Binance Square

hacking

350,010 views
213 Discussing
CyberFlow Trading
·
--
$40 MILLION GONE. STEP FINANCE HIT HARD. News just dropped. A devastating hack. $STEP treasury drained by a colossal $40 million. A breach of an executive's device. They’ve recovered a fraction. Operations are halted. Users are warned against using the $STEP token. Investigations are underway. Security is paramount. This is a crisis. Disclaimer: This is not financial advice. #CryptoNews #Hacking #SecurityBreach #StepFinance 🚨
$40 MILLION GONE. STEP FINANCE HIT HARD.

News just dropped. A devastating hack. $STEP treasury drained by a colossal $40 million. A breach of an executive's device. They’ve recovered a fraction. Operations are halted. Users are warned against using the $STEP token. Investigations are underway. Security is paramount. This is a crisis.

Disclaimer: This is not financial advice.

#CryptoNews #Hacking #SecurityBreach #StepFinance 🚨
CRYPTO HACKING EXPLODES AGAIN! News update: January 2026 saw 16 crypto hacks. Losses hit $86.01 million. This is a 1.42% drop from January 2025's $87.25 million. However, it's a massive 13.25% surge from December 2025's $75.95 million. Phishing scams are out of control. Over $300 million lost to phishing alone. This market is a warzone. Stay vigilant. Protect your assets. Disclaimer: This is not financial advice. #CryptoNews #Hacking #Security #FOMO 🚨
CRYPTO HACKING EXPLODES AGAIN!

News update: January 2026 saw 16 crypto hacks. Losses hit $86.01 million. This is a 1.42% drop from January 2025's $87.25 million. However, it's a massive 13.25% surge from December 2025's $75.95 million. Phishing scams are out of control. Over $300 million lost to phishing alone. This market is a warzone. Stay vigilant. Protect your assets.

Disclaimer: This is not financial advice.

#CryptoNews #Hacking #Security #FOMO 🚨
SOLANA UNDER SIEGE! $30 MILLION VANISHES. STEP wallet drained. Hackers exploited attack vectors. 261,854 $SOL gone. The method is revealed. Funds moved rapidly. STEP is tracing the flow. Confidence shaken. Massive fallout imminent. The market is reacting. This is a critical moment for $SOL.News for reference only. Not investment advice. #SOL #CryptoNews #Hacking #SecurityAlert 🚨 {future}(SOLUSDT)
SOLANA UNDER SIEGE! $30 MILLION VANISHES.

STEP wallet drained. Hackers exploited attack vectors. 261,854 $SOL gone. The method is revealed. Funds moved rapidly. STEP is tracing the flow. Confidence shaken. Massive fallout imminent. The market is reacting. This is a critical moment for $SOL .News for reference only. Not investment advice.

#SOL #CryptoNews #Hacking #SecurityAlert 🚨
STEP FINANCE HIT $30M HACKED! SOL unstaked. 261,854 tokens gone. This is critical. The network is bleeding. Immediate fallout expected. Every SOL holder must see this. This is not a drill. The market is reacting NOW. Disclaimer: DYOR. Not financial advice. #SOL #CryptoNews #Hacking #StealthAttack 🚨
STEP FINANCE HIT $30M HACKED!

SOL unstaked. 261,854 tokens gone. This is critical. The network is bleeding. Immediate fallout expected. Every SOL holder must see this. This is not a drill. The market is reacting NOW.

Disclaimer: DYOR. Not financial advice.
#SOL #CryptoNews #Hacking #StealthAttack 🚨
FUGITIVE HACKER CAUGHT WITH $65 MILLION! This is not a drill. A massive crypto heist has been exposed. A 21-year-old is implicated in draining millions from Indexed Finance and KyberSwap. He allegedly pocketed $16.5 million from Indexed Finance at just 18 and then $48 million from KyberSwap in 2023. He was arrested but released and is now in hiding. International warrants are out. This saga highlights the extreme risks and rewards in crypto. Stay vigilant, secure your assets. Disclaimer: This is not financial advice. #CryptoNews #Hacking #Security #DeFi 🚨
FUGITIVE HACKER CAUGHT WITH $65 MILLION!

This is not a drill. A massive crypto heist has been exposed. A 21-year-old is implicated in draining millions from Indexed Finance and KyberSwap. He allegedly pocketed $16.5 million from Indexed Finance at just 18 and then $48 million from KyberSwap in 2023. He was arrested but released and is now in hiding. International warrants are out. This saga highlights the extreme risks and rewards in crypto. Stay vigilant, secure your assets.

Disclaimer: This is not financial advice.

