Binance Square
#hack

hack

945,304 views
584 Discussing
All crypto market update
·
--
🚨 ALERT: 🇰🇵 Suspected North Korean hackers have breached widely used software in a major supply-chain attack, impacting thousands of U.S. companies. The operation may have specifically targeted crypto-related systems, raising serious security concerns. ⚠️ Large-scale cyber risk unfolding. #Breaking #CyberAttack #NorthKorea #Crypto #Security #Hack #Blockchain #GlobalRisk 🚨
🚨 ALERT:

🇰🇵 Suspected North Korean hackers have breached widely used software in a major supply-chain attack, impacting thousands of U.S. companies.

The operation may have specifically targeted crypto-related systems, raising serious security concerns.

⚠️ Large-scale cyber risk unfolding.

#Breaking #CyberAttack #NorthKorea #Crypto #Security #Hack #Blockchain #GlobalRisk 🚨
DRIFT HACK SHOWS THE COST OF WEAK MULTISIG ⚠️ SlowMist says Drift’s multisig was changed to 2/5 without a timelock a week before the exploit, creating the opening for admin takeover, fake CVT minting, oracle manipulation, and a high-value pool drain. Roughly 105,969 ETH, worth about $226 million, has now been consolidated to one Ethereum address while tracing continues. Track the liquidity flows, not the noise. When admin controls move that fast, whales and attackers are usually one step ahead of the market. This matters now because security failures can turn into forced risk repricing across the entire DeFi complex. I’d watch for follow-on contagion and sudden discounting in related assets if confidence keeps breaking. Not financial advice. Manage your risk. #Crypto #DeFi #ETH #Hack #Security ✦
DRIFT HACK SHOWS THE COST OF WEAK MULTISIG ⚠️

SlowMist says Drift’s multisig was changed to 2/5 without a timelock a week before the exploit, creating the opening for admin takeover, fake CVT minting, oracle manipulation, and a high-value pool drain. Roughly 105,969 ETH, worth about $226 million, has now been consolidated to one Ethereum address while tracing continues.

Track the liquidity flows, not the noise. When admin controls move that fast, whales and attackers are usually one step ahead of the market.

This matters now because security failures can turn into forced risk repricing across the entire DeFi complex. I’d watch for follow-on contagion and sudden discounting in related assets if confidence keeps breaking.

Not financial advice. Manage your risk.

#Crypto #DeFi #ETH #Hack #Security

DRIFT $DRIFT BLEEDS $270M ⚠️ Drift Protocol has suspended deposits and withdrawals after detecting an active exploit, with on-chain reports indicating more than $270 million in assets were drained to a single wallet. The incident now ranks among the largest crypto hacks ever and the biggest native Solana DeFi exploit, putting immediate pressure on liquidity, confidence, and ecosystem-wide risk sentiment. Watch the books and wait for the panic window to widen. Let forced deleveraging shake out weak hands, then track where whales rotate capital once containment updates hit. Do not chase the headline; monitor liquidity, bridge flows, and any stabilization in Solana risk. This matters because a hack of this size can reprice trust across the whole DeFi stack in minutes. I think the market will punish $DRIFT first, then quickly separate protocol damage from broader Solana exposure if the response looks credible. Not financial advice. Manage your risk. #Crypto #DeFi #Solana #Hack ⚡ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
DRIFT $DRIFT BLEEDS $270M ⚠️

Drift Protocol has suspended deposits and withdrawals after detecting an active exploit, with on-chain reports indicating more than $270 million in assets were drained to a single wallet. The incident now ranks among the largest crypto hacks ever and the biggest native Solana DeFi exploit, putting immediate pressure on liquidity, confidence, and ecosystem-wide risk sentiment.

Watch the books and wait for the panic window to widen. Let forced deleveraging shake out weak hands, then track where whales rotate capital once containment updates hit. Do not chase the headline; monitor liquidity, bridge flows, and any stabilization in Solana risk.

