Binance Square
#hacker

hacker

628,489 views
308 Discussing
prosperidade8
·
--
🚨Hacker or Insider? The mystery of the $285 million attack on Solana 🧐 While Elliptic points to groups from North Korea, security experts believe it was someone with intimate knowledge of the Drift Protocol. 🕵️‍♂️ The fact is: human and process-based security failed where code should have been sovereign. ❌ No time lock. ❌ No emergency shutoffs. ✅ Result: One of the largest losses in recent DeFi history. What's your opinion: are DeFi networks ready for mass adoption or are we still "luxury testers"? 👇 #DeFi #Hacker #Solana #Web3 #CryptoBrasil $SOL {spot}(SOLUSDT)
🚨Hacker or Insider? The mystery of the $285 million attack on Solana 🧐
While Elliptic points to groups from North Korea, security experts believe it was someone with intimate knowledge of the Drift Protocol. 🕵️‍♂️
The fact is: human and process-based security failed where code should have been sovereign.
❌ No time lock.
❌ No emergency shutoffs.
✅ Result: One of the largest losses in recent DeFi history.
What's your opinion: are DeFi networks ready for mass adoption or are we still "luxury testers"? 👇
#DeFi #Hacker #Solana #Web3 #CryptoBrasil
$SOL
Drift officially announced that 280 million dollars were precisely detonated by "social engineering + pre-signed transactions", and now all site functions have directly come to a physical standstill. They are currently cooperating with the police and security agencies to pursue and block on-chain at full speed. This wave is again a typical case of "human disaster" being greater than "natural disaster". Hackers targeted internal permissions along with durable random numbers to bypass security checks, using methods that are steady, precise, and ruthless, clearly having been plotting against core members for a long time. Now the protocol has entered the emergency room, and the most painful part is the liquidity that has not yet been withdrawn; once the functions are locked, retail investors can only watch their funds turn into "stagnant water" helplessly. From the on-chain intentions, this huge amount of money has not yet started to enter the mixer on a large scale, indicating that the hackers are still testing the waters. But this amount is too outrageous; if it cannot be recovered, the fundamentals of the protocol are likely to need to be reshaped. Do people think the officials can afford to compensate for the money lost due to human negligence in the end? #SOL #DeFi #Hacker $DRIFT {future}(DRIFTUSDT)
Drift officially announced that 280 million dollars were precisely detonated by "social engineering + pre-signed transactions", and now all site functions have directly come to a physical standstill. They are currently cooperating with the police and security agencies to pursue and block on-chain at full speed.
This wave is again a typical case of "human disaster" being greater than "natural disaster". Hackers targeted internal permissions along with durable random numbers to bypass security checks, using methods that are steady, precise, and ruthless, clearly having been plotting against core members for a long time. Now the protocol has entered the emergency room, and the most painful part is the liquidity that has not yet been withdrawn; once the functions are locked, retail investors can only watch their funds turn into "stagnant water" helplessly.
From the on-chain intentions, this huge amount of money has not yet started to enter the mixer on a large scale, indicating that the hackers are still testing the waters. But this amount is too outrageous; if it cannot be recovered, the fundamentals of the protocol are likely to need to be reshaped. Do people think the officials can afford to compensate for the money lost due to human negligence in the end? #SOL #DeFi #Hacker $DRIFT
