Binance Square

Hacking

232,391 views
76 Discussing
Hot
Latest
Razan2s
--
See original
😱Bybit hackers managed to launder 499,000 ETH in 10 days ‼️The attackers who hacked Bybit successfully laundered all stolen funds through the THORChain protocol. A total of 499,000 ETH was transferred, and THORChain earned 5.5 million in fees #hacking
😱Bybit hackers managed to launder 499,000 ETH in 10 days

‼️The attackers who hacked Bybit successfully laundered all stolen funds through the THORChain protocol. A total of 499,000 ETH was transferred, and THORChain earned 5.5 million in fees
#hacking
Hackers Use Fake GitHub Code to Steal Bitcoin – Kaspersky WarnsNew Cyber Threat: GitVenom According to the latest report from Kaspersky, a dangerous attack known as GitVenom is spreading through GitHub. This campaign, active for at least two years, continues to grow and poses a serious threat to both developers and cryptocurrency investors. The attack starts with fake GitHub projects that appear to be legitimate tools – such as Telegram bots for managing Bitcoin wallets or utilities for PC gaming. However, these projects contain malicious code designed to steal cryptocurrencies. How Does GitVenom Work? Hackers use several techniques to disguise their malicious software: 🔹 Fake GitHub Projects – Fraudulent repositories present seemingly useful tools for managing crypto assets or gaming applications. 🔹 Manipulated README Files – Often generated by AI to appear trustworthy. 🔹 Trojan Horse in the Code – In Python-based scripts, attackers hide malicious code behind a string of 2,000 spaces, which decrypts and activates malware upon execution. 🔹 JavaScript-based Attacks – A rogue function is embedded in the main script, which, when executed, downloads additional malicious tools from repositories controlled by hackers. One of the victims was a developer whose Bitcoin wallet was drained of more than $400,000 in November. What Happens After Infection? Once the system is compromised, the malware executes various malicious activities: 🔺 Node.js Stealer – Collects passwords, cryptocurrency wallet details, and browsing history. 🔺 Remote Access Trojan (RAT) – Tools such as AsyncRAT and Quasar allow hackers to take control of the device, log keystrokes, and capture screenshots. 🔺 Clipper Malware – Automatically replaces copied wallet addresses with hacker-controlled addresses, redirecting funds. 📌 In one case, attackers successfully stole 5 BTC (worth $485,000) in just one month! Where Is the Threat Most Prevalent? GitVenom has been detected most frequently in Russia, Brazil, and Turkey, but Kaspersky warns that its spread is global. Hackers continuously update their code, imitate active development, and modify tactics to evade antivirus detection. How to Protect Yourself? 🛑 Thoroughly inspect any code before running it! 🛑 Verify the authenticity of a GitHub project and its update history. 🛑 Be cautious of "perfectly written" README files. 🛑 Use cybersecurity protection and monitor suspicious system activities. 📢 Kaspersky warns that attacks like GitVenom are unlikely to stop and will likely evolve further. Users should remain constantly vigilant. #HackerAlert , #CyberSecurity , #CryptoNewss , #HackerNews , #hacking Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hackers Use Fake GitHub Code to Steal Bitcoin – Kaspersky Warns

New Cyber Threat: GitVenom
According to the latest report from Kaspersky, a dangerous attack known as GitVenom is spreading through GitHub. This campaign, active for at least two years, continues to grow and poses a serious threat to both developers and cryptocurrency investors.
The attack starts with fake GitHub projects that appear to be legitimate tools – such as Telegram bots for managing Bitcoin wallets or utilities for PC gaming. However, these projects contain malicious code designed to steal cryptocurrencies.
How Does GitVenom Work?
Hackers use several techniques to disguise their malicious software:
🔹 Fake GitHub Projects – Fraudulent repositories present seemingly useful tools for managing crypto assets or gaming applications.
🔹 Manipulated README Files – Often generated by AI to appear trustworthy.
🔹 Trojan Horse in the Code – In Python-based scripts, attackers hide malicious code behind a string of 2,000 spaces, which decrypts and activates malware upon execution.
🔹 JavaScript-based Attacks – A rogue function is embedded in the main script, which, when executed, downloads additional malicious tools from repositories controlled by hackers.
One of the victims was a developer whose Bitcoin wallet was drained of more than $400,000 in November.
What Happens After Infection?
Once the system is compromised, the malware executes various malicious activities:
🔺 Node.js Stealer – Collects passwords, cryptocurrency wallet details, and browsing history.
🔺 Remote Access Trojan (RAT) – Tools such as AsyncRAT and Quasar allow hackers to take control of the device, log keystrokes, and capture screenshots.
🔺 Clipper Malware – Automatically replaces copied wallet addresses with hacker-controlled addresses, redirecting funds.
📌 In one case, attackers successfully stole 5 BTC (worth $485,000) in just one month!
Where Is the Threat Most Prevalent?
GitVenom has been detected most frequently in Russia, Brazil, and Turkey, but Kaspersky warns that its spread is global.
Hackers continuously update their code, imitate active development, and modify tactics to evade antivirus detection.
How to Protect Yourself?
🛑 Thoroughly inspect any code before running it!
🛑 Verify the authenticity of a GitHub project and its update history.
🛑 Be cautious of "perfectly written" README files.
🛑 Use cybersecurity protection and monitor suspicious system activities.
📢 Kaspersky warns that attacks like GitVenom are unlikely to stop and will likely evolve further. Users should remain constantly vigilant.