This matters because a hack of this size can reprice trust across the whole DeFi stack in minutes. I think the market will punish $DRIFT first, then quickly separate protocol damage from broader Solana exposure if the response looks credible.

Not financial advice. Manage your risk.

#Crypto #DeFi #Solana #Hack

DRIFT JUST GOT NUKED AFTER $220M EXPLOIT $DRIFT 🚨 Entry: $0.048 🔥 Let the panic flush run its course. Track liquidation pockets, let weak hands sell into the void, and wait for a reclaim before touching the bounce. If bids start absorbing size, expect a violent squeeze as hunters step in for distressed liquidity. Stay disciplined and do not chase the first green candle. This is the kind of event that can force real repositioning fast. I think the suspension changes the game because fear can overshoot fundamentals before any stabilization begins, and that usually creates the sharpest tradable moves. Not financial advice. Manage your risk. #Crypto #DRIFT #DeFi #Altcoins #Hack ⚡
DRIFT JUST GOT NUKED AFTER $220M EXPLOIT $DRIFT 🚨

Entry: $0.048 🔥

Let the panic flush run its course. Track liquidation pockets, let weak hands sell into the void, and wait for a reclaim before touching the bounce. If bids start absorbing size, expect a violent squeeze as hunters step in for distressed liquidity. Stay disciplined and do not chase the first green candle.

This is the kind of event that can force real repositioning fast. I think the suspension changes the game because fear can overshoot fundamentals before any stabilization begins, and that usually creates the sharpest tradable moves.

Not financial advice. Manage your risk.

#Crypto #DRIFT #DeFi #Altcoins #Hack

DRIFT $DRIFT BLOODBATHE AFTER $220M EXPLOIT 🚨 A protocol exploit has forced Drift Protocol to suspend operations while multiple security firms trace the attacker. $DRIFT is down 30% in 24 hours after an early 35% plunge, showing a sharp liquidity shock and a fast institutional de-risking response. Stay sidelined until liquidity stabilizes. Watch for exchange flow, forensic updates, and whether bids return after the suspension lifts. Whale money wants certainty before it steps back into a hacked protocol. I think this is the kind of event that resets a token’s narrative overnight. In these setups, the first meaningful move comes from restored confidence, not from the initial panic wick. Not financial advice. Manage your risk. #Crypto #DeFi #Altcoins #Hack #DRIFT ⚡ {alpha}(CT_501DriFtupJYLTosbwoN8koMbEYSx54aFAVLddWsbksjwg7)
DRIFT $DRIFT BLOODBATHE AFTER $220M EXPLOIT 🚨

A protocol exploit has forced Drift Protocol to suspend operations while multiple security firms trace the attacker. $DRIFT is down 30% in 24 hours after an early 35% plunge, showing a sharp liquidity shock and a fast institutional de-risking response.

Stay sidelined until liquidity stabilizes. Watch for exchange flow, forensic updates, and whether bids return after the suspension lifts. Whale money wants certainty before it steps back into a hacked protocol.

I think this is the kind of event that resets a token’s narrative overnight. In these setups, the first meaningful move comes from restored confidence, not from the initial panic wick.

Not financial advice. Manage your risk.

#Crypto #DeFi #Altcoins #Hack #DRIFT

DRIFT PROTOCOL BLEEDS OUT $270M IN SHOCK EXPLOIT 🐋 Drift Protocol confirmed abnormal activity after monitoring flagged roughly $220M to $270M in suspicious transfers, with stolen assets bridged and swapped into ETH. The attacker has already accumulated 19,913 ETH worth about $42.6M, while the team told users not to deposit funds during the ongoing investigation. This is the kind of exploit that forces instant risk repricing across Solana DeFi. Liquidity can flee fast, and any follow-through in stolen-fund swaps can keep pressure elevated until the full damage is mapped. I’d treat this as a live contagion event, not a single-protocol headline. Not financial advice. Manage your risk. #Crypto #Solana #DeFi #Hack #DRIFT 🛡️
DRIFT PROTOCOL BLEEDS OUT $270M IN SHOCK EXPLOIT 🐋

Drift Protocol confirmed abnormal activity after monitoring flagged roughly $220M to $270M in suspicious transfers, with stolen assets bridged and swapped into ETH. The attacker has already accumulated 19,913 ETH worth about $42.6M, while the team told users not to deposit funds during the ongoing investigation.

