Binance Square

hackeralert

1.6M views
826 Discussing
Mr Ghost 786
--
Bearish
Stay alert Many thefts or scams in traditional finance are covered by banks or card companies. In the UK you can complain to the financial ombudsman service and may be compensated by the financial services compensation scheme. "Crypto remains largely unregulated in the UK and high-risk," says the FCA. "If something goes wrong, it is unlikely you will be protected so you should be prepared to lose all your money." #HackerAlert #ProtectYourInvestments
Stay alert

Many thefts or scams in traditional finance are covered by banks or card companies. In the UK you can complain to the financial ombudsman service and may be compensated by the financial services compensation scheme.

"Crypto remains largely unregulated in the UK and high-risk," says the FCA. "If something goes wrong, it is unlikely you will be protected so you should be prepared to lose all your money."
#HackerAlert
#ProtectYourInvestments
🚨 JUST IN: $63M TORNADO CASH FLOW LINKED TO $282M WALLET H@CK 🚨$DOGE {spot}(DOGEUSDT) Blockchain security firm CertiK reports that $63 million sent through Tornado Cash has been linked to a massive $282 million wallet compromise. $ROSE {spot}(ROSEUSDT) The finding ties privacy tools to one of the largest suspected exploit trails, reigniting debates around on-chain anonymity, security, and enforcement. 🔍 Funds traced across mixers ⚠️ Exploit size: $282M 📉 Security risks back in focus Another reminder: on-chain forensics never sleep, and big exploits leave bigger footprints. 👀 #TornadoCash #HackerAlert
🚨 JUST IN: $63M TORNADO CASH FLOW LINKED TO $282M WALLET H@CK 🚨$DOGE

Blockchain security firm CertiK reports that $63 million sent through Tornado Cash has been linked to a massive $282 million wallet compromise.
$ROSE

The finding ties privacy tools to one of the largest suspected exploit trails, reigniting debates around on-chain anonymity, security, and enforcement.

🔍 Funds traced across mixers

⚠️ Exploit size: $282M

📉 Security risks back in focus

Another reminder: on-chain forensics never sleep, and big exploits leave bigger footprints. 👀

#TornadoCash #HackerAlert
URGENT WARNING: YOUR SEED PHRASE IS EXPOSED DO NOT STORE YOUR SEED PHRASE ONLINE. THIS IS NOT A DRILL. YOUR ENTIRE WALLET IS AT RISK. HACKERS ARE ACTIVELY HUNTING FOR SEED PHRASES. ANYTHING CONNECTED TO THE INTERNET IS A TARGET. EXCHANGES HAVE BEEN HACKED. YOUR PHONE CAN BE HACKED. IF YOUR SEED PHRASE IS ONLINE, YOUR CRYPTO CAN VANISH INSTANTLY. SECURE IT OFFLINE NOW. WRITE IT DOWN. STORE IT PHYSICALLY. NEVER ON YOUR PHONE. NEVER IN THE CLOUD. YOUR SEED PHRASE IS YOUR WALLET'S MASTER KEY. PROTECT IT. DISCLAIMER: This is not financial advice. #CryptoSecurity #SeedPhrase #HackerAlert #ProtectYourCrypto 🚨
URGENT WARNING: YOUR SEED PHRASE IS EXPOSED

DO NOT STORE YOUR SEED PHRASE ONLINE. THIS IS NOT A DRILL. YOUR ENTIRE WALLET IS AT RISK. HACKERS ARE ACTIVELY HUNTING FOR SEED PHRASES. ANYTHING CONNECTED TO THE INTERNET IS A TARGET. EXCHANGES HAVE BEEN HACKED. YOUR PHONE CAN BE HACKED. IF YOUR SEED PHRASE IS ONLINE, YOUR CRYPTO CAN VANISH INSTANTLY. SECURE IT OFFLINE NOW. WRITE IT DOWN. STORE IT PHYSICALLY. NEVER ON YOUR PHONE. NEVER IN THE CLOUD. YOUR SEED PHRASE IS YOUR WALLET'S MASTER KEY. PROTECT IT.

DISCLAIMER: This is not financial advice.