#HackerAlert , #CyberSecurity , #CryptoNewss , #HackerNews , #hacking

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
See original
🚨 𝐔.𝐒. 𝐒𝐞𝐢𝐳𝐞𝐬 $𝟑𝟏𝐌 𝐟𝐫𝐨𝐦 𝐔𝐫𝐚𝐧𝐢𝐮𝐦 𝐅𝐢𝐧𝐚𝐧𝐜𝐞 𝐇𝐚𝐜𝐤 🔹 Authorities recovered $31M from the $50M exploit that hit #Uranium Finance on BNB Chain in April 2021. 🔹 The hacker exploited a calculation flaw in smart contracts, draining liquidity pools. 🔹 Inside job? Red flags include: - A prior $1.3M exploit just weeks earlier. - The project shut down entirely after the hack. - Its contract repo was deleted, raising suspicions. 🔹 Laundering methods: Tornado Cash, cross-chain bridges, CEXs, and Magic: The Gathering trading cards. 🔹 Victims urged to contact U.S. authorities (SDNY & HSI San Diego). One of the largest DeFi recoveries yet—but the hacker remains unidentified. 🕵️‍♂️ #hacking
🚨 𝐔.𝐒. 𝐒𝐞𝐢𝐳𝐞𝐬 $𝟑𝟏𝐌 𝐟𝐫𝐨𝐦 𝐔𝐫𝐚𝐧𝐢𝐮𝐦 𝐅𝐢𝐧𝐚𝐧𝐜𝐞 𝐇𝐚𝐜𝐤
🔹 Authorities recovered $31M from the $50M exploit that hit #Uranium Finance on BNB Chain in April 2021.
🔹 The hacker exploited a calculation flaw in smart contracts, draining liquidity pools.
🔹 Inside job? Red flags include:
- A prior $1.3M exploit just weeks earlier.
- The project shut down entirely after the hack.
- Its contract repo was deleted, raising suspicions.
🔹 Laundering methods: Tornado Cash, cross-chain bridges, CEXs, and Magic: The Gathering trading cards.
🔹 Victims urged to contact U.S. authorities (SDNY & HSI San Diego).
One of the largest DeFi recoveries yet—but the hacker remains unidentified. 🕵️‍♂️ #hacking
reinforcing concerns over its ability to evade international sanctions.🚨 Breaking: North Korea Accused of $3 Billion Cyber Theft – Global Authorities on High Alert 📅 February 23, 2025 — A shocking new revelation has emerged, with reports suggesting that North Korea may be responsible for a massive $3 billion cyber heist. Allegations indicate that state-backed hackers orchestrated a sophisticated operation, targeting financial institutions, cryptocurrency exchanges, and multinational corporations. Speculation has intensified following the circulation of a viral image showing North Korean leader Kim Jong-un alongside top military officials, allegedly linked to a financial account labeled "Stolen Funds" displaying an astonishing balance. While the authenticity of the image remains unconfirmed, global cybersecurity experts are raising alarms over the country’s growing involvement in digital financial crimes. 🔎 The Alleged Cyber Heist Cybersecurity analysts and intelligence agencies suspect that the stolen funds—estimated at $3,000,070,991—were funneled through decentralized finance (DeFi) platforms, making them highly difficult to trace. This latest incident aligns with North Korea’s established track record of cyber-enabled financial crimes, 💻 North Korea’s Cybercrime History North Korea has frequently been accused of orchestrating major cyberattacks to fund its nuclear program and sustain its isolated economy. The infamous Lazarus Group, a state-sponsored hacking unit, has been implicated in several high-profile cyber heists, including:$BTC 2016 Bangladesh Bank Heist – $81 million stolen via SWIFT network breaches. 2017 WannaCry Ransomware Attack – A global-scale cyberattack crippling hospitals and businesses. Ongoing Crypto Exchange Hacks (2018-Present) – Over $2 billion allegedly siphoned from platforms such as Coincheck and Ronin Network.$ETH 🌍 Global Response & Ongoing Investigations As these allegations spread, governments and cybersecurity agencies worldwide are actively investigating the legitimacy of the claims. If verified, this could mark one of the largest cyber financial thefts in history, escalating diplomatic tensions and prompting discussions on tighter global cybersecurity measures. The international community is now closely monitoring developments, awaiting concrete evidence to confirm or refute these explosive allegations.$BNB {spot}(BNBUSDT) #LazarusGroup

