Binance Square
#hacker

hacker

628,489 views
308 Discussing
prosperidade8
·
--
🚨Hacker or Insider? The mystery of the $285 million attack on Solana 🧐 While Elliptic points to groups from North Korea, security experts believe it was someone with intimate knowledge of the Drift Protocol. 🕵️‍♂️ The fact is: human and process-based security failed where code should have been sovereign. ❌ No time lock. ❌ No emergency shutoffs. ✅ Result: One of the largest losses in recent DeFi history. What's your opinion: are DeFi networks ready for mass adoption or are we still "luxury testers"? 👇 #DeFi #Hacker #Solana #Web3 #CryptoBrasil $SOL {spot}(SOLUSDT)
🚨Hacker or Insider? The mystery of the $285 million attack on Solana 🧐
While Elliptic points to groups from North Korea, security experts believe it was someone with intimate knowledge of the Drift Protocol. 🕵️‍♂️
The fact is: human and process-based security failed where code should have been sovereign.
❌ No time lock.
❌ No emergency shutoffs.
✅ Result: One of the largest losses in recent DeFi history.
What's your opinion: are DeFi networks ready for mass adoption or are we still "luxury testers"? 👇
#DeFi #Hacker #Solana #Web3 #CryptoBrasil
$SOL
Drift officially announced that 280 million dollars were precisely detonated by "social engineering + pre-signed transactions", and now all site functions have directly come to a physical standstill. They are currently cooperating with the police and security agencies to pursue and block on-chain at full speed. This wave is again a typical case of "human disaster" being greater than "natural disaster". Hackers targeted internal permissions along with durable random numbers to bypass security checks, using methods that are steady, precise, and ruthless, clearly having been plotting against core members for a long time. Now the protocol has entered the emergency room, and the most painful part is the liquidity that has not yet been withdrawn; once the functions are locked, retail investors can only watch their funds turn into "stagnant water" helplessly. From the on-chain intentions, this huge amount of money has not yet started to enter the mixer on a large scale, indicating that the hackers are still testing the waters. But this amount is too outrageous; if it cannot be recovered, the fundamentals of the protocol are likely to need to be reshaped. Do people think the officials can afford to compensate for the money lost due to human negligence in the end? #SOL #DeFi #Hacker $DRIFT {future}(DRIFTUSDT)
Drift officially announced that 280 million dollars were precisely detonated by "social engineering + pre-signed transactions", and now all site functions have directly come to a physical standstill. They are currently cooperating with the police and security agencies to pursue and block on-chain at full speed.
This wave is again a typical case of "human disaster" being greater than "natural disaster". Hackers targeted internal permissions along with durable random numbers to bypass security checks, using methods that are steady, precise, and ruthless, clearly having been plotting against core members for a long time. Now the protocol has entered the emergency room, and the most painful part is the liquidity that has not yet been withdrawn; once the functions are locked, retail investors can only watch their funds turn into "stagnant water" helplessly.
From the on-chain intentions, this huge amount of money has not yet started to enter the mixer on a large scale, indicating that the hackers are still testing the waters. But this amount is too outrageous; if it cannot be recovered, the fundamentals of the protocol are likely to need to be reshaped. Do people think the officials can afford to compensate for the money lost due to human negligence in the end? #SOL #DeFi #Hacker $DRIFT