#CryptoSecurity #SeedPhrase #HackerAlert #ProtectYourCrypto 🚨
The Security Wake-Up Call: Why 80% of Hacked Crypto Projects Fail to RecoverA staggering 80% of crypto projects that endure a major hacking incident never fully recover. The primary cause is not the initial financial loss, but the subsequent collapse of operational and trust systems during the response phase. This highlights a significant gap between rapid Web3 innovation and the adoption of robust, proactive security measures. The Critical Failure Points When a breach occurs, the immediate aftermath is often the most destructive period. Many project teams are paralyzed by hesitation and a lack of preparedness, exacerbating losses. Absence of Incident Response Plans: Most protocols lack pre-established plans for security incidents. In the crucial initial hours, this leads to slow decision-making, allowing attackers more time to drain funds and cause further damage. Trust Erosion: Fearing reputational damage, teams may hesitate to pause smart contracts or communicate openly with users. This silence fuels panic and permanently damages community trust, causing users and liquidity to disappear, which is often an irreversible "death sentence" for the project. Operational Security Gaps: Weak operational security, such as poorly secured private keys or compromised multi-signature setups, remains a top threat vector. Human error is often the weakest link, susceptible to increasingly sophisticated social engineering attacks. Common Vulnerabilities Web3 security risks are a mix of traditional and unique challenges: Smart Contract Flaws: Logical errors and vulnerabilities in smart contract code are common attack vectors. Once deployed, these errors are often immutable, making them difficult to correct. Cross-Chain Bridge Issues: Bridges that connect different blockchains are frequent targets, often due to their complexity and reliance on centralized components. Phishing and Social Engineering: Human-layer attacks are highly effective in the self-custody environment of Web3, tricking users into revealing sensitive information or approving malicious transactions. A Call for Proactive Security To improve recovery rates, the Web3 ecosystem needs to mature its security practices. This means moving beyond a reliance solely on third-party audits and implementing a holistic approach. Layered Security: Combining audits with in-house measures like static analysis, unit testing, and vulnerability scanning is essential. Transparency and Education: Fostering a security-first culture internally and educating users on safe practices can mitigate risks. Robust Incident Planning: Having a clear, practiced incident response plan is critical to acting swiftly and containing a breach effectively. The data from Immunefi's CEO Mitchell Amador indicates that while the technology is innovative, the human and operational elements of Web3 security urgently need to catch up to ensure long-term sustainability $BNB $XRP $BTC #MarketRebound #CPIWatch #StrategyBTCPurchase #HackerAlert

The Security Wake-Up Call: Why 80% of Hacked Crypto Projects Fail to Recover

A staggering 80% of crypto projects that endure a major hacking incident never fully recover. The primary cause is not the initial financial loss, but the subsequent collapse of operational and trust systems during the response phase. This highlights a significant gap between rapid Web3 innovation and the adoption of robust, proactive security measures.
The Critical Failure Points
When a breach occurs, the immediate aftermath is often the most destructive period. Many project teams are paralyzed by hesitation and a lack of preparedness, exacerbating losses.
Absence of Incident Response Plans: Most protocols lack pre-established plans for security incidents. In the crucial initial hours, this leads to slow decision-making, allowing attackers more time to drain funds and cause further damage.
Trust Erosion: Fearing reputational damage, teams may hesitate to pause smart contracts or communicate openly with users. This silence fuels panic and permanently damages community trust, causing users and liquidity to disappear, which is often an irreversible "death sentence" for the project.
Operational Security Gaps: Weak operational security, such as poorly secured private keys or compromised multi-signature setups, remains a top threat vector. Human error is often the weakest link, susceptible to increasingly sophisticated social engineering attacks.
Common Vulnerabilities
Web3 security risks are a mix of traditional and unique challenges:
Smart Contract Flaws: Logical errors and vulnerabilities in smart contract code are common attack vectors. Once deployed, these errors are often immutable, making them difficult to correct.
Cross-Chain Bridge Issues: Bridges that connect different blockchains are frequent targets, often due to their complexity and reliance on centralized components.
Phishing and Social Engineering: Human-layer attacks are highly effective in the self-custody environment of Web3, tricking users into revealing sensitive information or approving malicious transactions.
A Call for Proactive Security
To improve recovery rates, the Web3 ecosystem needs to mature its security practices. This means moving beyond a reliance solely on third-party audits and implementing a holistic approach.
Layered Security: Combining audits with in-house measures like static analysis, unit testing, and vulnerability scanning is essential.
Transparency and Education: Fostering a security-first culture internally and educating users on safe practices can mitigate risks.
Robust Incident Planning: Having a clear, practiced incident response plan is critical to acting swiftly and containing a breach effectively.
The data from Immunefi's CEO Mitchell Amador indicates that while the technology is innovative, the human and operational elements of Web3 security urgently need to catch up to ensure long-term sustainability
$BNB $XRP $BTC
#MarketRebound #CPIWatch #StrategyBTCPurchase #HackerAlert
🚨 $282M Crypto Hack Fuels Monero Price Spike A hacker pulled off a $282 million crypto theft in a hardware wallet social-engineering attack on Jan. 10 at 23:00 UTC, according to blockchain investigator ZachXBT. The attacker stole 2.05 million Litecoin (LTC) and 1,459 Bitcoin (BTC). Most of the funds were quickly swapped into Monero (XMR), helping drive a 70% surge in XMR’s price over the following four days. ZachXBT noted that part of the stolen BTC was bridged via Thorchain to multiple networks, including Ethereum, Ripple, and Litecoin. He also confirmed there are no signs the attack was linked to North Korean hackers. The incident highlights a growing 2025 trend where social engineering has become the leading method behind major crypto hacks, coming shortly after Ledger disclosed a data leak exposing user information. Source: CoinDesk.com $XMR #CryptoEducation #HackerAlert #USDT {future}(XMRUSDT)
🚨 $282M Crypto Hack Fuels Monero Price Spike