reinforcing concerns over its ability to evade international sanctions.

🚨 Breaking: North Korea Accused of $3 Billion Cyber Theft – Global Authorities on High Alert

📅 February 23, 2025 — A shocking new revelation has emerged, with reports suggesting that North Korea may be responsible for a massive $3 billion cyber heist. Allegations indicate that state-backed hackers orchestrated a sophisticated operation, targeting financial institutions, cryptocurrency exchanges, and multinational corporations. Speculation has intensified following the circulation of a viral image showing North Korean leader Kim Jong-un alongside top military officials, allegedly linked to a financial account labeled "Stolen Funds" displaying an astonishing balance. While the authenticity of the image remains unconfirmed, global cybersecurity experts are raising alarms over the country’s growing involvement in digital financial crimes.

🔎 The Alleged Cyber Heist

Cybersecurity analysts and intelligence agencies suspect that the stolen funds—estimated at $3,000,070,991—were funneled through decentralized finance (DeFi) platforms, making them highly difficult to trace. This latest incident aligns with North Korea’s established track record of cyber-enabled financial crimes,
💻 North Korea’s Cybercrime History

North Korea has frequently been accused of orchestrating major cyberattacks to fund its nuclear program and sustain its isolated economy. The infamous Lazarus Group, a state-sponsored hacking unit, has been implicated in several high-profile cyber heists, including:$BTC

2016 Bangladesh Bank Heist – $81 million stolen via SWIFT network breaches.

2017 WannaCry Ransomware Attack – A global-scale cyberattack crippling hospitals and businesses.

Ongoing Crypto Exchange Hacks (2018-Present) – Over $2 billion allegedly siphoned from platforms such as Coincheck and Ronin Network.$ETH

🌍 Global Response & Ongoing Investigations

As these allegations spread, governments and cybersecurity agencies worldwide are actively investigating the legitimacy of the claims. If verified, this could mark one of the largest cyber financial thefts in history, escalating diplomatic tensions and prompting discussions on tighter global cybersecurity measures. The international community is now closely monitoring developments, awaiting concrete evidence to confirm or refute these explosive allegations.$BNB

#LazarusGroup
See original
The Hunt Begins: A $140 Million Reward for the Capture of the Hackers Who Robbed BybitThe cryptocurrency exchange Bybit announced a reward of $140 million for assistance in capturing the organizers of the largest cryptocurrency heist in history. It should be noted that unknown hackers managed to steal assets worth about $1.4 billion. This unprecedented event shook the crypto industry and prompted the exchange to take decisive steps to find the perpetrators.

The Hunt Begins: A $140 Million Reward for the Capture of the Hackers Who Robbed Bybit