Article
Saw some people panicking or asking about quantum computing's impact on crypto. At a high level, allRecently, discussions around quantum computing and its potential impact on cryptocurrencies like Bitcoin have started to gain attention. Many people are concerned that future quantum machines could break current cryptographic systems and compromise blockchain security. However, according to Changpeng Zhao (CZ), there is no need to panic—at least not right now. The Core Idea: Crypto Can Adapt At a fundamental level, the solution is straightforward. Cryptocurrencies can upgrade their security systems to quantum-resistant (post-quantum) algorithms. These newer cryptographic methods are specifically designed to withstand the computational power of quantum machines. While today’s encryption may eventually become vulnerable, the industry is already working on stronger alternatives. The key takeaway: Crypto is not static—it evolves with technology. The Real Challenge: Execution While the solution exists in theory, implementing it across decentralized networks is far from simple. 1. Decentralization Makes Coordination Difficult Unlike traditional systems, blockchains are not controlled by a single authority. Upgrading them requires consensus among developers, miners/validators, and users. This often leads to disagreements about: Which algorithms to adopt When to implement changes As a result, the ecosystem may experience forks, where a blockchain splits into multiple versions. 2. New Code Brings New Risks Introducing new cryptographic algorithms is not risk-free: Bugs may be introduced Security vulnerabilities could appear Systems may be unstable in early stages Short-term uncertainty is almost inevitable during such transitions. 3. Outdated Projects May Disappear Not all crypto projects will successfully upgrade. Some inactive or poorly maintained projects may fail to adapt and eventually become obsolete. In a way, this acts as a natural cleanup of the ecosystem, removing weaker or abandoned projects. 4. Users Must Take Responsibility For individuals who use self-custody wallets: Funds may need to be migrated to quantum-safe wallets Users will have to stay informed and take action This adds a layer of responsibility for maintaining security. The Satoshi Nakamoto Question An interesting point raised by CZ involves Satoshi Nakamoto, the anonymous creator of Bitcoin. Satoshi is believed to hold a large amount of Bitcoin that has never been moved. If those coins are moved in the future, it could suggest that Satoshi is still active. If they remain untouched, there may be discussions about locking or “burning” those addresses to prevent them from being stolen by future quantum attackers. However, this idea faces challenges: Identifying all of Satoshi’s wallets is difficult There is a risk of mistakenly targeting legitimate early adopters Fundamental Principles CZ highlights a few important long-term principles: Encryption is generally easier to create than to break Advancements in computing power benefit technological progress overall Crypto will continue to exist, even in a post-quantum world Conclusion Quantum computing does present a potential future threat to current cryptographic systems. However, it is not an immediate danger, and solutions are already being developed. The real challenge lies in coordination, implementation, and ensuring a smooth transition across decentralized ecosystems. In the long run, cryptocurrencies are likely to adapt—just as they always have. Rather than a threat, quantum computing may simply be the next stage in crypto’s evolution.#quantumcomputers #hacker #BitmineIncreasesETHStake $BTC $ETH $XRP