This is the kind of exploit that forces instant risk repricing across Solana DeFi. Liquidity can flee fast, and any follow-through in stolen-fund swaps can keep pressure elevated until the full damage is mapped. I’d treat this as a live contagion event, not a single-protocol headline.

Not financial advice. Manage your risk.

#Crypto #Solana #DeFi #Hack #DRIFT

🛡️
·
--
#BAL Balancer Labs, the creator of Balancer, is shutting down following a $116 million hack in November. Balancer Labs' management insists that the protocol will be managed by the Balancer Foundation and the Balancer DAO. #hack
#BAL Balancer Labs, the creator of Balancer, is shutting down following a $116 million hack in November. Balancer Labs' management insists that the protocol will be managed by the Balancer Foundation and the Balancer DAO. #hack
#Hack #ResolvLabs ⏳ Ultimatum: Resolv gives hacker 72 hours to return $25 million The situation surrounding the Resolv Labs hack on Sunday has been resolved in a “bounty or war” format. The Abu Dhabi-based stablecoin issuer has made an official demand to the attacker. 📜 Terms of the deal: • Offer: The hacker can keep 10% ($2.5 million) as a reward for “white hat” activity. • Demand: Return 90% of the funds (~$22.5 million in $ETH ) and all remaining USR tokens to the specified address. • Deadline: Thursday, March 26. 🚨 What will happen in case of refusal? Resolv is determined. If the funds are not returned, the company will involve: 1. Law enforcement and legal prosecution. 2. Blockchain analysts to publicly track each transaction. 3. Exchanges and bridges to completely freeze the hacker's assets. 🔍 How did the hack happen? Experts have identified a critical vulnerability: the privileged role of minting (token creation) was controlled by only one wallet without multisigs, limits, or oracle checks. The hacker deposited $200k and “drawn” 80 million USR for himself, which he promptly converted into 11,409 $ETH . 🛡 What about users? Resolv Digital Assets has already opened the possibility of redemptions for verified users who held USR at the time of the incident. Others are promised an update later. {future}(ETHUSDT)
#Hack #ResolvLabs
⏳ Ultimatum: Resolv gives hacker 72 hours to return $25 million

The situation surrounding the Resolv Labs hack on Sunday has been resolved in a “bounty or war” format. The Abu Dhabi-based stablecoin issuer has made an official demand to the attacker.

📜 Terms of the deal:
• Offer: The hacker can keep 10% ($2.5 million) as a reward for “white hat” activity.
• Demand: Return 90% of the funds (~$22.5 million in $ETH ) and all remaining USR tokens to the specified address.
• Deadline: Thursday, March 26.

🚨 What will happen in case of refusal?
Resolv is determined. If the funds are not returned, the company will involve:
1. Law enforcement and legal prosecution.
2. Blockchain analysts to publicly track each transaction.
3. Exchanges and bridges to completely freeze the hacker's assets.

🔍 How did the hack happen?
Experts have identified a critical vulnerability: the privileged role of minting (token creation) was controlled by only one wallet without multisigs, limits, or oracle checks. The hacker deposited $200k and “drawn” 80 million USR for himself, which he promptly converted into 11,409 $ETH .