Article
Saw some people panicking or asking about quantum computing's impact on crypto. At a high level, allRecently, discussions around quantum computing and its potential impact on cryptocurrencies like Bitcoin have started to gain attention. Many people are concerned that future quantum machines could break current cryptographic systems and compromise blockchain security. However, according to Changpeng Zhao (CZ), there is no need to panic—at least not right now. The Core Idea: Crypto Can Adapt At a fundamental level, the solution is straightforward. Cryptocurrencies can upgrade their security systems to quantum-resistant (post-quantum) algorithms. These newer cryptographic methods are specifically designed to withstand the computational power of quantum machines. While today’s encryption may eventually become vulnerable, the industry is already working on stronger alternatives. The key takeaway: Crypto is not static—it evolves with technology. The Real Challenge: Execution While the solution exists in theory, implementing it across decentralized networks is far from simple. 1. Decentralization Makes Coordination Difficult Unlike traditional systems, blockchains are not controlled by a single authority. Upgrading them requires consensus among developers, miners/validators, and users. This often leads to disagreements about: Which algorithms to adopt When to implement changes As a result, the ecosystem may experience forks, where a blockchain splits into multiple versions. 2. New Code Brings New Risks Introducing new cryptographic algorithms is not risk-free: Bugs may be introduced Security vulnerabilities could appear Systems may be unstable in early stages Short-term uncertainty is almost inevitable during such transitions. 3. Outdated Projects May Disappear Not all crypto projects will successfully upgrade. Some inactive or poorly maintained projects may fail to adapt and eventually become obsolete. In a way, this acts as a natural cleanup of the ecosystem, removing weaker or abandoned projects. 4. Users Must Take Responsibility For individuals who use self-custody wallets: Funds may need to be migrated to quantum-safe wallets Users will have to stay informed and take action This adds a layer of responsibility for maintaining security. The Satoshi Nakamoto Question An interesting point raised by CZ involves Satoshi Nakamoto, the anonymous creator of Bitcoin. Satoshi is believed to hold a large amount of Bitcoin that has never been moved. If those coins are moved in the future, it could suggest that Satoshi is still active. If they remain untouched, there may be discussions about locking or “burning” those addresses to prevent them from being stolen by future quantum attackers. However, this idea faces challenges: Identifying all of Satoshi’s wallets is difficult There is a risk of mistakenly targeting legitimate early adopters Fundamental Principles CZ highlights a few important long-term principles: Encryption is generally easier to create than to break Advancements in computing power benefit technological progress overall Crypto will continue to exist, even in a post-quantum world Conclusion Quantum computing does present a potential future threat to current cryptographic systems. However, it is not an immediate danger, and solutions are already being developed. The real challenge lies in coordination, implementation, and ensuring a smooth transition across decentralized ecosystems. In the long run, cryptocurrencies are likely to adapt—just as they always have. Rather than a threat, quantum computing may simply be the next stage in crypto’s evolution.#quantumcomputers #hacker #BitmineIncreasesETHStake $BTC $ETH $XRP

