Binance Square
#hackeralert

hackeralert

1.7M views
873 Discussing
CriptoMaestra
·
--
🚨 If you do this with your wallet, they can empty EVERYTHING A lot of new people in crypto make this mistake: 👉 they save their seed phrase on their mobile 👉 or upload it to the cloud 👉 or connect the wallet without understanding what they are signing And then the worst happens. 💡 Let me explain it simply: The seed phrase is the master key to your wallet. If someone has it: ❌ they enter your wallet ❌ move your cryptos ❌ and normally there's no turning back ⚠️ Basic rule: - DO NOT save your seed phrase in mobile notes - DO NOT send it via WhatsApp - DO NOT upload it to Google Drive or iCloud - DO NOT sign strange things that you don't understand 📌 What to do better: 👉 write it down and keep it offline 👉 carefully check which wallet or website you connect to 👉 be wary of fake “official” links and comments In crypto, you don't always get hacked… 👉 many times you get robbed because you give them the door without realizing it If you want me to explain crypto simply and without mistakes, follow me. #crypto #Wallet #HackerAlert
🚨 If you do this with your wallet, they can empty EVERYTHING

A lot of new people in crypto make this mistake:

👉 they save their seed phrase on their mobile
👉 or upload it to the cloud
👉 or connect the wallet without understanding what they are signing

And then the worst happens.

💡 Let me explain it simply:

The seed phrase is the master key to your wallet.

If someone has it:
❌ they enter your wallet
❌ move your cryptos
❌ and normally there's no turning back

⚠️ Basic rule:

- DO NOT save your seed phrase in mobile notes
- DO NOT send it via WhatsApp
- DO NOT upload it to Google Drive or iCloud
- DO NOT sign strange things that you don't understand

📌 What to do better:

👉 write it down and keep it offline
👉 carefully check which wallet or website you connect to
👉 be wary of fake “official” links and comments

In crypto, you don't always get hacked…

👉 many times you get robbed because you give them the door without realizing it

If you want me to explain crypto simply and without mistakes, follow me.

#crypto #Wallet #HackerAlert
Found a unique way to filter fake employees 💀 Founders of crypto projects have started using an unconventional method when hiring — candidates are asked to say something negative about Kim Jong Un. If a person refuses, "hangs up" or avoids the answer — this may be a signal that they are a developer from North Korea. $ETH $TON $BNB #CZ #BTC #ETHETFsApproved #Binance #HackerAlert
Found a unique way to filter fake employees 💀

Founders of crypto projects have started using an unconventional method when hiring — candidates are asked to say something negative about Kim Jong Un.

If a person refuses, "hangs up" or avoids the answer — this may be a signal that they are a developer from North Korea.

$ETH $TON $BNB
#CZ #BTC #ETHETFsApproved #Binance #HackerAlert
🚨 Drift exploit update PeckShield flagged a new move from the Drift Protocol hacker 185 Solana (~$15K) sent to ChangeNOW Small amount… but could be testing liquidity routes After a $285M exploit, every move matters $SOL #solana #HackerAlert {spot}(SOLUSDT)
🚨 Drift exploit update