The cryptocurrency exchange Bybit announced a reward of $140 million for assistance in capturing the organizers of the largest cryptocurrency heist in history. It should be noted that unknown hackers managed to steal assets worth about $1.4 billion. This unprecedented event shook the crypto industry and prompted the exchange to take decisive steps to find the perpetrators.
Square-Creator-Ameli:
мне вот звонили,говорили,что кто то взломал аккаунт на бинансе,зашла все ок,никуда не стала нажимать да и нечего особо что воровать,мошенники не дремлют..
#hacking ❌ Hackers hacked the Infini cryptobank at $ 49,500,000+
#hacking ❌ Hackers hacked the Infini cryptobank at $ 49,500,000+
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement. According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts. Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities. “This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.” Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations. Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
#brekingnews #hacking #cryptouniverseofficial Breaking News: Notorious North Korean Hacker Park Jin Hyok Arrested in International Cybercrime Crackdown
In a dramatic turn of events, authorities have arrested Park Jin Hyok, the infamous North Korean hacker wanted by the FBI for some of the most devastating cyberattacks in history. Park, allegedly a key member of the state-sponsored Lazarus Group, was captured in a top-secret international sting operation conducted by U.S. intelligence agencies in collaboration with South Korean and European law enforcement.
According to official sources, Park was apprehended in an undisclosed Southeast Asian country, where he had been hiding under a false identity. Reports indicate that investigators had been tracking his digital footprint for years, tracing illicit financial transactions linked to cyber fraud, ransomware attacks, and cryptocurrency thefts.
Park is accused of orchestrating the 2014 Sony Pictures hack, which exposed internal company data, and the 2017 WannaCry ransomware attack, which crippled computer systems worldwide, including hospitals, banks, and major corporations. U.S. authorities believe he played a significant role in laundering millions of dollars through cyber heists, funding North Korea’s illicit activities.
“This arrest marks a major milestone in the global fight against cybercrime,” said a spokesperson for the FBI’s Cyber Division. “We have dismantled a critical link in North Korea’s hacking infrastructure.”
Park is currently being extradited to the United States, where he faces multiple charges, including conspiracy to commit wire fraud and computer-related fraud. Experts say this could lead to further revelations about North Korea’s cyber warfare operations.
Authorities are now intensifying efforts to locate other members of the Lazarus Group, with cybersecurity agencies warning of potential retaliatory attacks. More updates will follow as investigations continue.
🚨 Bybit Hacker Moves Funds to Thorchain Router! 🚨 🔎 Breaking Update: According to PANews, blockchain security firm BeosinTrace has detected movement from the Bybit hacker's address (0xfc92...6465). 📅 Date & Time: February 23, 2025, at 21:37:23 UTC+8 💰 Funds Flow: Moved to a dormant address and then directed to Thorchain: Router 🔍 What This Means: 🔸 The hacker is attempting to obscure the stolen assets by leveraging decentralized routing protocols. 🔸 Potential liquidation or further transfers could follow soon! ⚠️ Stay Alert! 🚀 Follow @Alchemy_Of_Crypto for real-time updates on crypto security & market insights! 🔥 🤣 Fun Fact: If hackers put their skills to good use, they might be running Fortune 500 companies instead of dodging law enforcement! 😆 📢 Like, Share & Support so more people stay informed! ✅ #CryptoNews #Hacking #BybitSecurityBreach #Blockchain [official post Link](https://app.binance.com/uni-qr/cart/20701092258545?r=527648310&l=en&uco=V2x7s24NDu24JT1cEPp1Tw&uc=app_square_share_link&us=copylink)
🚨 Bybit Hacker Moves Funds to Thorchain Router! 🚨

🔎 Breaking Update: According to PANews, blockchain security firm BeosinTrace has detected movement from the Bybit hacker's address (0xfc92...6465).

📅 Date & Time: February 23, 2025, at 21:37:23 UTC+8
💰 Funds Flow: Moved to a dormant address and then directed to Thorchain: Router

🔍 What This Means:
🔸 The hacker is attempting to obscure the stolen assets by leveraging decentralized routing protocols.
🔸 Potential liquidation or further transfers could follow soon!

⚠️ Stay Alert! 🚀
Follow @Alchemy_Of_Crypto for real-time updates on crypto security & market insights! 🔥

🤣 Fun Fact: If hackers put their skills to good use, they might be running Fortune 500 companies instead of dodging law enforcement! 😆

📢 Like, Share & Support so more people stay informed! ✅ #CryptoNews #Hacking #BybitSecurityBreach #Blockchain