Saw some people panicking or asking about quantum computing's impact on crypto. At a high level, all

Recently, discussions around quantum computing and its potential impact on cryptocurrencies like Bitcoin have started to gain attention. Many people are concerned that future quantum machines could break current cryptographic systems and compromise blockchain security.
However, according to Changpeng Zhao (CZ), there is no need to panic—at least not right now.
The Core Idea: Crypto Can Adapt
At a fundamental level, the solution is straightforward. Cryptocurrencies can upgrade their security systems to quantum-resistant (post-quantum) algorithms.
These newer cryptographic methods are specifically designed to withstand the computational power of quantum machines. While today’s encryption may eventually become vulnerable, the industry is already working on stronger alternatives.
The key takeaway:
Crypto is not static—it evolves with technology.
The Real Challenge: Execution
While the solution exists in theory, implementing it across decentralized networks is far from simple.

1. Decentralization Makes Coordination Difficult
Unlike traditional systems, blockchains are not controlled by a single authority. Upgrading them requires consensus among developers, miners/validators, and users.
This often leads to disagreements about:
Which algorithms to adopt
When to implement changes
As a result, the ecosystem may experience forks, where a blockchain splits into multiple versions.
2. New Code Brings New Risks
Introducing new cryptographic algorithms is not risk-free:
Bugs may be introduced
Security vulnerabilities could appear
Systems may be unstable in early stages
Short-term uncertainty is almost inevitable during such transitions.
3. Outdated Projects May Disappear
Not all crypto projects will successfully upgrade. Some inactive or poorly maintained projects may fail to adapt and eventually become obsolete.
In a way, this acts as a natural cleanup of the ecosystem, removing weaker or abandoned projects.
4. Users Must Take Responsibility
For individuals who use self-custody wallets:
Funds may need to be migrated to quantum-safe wallets
Users will have to stay informed and take action
This adds a layer of responsibility for maintaining security.
The Satoshi Nakamoto Question
An interesting point raised by CZ involves Satoshi Nakamoto, the anonymous creator of Bitcoin.
Satoshi is believed to hold a large amount of Bitcoin that has never been moved.
If those coins are moved in the future, it could suggest that Satoshi is still active.
If they remain untouched, there may be discussions about locking or “burning” those addresses to prevent them from being stolen by future quantum attackers.
However, this idea faces challenges:
Identifying all of Satoshi’s wallets is difficult
There is a risk of mistakenly targeting legitimate early adopters
Fundamental Principles
CZ highlights a few important long-term principles:
Encryption is generally easier to create than to break
Advancements in computing power benefit technological progress overall
Crypto will continue to exist, even in a post-quantum world
Conclusion
Quantum computing does present a potential future threat to current cryptographic systems. However, it is not an immediate danger, and solutions are already being developed.
The real challenge lies in coordination, implementation, and ensuring a smooth transition across decentralized ecosystems.
In the long run, cryptocurrencies are likely to adapt—just as they always have.
Rather than a threat, quantum computing may simply be the next stage in crypto’s evolution.#quantumcomputers #hacker #BitmineIncreasesETHStake $BTC $ETH $XRP
Article
North Korean hackers hide malicious code in the ETH blockchain🔍 Details of what they have detected According to the Google Threat Intelligence Group (GTIG), it was observed that UNC5342 since February 2025 initiated campaigns where they use EtherHiding to store encrypted malicious payloads within smart contracts or transactions on Ethereum/BNB. In that modus operandi: The attackers create fake 'job offers', contacting developers or people in the blockchain space via LinkedIn or other platforms. Victims download files as if it were part of a technical test or interview; those files contain malicious loaders that, when executed, query a smart contract that delivers the next malicious step.

North Korean hackers hide malicious code in the ETH blockchain

🔍 Details of what they have detected

According to the Google Threat Intelligence Group (GTIG), it was observed that UNC5342 since February 2025 initiated campaigns where they use EtherHiding to store encrypted malicious payloads within smart contracts or transactions on Ethereum/BNB.


In that modus operandi:
The attackers create fake 'job offers', contacting developers or people in the blockchain space via LinkedIn or other platforms.

Victims download files as if it were part of a technical test or interview; those files contain malicious loaders that, when executed, query a smart contract that delivers the next malicious step.
Article
Unmasking the $4.3 million fraud scheme using 'Approval Phishing' on EthereumIn a large-scale collaborative operation between the U.S. Secret Service and Canadian law enforcement agencies, a sophisticated fraud scheme targeting Ethereum wallet users was uncovered and intervened in time, preventing estimated damages of up to $4.3 million. This is one of the latest incidents that illustrate the potential dangers of the 'Approval Phishing' scam in the crypto world – an increasingly common attack that inflicts severe damage.