Saw some people panicking or asking about quantum computing's impact on crypto. At a high level, all

Recently, discussions around quantum computing and its potential impact on cryptocurrencies like Bitcoin have started to gain attention. Many people are concerned that future quantum machines could break current cryptographic systems and compromise blockchain security.
However, according to Changpeng Zhao (CZ), there is no need to panic—at least not right now.
The Core Idea: Crypto Can Adapt
At a fundamental level, the solution is straightforward. Cryptocurrencies can upgrade their security systems to quantum-resistant (post-quantum) algorithms.
These newer cryptographic methods are specifically designed to withstand the computational power of quantum machines. While today’s encryption may eventually become vulnerable, the industry is already working on stronger alternatives.
The key takeaway:
Crypto is not static—it evolves with technology.
The Real Challenge: Execution
While the solution exists in theory, implementing it across decentralized networks is far from simple.

1. Decentralization Makes Coordination Difficult
Unlike traditional systems, blockchains are not controlled by a single authority. Upgrading them requires consensus among developers, miners/validators, and users.
This often leads to disagreements about:
Which algorithms to adopt
When to implement changes
As a result, the ecosystem may experience forks, where a blockchain splits into multiple versions.
2. New Code Brings New Risks
Introducing new cryptographic algorithms is not risk-free:
Bugs may be introduced
Security vulnerabilities could appear
Systems may be unstable in early stages
Short-term uncertainty is almost inevitable during such transitions.
3. Outdated Projects May Disappear
Not all crypto projects will successfully upgrade. Some inactive or poorly maintained projects may fail to adapt and eventually become obsolete.
In a way, this acts as a natural cleanup of the ecosystem, removing weaker or abandoned projects.
4. Users Must Take Responsibility
For individuals who use self-custody wallets:
Funds may need to be migrated to quantum-safe wallets
Users will have to stay informed and take action
This adds a layer of responsibility for maintaining security.
The Satoshi Nakamoto Question
An interesting point raised by CZ involves Satoshi Nakamoto, the anonymous creator of Bitcoin.
Satoshi is believed to hold a large amount of Bitcoin that has never been moved.
If those coins are moved in the future, it could suggest that Satoshi is still active.
If they remain untouched, there may be discussions about locking or “burning” those addresses to prevent them from being stolen by future quantum attackers.
However, this idea faces challenges:
Identifying all of Satoshi’s wallets is difficult
There is a risk of mistakenly targeting legitimate early adopters
Fundamental Principles
CZ highlights a few important long-term principles:
Encryption is generally easier to create than to break
Advancements in computing power benefit technological progress overall
Crypto will continue to exist, even in a post-quantum world
Conclusion
Quantum computing does present a potential future threat to current cryptographic systems. However, it is not an immediate danger, and solutions are already being developed.
The real challenge lies in coordination, implementation, and ensuring a smooth transition across decentralized ecosystems.
In the long run, cryptocurrencies are likely to adapt—just as they always have.
Rather than a threat, quantum computing may simply be the next stage in crypto’s evolution.#quantumcomputers #hacker #BitmineIncreasesETHStake $BTC $ETH $XRP
🔐 Cyber News (Aug 3, 2024): 1️⃣ Cointelegraph: Over 70% of funds lost to hacks in the cryptocurrency sector are from centralized financial platforms (CeFi). 📉 2️⃣ PeckShield: In July, $266 million was stolen, with experts noting a total of 16 incidents. The majority of the losses were due to the hack of the Indian cryptocurrency exchange WazirX, which amounted to $230 million. 🏴‍☠️ 3️⃣ CertiK: In July, cryptocurrency projects lost $278.8 million due to malicious activities, making it the second-largest loss in 2024. 💸 4️⃣ PeckShield: On the morning of August 1, 2024, an unknown #hacker attacked the decentralized protocol Convergence. They gained access to the project's smart contract, minted approximately 58 million CVG tokens, and sold them. 🔓 5️⃣ AFM: Employees of the Kazakhstan Agency for Financial Monitoring (AFM) tracked assets of the cryptocurrency pyramid scheme Eolus amounting to 250 million tenge (over $520,000), stolen from nearly 2,500 citizens across the country. The agency managed to trace the transactions and ensure the return of the funds to the country. The cryptocurrencies are now held in a special AFM account and will be reimbursed to the victims. 🔍 If you haven't subscribed yet, make sure to do so! If you enjoyed the content, please like it or leave a comment below with your thoughts. 👍
🔐 Cyber News (Aug 3, 2024):

1️⃣ Cointelegraph: Over 70% of funds lost to hacks in the cryptocurrency sector are from centralized financial platforms (CeFi). 📉

2️⃣ PeckShield: In July, $266 million was stolen, with experts noting a total of 16 incidents. The majority of the losses were due to the hack of the Indian cryptocurrency exchange WazirX, which amounted to $230 million. 🏴‍☠️

3️⃣ CertiK: In July, cryptocurrency projects lost $278.8 million due to malicious activities, making it the second-largest loss in 2024. 💸

4️⃣ PeckShield: On the morning of August 1, 2024, an unknown #hacker attacked the decentralized protocol Convergence. They gained access to the project's smart contract, minted approximately 58 million CVG tokens, and sold them. 🔓