A hacker pulled off a $282 million crypto theft in a hardware wallet social-engineering attack on Jan. 10 at 23:00 UTC, according to blockchain investigator ZachXBT.

The attacker stole 2.05 million Litecoin (LTC) and 1,459 Bitcoin (BTC). Most of the funds were quickly swapped into Monero (XMR), helping drive a 70% surge in XMR’s price over the following four days.

ZachXBT noted that part of the stolen BTC was bridged via Thorchain to multiple networks, including Ethereum, Ripple, and Litecoin. He also confirmed there are no signs the attack was linked to North Korean hackers.

The incident highlights a growing 2025 trend where social engineering has become the leading method behind major crypto hacks, coming shortly after Ledger disclosed a data leak exposing user information.

Source: CoinDesk.com

$XMR #CryptoEducation #HackerAlert #USDT
Binance BiBi:
Of course! The post explains a $282 million crypto hack where a user's BTC and LTC were stolen via a social engineering attack. The hacker then laundered the funds through Monero (XMR), which caused XMR's price to surge by 70%. It's a strong reminder to be extra cautious about security
🚨 A sophisticated social-engineering attack led to the theft of more than $282 million in $BTC and $LTC , with the funds rapidly laundered through monero($XMR ).👨‍💻🩸 #HackerAlert #BTC #LTC #XMR #MarketRebound
🚨 A sophisticated social-engineering attack led to the theft of more than $282 million in $BTC and $LTC , with the funds rapidly laundered through monero($XMR ).👨‍💻🩸
#HackerAlert #BTC #LTC #XMR #MarketRebound
Reposting this article to spread awareness. A genuine hacking case that resulted in loss. Please protect your account and avoid phishing links. #HackerAlert $BTC $BNB
Reposting this article to spread awareness. A genuine hacking case that resulted in loss. Please protect your account and avoid phishing links.
#HackerAlert
$BTC
$BNB
Twin Tulips
--
My Binance Account Hack – Community Awareness 🚨
Date of Incident: 09 January 2026
I am sharing this incident in detail to raise awareness within the crypto community. What happened to me can happen to anyone, especially during live sessions and multitasking.
📍 Location & Situation
At the time of the incident, I was present at Twin Tulips and hosting a live session on Binance Square. Alongside the live session, I was also involved in an important meeting on my mobile phone, which divided my attention.
🔐 Events Leading Up to the Hack
Two days before the incident:
• My Gmail account was compromised
• Using access to my email, the attacker attempted and later succeeded in accessing my Binance account
• I immediately:
• Informed my Binance BDM
• Contacted Binance Customer Support
• My Binance account already had 2FA enabled
🎥 Live Session & Co-Host Involvement
During the Binance Square live session:
• I noticed unusual behavior on my account
• I informed my co-host and clearly told them:
“Please manage the live session, I need to focus on an urgent meeting on my mobile.”
• While my co-host was handling the live session, I became fully engaged in the meeting on my phone
🚨 Account Logout & Suspicious Activity
While I was distracted with the meeting:
• My Binance account logged out automatically
• I was not actively monitoring the account due to the meeting and live session running simultaneously
When I returned:
• I attempted to log in again
• A QR code appeared on the screen with a message indicating that I had been logged out and needed to scan the QR code to re-login
📱 QR Code Exploit
As soon as I:
• Scanned the QR code
• My screen began to freeze and lag
• The account logged out again
• Immediately after, the account logged back in automatically
At that moment:
• The attacker withdrew $831 from my Spot Wallet
💸 Financial Impact
• Total loss: $831
• Fortunately:
• No additional funds were available in the Spot Wallet
• Funds in the Earnings section remained untouched
• Either the attacker could not access those funds or failed to withdraw them