Unmasking the $4.3 million fraud scheme using 'Approval Phishing' on Ethereum

In a large-scale collaborative operation between the U.S. Secret Service and Canadian law enforcement agencies, a sophisticated fraud scheme targeting Ethereum wallet users was uncovered and intervened in time, preventing estimated damages of up to $4.3 million. This is one of the latest incidents that illustrate the potential dangers of the 'Approval Phishing' scam in the crypto world – an increasingly common attack that inflicts severe damage.
·
--
Bearish
😱🤯😱🤯😱🤯😱 The "white hats" of Web3 earn millions, sweeping away traditional jobs in cybersecurity. The top ethical hackers in Web3 are making millions by discovering flaws in DeFi, far surpassing the traditional cybersecurity salaries, which have a cap of USD 300,000. The best ethical hackers looking for vulnerabilities in Web3's decentralized protocols are earning millions, eclipsing the USD 300,000 salary cap of traditional cybersecurity positions. Researchers earn millions a year, compared to the typical cybersecurity salaries ranging from USD 150,000 to USD 300,000. In the realm of cryptocurrencies, "white hats" are ethical hackers who are paid to reveal vulnerabilities in decentralized finance (DeFi) protocols. #Hacker #FOMO #CreatorPad $BNB {spot}(BNBUSDT) $SOL {spot}(SOLUSDT) $ETH {spot}(ETHUSDT)
😱🤯😱🤯😱🤯😱
The "white hats" of Web3 earn millions, sweeping away traditional jobs in cybersecurity.

The top ethical hackers in Web3 are making millions by discovering flaws in DeFi, far surpassing the traditional cybersecurity salaries, which have a cap of USD 300,000.

The best ethical hackers looking for vulnerabilities in Web3's decentralized protocols are earning millions, eclipsing the USD 300,000 salary cap of traditional cybersecurity positions.

Researchers earn millions a year, compared to the typical cybersecurity salaries ranging from USD 150,000 to USD 300,000.

In the realm of cryptocurrencies, "white hats" are ethical hackers who are paid to reveal vulnerabilities in decentralized finance (DeFi) protocols.
#Hacker
#FOMO
#CreatorPad
$BNB
$SOL
$ETH
❗ Iran's Largest Crypto Exchange Hacked Iran's most popular and largest crypto exchange, Nobitex, has been hacked by a hacker group called "Predatory Sparrow." 📌 According to reports, approximately $48–82 million in various cryptocurrencies (USDT, BTC, TON, and others) were stolen from the exchange. 🔐 The hackers claimed that not only did they transfer the funds to their own crypto accounts, but they also caused cyber damage to banks and ATM machines linked to Iran's Islamic Revolutionary Guard Corps (IRGC). 🗣️ Nobitex has officially confirmed the incident and stated: "We will compensate our customers for their losses." 🌐 Due to the risk of further cyberattacks, it is reported that Iran also restricted its internet access last night. #cyber #hacker #IsraelIranConflict #cybercrime
❗ Iran's Largest Crypto Exchange Hacked

Iran's most popular and largest crypto exchange, Nobitex, has been hacked by a hacker group called "Predatory Sparrow."

📌 According to reports, approximately $48–82 million in various cryptocurrencies (USDT, BTC, TON, and others) were stolen from the exchange.

🔐 The hackers claimed that not only did they transfer the funds to their own crypto accounts, but they also caused cyber damage to banks and ATM machines linked to Iran's Islamic Revolutionary Guard Corps (IRGC).

🗣️ Nobitex has officially confirmed the incident and stated:

"We will compensate our customers for their losses."

🌐 Due to the risk of further cyberattacks, it is reported that Iran also restricted its internet access last night.

#cyber #hacker #IsraelIranConflict #cybercrime
Hackers managed to steal millions of dollars in valuable NFTs, including Bored Ape Yacht Club and Mutant Ape Yacht Club, using an NFT Trader exploit. Following the hack of "legacy smart contracts", NFT Trader is calling on users to revoke access to the two compromised contracts. Hacker demands ransom for stolen NFTs. The hacker also returned one Bored Ape NFT along with ETH to one user and returned some Bored Ape tokens to the owners. In addition, there were reports of auxiliary hacks that removed Cool Cats and Squiggles tokens from users' wallets. NFT Trader has not yet responded to requests for comment. #crypto #NFTMarketTrends #hacker
Hackers managed to steal millions of dollars in valuable NFTs, including Bored Ape Yacht Club and Mutant Ape Yacht Club, using an NFT Trader exploit.

Following the hack of "legacy smart contracts", NFT Trader is calling on users to revoke access to the two compromised contracts.