#CryptoNews #Hacking #Security #DeFi 🚨
FUGITIVE HACKER STOLE $65 MILLION. STILL AT LARGE. News Update: A 21-year-old crypto suspect is on the run after allegedly draining $65 million from Indexed Finance and KyberSwap. He reportedly made $16.5 million at 18 and another $48 million in 2023. Despite arrests and international warrants, he was released and is believed to be in hiding. Authorities are pursuing him. Money was allegedly laundered through mixers. He claims to earn $100,000 monthly as a freelancer. Disclaimer: This is not financial advice. #CryptoNews #Hacking #Fugitive 🚨
FUGITIVE HACKER STOLE $65 MILLION. STILL AT LARGE.

News Update: A 21-year-old crypto suspect is on the run after allegedly draining $65 million from Indexed Finance and KyberSwap. He reportedly made $16.5 million at 18 and another $48 million in 2023. Despite arrests and international warrants, he was released and is believed to be in hiding. Authorities are pursuing him. Money was allegedly laundered through mixers. He claims to earn $100,000 monthly as a freelancer.

Disclaimer: This is not financial advice.

#CryptoNews #Hacking #Fugitive 🚨
🚨 US Scandal: Son of DOJ Contractor Allegedly Stole $40M in Crypto Right Under the Government's Nose! Crypto-detective ZachXBT is back with findings that read like a Netflix script. This time, the theft involves assets from official U.S. government wallets. What Happened? According to the investigation, the hacker may be John Daggett, the son of the president of CMDSS—a long-standing contractor for the Pentagon and the Department of Justice. The ultimate irony? CMDSS was helping the U.S. Marshals Service (USMS) manage and liquidate seized crypto assets. Key Facts: 💰 The Amount: Around $40M was withdrawn from government addresses. The hacker's total potential haul across other breaches might exceed $90M.📂 "Excel" Security: Earlier media reports revealed that the U.S. Marshals were tracking billions in seized assets using literally just "an Excel spreadsheet." It seems this system couldn't stand up to the "family business."🔍 The Response: Patrick Witt (President's Council on Digital Assets) and USMS representatives have officially confirmed: an investigation is underway. Exactly how Daggett Jr. gained access—whether through a loophole in his father's system or by using the company's official credentials—remains unclear. But this case once again proves that even the most secure state depositories are vulnerable when human error and internal controls are weak. Will we see stricter requirements for custodians working with the government after this? 🤔 #CryptoNews #ZachXBT #USGovernment #Hacking #Bitcoin
🚨 US Scandal: Son of DOJ Contractor Allegedly Stole $40M in Crypto Right Under the Government's Nose!
Crypto-detective ZachXBT is back with findings that read like a Netflix script. This time, the theft involves assets from official U.S. government wallets.
What Happened?
According to the investigation, the hacker may be John Daggett, the son of the president of CMDSS—a long-standing contractor for the Pentagon and the Department of Justice. The ultimate irony? CMDSS was helping the U.S. Marshals Service (USMS) manage and liquidate seized crypto assets.
Key Facts:
💰 The Amount: Around $40M was withdrawn from government addresses. The hacker's total potential haul across other breaches might exceed $90M.📂 "Excel" Security: Earlier media reports revealed that the U.S. Marshals were tracking billions in seized assets using literally just "an Excel spreadsheet." It seems this system couldn't stand up to the "family business."🔍 The Response: Patrick Witt (President's Council on Digital Assets) and USMS representatives have officially confirmed: an investigation is underway.
Exactly how Daggett Jr. gained access—whether through a loophole in his father's system or by using the company's official credentials—remains unclear. But this case once again proves that even the most secure state depositories are vulnerable when human error and internal controls are weak.
Will we see stricter requirements for custodians working with the government after this? 🤔
#CryptoNews #ZachXBT #USGovernment #Hacking #Bitcoin
🚨 CITY HACKED! RANSOM DEMANDED IN BITCOIN! 🚨 A Spanish city government (Sanxenxo) is paralyzed after a major ransomware attack encrypted thousands of files! The Demand 👇🏻 Hackers want a $5,000 BTC ransom! 😱 And the response👇🏻 The city said NO. This is a grim reminder of ongoing cyber threats in our space. Securing your digital assets is crucial! Don't be a victim! Follow me for daily security tips and market updates! 🛡️ #Bitcoin #Ransomware #Cybersecurity #ProtectYourAssets #Hacking
🚨 CITY HACKED! RANSOM DEMANDED IN BITCOIN! 🚨

A Spanish city government (Sanxenxo) is paralyzed after a major ransomware attack encrypted thousands of files!

The Demand 👇🏻
Hackers want a $5,000 BTC ransom! 😱

And the response👇🏻
The city said NO.