5️⃣ AFM: Employees of the Kazakhstan Agency for Financial Monitoring (AFM) tracked assets of the cryptocurrency pyramid scheme Eolus amounting to 250 million tenge (over $520,000), stolen from nearly 2,500 citizens across the country. The agency managed to trace the transactions and ensure the return of the funds to the country. The cryptocurrencies are now held in a special AFM account and will be reimbursed to the victims. 🔍

If you haven't subscribed yet, make sure to do so! If you enjoyed the content, please like it or leave a comment below with your thoughts. 👍
Maybe this is small money in your eyes, but it is also quite big in the eyes of those who need it. IS your Binance account SAFE?! check it periodically The story is that this transaction just happened without any notification Initially USDT resides in the Trading Bot wallet. On August 1, 2024 starting at 22:25:25, the Hacker made a transaction moving it to the Spot wallet without me knowing and there was no notification. The next morning on August 2 2024 I only saw the wallet summary and the amount had not been reduced. Until midday there were no trading notifications on Coin BTC, in history there were no purchase transactions or orders to buy BTC/USDT, at exactly 11 o'clock the hacker took action, at 11:03 he made a purchase of BTC/USDT with the position (Taker) (seen in transaction history) and then quickly at 11:08 The hack made a withdrawal transaction via my Binance account, again no notification and I didn't notice. Around 13:00 I opened a Binance account and what happened next was that I couldn't find my funds and the chronology I told above is the flow of the transaction history that occurred. I always play with my gadgets and periodically monitor the market on Binance, but I can still get stolen. Before this incident, I had not had any contact with anyone (scammer). So where does this hacker take my funds? This is my morning experience, hopefully it can be a lesson for you, I am still unsure whether my account is still safe or not even though I have activated double security. and I have also reported this incident via the Binance feature. $BTC #Binance #hacker #binancehack #HackAlert
Maybe this is small money in your eyes, but it is also quite big in the eyes of those who need it.
IS your Binance account SAFE?!
check it periodically

The story is that this transaction just happened without any notification
Initially USDT resides in the Trading Bot wallet. On August 1, 2024 starting at 22:25:25, the Hacker made a transaction moving it to the Spot wallet without me knowing and there was no notification.
The next morning on August 2 2024 I only saw the wallet summary and the amount had not been reduced.
Until midday there were no trading notifications on Coin BTC, in history there were no purchase transactions or orders to buy BTC/USDT, at exactly 11 o'clock the hacker took action, at 11:03 he made a purchase of BTC/USDT with the position (Taker) (seen in transaction history) and then quickly at 11:08 The hack made a withdrawal transaction via my Binance account, again no notification and I didn't notice.
Around 13:00 I opened a Binance account and what happened next was that I couldn't find my funds and the chronology I told above is the flow of the transaction history that occurred.
I always play with my gadgets and periodically monitor the market on Binance, but I can still get stolen. Before this incident, I had not had any contact with anyone (scammer). So where does this hacker take my funds?

This is my morning experience, hopefully it can be a lesson for you, I am still unsure whether my account is still safe or not even though I have activated double security. and I have also reported this incident via the Binance feature.

$BTC
#Binance #hacker #binancehack #HackAlert
Article
Cryptocurrency Exchange BingX Hacked, Onchain Data Shows Over $43 Million WithdrawnBingX was the victim of a cyberattack that caused more than $43 million in damages. The company's CEO told X that the amount of stolen assets was insignificant and any customer losses would be compensated. Cryptocurrency exchange BingX has been hacked and a “small” amount of assets have been stolen, and the exchange plans to compensate users for any losses, the company’s CEO said in a message on X.