📞 Reporting & Follow-Up
After identifying the unauthorized withdrawal:
• I contacted Binance Customer Support immediately

• Submitted a complete report, including:
• Timeline of events
• Screenshots
• Live session context
• The case was forwarded for internal investigation
⚠️ Key Security Lessons
This incident highlights several critical lessons for all crypto users:
✅ Never underestimate email security
✅ Avoid scanning any QR code during high-pressure situations like live sessions
✅ Multitasking during live crypto events can increase risk
✅ Always assign a trusted co-host and stay alert during live sessions
✅ Immediately inform CS and BDM if any suspicious activity occurs
📢 Final Note to the Community
I am sharing this experience purely for community awareness. In crypto, even a few minutes of distraction can lead to irreversible loss.
Please stay alert, secure your email first, and never ignore unusual behavior on your account.
--
Bullish
The Hacker Who Phished... Himself 🫢🤦🏻 In an ironic twist of fate, a hacker who had successfully drained $26 million in ETH from the zkLend protocol in early 2025 lost it all almost immediately. While attempting to "wash" the stolen funds through a privacy mixer, the hacker accidentally clicked on a phishing link. A second, presumably luckier hacker then stole the funds from the first hacker. #HackerAlert #WriteToEarnUpgrade $ETH
The Hacker Who Phished... Himself 🫢🤦🏻

In an ironic twist of fate, a hacker who had successfully drained $26 million in ETH from the zkLend protocol in early 2025 lost it all almost immediately.
While attempting to "wash" the stolen funds through a privacy mixer, the hacker accidentally clicked on a phishing link. A second, presumably luckier hacker then stole the funds from the first hacker. #HackerAlert #WriteToEarnUpgrade
$ETH
--
Bearish
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨 Another major blow to DeFi security! The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol. 🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi. 📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations! 🔐 This is a harsh reminder to: — Stay updated on security risks — Use cold wallets for long-term holdings — Never go all-in on unverified protocols 👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem. #gmx #defi #HackerAlert #CryptoNewss
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨

Another major blow to DeFi security!

The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol.

🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi.

📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations!

🔐 This is a harsh reminder to: — Stay updated on security risks
— Use cold wallets for long-term holdings
— Never go all-in on unverified protocols

👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem.