This is a grim reminder of ongoing cyber threats in our space. Securing your digital assets is crucial! Don't be a victim!
Follow me for daily security tips and market updates! 🛡️

#Bitcoin #Ransomware #Cybersecurity #ProtectYourAssets #Hacking
HACKER MOVES $33M TO TORNADO CASH! This is NOT a drill. The notorious hacker linked to the $90M US gov heist has just dumped 11,037 ETH into Tornado Cash. That's $33 MILLION being laundered RIGHT NOW. This same criminal is tied to multiple other major thefts last year. The market is about to feel this. Stay alert. Disclaimer: This is not financial advice. #Crypto #Bitcoin #Ethereum #Hacking #TornadoCash. 🚨
HACKER MOVES $33M TO TORNADO CASH!

This is NOT a drill. The notorious hacker linked to the $90M US gov heist has just dumped 11,037 ETH into Tornado Cash. That's $33 MILLION being laundered RIGHT NOW. This same criminal is tied to multiple other major thefts last year. The market is about to feel this. Stay alert.

Disclaimer: This is not financial advice.

#Crypto #Bitcoin #Ethereum #Hacking #TornadoCash. 🚨
HACKER MOVES $33 MILLION 🚨 11,037 ETH JUST HIT TORNADO CASH. THIS IS THE SAME INDIVIDUAL LINKED TO THE $90 MILLION US GOVT THEFT. THEY ARE ALSO CONNECTED TO MULTIPLE UNSOLVED THEFTS FROM LATE 2025. THEY ARE ACTIVE. THIS IS NOT A DRILL. MONITOR CLOSELY. DISCLAIMER: Not financial advice. #Crypto #TornadoCash #Hacking #Blockchain 🚨
HACKER MOVES $33 MILLION 🚨

11,037 ETH JUST HIT TORNADO CASH.

THIS IS THE SAME INDIVIDUAL LINKED TO THE $90 MILLION US GOVT THEFT. THEY ARE ALSO CONNECTED TO MULTIPLE UNSOLVED THEFTS FROM LATE 2025.

THEY ARE ACTIVE.

THIS IS NOT A DRILL. MONITOR CLOSELY.

DISCLAIMER: Not financial advice.

#Crypto #TornadoCash #Hacking #Blockchain 🚨
$500M GONE. MOST PROJECTS NEVER RECOVER. News Update: NEARLY 80% OF HACKED CRYPTO PROJECTS FAIL TO FULLY RECOVER. PROTOCOLS ARE PARALYZED AT THE MOMENT OF EXPOSURE. TEAMS ARE BLIND TO THEIR VULNERABILITIES. INCIDENT RESPONSE PLANS ARE NON-EXISTENT. DECISIONS ARE SLOWED. IMPROVISED ACTIONS LEAD TO FURTHER LOSSES. PROJECTS FEAR REPUTATIONAL DAMAGE. SILENCE AMPLIFIES FEAR. ONLY A FRACTION RECOVER. TRUST IS DESTROYED. BYBIT LOST $1.5 BILLION IN A SINGLE HEIST. SECURITY PRACTICES ARE IMPROVING. ON-CHAIN MONITORING IS KEY. 2026 WILL BE THE STRONGEST YEAR FOR SMART CONTRACT SECURITY. RAPID, DECISIVE ACTION IS CRITICAL. IMMEDIATE COMMUNICATION IS ESSENTIAL. Disclaimer: This is not financial advice. #CryptoSecurity #Hacking #DeFi #Blockchain 🚨
$500M GONE. MOST PROJECTS NEVER RECOVER.

News Update:
NEARLY 80% OF HACKED CRYPTO PROJECTS FAIL TO FULLY RECOVER. PROTOCOLS ARE PARALYZED AT THE MOMENT OF EXPOSURE. TEAMS ARE BLIND TO THEIR VULNERABILITIES. INCIDENT RESPONSE PLANS ARE NON-EXISTENT. DECISIONS ARE SLOWED. IMPROVISED ACTIONS LEAD TO FURTHER LOSSES. PROJECTS FEAR REPUTATIONAL DAMAGE. SILENCE AMPLIFIES FEAR. ONLY A FRACTION RECOVER. TRUST IS DESTROYED. BYBIT LOST $1.5 BILLION IN A SINGLE HEIST. SECURITY PRACTICES ARE IMPROVING. ON-CHAIN MONITORING IS KEY. 2026 WILL BE THE STRONGEST YEAR FOR SMART CONTRACT SECURITY. RAPID, DECISIVE ACTION IS CRITICAL. IMMEDIATE COMMUNICATION IS ESSENTIAL.

Disclaimer: This is not financial advice.