Cryptocurrency Exchange BingX Hacked, Onchain Data Shows Over $43 Million Withdrawn

BingX was the victim of a cyberattack that caused more than $43 million in damages.
The company's CEO told X that the amount of stolen assets was insignificant and any customer losses would be compensated.
Cryptocurrency exchange BingX has been hacked and a “small” amount of assets have been stolen, and the exchange plans to compensate users for any losses, the company’s CEO said in a message on X.
Article
Texdipektop Ripple ппедпедил долделцев XRP o вне фишинга#Phishing #RippleTrends #XRPcryptowolf #attacked #hacker $XRP $NOT $BTC According to the technical director of Ripple, asset holders should be prepared for a new wave of fraud. This time, according to David Schwartz, it is aimed at stealing personal data. His warning appeared after one of the users under the nickname @ZYearLetterman stated that he had communicated with the Ripple support service, and in the end it turned out to be a phishing attack disguised as an official service. The message received by @ZYearLetterman indicated that the service was investigating his account for copyright infringement, and in order to avoid blocking his account, he You must follow the link and fill out the review form. David Schwartz warned each of his subscribers that they should ignore such messages and under no circumstances click on the link! He explained that the link leads to a phishing resource that collects clients’ personal data and other information. Phishing attacks are one of the most common types of fraud on the Internet and many users and companies become their victims. Criminals are constantly improving their methods, which allows them to steal private information about clients, and then steal their finances. Despite all the calls from information security experts, many users do not exercise due diligence and become victims of hackers.

Texdipektop Ripple ппедпедил долделцев XRP o вне фишинга

#Phishing #RippleTrends #XRPcryptowolf #attacked #hacker $XRP $NOT $BTC
According to the technical director of Ripple, asset holders should be prepared for a new wave of fraud. This time, according to David Schwartz, it is aimed at stealing personal data. His warning appeared after one of the users under the nickname @ZYearLetterman stated that he had communicated with the Ripple support service, and in the end it turned out to be a phishing attack disguised as an official service. The message received by @ZYearLetterman indicated that the service was investigating his account for copyright infringement, and in order to avoid blocking his account, he You must follow the link and fill out the review form. David Schwartz warned each of his subscribers that they should ignore such messages and under no circumstances click on the link! He explained that the link leads to a phishing resource that collects clients’ personal data and other information. Phishing attacks are one of the most common types of fraud on the Internet and many users and companies become their victims. Criminals are constantly improving their methods, which allows them to steal private information about clients, and then steal their finances. Despite all the calls from information security experts, many users do not exercise due diligence and become victims of hackers.
Article
Bedrock Protocol Hack: How Hackers Stole $2 Million and Compromised Data SecurityWell, the Bedrock protocol hacking story is something else. Let's take it step by step. First of all, the Bedrock protocol itself is not just some platform. It is one of the key mechanisms for Bitcoin restaking, that is, transferring assets from one level of the blockchain to another to generate income. The point is that it must be as secure as possible, because big money flows there.

Bedrock Protocol Hack: How Hackers Stole $2 Million and Compromised Data Security

Well, the Bedrock protocol hacking story is something else. Let's take it step by step.
First of all, the Bedrock protocol itself is not just some platform. It is one of the key mechanisms for Bitcoin restaking, that is, transferring assets from one level of the blockchain to another to generate income. The point is that it must be as secure as possible, because big money flows there.
Article
Unmasking the $4.3 million fraud scheme using 'Approval Phishing' on EthereumIn a large-scale collaborative operation between the U.S. Secret Service and Canadian law enforcement agencies, a sophisticated fraud scheme targeting Ethereum wallet users was uncovered and intervened in time, preventing estimated damages of up to $4.3 million. This is one of the latest incidents that illustrate the potential dangers of the 'Approval Phishing' scam in the crypto world – an increasingly common attack that inflicts severe damage.