#gmx #defi
#HackerAlert
#CryptoNewss
#HackerAlert JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report. $BTC $ETH $TRX
#HackerAlert
JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report.
$BTC $ETH $TRX
Solana Co-Founder’s Personal Data Leaked in Instagram Hack Amid Alleged Extortion AttemptCrypto hacks surge over 130% in Q1 2025 Raj Gokal, co-founder of the Solana blockchain, has become the target of a serious cyberattack. Hackers published his personal identification documents on the compromised Instagram account of rapper Migos. The leak appears to be tied to an unsuccessful extortion attempt — reportedly demanding over $4.3 million. 🔐 Extortion Message: “You Should Have Paid the 40 BTC” Circulating online are photos of Gokal and his wife, alongside their IDs and passports — resembling typical KYC (Know Your Customer) data used on regulated crypto platforms. The sensitive documents were shared on the official Instagram page of rapper Migos, which was apparently hacked as well. A caption under one of the posts read: “You should have paid the 40 BTC” — a statement that led many to speculate the leak followed a failed ransom attempt. At current Bitcoin prices, that would equate to a ransom demand of over $4.3 million. Instagram has since removed the post. 🧠 Social Engineering Suspected Renowned Web3 investigator ZachXBT believes the attack was a result of social engineering — where cybercriminals tricked their way into accessing Gokal’s personal accounts and data. “Raj’s accounts were likely compromised and used in an extortion attempt. Since he didn’t pay, the attackers trolled him by leaking the data through Migos’ Instagram,” said ZachXBT. Interestingly, a week before the incident, Gokal had already warned his followers on X that someone was trying to access his email and social media accounts. 📈 Crypto Hacks in 2025: A Dangerous Spike This attack is just one in a wave of escalating crypto hacks in 2025. 🔹 Q1 2025: According to security firm PeckShield, there were over 60 major hacking incidents, resulting in $1.63 billion in losses — a 131% increase from $706 million in Q1 2024. 🔹 The largest breach targeted Bybit, while Q2 saw the Cetus Protocol on the Sui network lose over $223 million. 🔹 Following the Coinbase data breach confirmed on May 15, reported compensation claims could exceed $400 million — further highlighting that DeFi and centralized platforms remain prime targets. ⚠️ A Call for Caution With the rising number of cyberattacks, the need for increased vigilance is critical — especially when dealing with unknown links or individuals posing as support staff from crypto exchanges. #solana , #CryptoHack , #HackerAlert , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Solana Co-Founder’s Personal Data Leaked in Instagram Hack Amid Alleged Extortion Attempt

Crypto hacks surge over 130% in Q1 2025
Raj Gokal, co-founder of the Solana blockchain, has become the target of a serious cyberattack. Hackers published his personal identification documents on the compromised Instagram account of rapper Migos. The leak appears to be tied to an unsuccessful extortion attempt — reportedly demanding over $4.3 million.

🔐 Extortion Message: “You Should Have Paid the 40 BTC”
Circulating online are photos of Gokal and his wife, alongside their IDs and passports — resembling typical KYC (Know Your Customer) data used on regulated crypto platforms.
The sensitive documents were shared on the official Instagram page of rapper Migos, which was apparently hacked as well. A caption under one of the posts read: “You should have paid the 40 BTC” — a statement that led many to speculate the leak followed a failed ransom attempt.
At current Bitcoin prices, that would equate to a ransom demand of over $4.3 million. Instagram has since removed the post.

🧠 Social Engineering Suspected
Renowned Web3 investigator ZachXBT believes the attack was a result of social engineering — where cybercriminals tricked their way into accessing Gokal’s personal accounts and data.
“Raj’s accounts were likely compromised and used in an extortion attempt. Since he didn’t pay, the attackers trolled him by leaking the data through Migos’ Instagram,” said ZachXBT.

Interestingly, a week before the incident, Gokal had already warned his followers on X that someone was trying to access his email and social media accounts.

📈 Crypto Hacks in 2025: A Dangerous Spike
This attack is just one in a wave of escalating crypto hacks in 2025.
🔹 Q1 2025: According to security firm PeckShield, there were over 60 major hacking incidents, resulting in $1.63 billion in losses — a 131% increase from $706 million in Q1 2024.
🔹 The largest breach targeted Bybit, while Q2 saw the Cetus Protocol on the Sui network lose over $223 million.
🔹 Following the Coinbase data breach confirmed on May 15, reported compensation claims could exceed $400 million — further highlighting that DeFi and centralized platforms remain prime targets.

⚠️ A Call for Caution
With the rising number of cyberattacks, the need for increased vigilance is critical — especially when dealing with unknown links or individuals posing as support staff from crypto exchanges.