#CryptoSecurity #Hacking #DeFi #Blockchain 🚨
FRENCH INVESTORS COMPROMISED $WALTIOURGENT ALERT: French crypto investors are in panic mode. Tax firm Waltio hit by hackers "Shiny Hunters". They have your email addresses and crypto balance data. This is a massive OpSec fail. 150,000 users affected. Ransom demand made. French authorities are investigating a spike in violent crypto crimes too. Crypto-kidnappings and home invasions are on the rise. Your digital assets are NOT safe. Act now to protect yourself. This is not financial advice. #CryptoNews #CyberSecurity #FOMO #Hacking 🚨
FRENCH INVESTORS COMPROMISED $WALTIOURGENT ALERT: French crypto investors are in panic mode. Tax firm Waltio hit by hackers "Shiny Hunters". They have your email addresses and crypto balance data. This is a massive OpSec fail. 150,000 users affected. Ransom demand made. French authorities are investigating a spike in violent crypto crimes too. Crypto-kidnappings and home invasions are on the rise. Your digital assets are NOT safe. Act now to protect yourself.

This is not financial advice.

#CryptoNews #CyberSecurity #FOMO #Hacking 🚨
🚨 30-Year Prison Sentence For Crypto Mixer Founder Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges. Disputed Conviction and Sentence: Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft. However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court. A Call for Fairness: Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation. Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment. What do you think about this sentencing? Drop your comment below! #bitcoin #tornadocash #scam #cryptoscam #hacking $BTC
🚨 30-Year Prison Sentence For Crypto Mixer Founder

Roman Sterlingov, the mastermind behind the cryptocurrency mixer Bitcoin Fog, is fighting back against a hefty 30-year prison sentence after being found guilty on multiple money laundering charges.

Disputed Conviction and Sentence:

Sterlingov was convicted in March on charges that included money laundering, conspiracy, and running an unlicensed money transmitting business. Prosecutors allege he operated Bitcoin Fog from 2011 to 2021, helping to launder around $400 million in Bitcoin tied to illegal activities like drug trafficking and identity theft.

However, Sterlingov’s defense disputes the extent of his involvement, arguing that he wasn’t responsible for Bitcoin Fog's operations despite being linked to it. They also pointed out that key evidence—such as server logs, private keys, and ledgers—was never presented in court.

A Call for Fairness:

Sterlingov’s legal team argues that the proposed 20 to 30-year sentence is unjustified, especially when compared to similar cases that resulted in lighter penalties. They emphasize that the sentence should reflect his actual role, which they suggest was more about aiding and abetting rather than direct operation.

Judge Randolph Moss initially planned to sentence Sterlingov on August 21 but has decided to first consider the government’s forfeiture order, which includes 1,354 BTC still sitting untouched in a Bitcoin Fog wallet since 2012 and a possible $395 million judgment.

What do you think about this sentencing?

Drop your comment below!

#bitcoin #tornadocash #scam #cryptoscam #hacking
$BTC
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯 Monday news: ✔️ Retail sales and industrial production data from China showed an economic slowdown ✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining ✔️ The Dow Jones stock index reached a new high of $41,558 💵 ✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15 ✔️ Binance warned of a potential threat to user accounts due to malware called Clipper ✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑 ✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million ✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million #BTC #DowJones #ETH #hacking
✅ The S&P 500 is treading water, $BTC is undergoing a correction, but buyers are still trying to defend the key level of $58k 🕯

Monday news:

✔️ Retail sales and industrial production data from China showed an economic slowdown

✔️ The government of Bhutan holds $780 million worth of BTC, earned through mining

✔️ The Dow Jones stock index reached a new high of $41,558 💵

✔️ Pre-orders for the iPhone 16 have dropped by 12.7% compared to the iPhone 15

✔️ Binance warned of a potential threat to user accounts due to malware called Clipper

✔️ A whale with a balance of 16,636 $ETH, bought in 2016 for $87,135, sold 350 ETH today 🤑

✔️ Hackers got a job at the Delta Prime protocol and withdrew $7 million

✔️ Research: In 2024, cryptocurrency donations for elections in the US will total $190 million

#BTC #DowJones #ETH #hacking
✅ Thursday News: ✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire. ✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌 ✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands. ✔️ Quantity Funds has created a Bitcoin and Gold-based ETF. ✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token. ✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC. ✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million. ✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million. ✔️ BTC open interest set a new record at $20 billion. 🤑 ✔️ Hamster Kombat promises the upcoming launch of its second season. #btc #kraken #hacking #etf #news
✅ Thursday News:

✔️ OKX launched a promotion with a prize pool of 1.65 billion X tokens to celebrate the listing of X Empire.

✔️ A hacker was arrested for hacking the SEC's Twitter account in January 2024 and posting a fake announcement about Bitcoin ETF approval. 👌

✔️ Amazon and Google are racing to invest in nuclear energy to meet future AI demands.