Unmasking the $4.3 million fraud scheme using 'Approval Phishing' on Ethereum

In a large-scale collaborative operation between the U.S. Secret Service and Canadian law enforcement agencies, a sophisticated fraud scheme targeting Ethereum wallet users was uncovered and intervened in time, preventing estimated damages of up to $4.3 million. This is one of the latest incidents that illustrate the potential dangers of the 'Approval Phishing' scam in the crypto world – an increasingly common attack that inflicts severe damage.
·
--
Bearish
😱🤯😱🤯😱🤯😱 The "white hats" of Web3 earn millions, sweeping away traditional jobs in cybersecurity. The top ethical hackers in Web3 are making millions by discovering flaws in DeFi, far surpassing the traditional cybersecurity salaries, which have a cap of USD 300,000. The best ethical hackers looking for vulnerabilities in Web3's decentralized protocols are earning millions, eclipsing the USD 300,000 salary cap of traditional cybersecurity positions. Researchers earn millions a year, compared to the typical cybersecurity salaries ranging from USD 150,000 to USD 300,000. In the realm of cryptocurrencies, "white hats" are ethical hackers who are paid to reveal vulnerabilities in decentralized finance (DeFi) protocols. #Hacker #FOMO #CreatorPad $BNB {spot}(BNBUSDT) $SOL {spot}(SOLUSDT) $ETH {spot}(ETHUSDT)
😱🤯😱🤯😱🤯😱
The "white hats" of Web3 earn millions, sweeping away traditional jobs in cybersecurity.

The top ethical hackers in Web3 are making millions by discovering flaws in DeFi, far surpassing the traditional cybersecurity salaries, which have a cap of USD 300,000.

The best ethical hackers looking for vulnerabilities in Web3's decentralized protocols are earning millions, eclipsing the USD 300,000 salary cap of traditional cybersecurity positions.

Researchers earn millions a year, compared to the typical cybersecurity salaries ranging from USD 150,000 to USD 300,000.

In the realm of cryptocurrencies, "white hats" are ethical hackers who are paid to reveal vulnerabilities in decentralized finance (DeFi) protocols.
#Hacker
#FOMO
#CreatorPad
$BNB
$SOL
$ETH
Following yesterday's cryptocurrency crash caused by the news of the Bybit hack, the market is attempting a technical rebound. Historically, the market has always shown the ability to absorb various cyber attacks. 🙃 Bybit is currently searching for wallets to recover the stolen ETH, a complex task given the operating mode of the NK collective, which is responsible for this sophisticated attack. Bitcoin is trying to stay above 95k, where it has been consolidating an interesting structure for a few months (93-98k range). Yesterday it even attempted to break above 99k, but this collapse was unwanted. 🤔 $ETH {spot}(ETHUSDT) $BTC {spot}(BTCUSDT) #Hacker
Following yesterday's cryptocurrency crash caused by the news of the Bybit hack, the market is attempting a technical rebound. Historically, the market has always shown the ability to absorb various cyber attacks. 🙃
Bybit is currently searching for wallets to recover the stolen ETH, a complex task given the operating mode of the NK collective, which is responsible for this sophisticated attack.
Bitcoin is trying to stay above 95k, where it has been consolidating an interesting structure for a few months (93-98k range).
Yesterday it even attempted to break above 99k, but this collapse was unwanted. 🤔

$ETH

$BTC

#Hacker
#hacker https://app.binance.com/uni-qr/cart/21746916308874?r=527648310&l=en-US&uco=5lCqzywZiw1KZJSmHkdIFw&uc=app_square_share_link&us=copylink
#hacker https://app.binance.com/uni-qr/cart/21746916308874?r=527648310&l=en-US&uco=5lCqzywZiw1KZJSmHkdIFw&uc=app_square_share_link&us=copylink
GMX & MIM SPELL EXPLOITED FOR $12.9M – #HACKER MOVES FUNDS A major exploit has hit #GMX (@GMX_IO) and MIM Spell (@MIM_Spell), with attackers draining approximately 6,262 ETH (~$12.9M) from related contracts. The stolen funds were quickly bridged to Ethereum and split across three new wallets, suggesting the hacker is attempting to obfuscate the trail. 🔹 Hacked Contract: 0xAF9e33Aa03CAaa613c3Ba4221f7EA3eE2AC38649 🔹 New Wallets Holding the Funds: 0xa8f822E937C982e65b0437Ac81792a3AdA76A1ff 0x047C2a3dd1Ab4105B365685d4804fE5c440B5729 0x018182FD7B856AeE1606D7E0AA8bca10F1Cb0b5d The exploit details are still unfolding—will the hacker cash out or be traced?
GMX & MIM SPELL EXPLOITED FOR $12.9M – #HACKER MOVES FUNDS
A major exploit has hit #GMX (@GMX_IO) and MIM Spell (@MIM_Spell), with attackers draining approximately 6,262 ETH (~$12.9M) from related contracts.
The stolen funds were quickly bridged to Ethereum and split across three new wallets, suggesting the hacker is attempting to obfuscate the trail.
🔹 Hacked Contract: 0xAF9e33Aa03CAaa613c3Ba4221f7EA3eE2AC38649