Hacker demands ransom for stolen NFTs. The hacker also returned one Bored Ape NFT along with ETH to one user and returned some Bored Ape tokens to the owners. In addition, there were reports of auxiliary hacks that removed Cool Cats and Squiggles tokens from users' wallets.

NFT Trader has not yet responded to requests for comment. #crypto #NFTMarketTrends #hacker
#hacker https://app.binance.com/uni-qr/cart/21746916308874?r=527648310&l=en-US&uco=5lCqzywZiw1KZJSmHkdIFw&uc=app_square_share_link&us=copylink
#hacker https://app.binance.com/uni-qr/cart/21746916308874?r=527648310&l=en-US&uco=5lCqzywZiw1KZJSmHkdIFw&uc=app_square_share_link&us=copylink
😨 The Sui Hacker Is Accumulating TONS of Ethereum 🚀 What Is He Planning? 🕵️‍♂️ New massive blockchain movements reveal that the hacker linked to the Sui exploit is purchasing huge amounts of ETH through Mayan Finance and CoW Protocol. 💥 Transfers of up to $999,000 USD in a single transaction 😳 💸 Are you looking to move your funds to a more stable asset or are you planning something even bigger? 📊 What does this mean for the price of Ethereum? Should we be worried about a sell-off, or is it just an accumulation strategy? 📌 Useful Links: 👉🎁 [Mystery Box on Binance](https://www.binance.com/referral/mystery-box/2025-pizza-day/claim?ref=GRO_16987_J6B2Y) 👉💹 [Create your Binance account and receive rewards](https://accounts.binance.com/en/register?ref=YAW7SIBT) 👉💸 [Earn up](https://www.binance.com/referral/earn-together/refertoearn2000usdc/claim?hl=es-ES&ref=GRO_14352_GOUAR) to $2,000 USDC with your referral link: #SUİ #Ethereum #ETH #Hacker #cryptocurrencies
😨 The Sui Hacker Is Accumulating TONS of Ethereum 🚀 What Is He Planning?

🕵️‍♂️ New massive blockchain movements reveal that the hacker linked to the Sui exploit is purchasing huge amounts of ETH through Mayan Finance and CoW Protocol.

💥 Transfers of up to $999,000 USD in a single transaction 😳

💸 Are you looking to move your funds to a more stable asset or are you planning something even bigger?

📊 What does this mean for the price of Ethereum?

Should we be worried about a sell-off, or is it just an accumulation strategy?

📌 Useful Links:

👉🎁 Mystery Box on Binance

👉💹 Create your Binance account and receive rewards

👉💸 Earn up to $2,000 USDC with your referral link:

#SUİ #Ethereum #ETH #Hacker #cryptocurrencies
Infini Hacker’s Bold ETH Sales Amid Surging Ethereum Price Binance Square readers, prepare to uncover the latest twists in the crypto realm! The enigmatic Infini Hacker has captured the attention of the crypto sphere once more. In a daring move, they have chosen to liquidate a significant portion of their Ethereum holdings, taking advantage of the recent price rally. This decision raises intriguing questions and showcases the complexities of the crypto landscape. The hacker, who previously made off with a substantial haul from the Infini stablecoin project, is now arguably influencing the market. Their large ETH sales have potentially impacted Ethereum's price trajectory, demonstrating the influence of individual actors within the volatile crypto ecosystem. It's a reminder that the crypto market is a complex web of interconnected entities, where the actions of one can have ripple effects across the entire network. The Infini Hacker's bold move serves as a testament to the dynamic and ever-evolving nature of our beloved ecosystem, keeping us on our toes. #Crypto #ETH #Hacker #MarketInfluences #PriceAction $ETH {spot}(ETHUSDT) $ETC {spot}(ETCUSDT)
Infini Hacker’s Bold ETH Sales Amid Surging Ethereum Price

Binance Square readers, prepare to uncover the latest twists in the crypto realm!