✔️ Quantity Funds has created a Bitcoin and Gold-based ETF.

✔️ Bloomberg: Crypto market maker Jump Trading is accused of price manipulation of the DIO token.

✔️ Crypto exchange Kraken announced its own wrapped Bitcoin, kBTC.

✔️ Hackers breached the Radiant Capital crypto project, stealing $51 million.

✔️ Research shows that the number of cryptocurrency users worldwide has reached 617 million.

✔️ BTC open interest set a new record at $20 billion. 🤑

✔️ Hamster Kombat promises the upcoming launch of its second season.
#btc #kraken #hacking #etf #news
Global Cyberattack Exposes Microsoft Vulnerability: U.S. Agencies and Infrastructure HitThe world is facing another major cyberattack—this time targeting the very core of governmental institutions. Hackers have exploited an unpatched vulnerability in Microsoft’s widely used SharePoint Server software, compromising dozens of organizations worldwide, from U.S. federal agencies to telecom networks across Asia. Unlike Microsoft’s cloud-based services like Microsoft 365, the issue lies within local SharePoint servers—internal systems used for storing and sharing documents. These servers became the prime targets. Zero-Day Flaw Left Thousands of Systems Unprotected This is a "zero-day" vulnerability—an undisclosed flaw with no available patch. According to security experts, thousands of institutions were left exposed with no defenses in place. Early investigations show that attackers infiltrated systems of over 50 organizations, including European government agencies, a major energy provider in the U.S., and a university in Brazil. In one Eastern U.S. state, hackers blocked access to a batch of public documents, making it impossible for the government to delete or retrieve them. No Patch from Microsoft Yet — Organizations Forced to Improvise Despite the severity of the breach, Microsoft has yet to release an official patch. Affected institutions have had to resort to temporary fixes—such as server reconfigurations or disconnecting them from the internet—to reduce risk. While Microsoft confirmed the breach and issued a security advisory, the company has remained publicly silent. It recommended users quarantine vulnerable servers and take them offline if necessary. The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with counterparts in Canada and Australia, has launched an investigation. The Center for Internet Security (CIS), which works with local U.S. governments, identified nearly 100 at-risk organizations, including public schools and universities. The situation is further complicated by recent budget cuts, which led to the termination of 60% of the personnel handling threat response. According to CIS Vice President Randy Rose, it took six hours on Saturday night to process the first incident alert. "If we hadn’t lost so many team members, it would’ve been much faster," he added. Microsoft Faces Growing Scrutiny This isn’t the first time Microsoft has faced doubts about its ability to protect customers. The Department of Homeland Security noted that the attackers may have built on an earlier SharePoint vulnerability that Microsoft had only partially addressed. Experts warn of long-term consequences. Once attackers gain access to SharePoint servers, they can move laterally into systems like Outlook, Microsoft Teams, and internal databases. Some reportedly stole cryptographic keys that could enable future access—even after a patch is applied. One anonymous researcher involved in the federal investigation warned, “Even if Microsoft releases a fix on Monday or Tuesday, it won’t help those already breached in the past 72 hours.” Past Criticism Comes Back into Focus Last year, a government-appointed panel criticized Microsoft’s handling of a targeted Chinese cyberattack on U.S. federal email systems—including communications by then-Commerce Secretary Gina Raimondo. In that case, hackers abused Microsoft’s cloud platform to access sensitive government emails. The situation escalated further after a ProPublica report revealed that Microsoft had hired engineers in China to work on cloud systems tied to the U.S. military. In response, Microsoft announced on Friday that it would no longer employ Chinese workers on Pentagon-related projects. Long-Term Fallout Likely Governments, cybersecurity agencies, and corporations worldwide are now questioning whether Microsoft can still be trusted as a critical tech provider when it repeatedly fails to address major vulnerabilities in time. While attackers gain access to sensitive data, the world is waiting for Microsoft to deliver a real solution—and wondering what the consequences will be for those already affected. #cyberattack , #CyberSecurity , #HackAlert , #Microsoft , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Global Cyberattack Exposes Microsoft Vulnerability: U.S. Agencies and Infrastructure Hit

The world is facing another major cyberattack—this time targeting the very core of governmental institutions. Hackers have exploited an unpatched vulnerability in Microsoft’s widely used SharePoint Server software, compromising dozens of organizations worldwide, from U.S. federal agencies to telecom networks across Asia.
Unlike Microsoft’s cloud-based services like Microsoft 365, the issue lies within local SharePoint servers—internal systems used for storing and sharing documents. These servers became the prime targets.