official post Link
--
Bearish
The Cyber Criminal You’ve Probably Never Heard Of: Park Jin Hyok 🚨 $BNB $BTC $ETH {future}(ETHUSDT) Park Jin Hyok, a key member of North Korea’s infamous Lazarus Group, has been linked to some of the most destructive cyberattacks in modern history. While his name may not be as widely known as other hackers, his actions have left a lasting impact on global cybersecurity and financial systems. His group’s operations have targeted major institutions, stealing millions and compromising security on an unprecedented scale. Notorious Cyber Attacks Linked to Park Jin Hyok 🔹 Sony Pictures Breach (2014): Although no money was stolen, the attack exposed sensitive data and crippled Sony’s internal systems. 🔹 Bangladesh Bank Heist (2016): A sophisticated cyberattack that siphoned off $81 million using fraudulent SWIFT transactions. 🔹 WannaCry Ransomware (2017): A global ransomware outbreak that encrypted data and demanded payments, amassing over $140,000 in Bitcoin from victims. 🔹 Bybit Exchange Hack (2025): One of the largest crypto heists ever, resulting in a staggering $1.46 billion loss from the exchange. Park Jin Hyok’s name is synonymous with large-scale cybercrime, and his role in the Lazarus Group continues to raise alarms in financial and digital security sectors. As cyber threats evolve, traders and investors must stay vigilant against potential security breaches and scams. 📢 Stay alert, protect your assets, and be aware of emerging cyber threats! #CyberSecurity #Hacking #CryptoScams #StaySafe #Binance
The Cyber Criminal You’ve Probably Never Heard Of: Park Jin Hyok 🚨
$BNB $BTC $ETH

Park Jin Hyok, a key member of North Korea’s infamous Lazarus Group, has been linked to some of the most destructive cyberattacks in modern history. While his name may not be as widely known as other hackers, his actions have left a lasting impact on global cybersecurity and financial systems. His group’s operations have targeted major institutions, stealing millions and compromising security on an unprecedented scale.

Notorious Cyber Attacks Linked to Park Jin Hyok

🔹 Sony Pictures Breach (2014): Although no money was stolen, the attack exposed sensitive data and crippled Sony’s internal systems.
🔹 Bangladesh Bank Heist (2016): A sophisticated cyberattack that siphoned off $81 million using fraudulent SWIFT transactions.
🔹 WannaCry Ransomware (2017): A global ransomware outbreak that encrypted data and demanded payments, amassing over $140,000 in Bitcoin from victims.
🔹 Bybit Exchange Hack (2025): One of the largest crypto heists ever, resulting in a staggering $1.46 billion loss from the exchange.

Park Jin Hyok’s name is synonymous with large-scale cybercrime, and his role in the Lazarus Group continues to raise alarms in financial and digital security sectors. As cyber threats evolve, traders and investors must stay vigilant against potential security breaches and scams.

📢 Stay alert, protect your assets, and be aware of emerging cyber threats!
#CyberSecurity #Hacking #CryptoScams #StaySafe #Binance
Lazarus Hacking Group is the 14th largest ETH holder in the world, beating Vitalik and the Ethereum Foundation. #hacking #ETH #Etherum
Lazarus Hacking Group is the 14th largest ETH holder in the world, beating Vitalik and the Ethereum Foundation.
#hacking #ETH #Etherum
$1.5B isn’t walking away—this isn’t 2010. Stop the FUD. 🚀 🚨 $1.5B Hack? Not Happening! 🚨 If you think a hacker can just disappear with $1.5 billion, think again. Here’s why: 1️⃣ Stablecoins? Frozen instantly. Tether & Circle won’t let it slide. ❄️ 2️⃣ Exchanges? No way. KYC means his account gets locked. 🚫 3️⃣ Bridges? Not big enough. No platform can move that kind of money. ⛔ 4️⃣ P2P? Impossible. Nobody is casually trading $1.5B over-the-counter. 🤡 The Reality: Bybit, Binance, ZachXBT, the FBI, the SEC, and every top security expert are tracking this. 🔄 Most likely outcome? The funds are recovered. 🎯 Worst case? The hacker gets a 10% bounty for returning it. This isn’t 2010—stop the unnecessary FUD. 🚀 #CryptoSecurity #Blockchain #hacking #cyberToken #Bybit #Binance #FUD
$1.5B isn’t walking away—this isn’t 2010. Stop the FUD. 🚀

🚨 $1.5B Hack? Not Happening! 🚨

If you think a hacker can just disappear with $1.5 billion, think again. Here’s why:

1️⃣ Stablecoins? Frozen instantly. Tether & Circle won’t let it slide. ❄️
2️⃣ Exchanges? No way. KYC means his account gets locked. 🚫
3️⃣ Bridges? Not big enough. No platform can move that kind of money. ⛔
4️⃣ P2P? Impossible. Nobody is casually trading $1.5B over-the-counter. 🤡

The Reality: Bybit, Binance, ZachXBT, the FBI, the SEC, and every top security expert are tracking this.