🔹 New Wallets Holding the Funds:
0xa8f822E937C982e65b0437Ac81792a3AdA76A1ff
0x047C2a3dd1Ab4105B365685d4804fE5c440B5729
0x018182FD7B856AeE1606D7E0AA8bca10F1Cb0b5d
The exploit details are still unfolding—will the hacker cash out or be traced?
😨 The Sui Hacker Is Accumulating TONS of Ethereum 🚀 What Is He Planning? 🕵️‍♂️ New massive blockchain movements reveal that the hacker linked to the Sui exploit is purchasing huge amounts of ETH through Mayan Finance and CoW Protocol. 💥 Transfers of up to $999,000 USD in a single transaction 😳 💸 Are you looking to move your funds to a more stable asset or are you planning something even bigger? 📊 What does this mean for the price of Ethereum? Should we be worried about a sell-off, or is it just an accumulation strategy? 📌 Useful Links: 👉🎁 [Mystery Box on Binance](https://www.binance.com/referral/mystery-box/2025-pizza-day/claim?ref=GRO_16987_J6B2Y) 👉💹 [Create your Binance account and receive rewards](https://accounts.binance.com/en/register?ref=YAW7SIBT) 👉💸 [Earn up](https://www.binance.com/referral/earn-together/refertoearn2000usdc/claim?hl=es-ES&ref=GRO_14352_GOUAR) to $2,000 USDC with your referral link: #SUİ #Ethereum #ETH #Hacker #cryptocurrencies
😨 The Sui Hacker Is Accumulating TONS of Ethereum 🚀 What Is He Planning?

🕵️‍♂️ New massive blockchain movements reveal that the hacker linked to the Sui exploit is purchasing huge amounts of ETH through Mayan Finance and CoW Protocol.

💥 Transfers of up to $999,000 USD in a single transaction 😳

💸 Are you looking to move your funds to a more stable asset or are you planning something even bigger?

📊 What does this mean for the price of Ethereum?

Should we be worried about a sell-off, or is it just an accumulation strategy?

📌 Useful Links:

👉🎁 Mystery Box on Binance

👉💹 Create your Binance account and receive rewards

👉💸 Earn up to $2,000 USDC with your referral link:

#SUİ #Ethereum #ETH #Hacker #cryptocurrencies
❗ Iran's Largest Crypto Exchange Hacked Iran's most popular and largest crypto exchange, Nobitex, has been hacked by a hacker group called "Predatory Sparrow." 📌 According to reports, approximately $48–82 million in various cryptocurrencies (USDT, BTC, TON, and others) were stolen from the exchange. 🔐 The hackers claimed that not only did they transfer the funds to their own crypto accounts, but they also caused cyber damage to banks and ATM machines linked to Iran's Islamic Revolutionary Guard Corps (IRGC). 🗣️ Nobitex has officially confirmed the incident and stated: "We will compensate our customers for their losses." 🌐 Due to the risk of further cyberattacks, it is reported that Iran also restricted its internet access last night. #cyber #hacker #IsraelIranConflict #cybercrime
❗ Iran's Largest Crypto Exchange Hacked

Iran's most popular and largest crypto exchange, Nobitex, has been hacked by a hacker group called "Predatory Sparrow."