🛡 What about users?
Resolv Digital Assets has already opened the possibility of redemptions for verified users who held USR at the time of the incident. Others are promised an update later.
🚨 STABLECOIN NIGHTMARE JUST UNFOLDED 🚨 Resolv Labs stablecoin collapses 80% after a $23M exploit. This wasn’t volatility. This was a failure of trust. 1. Attackers used compromised private keys. Result? They minted 80M unbacked $USR with almost no collateral. That’s instant dilution. 2. Once confidence breaks… Liquidity vanishes. Price collapses. Death spiral begins. 3. $23M drained. But the real damage? Contagion across DeFi vaults. 4. This is the dark side of crypto: Smart contracts + key risk = catastrophic failure. No bailout. No safety net. 5. Stablecoin ≠ always stable. If backing fails… it becomes just another token. 6. Lessons: → Security is EVERYTHING → Trust is fragile → Risk management matters more than hype Survival in crypto isn’t about chasing gains… It’s about avoiding blow-ups. #Crypto #DeFi #Stablecoins #Hack #Blockchain
🚨 STABLECOIN NIGHTMARE JUST UNFOLDED 🚨

Resolv Labs stablecoin collapses 80% after a $23M exploit. This wasn’t volatility. This was a failure of trust.

1. Attackers used compromised private keys. Result? They minted 80M unbacked $USR with almost no collateral. That’s instant dilution.

2. Once confidence breaks… Liquidity vanishes. Price collapses. Death spiral begins.

3. $23M drained. But the real damage? Contagion across DeFi vaults.

4. This is the dark side of crypto: Smart contracts + key risk = catastrophic failure. No bailout. No safety net.

5. Stablecoin ≠ always stable. If backing fails… it becomes just another token.

6. Lessons: → Security is EVERYTHING
→ Trust is fragile
→ Risk management matters more than hype Survival in crypto isn’t about chasing gains… It’s about avoiding blow-ups.

#Crypto #DeFi #Stablecoins #Hack #Blockchain
{spot}(ENJUSDT) $🚨 DEFI NIGHTMARE JUST UNFOLDED… 🚨 Resolv Labs has officially paused its protocol after a massive exploit shook the ecosystem 💀 An attacker minted 50–80 MILLION unbacked $USR out of thin air… Then swapped it into USDC, USDT & ETH like a pro exit scam 🐍 💸 Estimated damage: ~$25 MILLION drained 📉 Result: $USR completely de pegged This wasn’t just a hack… This was a liquidity execution ⚔️ 👉 Lessons for investors: • “Stable” doesn’t mean safe ❌ • Always check protocol backing & audits 🔍 • If minting isn’t controlled… it’s a ticking bomb 💣 Whales don’t warn you… They just take your liquidity silently 🐋 Stay sharp. Stay skeptical. #defi #hack #Injective🔥
$🚨 DEFI NIGHTMARE JUST UNFOLDED… 🚨
Resolv Labs has officially paused its protocol after a massive exploit shook the ecosystem 💀
An attacker minted 50–80 MILLION unbacked $USR out of thin air…
Then swapped it into USDC, USDT & ETH like a pro exit scam 🐍

💸 Estimated damage: ~$25 MILLION drained
📉 Result: $USR completely de pegged
This wasn’t just a hack…

This was a liquidity execution ⚔️
👉 Lessons for investors:
• “Stable” doesn’t mean safe ❌
• Always check protocol backing & audits 🔍
• If minting isn’t controlled… it’s a ticking bomb 💣
Whales don’t warn you…
They just take your liquidity silently 🐋
Stay sharp. Stay skeptical.

#defi #hack
#Injective🔥
🚨 USR Collapse: $80M Mint Exploit Hits Resolv Resolv Protocol suffered a critical smart contract exploit, allowing an attacker to mint over $80M USR with zero collateral 💥 With just $200K, the attacker cashed out ~$23.8M in under 3 hours USR lost its peg hard, crashing to ~$0.14 and shaking DeFi markets ⚠️ Root cause: broken mint logic with no validation + a single privileged wallet This proves one thing — protocols don’t need a bear market to collapse… just flawed logic 👀 💭 What do you think — bug or insider job? Drop your thoughts below! 👇 $RESOLV #DeFi #Stablecoin #Hack #Security
🚨 USR Collapse: $80M Mint Exploit Hits Resolv