🔄 Most likely outcome? The funds are recovered.
🎯 Worst case? The hacker gets a 10% bounty for returning it.

This isn’t 2010—stop the unnecessary FUD. 🚀
#CryptoSecurity #Blockchain #hacking #cyberToken #Bybit #Binance #FUD
See original
On February 21, 2025, the cryptocurrency exchange Bybit suffered a hack, resulting in the theft of $1.5 billion in tokens. Hackers stole 400,000 Ethereum from a cold wallet, exploiting a vulnerability in smart contracts. Bybit assures that users' worlds are safe and is working with blockchain experts to intervene and investigate. This is one of the largest thefts in the history of cryptocurrencies.#whatdo you think? Could Bybit handle this? #Bybit#SicurezzaCrypto #Hacking #Ethereum#
On February 21, 2025, the cryptocurrency exchange Bybit suffered a hack, resulting in the theft of $1.5 billion in tokens. Hackers stole 400,000 Ethereum from a cold wallet, exploiting a vulnerability in smart contracts.
Bybit assures that users' worlds are safe and is working with blockchain experts to intervene and investigate. This is one of the largest thefts in the history of cryptocurrencies.#whatdo you think? Could Bybit handle this?
#Bybit#SicurezzaCrypto #Hacking #Ethereum#
🚨 Important News: Bybit Hacked! 🚨 Yesterday, the crypto exchange Bybit fell victim to a severe cyber attack. Hackers managed to steal approximately 400,000 Ethereum ($ETH ) from their cold wallet, equivalent to around $1.5 billion at current market rates. 😱 🔍 Details of the Incident: Type of Hack: Hackers breached Bybit’s security systems and extracted a large amount of Ethereum from the cold wallet. Account Security: This incident raises concerns about the security of users’ accounts and data. ⚠️ User Precautions: 1. Change Your Password: Change your Bybit account password as soon as possible and use a strong password. 2. Enable Two-Factor Authentication (2FA): Activate 2FA if available on your account. 3. Monitor for Suspicious Activity: If you notice any unusual activity on your account, contact Bybit immediately. 💔 Bybit’s Response: Bybit CEO Ben Zhou stated that they are working to secure users' assets and are taking necessary measures. Security in the crypto market should always be a priority. Events like this remind us to stay vigilant and ensure the safety of our assets. #CryptoNews #Bybit #Hacking #BybitSecurityBreach #Write2Earn $BTC {future}(BTCUSDT) $ETH {future}(ETHUSDT)
🚨 Important News: Bybit Hacked! 🚨

Yesterday, the crypto exchange Bybit fell victim to a severe cyber attack. Hackers managed to steal approximately 400,000 Ethereum ($ETH ) from their cold wallet, equivalent to around $1.5 billion at current market rates. 😱

🔍 Details of the Incident:

Type of Hack: Hackers breached Bybit’s security systems and extracted a large amount of Ethereum from the cold wallet.

Account Security: This incident raises concerns about the security of users’ accounts and data.

⚠️ User Precautions:

1. Change Your Password: Change your Bybit account password as soon as possible and use a strong password.

2. Enable Two-Factor Authentication (2FA): Activate 2FA if available on your account.

3. Monitor for Suspicious Activity: If you notice any unusual activity on your account, contact Bybit immediately.

💔 Bybit’s Response: Bybit CEO Ben Zhou stated that they are working to secure users' assets and are taking necessary measures.

Security in the crypto market should always be a priority. Events like this remind us to stay vigilant and ensure the safety of our assets.

