierno busca invertir estratégicamente en tecnología cuántica para proteger la seguridad nacional y mantener una ventaja tecnológica frente a sus rivales globales. #SecurityAlert
🇺🇸 EE. UU. inicia conversaciones para invertir en empresas de computación cuántica y competir con China
🔬 El gobierno busca invertir estratégicamente en tecnología cuántica para proteger la seguridad nacional y mantener una ventaja tecnológica frente a sus rivales globales.
#SecurityAlert
·
--
Ανατιμητική
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds. Security isn’t just about smart contracts. It’s about not clicking like it’s 2010. #ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
🎣 Another phishing scam, courtesy of Google search. A fake HyperLend site sat in top results for hours. One wrong click and a malicious signature drains your wallet in seconds.

Security isn’t just about smart contracts. It’s about not clicking like it’s 2010.
#ScamSniffer #Hyperlend #SecurityAlert #phishingscam $BTC
Вимкнення Cloudflare вплинуло на доступ до ChatGPT та соціальної медіа платформи X Згідно з PANews, збої у мережі компанії з кібербезпеки Cloudflare у вівторок призвели до проблем з доступом для деяких користувачів ChatGPT та соціальної медіа платформи 'X'. Cloudflare оголосила на своєму вебсайті, що розслідує проблему, яка може вплинути на кілька клієнтів. Портал підтримки клієнтів компанії також зазнав перебоїв, що співпадало з запланованим технічним обслуговуванням в певних регіонах раніше того дня. У певний момент власна сторінка статусу Cloudflare була недоступна. Програмне забезпечення безпеки Cloudflare використовується сотнями тисяч компаній по всьому світу, і система вже переживала збої в минулому. #Write2Earn #SecurityAlert $BNB {spot}(BNBUSDT)
Вимкнення Cloudflare вплинуло на доступ до ChatGPT та соціальної медіа платформи X
Згідно з PANews, збої у мережі компанії з кібербезпеки Cloudflare у вівторок призвели до проблем з доступом для деяких користувачів ChatGPT та соціальної медіа платформи 'X'. Cloudflare оголосила на своєму вебсайті, що розслідує проблему, яка може вплинути на кілька клієнтів. Портал підтримки клієнтів компанії також зазнав перебоїв, що співпадало з запланованим технічним обслуговуванням в певних регіонах раніше того дня. У певний момент власна сторінка статусу Cloudflare була недоступна. Програмне забезпечення безпеки Cloudflare використовується сотнями тисяч компаній по всьому світу, і система вже переживала збої в минулому.
#Write2Earn
#SecurityAlert
$BNB
183 Million Gmail passwords data leak --- What Really Happened About 183 million email+password combinations were added to the Have I Been Pwned (HIBP) database. The data comes not from a Google server breach, but from infostealer malware — malicious software that infects devices and steals login details locally. The leak includes plaintext passwords, along with the website URL, email address, and the password. In a sample of ~94,000 records, 92% of them were already known from prior leaks. But around 16.4 million credentials in the dataset are new — they haven’t appeared in public breaches before. Some users confirmed that the exposed passwords still worked for their Gmail accounts. --- What Google Says Google denies a “Gmail breach”: they say their infrastructure wasn’t hacked. According to Google, the leak comes from malware-infected devices — not from Google’s own servers. Google recommends: 1. Turn on 2-Step Verification (2FA) 2. Use passkeys instead of passwords for stronger security. 3. Reset your password if it appears in large leaked credential dumps. --- Why This Matters Because many people reuse passwords, attackers could use these leaked credentials in credential stuffing attacks (trying the same password on many sites). Infostealer malware is especially dangerous: it bypasses traditional organizational defenses by stealing directly from user devices. Even if most credentials are “old,” the newly leaked ones (16.4M) represent fresh risk. Long-term threat: these credentials can be exploited for a long time, especially if users don’t improve their security practices. --- ✅ What You Should Do (If You're a Gmail User) 1. Check Have I Been Pwned (HIBP) to see if your email appears in the leak. 2. If your credentials are exposed, change your password, especially if you’re reusing it on other sites. 3. Enable 2-Factor Authentication (2FA) — this adds a crucial extra layer of protection. 4. Use a password manager to generate and store strong, unique passwords. 5. Keep your device clean: use antivirus / anti-malware, avoid installing suspicious software, and update your system regularly. --- Bottom Line This is not a Gmail server hack — but a massive credential dump collected via malware from users’ devices. The scale is worrying (183M!), but most of the data is recycled. Still, the newly exposed credentials are a real threat. The incident highlights how important good password hygiene and strong authentication (2FA / passkeys) are in today’s threat landscape. #GoogleDocsMagic #SecurityAlert

183 Million Gmail passwords data leak




---
What Really Happened

About 183 million email+password combinations were added to the Have I Been Pwned (HIBP) database.

The data comes not from a Google server breach, but from infostealer malware — malicious software that infects devices and steals login details locally.

The leak includes plaintext passwords, along with the website URL, email address, and the password.

In a sample of ~94,000 records, 92% of them were already known from prior leaks.

But around 16.4 million credentials in the dataset are new — they haven’t appeared in public breaches before.

Some users confirmed that the exposed passwords still worked for their Gmail accounts.



---

What Google Says

Google denies a “Gmail breach”: they say their infrastructure wasn’t hacked.

According to Google, the leak comes from malware-infected devices — not from Google’s own servers.

Google recommends:

1. Turn on 2-Step Verification (2FA)


2. Use passkeys instead of passwords for stronger security.


3. Reset your password if it appears in large leaked credential dumps.





---

Why This Matters

Because many people reuse passwords, attackers could use these leaked credentials in credential stuffing attacks (trying the same password on many sites).

Infostealer malware is especially dangerous: it bypasses traditional organizational defenses by stealing directly from user devices.

Even if most credentials are “old,” the newly leaked ones (16.4M) represent fresh risk.

Long-term threat: these credentials can be exploited for a long time, especially if users don’t improve their security practices.



---

✅ What You Should Do (If You're a Gmail User)

1. Check Have I Been Pwned (HIBP) to see if your email appears in the leak.


2. If your credentials are exposed, change your password, especially if you’re reusing it on other sites.


3. Enable 2-Factor Authentication (2FA) — this adds a crucial extra layer of protection.


4. Use a password manager to generate and store strong, unique passwords.


5. Keep your device clean: use antivirus / anti-malware, avoid installing suspicious software, and update your system regularly.




---

Bottom Line

This is not a Gmail server hack — but a massive credential dump collected via malware from users’ devices.

The scale is worrying (183M!), but most of the data is recycled. Still, the newly exposed credentials are a real threat.

The incident highlights how important good password hygiene and strong authentication (2FA / passkeys) are in today’s threat landscape.
#GoogleDocsMagic #SecurityAlert
Συνδεθείτε για να εξερευνήσετε περισσότερα περιεχόμενα
Γίνετε κι εσείς μέλος των παγκοσμίων χρηστών κρυπτονομισμάτων στο Binance Square.
⚡️ Λάβετε τις πιο πρόσφατες και χρήσιμες πληροφορίες για τα κρυπτονομίσματα.
💬 Το εμπιστεύεται το μεγαλύτερο ανταλλακτήριο κρυπτονομισμάτων στον κόσμο.
👍 Ανακαλύψτε πραγματικά στοιχεία από επαληθευμένους δημιουργούς.
Διεύθυνση email/αριθμός τηλεφώνου