Resolv Protocol suffered a critical smart contract exploit, allowing an attacker to mint over $80M USR with zero collateral 💥
With just $200K, the attacker cashed out ~$23.8M in under 3 hours

USR lost its peg hard, crashing to ~$0.14 and shaking DeFi markets ⚠️
Root cause: broken mint logic with no validation + a single privileged wallet

This proves one thing — protocols don’t need a bear market to collapse… just flawed logic 👀

💭 What do you think — bug or insider job? Drop your thoughts below! 👇

$RESOLV #DeFi #Stablecoin #Hack #Security
·
--
🚨 $23,660,000 disappeared in minutes… and “stablecoin” collapsed -69%! 💀 What happened today is terrifying: Hack of Resolv Protocol Theft 11,422 $ETH Collapse of USR stablecoin From $1.00 → $0.29 within minutes! ➡️ “Stablecoin” is no longer stable… 🧠 How did this happen? (In a terrifying nutshell) The attacker: Exploited a vulnerability in the smart contract Withdrew the collateral (ETH) Without burning USR = Suddenly … the currency became “worthless” 📉 The catastrophic result: Holders of USR: -70% in minutes Liquidity providers: multiplied losses The protocol? Essentially ended ➡️ One blow = wiped out wealth ⚠️ This is not the first time… Remember: Terra ($LUNA ) → $40B disappeared And today USR ➡️ The same story… repeats 💡 The harsh truth: Not every stablecoin is safe USDT / USDC → “relatively safer” Algorithmic → time bombs 💣 😨 The message to the market: If $1 can become $0.29… You do not have “stability” You have hidden risk 💬 The question: After this… Do you still trust DeFi Stablecoins? 🟢 Yes (but only for the big players) 🟡 Very cautiously 🔴 Finished … I won’t touch it 👇 Your opinion #crypto #DeFi #Stablecoin #Hack #Ethereum ⚠️ Not your keys ≠ Not your risk {spot}(ETHUSDT)
🚨 $23,660,000 disappeared in minutes… and “stablecoin” collapsed -69%!

💀 What happened today is terrifying:
Hack of Resolv Protocol
Theft 11,422 $ETH
Collapse of USR stablecoin
From $1.00 → $0.29 within minutes!
➡️ “Stablecoin” is no longer stable…
🧠 How did this happen? (In a terrifying nutshell)

The attacker:
Exploited a vulnerability in the smart contract
Withdrew the collateral (ETH)
Without burning USR
= Suddenly … the currency became “worthless”

📉 The catastrophic result:
Holders of USR: -70% in minutes
Liquidity providers: multiplied losses
The protocol? Essentially ended
➡️ One blow = wiped out wealth
⚠️ This is not the first time…

Remember:
Terra ($LUNA ) → $40B disappeared
And today USR
➡️ The same story… repeats

💡 The harsh truth:
Not every stablecoin is safe
USDT / USDC → “relatively safer”
Algorithmic → time bombs 💣

😨 The message to the market:
If $1 can become $0.29…
You do not have “stability”
You have hidden risk

💬 The question:
After this…
Do you still trust DeFi Stablecoins?
🟢 Yes (but only for the big players)
🟡 Very cautiously
🔴 Finished … I won’t touch it
👇 Your opinion

#crypto #DeFi #Stablecoin #Hack #Ethereum
⚠️ Not your keys ≠ Not your risk
RESOLV LABS HIT BY MASSIVE HACK $USR 🚨 News Bulletin: Resolv Labs has confirmed a critical security breach, halting all protocol functions. The exploit resulted in the illegal minting of $80 million in USR stablecoin, with approximately $4.55 million already converted to ETH. The protocol is locked down, preventing further trading or liquidation, as the team undertakes a lengthy audit and fix process. WHALES ARE BRUTALLY LIQUIDATING POSITIONS. DUMP EVERYTHING. ABSOLUTE PANIC SELLING MODE ACTIVATED. SELL NOW BEFORE IT GOES TO ZERO. DO NOT HESITATE. Not financial advice. Manage your risk. #DeFi #Crypto #Hack #Security #Stablecoin 💥
RESOLV LABS HIT BY MASSIVE HACK $USR 🚨