#solana , #CryptoHack , #HackerAlert , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
#HackedFunds #HackerAlert follow like share The AI agent protocol swarms community Discord account was hacked, the attacker deleted channels and kicked out over 300 members, the team is currently recovering and strengthening security. Hacker attacks are frequent, it's not just swarms; yesterday Consensys also confirmed a hard disk issue with MetaMask, there are indeed many security risks in the crypto ecosystem. Linking to stablecoin underlying asset management and the launch of Cyber AI tools, project teams need to quickly patch up vulnerabilities, otherwise user confidence will collapse. I believe this will increase the demand for security tools. Next, we will focus on the team's recovery progress. In the short term, similar incidents may drag down the AI sector, but in the long run, strengthening security can stabilize the market, so don't rush to sell
#HackedFunds #HackerAlert

follow like share

The AI agent protocol swarms community Discord account was hacked, the attacker deleted channels and kicked out over 300 members, the team is currently recovering and strengthening security.
Hacker attacks are frequent, it's not just swarms; yesterday Consensys also confirmed a hard disk issue with MetaMask, there are indeed many security risks in the crypto ecosystem.
Linking to stablecoin underlying asset management and the launch of Cyber AI tools, project teams need to quickly patch up vulnerabilities, otherwise user confidence will collapse. I believe this will increase the demand for security tools.
Next, we will focus on the team's recovery progress. In the short term, similar incidents may drag down the AI sector, but in the long run, strengthening security can stabilize the market, so don't rush to sell
B
1MBABYDOGE/USDT
Price
0.0011909
Warning About a Crypto Scam: Hacked @TrumpDaily Account Promotes Fake Meme CoinsHackers Exploited the Account to Promote Fraudulent Tokens The @TrumpDailyPosts account on the X platform (formerly Twitter) has been hacked and is being misused to spread fake meme coin addresses. The compromised account continues to actively promote several fraudulent tokens, including a fake token named $POWER. According to Scam Sniffer, a Web3 platform focused on combating scams, the hackers not only post but also quickly delete content related to these fraudulent schemes. Users are advised to verify the credibility of any investment promises, especially those originating from compromised accounts. Connection to Other Organized Scams Investigations revealed that the gas source used to create the fake $POWER token address was linked to the same platform involved in a recent hack of the Farcaster account, owned by a MetaMask co-founder. During that incident, hackers promoted fraudulent meme coins and were accused of generating over 1,000 SOL (Solana). These activities point to a well-organized cybercriminal gang targeting prominent crypto figures and organizations. Social Media as an Emerging Tool for Fraud A troubling trend in the crypto space is the increasing use of social media accounts to promote fraudulent tokens. Hackers exploit high-profile accounts to create an illusion of trustworthiness and maximize their financial gains. The hacking of @TrumpDailyPosts is yet another example of how cybercriminals are adapting their methods. By leveraging fraudulent meme coins and social media, they are creating new ways to deceive investors and extract illicit profits. How to Protect Yourself From These Scams Given these trends, it is crucial for both users and platforms to pay closer attention to identifying fraudulent activities. Users should exercise extreme caution when considering any investment opportunities, especially involving meme coins or less-known tokens. Safety should always take precedence over the promise of profit. Verify sources, thoroughly check addresses, and avoid suspicious projects promising unrealistic returns. The crypto space offers numerous opportunities but also comes with heightened risks that require vigilance and proactive measures. #CryptoNewss , #blockchain , #CryptoScamAlert , #cryptohacks , #HackerAlert Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Warning About a Crypto Scam: Hacked @TrumpDaily Account Promotes Fake Meme Coins

Hackers Exploited the Account to Promote Fraudulent Tokens
The @TrumpDailyPosts account on the X platform (formerly Twitter) has been hacked and is being misused to spread fake meme coin addresses. The compromised account continues to actively promote several fraudulent tokens, including a fake token named $POWER.
According to Scam Sniffer, a Web3 platform focused on combating scams, the hackers not only post but also quickly delete content related to these fraudulent schemes. Users are advised to verify the credibility of any investment promises, especially those originating from compromised accounts.

Connection to Other Organized Scams
Investigations revealed that the gas source used to create the fake $POWER token address was linked to the same platform involved in a recent hack of the Farcaster account, owned by a MetaMask co-founder.
During that incident, hackers promoted fraudulent meme coins and were accused of generating over 1,000 SOL (Solana). These activities point to a well-organized cybercriminal gang targeting prominent crypto figures and organizations.
Social Media as an Emerging Tool for Fraud
A troubling trend in the crypto space is the increasing use of social media accounts to promote fraudulent tokens. Hackers exploit high-profile accounts to create an illusion of trustworthiness and maximize their financial gains.
The hacking of @TrumpDailyPosts is yet another example of how cybercriminals are adapting their methods. By leveraging fraudulent meme coins and social media, they are creating new ways to deceive investors and extract illicit profits.
How to Protect Yourself From These Scams
Given these trends, it is crucial for both users and platforms to pay closer attention to identifying fraudulent activities. Users should exercise extreme caution when considering any investment opportunities, especially involving meme coins or less-known tokens.
Safety should always take precedence over the promise of profit. Verify sources, thoroughly check addresses, and avoid suspicious projects promising unrealistic returns. The crypto space offers numerous opportunities but also comes with heightened risks that require vigilance and proactive measures.