Zero-Day Flaw Left Thousands of Systems Unprotected
This is a "zero-day" vulnerability—an undisclosed flaw with no available patch. According to security experts, thousands of institutions were left exposed with no defenses in place.
Early investigations show that attackers infiltrated systems of over 50 organizations, including European government agencies, a major energy provider in the U.S., and a university in Brazil. In one Eastern U.S. state, hackers blocked access to a batch of public documents, making it impossible for the government to delete or retrieve them.

No Patch from Microsoft Yet — Organizations Forced to Improvise
Despite the severity of the breach, Microsoft has yet to release an official patch. Affected institutions have had to resort to temporary fixes—such as server reconfigurations or disconnecting them from the internet—to reduce risk.
While Microsoft confirmed the breach and issued a security advisory, the company has remained publicly silent. It recommended users quarantine vulnerable servers and take them offline if necessary.
The U.S. Cybersecurity and Infrastructure Security Agency (CISA), along with counterparts in Canada and Australia, has launched an investigation. The Center for Internet Security (CIS), which works with local U.S. governments, identified nearly 100 at-risk organizations, including public schools and universities.
The situation is further complicated by recent budget cuts, which led to the termination of 60% of the personnel handling threat response. According to CIS Vice President Randy Rose, it took six hours on Saturday night to process the first incident alert. "If we hadn’t lost so many team members, it would’ve been much faster," he added.

Microsoft Faces Growing Scrutiny
This isn’t the first time Microsoft has faced doubts about its ability to protect customers. The Department of Homeland Security noted that the attackers may have built on an earlier SharePoint vulnerability that Microsoft had only partially addressed.
Experts warn of long-term consequences. Once attackers gain access to SharePoint servers, they can move laterally into systems like Outlook, Microsoft Teams, and internal databases. Some reportedly stole cryptographic keys that could enable future access—even after a patch is applied.
One anonymous researcher involved in the federal investigation warned, “Even if Microsoft releases a fix on Monday or Tuesday, it won’t help those already breached in the past 72 hours.”

Past Criticism Comes Back into Focus
Last year, a government-appointed panel criticized Microsoft’s handling of a targeted Chinese cyberattack on U.S. federal email systems—including communications by then-Commerce Secretary Gina Raimondo. In that case, hackers abused Microsoft’s cloud platform to access sensitive government emails.
The situation escalated further after a ProPublica report revealed that Microsoft had hired engineers in China to work on cloud systems tied to the U.S. military. In response, Microsoft announced on Friday that it would no longer employ Chinese workers on Pentagon-related projects.

Long-Term Fallout Likely
Governments, cybersecurity agencies, and corporations worldwide are now questioning whether Microsoft can still be trusted as a critical tech provider when it repeatedly fails to address major vulnerabilities in time.
While attackers gain access to sensitive data, the world is waiting for Microsoft to deliver a real solution—and wondering what the consequences will be for those already affected.

#cyberattack , #CyberSecurity , #HackAlert , #Microsoft , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
It was a major security breach in which Euphoria. Official Account was hacked by hackers. A massive security breach has shaken the cryptocurrency market with the official account of Euphoria, one of the largest crypto derivatives trading apps that are built on MegaETH, becoming infected by a high-end assault on September 27, 2025, as revealed by the wisdom word on September 28, 2025, This is a worrying case, where the compromised account has been used to distribute phishing links, and the hackers still have the account under their full control, which is highly dangerous to users of the platform. The attack highlights how the security of digital assets is currently a daunting problem in the ever-changing environment. The attackers have used the account to conduct a targeted attack, leaving fake links intended to trick users to provide sensitive data or give authorization to fraudulent transactions that may empty their online wallets. This is an aggressive step that emphasizes the increased complexity of cyber threats taking advantage of trusted platforms to have the most impact. The inability to control the account is an ongoing cause of the urgency, which makes it strongly desirable to users and stakeholders. Professionals are in a state of panic, greatly recommending that users stop all communication with the compromised account to secure their prized possessions. This proactive measure will help to avert the risks, and people will be able to protect their assets in the context of the ongoing crisis. The case can also be viewed as a wake-up call and acts as a reminder of the importance of strong security initiatives and alert measures in the crypto scene. With the situation taking new dimensions, the breach preconditions a revolutionary reaction, and attempts are being made to restore the situation and tighten the belts. This high profile attack is set to intrigue the community leading to a revival of attention to cybersecurity and resilience to guarantee the safety of digital assets in a more volatile environment. #euphoria #hacking
It was a major security breach in which Euphoria. Official Account was hacked by hackers.

A massive security breach has shaken the cryptocurrency market with the official account of Euphoria, one of the largest crypto derivatives trading apps that are built on MegaETH, becoming infected by a high-end assault on September 27, 2025, as revealed by the wisdom word on September 28, 2025, This is a worrying case, where the compromised account has been used to distribute phishing links, and the hackers still have the account under their full control, which is highly dangerous to users of the platform. The attack highlights how the security of digital assets is currently a daunting problem in the ever-changing environment.