The enigmatic Infini Hacker has captured the attention of the crypto sphere once more. In a daring move, they have chosen to liquidate a significant portion of their Ethereum holdings, taking advantage of the recent price rally. This decision raises intriguing questions and showcases the complexities of the crypto landscape.

The hacker, who previously made off with a substantial haul from the Infini stablecoin project, is now arguably influencing the market. Their large ETH sales have potentially impacted Ethereum's price trajectory, demonstrating the influence of individual actors within the volatile crypto ecosystem.

It's a reminder that the crypto market is a complex web of interconnected entities, where the actions of one can have ripple effects across the entire network. The Infini Hacker's bold move serves as a testament to the dynamic and ever-evolving nature of our beloved ecosystem, keeping us on our toes.

#Crypto #ETH #Hacker #MarketInfluences #PriceAction

$ETH
$ETC
Following yesterday's cryptocurrency crash caused by the news of the Bybit hack, the market is attempting a technical rebound. Historically, the market has always shown the ability to absorb various cyber attacks. 🙃 Bybit is currently searching for wallets to recover the stolen ETH, a complex task given the operating mode of the NK collective, which is responsible for this sophisticated attack. Bitcoin is trying to stay above 95k, where it has been consolidating an interesting structure for a few months (93-98k range). Yesterday it even attempted to break above 99k, but this collapse was unwanted. 🤔 $ETH {spot}(ETHUSDT) $BTC {spot}(BTCUSDT) #Hacker
Following yesterday's cryptocurrency crash caused by the news of the Bybit hack, the market is attempting a technical rebound. Historically, the market has always shown the ability to absorb various cyber attacks. 🙃
Bybit is currently searching for wallets to recover the stolen ETH, a complex task given the operating mode of the NK collective, which is responsible for this sophisticated attack.
Bitcoin is trying to stay above 95k, where it has been consolidating an interesting structure for a few months (93-98k range).
Yesterday it even attempted to break above 99k, but this collapse was unwanted. 🤔

$ETH

$BTC

#Hacker
GMX & MIM SPELL EXPLOITED FOR $12.9M – #HACKER MOVES FUNDS A major exploit has hit #GMX (@GMX_IO) and MIM Spell (@MIM_Spell), with attackers draining approximately 6,262 ETH (~$12.9M) from related contracts. The stolen funds were quickly bridged to Ethereum and split across three new wallets, suggesting the hacker is attempting to obfuscate the trail. 🔹 Hacked Contract: 0xAF9e33Aa03CAaa613c3Ba4221f7EA3eE2AC38649 🔹 New Wallets Holding the Funds: 0xa8f822E937C982e65b0437Ac81792a3AdA76A1ff 0x047C2a3dd1Ab4105B365685d4804fE5c440B5729 0x018182FD7B856AeE1606D7E0AA8bca10F1Cb0b5d The exploit details are still unfolding—will the hacker cash out or be traced?
GMX & MIM SPELL EXPLOITED FOR $12.9M – #HACKER MOVES FUNDS
A major exploit has hit #GMX (@GMX_IO) and MIM Spell (@MIM_Spell), with attackers draining approximately 6,262 ETH (~$12.9M) from related contracts.
The stolen funds were quickly bridged to Ethereum and split across three new wallets, suggesting the hacker is attempting to obfuscate the trail.
🔹 Hacked Contract: 0xAF9e33Aa03CAaa613c3Ba4221f7EA3eE2AC38649