News Bulletin: Resolv Labs has confirmed a critical security breach, halting all protocol functions. The exploit resulted in the illegal minting of $80 million in USR stablecoin, with approximately $4.55 million already converted to ETH. The protocol is locked down, preventing further trading or liquidation, as the team undertakes a lengthy audit and fix process.

WHALES ARE BRUTALLY LIQUIDATING POSITIONS. DUMP EVERYTHING. ABSOLUTE PANIC SELLING MODE ACTIVATED. SELL NOW BEFORE IT GOES TO ZERO. DO NOT HESITATE.

Not financial advice. Manage your risk.

#DeFi #Crypto #Hack #Security #Stablecoin

💥
·
--
Bullish
🍔 McDonald's Memecoin Hack: Cyber ​​Thieves Steal Around $700,000 in Solana In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered. 💀 The Grimace Memecoin Scam 👾 Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes. 📊 Pump & Dump The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes. 💸 The Payout In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana." ⚠️ Aftermath The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
🍔 McDonald's Memecoin Hack: Cyber ​​Thieves Steal Around $700,000 in Solana

In an unexpected twist, on August 21, scammers hacked McDonald's official Instagram account, using the fast food giant's platform to sell a fake memecoin based on the Grimace mascot. The hackers managed to raise over $700,000 in Solana before the scam was discovered.

💀 The Grimace Memecoin Scam 👾

Taking advantage of McDonald's Instagram page, with 5.1 million followers, the hackers promoted the fake Grimace token as a "McDonald's experiment on Solana." This tactic quickly caught the attention of the crypto community, causing the token's market cap to jump from a few thousand dollars to $25 million in just 30 minutes.

📊 Pump & Dump

The crooks had already secured 75% of the Grimace token supply using the Solana memecoin implementer pump.fun. They then distributed these tokens across 100 different wallets. As the token's value increased, the hackers began selling their holdings, causing the token's price to drop to $650,000 in just 40 minutes.

💸 The Payout

In total, the crooks made off with around $700,000 worth of Solana from this pump and dump scheme. They even edited McDonald's Instagram bio to boast about their success, writing: "Sorry India_X_Kr3w just scammed you, thanks for the $700,000 worth of Solana."

⚠️ Aftermath

The posts and bio were eventually restored, and McDonald's issued a statement acknowledging the hack as an "isolated incident." This incident is a reminder of the dangers in the cryptocurrency world, where even well-known brands can be used to facilitate scams.

#scam #hack #Solana⁩ $SOL #RiskManagement
Article
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
Article
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Article
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
·
--
Stay #SAFU on X and other socials. @JasonYanowitz on X narrates his #hack odeal. I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked. Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole. I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed. This was the real hack. I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address. But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it. Some takeaways: - Don't click links - If you do click a link, review the actual email address - Set up non-text 2FA on everything - If you've done that, trust your own security process - If you think you've been hacked, slow down and think about how this could have happened Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly. If you're still reading, go read the self-audit series from @samczsun. And this best practices from @bobbyong. Lot more you can do but start there. #phishing
Stay #SAFU on X and other socials.

@JasonYanowitz on X narrates his #hack odeal.

I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked.
Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole.
I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed.

This was the real hack.

I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address.
But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it.

Some takeaways:
- Don't click links
- If you do click a link, review the actual email address
- Set up non-text 2FA on everything
- If you've done that, trust your own security process
- If you think you've been hacked, slow down and think about how this could have happened
Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly.
If you're still reading, go read the self-audit series from @samczsun.
And this best practices from @bobbyong.
Lot more you can do but start there. #phishing
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number