The attackers have used the account to conduct a targeted attack, leaving fake links intended to trick users to provide sensitive data or give authorization to fraudulent transactions that may empty their online wallets. This is an aggressive step that emphasizes the increased complexity of cyber threats taking advantage of trusted platforms to have the most impact. The inability to control the account is an ongoing cause of the urgency, which makes it strongly desirable to users and stakeholders.

Professionals are in a state of panic, greatly recommending that users stop all communication with the compromised account to secure their prized possessions. This proactive measure will help to avert the risks, and people will be able to protect their assets in the context of the ongoing crisis. The case can also be viewed as a wake-up call and acts as a reminder of the importance of strong security initiatives and alert measures in the crypto scene.

With the situation taking new dimensions, the breach preconditions a revolutionary reaction, and attempts are being made to restore the situation and tighten the belts. This high profile attack is set to intrigue the community leading to a revival of attention to cybersecurity and resilience to guarantee the safety of digital assets in a more volatile environment.

#euphoria #hacking
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Microsoft Hack Puts U.S. Nuclear Security at RiskThe U.S. National Nuclear Security Administration (NNSA), which oversees the design and maintenance of America’s nuclear weapons arsenal, has become one of the victims of a cyberattack targeting Microsoft SharePoint. The incident also affected several other key government agencies – and all signs point once again to China-linked hackers. Microsoft Targeted Again – Along with the U.S. Nuclear Authority The vulnerability in Microsoft SharePoint was exploited on July 18, and according to a spokesperson from the Department of Energy, some systems were affected. Fortunately, due to widespread use of Microsoft 365 cloud services and robust cybersecurity measures, the damage was reportedly minimal, with only a few systems impacted – all of which are now being restored. Representatives of the NNSA confirmed that no classified information was leaked during the incident. Still, the fact that someone managed to access infrastructure related to U.S. nuclear operations is highly concerning. SharePoint – The Weak Link The vulnerability only affected locally hosted SharePoint systems – not the cloud-based ones – which opened the door to this breach. The attack extended far beyond U.S. borders, hitting Middle Eastern and EU government systems as well. Other U.S. victims included the Department of Education, the Florida Department of Financial Services, and Rhode Island’s General Assembly. Earlier reports revealed that hackers stole login credentials, tokens, and hash codes, potentially giving them access to sensitive internal systems. China-Linked Groups Suspected Microsoft has named several hacking groups believed to be backed by the Chinese government – specifically Violet Typhoon, Linen Typhoon, and Storm-2603. Cybersecurity firm Mandiant, owned by Google, stated that at least one attacker was very likely of Chinese origin. U.S. cybersecurity agency CISA confirmed that the SharePoint vulnerability is being actively exploited. Microsoft has already released three updates to fix the issue. The Chinese embassy in Washington responded by denying any involvement and warned against “groundless accusations.” Microsoft Under Fire Microsoft has become a repeated target of high-level cyberattacks in recent years. In 2021, a separate Chinese group called Hafnium breached systems via a vulnerability in Microsoft Exchange Server. After facing sharp criticism for its previous response, Microsoft CEO Satya Nadella declared that cybersecurity is now the company’s top priority. Recently, Microsoft also announced it would no longer rely on Chinese engineers for developing cloud services tied to the U.S. Department of Defense – following concerns that such arrangements may have enabled access to sensitive systems. The Flaw Was First Discovered – by Ethical Hackers Interestingly, the SharePoint vulnerability was first discovered in May during a hacking contest in Berlin organized by cybersecurity firm Trend Micro. The event offered $100,000 rewards for discovering zero-day vulnerabilities, demonstrating just how valuable – and dangerous – these flaws can be. Summary: Another Security Blow for the U.S. Although no classified data was leaked, confidence in government infrastructure has taken another hit. The NNSA was among several high-profile victims, and China-sponsored cyber threats continue to rise. The U.S. once again finds itself needing to strengthen its cyber defenses – not just against foreign adversaries, but also against its own systemic vulnerabilities. #CyberSecurity , #Microsoft , #cyberattack , #hacking , #CryptoNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Microsoft Hack Puts U.S. Nuclear Security at Risk

The U.S. National Nuclear Security Administration (NNSA), which oversees the design and maintenance of America’s nuclear weapons arsenal, has become one of the victims of a cyberattack targeting Microsoft SharePoint. The incident also affected several other key government agencies – and all signs point once again to China-linked hackers.