#CryptoNews #Bybit #Hacking #BybitSecurityBreach #Write2Earn

$BTC
$ETH
💥 *Crypto Industry's Incredible Response to the 1.4B Hack* 💥 Did you hear about the *1.4B hack* that rocked B..... recently? 😱 Well, here’s the twist that’s showing how *supportive* the crypto industry can be in times of crisis! 💪 When B..... was hit with a massive *hack*, industry leaders didn’t just sit back and watch. Even though they are *competitors*, *Binance* stepped up and sent *liquidity* to *B......* to help *stabilize* the exchange. 🙌 *Why This Matters?* This is *huge*, and here’s why: In traditional industries, competitors often celebrate the downfall of others. But in the *crypto world*, it’s *different*. Instead of watching B..... struggle, Binance took immediate action, showing the true spirit of collaboration. 🤝 *The Power of Collaboration in Crypto* 🔗 - *Crypto is different* – While hacks are devastating, the response from the industry to *protect the market* and *users* has been *incredible*. Leaders aren’t just looking out for their own bottom lines, but for the *safety of the entire ecosystem*. 🚀 - B..... received *liquidity injections* to help keep its exchange stable, so users could continue trading without panic. 💵 Binance’s action was crucial to help calm the market and ensure *confidence in the system*. 💥 *What This Means for You as a Trader* 💡 This situation proves that, in crypto, *community matters* more than competition. It’s not just about the big exchanges, it’s about *protecting the entire space* and *making sure users are safe*. 🚀 So, if you’re ever in doubt about the *strength* of the crypto market, remember that competitors are willing to help each other out during tough times! 😎 $ETH {spot}(ETHUSDT) $BNB {spot}(BNBUSDT) #CryptoCommunity #Binance #CryptoSupport #hacking #CryptoSecurity
💥 *Crypto Industry's Incredible Response to the 1.4B Hack* 💥

Did you hear about the *1.4B hack* that rocked B..... recently? 😱 Well, here’s the twist that’s showing how *supportive* the crypto industry can be in times of crisis! 💪

When B..... was hit with a massive *hack*, industry leaders didn’t just sit back and watch. Even though they are *competitors*, *Binance* stepped up and sent *liquidity* to *B......* to help *stabilize* the exchange. 🙌

*Why This Matters?*

This is *huge*, and here’s why: In traditional industries, competitors often celebrate the downfall of others. But in the *crypto world*, it’s *different*. Instead of watching B..... struggle, Binance took immediate action, showing the true spirit of collaboration. 🤝

*The Power of Collaboration in Crypto* 🔗

- *Crypto is different* – While hacks are devastating, the response from the industry to *protect the market* and *users* has been *incredible*. Leaders aren’t just looking out for their own bottom lines, but for the *safety of the entire ecosystem*. 🚀

- B..... received *liquidity injections* to help keep its exchange stable, so users could continue trading without panic. 💵 Binance’s action was crucial to help calm the market and ensure *confidence in the system*. 💥

*What This Means for You as a Trader* 💡
This situation proves that, in crypto, *community matters* more than competition. It’s not just about the big exchanges, it’s about *protecting the entire space* and *making sure users are safe*. 🚀

So, if you’re ever in doubt about the *strength* of the crypto market, remember that competitors are willing to help each other out during tough times! 😎

$ETH
$BNB

#CryptoCommunity #Binance #CryptoSupport #hacking #CryptoSecurity
See original
How was Bybit's cold wallet hacked?Bybit’s cold wallet for ETH relies on a multisig system, where more than one person must approve a transaction before it can be executed, making it typically very secure. However, hackers have been able to trick signers into approving a malicious modification to the wallet’s smart contract, using techniques such as UI spoofing or transaction masking.

How was Bybit's cold wallet hacked?

Bybit’s cold wallet for ETH relies on a multisig system, where more than one person must approve a transaction before it can be executed, making it typically very secure. However, hackers have been able to trick signers into approving a malicious modification to the wallet’s smart contract, using techniques such as UI spoofing or transaction masking.
EmoOn:
اما غباء من شركة كبيرة. او خدعه لاقناع الناس والمسؤولين ان العملات المشفرة ليس لها امان. لكنه اثبت العكس بسبب التعافي السريع من نظري يجب التحقيق في هذا الموضوع بدقه.
🚨JUST BREAKING NEWS 🚨 💥 Bybit Founder Confirms Massive Hack! 💥 💸 $1.4 BILLION in ETH stolen! 🚨 ⚠️ One of the biggest crypto breaches ever! ⚠️ 🔍 Investigations are ongoing—stay tuned for updates! #BreakingCryptoNews #bybithack #ETH #hacking
🚨JUST BREAKING NEWS 🚨
💥 Bybit Founder Confirms Massive Hack! 💥
💸 $1.4 BILLION in ETH stolen! 🚨
⚠️ One of the biggest crypto breaches ever! ⚠️
🔍 Investigations are ongoing—stay tuned for updates!

#BreakingCryptoNews #bybithack #ETH #hacking
JUST IN: Bybit CEO says the exchange is solvent and all clients assets are still 1:1 backed, following $1.4 billion hack. #Hacking #dyor #eth
JUST IN: Bybit CEO says the exchange is solvent and all clients assets are still 1:1 backed, following $1.4 billion hack.