📌 According to reports, approximately $48–82 million in various cryptocurrencies (USDT, BTC, TON, and others) were stolen from the exchange.

🔐 The hackers claimed that not only did they transfer the funds to their own crypto accounts, but they also caused cyber damage to banks and ATM machines linked to Iran's Islamic Revolutionary Guard Corps (IRGC).

🗣️ Nobitex has officially confirmed the incident and stated:

"We will compensate our customers for their losses."

🌐 Due to the risk of further cyberattacks, it is reported that Iran also restricted its internet access last night.

#cyber #hacker #IsraelIranConflict #cybercrime
Hackers managed to steal millions of dollars in valuable NFTs, including Bored Ape Yacht Club and Mutant Ape Yacht Club, using an NFT Trader exploit. Following the hack of "legacy smart contracts", NFT Trader is calling on users to revoke access to the two compromised contracts. Hacker demands ransom for stolen NFTs. The hacker also returned one Bored Ape NFT along with ETH to one user and returned some Bored Ape tokens to the owners. In addition, there were reports of auxiliary hacks that removed Cool Cats and Squiggles tokens from users' wallets. NFT Trader has not yet responded to requests for comment. #crypto #NFTMarketTrends #hacker
Hackers managed to steal millions of dollars in valuable NFTs, including Bored Ape Yacht Club and Mutant Ape Yacht Club, using an NFT Trader exploit.

Following the hack of "legacy smart contracts", NFT Trader is calling on users to revoke access to the two compromised contracts.

Hacker demands ransom for stolen NFTs. The hacker also returned one Bored Ape NFT along with ETH to one user and returned some Bored Ape tokens to the owners. In addition, there were reports of auxiliary hacks that removed Cool Cats and Squiggles tokens from users' wallets.

NFT Trader has not yet responded to requests for comment. #crypto #NFTMarketTrends #hacker
Infini Hacker’s Bold ETH Sales Amid Surging Ethereum Price Binance Square readers, prepare to uncover the latest twists in the crypto realm! The enigmatic Infini Hacker has captured the attention of the crypto sphere once more. In a daring move, they have chosen to liquidate a significant portion of their Ethereum holdings, taking advantage of the recent price rally. This decision raises intriguing questions and showcases the complexities of the crypto landscape. The hacker, who previously made off with a substantial haul from the Infini stablecoin project, is now arguably influencing the market. Their large ETH sales have potentially impacted Ethereum's price trajectory, demonstrating the influence of individual actors within the volatile crypto ecosystem. It's a reminder that the crypto market is a complex web of interconnected entities, where the actions of one can have ripple effects across the entire network. The Infini Hacker's bold move serves as a testament to the dynamic and ever-evolving nature of our beloved ecosystem, keeping us on our toes. #Crypto #ETH #Hacker #MarketInfluences #PriceAction $ETH {spot}(ETHUSDT) $ETC {spot}(ETCUSDT)
Infini Hacker’s Bold ETH Sales Amid Surging Ethereum Price

Binance Square readers, prepare to uncover the latest twists in the crypto realm!

The enigmatic Infini Hacker has captured the attention of the crypto sphere once more. In a daring move, they have chosen to liquidate a significant portion of their Ethereum holdings, taking advantage of the recent price rally. This decision raises intriguing questions and showcases the complexities of the crypto landscape.

The hacker, who previously made off with a substantial haul from the Infini stablecoin project, is now arguably influencing the market. Their large ETH sales have potentially impacted Ethereum's price trajectory, demonstrating the influence of individual actors within the volatile crypto ecosystem.

It's a reminder that the crypto market is a complex web of interconnected entities, where the actions of one can have ripple effects across the entire network. The Infini Hacker's bold move serves as a testament to the dynamic and ever-evolving nature of our beloved ecosystem, keeping us on our toes.

#Crypto #ETH #Hacker #MarketInfluences #PriceAction

$ETH
$ETC
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number