Microsoft Targeted Again – Along with the U.S. Nuclear Authority
The vulnerability in Microsoft SharePoint was exploited on July 18, and according to a spokesperson from the Department of Energy, some systems were affected. Fortunately, due to widespread use of Microsoft 365 cloud services and robust cybersecurity measures, the damage was reportedly minimal, with only a few systems impacted – all of which are now being restored.
Representatives of the NNSA confirmed that no classified information was leaked during the incident. Still, the fact that someone managed to access infrastructure related to U.S. nuclear operations is highly concerning.

SharePoint – The Weak Link
The vulnerability only affected locally hosted SharePoint systems – not the cloud-based ones – which opened the door to this breach. The attack extended far beyond U.S. borders, hitting Middle Eastern and EU government systems as well. Other U.S. victims included the Department of Education, the Florida Department of Financial Services, and Rhode Island’s General Assembly.
Earlier reports revealed that hackers stole login credentials, tokens, and hash codes, potentially giving them access to sensitive internal systems.

China-Linked Groups Suspected
Microsoft has named several hacking groups believed to be backed by the Chinese government – specifically Violet Typhoon, Linen Typhoon, and Storm-2603. Cybersecurity firm Mandiant, owned by Google, stated that at least one attacker was very likely of Chinese origin.
U.S. cybersecurity agency CISA confirmed that the SharePoint vulnerability is being actively exploited. Microsoft has already released three updates to fix the issue.
The Chinese embassy in Washington responded by denying any involvement and warned against “groundless accusations.”

Microsoft Under Fire
Microsoft has become a repeated target of high-level cyberattacks in recent years. In 2021, a separate Chinese group called Hafnium breached systems via a vulnerability in Microsoft Exchange Server. After facing sharp criticism for its previous response, Microsoft CEO Satya Nadella declared that cybersecurity is now the company’s top priority.
Recently, Microsoft also announced it would no longer rely on Chinese engineers for developing cloud services tied to the U.S. Department of Defense – following concerns that such arrangements may have enabled access to sensitive systems.

The Flaw Was First Discovered – by Ethical Hackers
Interestingly, the SharePoint vulnerability was first discovered in May during a hacking contest in Berlin organized by cybersecurity firm Trend Micro. The event offered $100,000 rewards for discovering zero-day vulnerabilities, demonstrating just how valuable – and dangerous – these flaws can be.

Summary: Another Security Blow for the U.S.
Although no classified data was leaked, confidence in government infrastructure has taken another hit. The NNSA was among several high-profile victims, and China-sponsored cyber threats continue to rise.
The U.S. once again finds itself needing to strengthen its cyber defenses – not just against foreign adversaries, but also against its own systemic vulnerabilities.

#CyberSecurity , #Microsoft , #cyberattack , #hacking , #CryptoNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 WTF? $100,000,000 GONE despite 11 audits!!! Balancer just suffered one of the biggest exploits of the year - $100M+ drained from staked ETH pools. What’s shocking isn’t just the number, it’s the fact that four major audit firms - OpenZeppelin, Trail of Bits, Certora, and ABDK - had already reviewed the contracts 11 times since 2021. Let that sink in: eleven audits, bug bounties, top-tier security partners… and still a total wipeout. DeFi isn’t broken - it’s just brutally transparent. Code can be perfect on paper and still crumble under the creativity of one skilled attacker. Early data suggests a faulty access control opened the door for funds to be withdrawn by an unauthorized command. Balancer’s team offered the hacker a 20% white-hat bounty if the funds are returned - but so far, silence. The move buys time, but trust takes longer to rebuild. The takeaway? “Audited” doesn’t mean “safe.” In DeFi, security isn’t a box to check - it’s an arms race between builders and exploiters. #Scamalert #Hackalert #Hacking #MarketPullback #CryptoMarketWatch
🚨 WTF? $100,000,000 GONE despite 11 audits!!!

Balancer just suffered one of the biggest exploits of the year - $100M+ drained from staked ETH pools. What’s shocking isn’t just the number, it’s the fact that four major audit firms - OpenZeppelin, Trail of Bits, Certora, and ABDK - had already reviewed the contracts 11 times since 2021.

Let that sink in: eleven audits, bug bounties, top-tier security partners… and still a total wipeout.

DeFi isn’t broken - it’s just brutally transparent. Code can be perfect on paper and still crumble under the creativity of one skilled attacker. Early data suggests a faulty access control opened the door for funds to be withdrawn by an unauthorized command.

Balancer’s team offered the hacker a 20% white-hat bounty if the funds are returned - but so far, silence. The move buys time, but trust takes longer to rebuild.

The takeaway? “Audited” doesn’t mean “safe.” In DeFi, security isn’t a box to check - it’s an arms race between builders and exploiters. #Scamalert #Hackalert #Hacking #MarketPullback #CryptoMarketWatch
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number