#Hacking #dyor #eth
See original
Bybit Hacked: Over $1.46 Billion in Ethereum Stolen Cryptocurrency exchange Bybit has suffered what could be the largest hack in digital currency history, with $1.46 billion in Ethereum (ETH) being withdrawn from hot wallets. Bybit CEO Ben Zhou confirmed the hack via social media, saying that the hacker had taken control of a specific ETH cold wallet and transferred its entire contents to an unknown address. Suspicions of a hack were raised when blockchain data showed a massive transfer of 401,346 ETH, worth approximately $1.13 billion, from a Bybit hot wallet to an unknown wallet. Not only did this transfer raise alarms about a possible hack, it also impacted the market price of Ethereum, which fell more than 4% after the stolen funds began to be liquidated. Zhou assured users that despite the hack, all other cold wallets remain safe and withdrawals are working normally. The method used in the Bybit hack is very similar to techniques used in previous major hacks, such as the WazirX and Radiant Capital hacks in 2024. $ETH {spot}(ETHUSDT) #взлом #bybit #hacking
Bybit Hacked: Over $1.46 Billion in Ethereum Stolen

Cryptocurrency exchange Bybit has suffered what could be the largest hack in digital currency history, with $1.46 billion in Ethereum (ETH) being withdrawn from hot wallets. Bybit CEO Ben Zhou confirmed the hack via social media, saying that the hacker had taken control of a specific ETH cold wallet and transferred its entire contents to an unknown address.

Suspicions of a hack were raised when blockchain data showed a massive transfer of 401,346 ETH, worth approximately $1.13 billion, from a Bybit hot wallet to an unknown wallet. Not only did this transfer raise alarms about a possible hack, it also impacted the market price of Ethereum, which fell more than 4% after the stolen funds began to be liquidated.

Zhou assured users that despite the hack, all other cold wallets remain safe and withdrawals are working normally.

The method used in the Bybit hack is very similar to techniques used in previous major hacks, such as the WazirX and Radiant Capital hacks in 2024.

$ETH
#взлом #bybit #hacking
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️* $BTC $NOT $BNB 🌏⤴️🪙 {spot}(BNBUSDT) {spot}(NOTUSDT) {spot}(BTCUSDT) *Key Developments 📊* 1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖. 2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸. 3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈. *Laundering Efforts 🚮* 1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊. 2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰. *Timeline 📆* 1. November 23, 2023: Kyber network exploited 🔥. 2. Today: Hacker resurfaced, transferring $5.83M 📈. *Implications 🤔* 1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒. 2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨. *Expert Insights 💡* "DeFi security requires constant vigilance." "Money laundering prevention is crucial." *Conclusion 🤝* The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes. #CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
*🚨⚠️🚨KyberSwap Hacker Resurfaces: $5.83M Transferred ⚡️*
$BTC $NOT $BNB 🌏⤴️🪙



*Key Developments 📊*

1. Hacker's Return: After 7 months of inactivity, the KyberSwap hacker resurfaced 🤖.
2. Recent Transfer: 2200 ETH ($5.83M) transferred to Tornado Cash 💸.
3. Previous Heist: $48.3M stolen across multiple networks (Arbitrum, Optimism, Ethereum, Polygon, Base) 📈.

*Laundering Efforts 🚮*

1. Total Laundered: 7200 ETH ($17.23M) through a mixer 📊.
2. Remaining Balance: 12,306 ETH ($32.2M) across 16 addresses 💰.

*Timeline 📆*

1. November 23, 2023: Kyber network exploited 🔥.
2. Today: Hacker resurfaced, transferring $5.83M 📈.

*Implications 🤔*

1. Security Concerns: Renewed focus on decentralized finance (DeFi) security 🔒.
2. Money Laundering: Increased scrutiny on cryptocurrency mixers 🚨.

*Expert Insights 💡*

"DeFi security requires constant vigilance."
"Money laundering prevention is crucial."

*Conclusion 🤝*

The KyberSwap hacker's return highlights ongoing DeFi security risks. Platforms and authorities must intensify efforts to prevent cryptocurrency crimes.

#CryptocurrencySecurity #DefiMonеy #hacking #CPI_BTC_Watch
Login to explore more contents
Explore the latest crypto news
⚡️ Be a part of the latests discussions in crypto
💬 Interact with your favorite creators
👍 Enjoy content that interests you
Email / Phone number