#CryptoNewss , #blockchain , #CryptoScamAlert , #cryptohacks , #HackerAlert

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins. It gives them full admin access, evades detection, and locks out real users. It looks like a legit plugin—and it auto-activates. CheckDot is SAFU #dyor on CheckDot 🤝 #HackerAlert
🚨 Hackers are hijacking WordPress sites with a backdoor hidden in plain sight—inside mu-plugins.

It gives them full admin access, evades detection, and locks out real users.

It looks like a legit plugin—and it auto-activates.

CheckDot is SAFU #dyor on CheckDot 🤝

#HackerAlert
--
Bearish
🚨 Why is SUI Dumping? Analyzing the Plunge Amid Cetus Protocol Exploit 🚨 The SUI token has seen a sharp decline recently, with growing concerns tied to an apparent $260M exploit targeting Cetus Protocol—Sui’s largest liquidity provider and decentralized exchange (DEX). Here’s a breakdown of the key factors behind the sell-off: ➡️ Cetus Protocol Exploit Spooks Investors - Reports confirm Cetus, a cornerstone of Sui’s DeFi ecosystem, was hacked, causing Sui-based tokens to plummet ~90%. - The breach has eroded confidence in Sui’s security infrastructure, especially since Cetus was a major hub for liquidity and trading activity. ➡️ Liquidity Crisis and TVL Impact - Prior to the exploit, Sui’s Total Value Locked (TVL) hit a record $1.835B, but the attack may trigger mass withdrawals. - Protocols like Suilend, which dominate Sui’s DeFi TVL, could face collateral damage if users flee to safer chains. #sui #SUI🔥 #HackerAlert $SUI {spot}(SUIUSDT)
🚨 Why is SUI Dumping? Analyzing the Plunge Amid Cetus Protocol Exploit 🚨

The SUI token has seen a sharp decline recently, with growing concerns tied to an apparent $260M exploit targeting Cetus Protocol—Sui’s largest liquidity provider and decentralized exchange (DEX). Here’s a breakdown of the key factors behind the sell-off:

➡️ Cetus Protocol Exploit Spooks Investors
- Reports confirm Cetus, a cornerstone of Sui’s DeFi ecosystem, was hacked, causing Sui-based tokens to plummet ~90%.
- The breach has eroded confidence in Sui’s security infrastructure, especially since Cetus was a major hub for liquidity and trading activity.