🔹 New Wallets Holding the Funds:
0xa8f822E937C982e65b0437Ac81792a3AdA76A1ff
0x047C2a3dd1Ab4105B365685d4804fE5c440B5729
0x018182FD7B856AeE1606D7E0AA8bca10F1Cb0b5d
The exploit details are still unfolding—will the hacker cash out or be traced?
Serious security vulnerability on NPM: Fortunately, it has not caused significant damage On September 8, 2025, the crypto community was thrown into a panic when Charles Guillemet, CTO of #Ledger , issued an urgent warning about a serious cybersecurity vulnerability that could affect all on-chain transactions. This vulnerability stemmed from the compromise of the NPM account of a reputable developer, allowing malicious actors to inject malware into data packages that had been downloaded over 1 billion times. This malware could automatically change wallet addresses in transactions, posing a risk of asset theft. Damage was limited due to luck However, in a recent update, the attack was "almost a failure" due to a technical error on the part of the attacker, causing the plan to be quickly detected. According to analysis firm #arkham , the direct damage was only about 504 USD. The SEAL Org security team stated that this was a "stroke of luck," as had the malware been more sophisticated, damages could have reached billions of USD. A lesson for the entire industry This incident serves as a serious reminder of the potential risks in the crypto ecosystem. Although major wallets like MetaMask and Phantom have reassured users, this incident shows that reliance on external programming libraries remains a weakness. Experts recommend that users exercise caution, thoroughly check transactions before approving, and developers should regularly update software and eliminate risky data packages to ensure safety. #Hacker {future}(BTCUSDT) {spot}(BNBUSDT)
Serious security vulnerability on NPM: Fortunately, it has not caused significant damage

On September 8, 2025, the crypto community was thrown into a panic when Charles Guillemet, CTO of #Ledger , issued an urgent warning about a serious cybersecurity vulnerability that could affect all on-chain transactions. This vulnerability stemmed from the compromise of the NPM account of a reputable developer, allowing malicious actors to inject malware into data packages that had been downloaded over 1 billion times. This malware could automatically change wallet addresses in transactions, posing a risk of asset theft.

Damage was limited due to luck

However, in a recent update, the attack was "almost a failure" due to a technical error on the part of the attacker, causing the plan to be quickly detected. According to analysis firm #arkham , the direct damage was only about 504 USD. The SEAL Org security team stated that this was a "stroke of luck," as had the malware been more sophisticated, damages could have reached billions of USD.

A lesson for the entire industry

This incident serves as a serious reminder of the potential risks in the crypto ecosystem. Although major wallets like MetaMask and Phantom have reassured users, this incident shows that reliance on external programming libraries remains a weakness. Experts recommend that users exercise caution, thoroughly check transactions before approving, and developers should regularly update software and eliminate risky data packages to ensure safety. #Hacker
🔐 Cyber News (Mar 31, 2024): 1️⃣ Etherscan: The #hacker responsible for breaching the #PrismaFinance liquid staking protocol engaged in negotiations with the project team. He expressed interest in returning the funds and presented a series of demands. The hacker wants the developers to hold a public online conference during which they will reveal their identities. Additionally, the unknown individual demanded that the team apologize to investors and users for their mistakes. Furthermore, the programmers are required to thank the hacker for the operation and announce collaboration on solving the issue. 🛡️ 2️⃣ PeckShield: On March 29, 2024, PeckShield specialists reported a security incident involving the #EthenaLabs project. According to experts, unknown actors created a fake token, ENA, on the BNB Chain network. The incident occurred shortly after the launch pool with the Ethena Labs project on the Binance cryptocurrency exchange. The vulnerability underlying the exploit is still unknown. PeckShield reported a loss of 480 BNB, equivalent to $290,000. 💰 3️⃣ Vx-underground: An unknown group of cybercriminals has released malicious software targeting Call of Duty fans. Hackers are using it to steal bitcoins from players. Hackers are targeting users who use so-called cheat codes in Call of Duty. These are software solutions from unofficial providers that assist in gameplay. 🎮 4️⃣ Immunefi: In the first three months of 2024, as a result of 46 breaches and 15 fraudulent incidents, crypto projects lost over $321 million. This is 23.1% less than the same period last year when hackers stole over $437 million. 💸 5️⃣ TRM Labs: In 2023, the Tron blockchain accounted for 45% of all illegal cryptocurrency transactions. Mostly, this involves the #USDT stablecoin from Tether. 🔄 📢 What are your thoughts on this series of events?
🔐 Cyber News (Mar 31, 2024):