➡️ Liquidity Crisis and TVL Impact
- Prior to the exploit, Sui’s Total Value Locked (TVL) hit a record $1.835B, but the attack may trigger mass withdrawals.
- Protocols like Suilend, which dominate Sui’s DeFi TVL, could face collateral damage if users flee to safer chains.
#sui #SUI🔥 #HackerAlert $SUI
Coinbase Hacker Mocks Investigator While Laundering Millions via Decentralized PlatformsOn Wednesday night, a mysterious message appeared on the Ethereum blockchain — a direct mockery aimed at one of the most prominent crypto investigators. The sender? A hacker linked to the recent massive data breach at Coinbase, which compromised the accounts of over 69,000 users and may cost the exchange hundreds of millions of dollars. The taunt, simply reading "L bozo", was embedded in a transaction and meant to ridicule the investigator. The hacker even included a link to a viral meme video featuring NBA Hall of Famer James Worthy smoking a cigar, escalating the provocation. 💰 $44.9 Million Laundered Through THORChain But the trolling wasn’t all. On Tuesday, the attacker began liquidating stolen assets, converting 17,800 ETH into DAI stablecoins — worth roughly $44.9 million — using THORChain, a decentralized cross-chain trading protocol. 📉 The swaps occurred at an average ETH price of $2,528. 💼 One major swap involved 9,080 ETH for $22.8 million in DAI. Using THORChain allowed the hacker to bypass centralized exchanges, complicating tracking efforts and signaling a new level of sophistication in crypto laundering tactics. 🔓 What Happened at Coinbase? Coinbase confirmed that the breach took place in December 2024, but it wasn’t disclosed publicly until May 2025. The hackers gained access to sensitive personal data of around 69,000 users. Soon after, they allegedly demanded $20 million in Bitcoin as ransom, threatening to leak the stolen data on the dark web. Coinbase refused to pay and instead offered the same amount as a reward for information leading to the attackers. 📉 Financial Fallout: Coinbase in Crisis The breach has severely damaged Coinbase’s reputation. On Wednesday, its stock (COIN) closed down 0.92% at $258.97, continuing a 36% monthly decline. Security experts claim the exchange ignored prior warnings of suspicious activity as early as December, a failure that now haunts its image and user trust. 🛡️ Binance and Kraken Also Targeted Coinbase wasn’t the only target. Binance and Kraken also faced recent social engineering attempts, where attackers posed as users and tried to bribe support agents. Binance’s AI systems successfully flagged and blocked the suspicious messages. Kraken reported no customer data losses either, thanks to strong internal protocols. 🔚 A Glimpse Into the Future of Crypto Crime? This case is more than a breach — it's a bold show of power by a cybercriminal who’s fluent in DeFi and unafraid to mock those chasing him. With advanced laundering tactics and an open taunt of blockchain sleuths, we may be witnessing the next evolution in crypto-based crime. Coinbase may recover financially — but the reputational scars will be harder to erase. #HackerAlert , #CryptoSecurity , #CryptoCrime , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Coinbase Hacker Mocks Investigator While Laundering Millions via Decentralized Platforms

On Wednesday night, a mysterious message appeared on the Ethereum blockchain — a direct mockery aimed at one of the most prominent crypto investigators. The sender? A hacker linked to the recent massive data breach at Coinbase, which compromised the accounts of over 69,000 users and may cost the exchange hundreds of millions of dollars.
The taunt, simply reading "L bozo", was embedded in a transaction and meant to ridicule the investigator. The hacker even included a link to a viral meme video featuring NBA Hall of Famer James Worthy smoking a cigar, escalating the provocation.

💰 $44.9 Million Laundered Through THORChain
But the trolling wasn’t all. On Tuesday, the attacker began liquidating stolen assets, converting 17,800 ETH into DAI stablecoins — worth roughly $44.9 million — using THORChain, a decentralized cross-chain trading protocol.
📉 The swaps occurred at an average ETH price of $2,528.

💼 One major swap involved 9,080 ETH for $22.8 million in DAI.
Using THORChain allowed the hacker to bypass centralized exchanges, complicating tracking efforts and signaling a new level of sophistication in crypto laundering tactics.

🔓 What Happened at Coinbase?
Coinbase confirmed that the breach took place in December 2024, but it wasn’t disclosed publicly until May 2025. The hackers gained access to sensitive personal data of around 69,000 users.
Soon after, they allegedly demanded $20 million in Bitcoin as ransom, threatening to leak the stolen data on the dark web. Coinbase refused to pay and instead offered the same amount as a reward for information leading to the attackers.

📉 Financial Fallout: Coinbase in Crisis
The breach has severely damaged Coinbase’s reputation. On Wednesday, its stock (COIN) closed down 0.92% at $258.97, continuing a 36% monthly decline.
Security experts claim the exchange ignored prior warnings of suspicious activity as early as December, a failure that now haunts its image and user trust.

🛡️ Binance and Kraken Also Targeted
Coinbase wasn’t the only target. Binance and Kraken also faced recent social engineering attempts, where attackers posed as users and tried to bribe support agents.
Binance’s AI systems successfully flagged and blocked the suspicious messages. Kraken reported no customer data losses either, thanks to strong internal protocols.

🔚 A Glimpse Into the Future of Crypto Crime?
This case is more than a breach — it's a bold show of power by a cybercriminal who’s fluent in DeFi and unafraid to mock those chasing him. With advanced laundering tactics and an open taunt of blockchain sleuths, we may be witnessing the next evolution in crypto-based crime.
Coinbase may recover financially — but the reputational scars will be harder to erase.

#HackerAlert , #CryptoSecurity , #CryptoCrime , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number