1️⃣ Etherscan: The #hacker responsible for breaching the #PrismaFinance liquid staking protocol engaged in negotiations with the project team. He expressed interest in returning the funds and presented a series of demands. The hacker wants the developers to hold a public online conference during which they will reveal their identities. Additionally, the unknown individual demanded that the team apologize to investors and users for their mistakes. Furthermore, the programmers are required to thank the hacker for the operation and announce collaboration on solving the issue. 🛡️

2️⃣ PeckShield: On March 29, 2024, PeckShield specialists reported a security incident involving the #EthenaLabs project. According to experts, unknown actors created a fake token, ENA, on the BNB Chain network. The incident occurred shortly after the launch pool with the Ethena Labs project on the Binance cryptocurrency exchange. The vulnerability underlying the exploit is still unknown. PeckShield reported a loss of 480 BNB, equivalent to $290,000. 💰

3️⃣ Vx-underground: An unknown group of cybercriminals has released malicious software targeting Call of Duty fans. Hackers are using it to steal bitcoins from players. Hackers are targeting users who use so-called cheat codes in Call of Duty. These are software solutions from unofficial providers that assist in gameplay. 🎮

4️⃣ Immunefi: In the first three months of 2024, as a result of 46 breaches and 15 fraudulent incidents, crypto projects lost over $321 million. This is 23.1% less than the same period last year when hackers stole over $437 million. 💸

5️⃣ TRM Labs: In 2023, the Tron blockchain accounted for 45% of all illegal cryptocurrency transactions. Mostly, this involves the #USDT stablecoin from Tether. 🔄

📢 What are your thoughts on this series of events?
Article
Texdipektop Ripple ппедпедил долделцев XRP o вне фишинга#Phishing #RippleTrends #XRPcryptowolf #attacked #hacker $XRP $NOT $BTC According to the technical director of Ripple, asset holders should be prepared for a new wave of fraud. This time, according to David Schwartz, it is aimed at stealing personal data. His warning appeared after one of the users under the nickname @ZYearLetterman stated that he had communicated with the Ripple support service, and in the end it turned out to be a phishing attack disguised as an official service. The message received by @ZYearLetterman indicated that the service was investigating his account for copyright infringement, and in order to avoid blocking his account, he You must follow the link and fill out the review form. David Schwartz warned each of his subscribers that they should ignore such messages and under no circumstances click on the link! He explained that the link leads to a phishing resource that collects clients’ personal data and other information. Phishing attacks are one of the most common types of fraud on the Internet and many users and companies become their victims. Criminals are constantly improving their methods, which allows them to steal private information about clients, and then steal their finances. Despite all the calls from information security experts, many users do not exercise due diligence and become victims of hackers.

Texdipektop Ripple ппедпедил долделцев XRP o вне фишинга

#Phishing #RippleTrends #XRPcryptowolf #attacked #hacker $XRP $NOT $BTC
According to the technical director of Ripple, asset holders should be prepared for a new wave of fraud. This time, according to David Schwartz, it is aimed at stealing personal data. His warning appeared after one of the users under the nickname @ZYearLetterman stated that he had communicated with the Ripple support service, and in the end it turned out to be a phishing attack disguised as an official service. The message received by @ZYearLetterman indicated that the service was investigating his account for copyright infringement, and in order to avoid blocking his account, he You must follow the link and fill out the review form. David Schwartz warned each of his subscribers that they should ignore such messages and under no circumstances click on the link! He explained that the link leads to a phishing resource that collects clients’ personal data and other information. Phishing attacks are one of the most common types of fraud on the Internet and many users and companies become their victims. Criminals are constantly improving their methods, which allows them to steal private information about clients, and then steal their finances. Despite all the calls from information security experts, many users do not exercise due diligence and become victims of hackers.
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number