PeckShield flagged a new move from the Drift Protocol hacker

185 Solana (~$15K) sent to ChangeNOW

Small amount… but could be testing liquidity routes

After a $285M exploit, every move matters
$SOL
#solana #HackerAlert
·
--
Bullish
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers A new investigation into a recent cyberattack has once again drawn attention to the growing intersection between cybersecurity and the cryptocurrency ecosystem. Reports suggest that the attack targeting the decentralized trading platform Drift Protocol may be linked to hacker groups believed to operate from North Korea. If confirmed, this would follow a pattern that cybersecurity analysts have observed for several years. State-linked hacking groups have increasingly targeted crypto platforms, exchanges, and decentralized finance protocols. These attacks often focus on exploiting smart contract vulnerabilities, private key security weaknesses, or operational infrastructure gaps. The reason is relatively straightforward. Digital assets can move across borders quickly and can be transferred without traditional banking intermediaries. This makes crypto platforms attractive targets for sophisticated cyber operations. Security researchers have repeatedly linked several large-scale crypto breaches to North Korean cyber groups. These groups are believed to use stolen digital assets to support state activities and circumvent international financial restrictions. For the broader crypto ecosystem, incidents like this highlight the importance of security-first development. As decentralized finance continues to grow, platforms must invest heavily in auditing smart contracts, strengthening infrastructure security, and implementing real-time monitoring systems. The investigation into the Drift attack serves as another reminder that while blockchain technology itself is highly secure, the surrounding infrastructure—wallets, protocols, and interfaces—must continue to evolve to stay ahead of increasingly sophisticated cyber threats. $SOL {future}(SOLUSDT) $SIREN {future}(SIRENUSDT) $STO {future}(STOUSDT) #Write2Earn #Binance #CyberSecurity #HackerAlert #NorthKoreaHackers
#DriftInvestigationLinksRecentAttackToNorthKoreanHackers
A new investigation into a recent cyberattack has once again drawn attention to the growing intersection between cybersecurity and the cryptocurrency ecosystem.
Reports suggest that the attack targeting the decentralized trading platform Drift Protocol may be linked to hacker groups believed to operate from North Korea. If confirmed, this would follow a pattern that cybersecurity analysts have observed for several years.
State-linked hacking groups have increasingly targeted crypto platforms, exchanges, and decentralized finance protocols. These attacks often focus on exploiting smart contract vulnerabilities, private key security weaknesses, or operational infrastructure gaps.
The reason is relatively straightforward. Digital assets can move across borders quickly and can be transferred without traditional banking intermediaries. This makes crypto platforms attractive targets for sophisticated cyber operations.
Security researchers have repeatedly linked several large-scale crypto breaches to North Korean cyber groups. These groups are believed to use stolen digital assets to support state activities and circumvent international financial restrictions.
For the broader crypto ecosystem, incidents like this highlight the importance of security-first development. As decentralized finance continues to grow, platforms must invest heavily in auditing smart contracts, strengthening infrastructure security, and implementing real-time monitoring systems.
The investigation into the Drift attack serves as another reminder that while blockchain technology itself is highly secure, the surrounding infrastructure—wallets, protocols, and interfaces—must continue to evolve to stay ahead of increasingly sophisticated cyber threats.
$SOL
$SIREN
$STO
#Write2Earn #Binance #CyberSecurity #HackerAlert #NorthKoreaHackers
Film Infiltration How North Korean hackers deceived #DRIFT for months to execute the $280 million theft Social Engineering and the "Long Game" of the DPRK #DriftProtocol has revealed details of an attack that redefines the concept of "risk in DeFi". What appeared to be a technical hack turned out to be a structured intelligence operation lasting six months. Face-to-Face Deception: The attackers did not operate from the shadows. They posed as a legitimate quantitative trading company, attending international conferences and meeting in person with the Drift team for months. They created trust bonds, Telegram groups, and even deposited $1 million of their own capital to seem like genuine partners. Digital Trojan Horses: The intrusion was achieved through two vectors of social engineering Malicious repositories: They exploited a vulnerability in editors like VS Code that executed hidden code when opening files. Beta Apps: They induced a collaborator to install a fake wallet via Apple’s TestFlight. The Connection to North Korea: Drift and the SEAL 911 security team link the attack to the UNC4736 group (AppleJeus), the cyber arm of North Korean intelligence. The funds used for the preparation were traced back to the hack of Radiant Capital in 2024. “Durable Nonce” Attack: The hack was not a failure in smart contracts. The attackers used a legitimate function of #solana to pre-sign transactions and, after gaining administrative access via previously installed malware, drained the protocol in minutes. Security experts like tanuki42_ rate this attack as the most elaborate in cryptocurrency history. The fact that they used physical "facilitators" (non-Koreans) to overcome due diligence sets a dangerous precedent for any development team in the sector. #CryptoNews #HackerAlert $DRIFT {future}(DRIFTUSDT)
Film Infiltration
How North Korean hackers deceived #DRIFT for months to execute the $280 million theft

Social Engineering and the "Long Game" of the DPRK

#DriftProtocol has revealed details of an attack that redefines the concept of "risk in DeFi". What appeared to be a technical hack turned out to be a structured intelligence operation lasting six months.

Face-to-Face Deception: The attackers did not operate from the shadows. They posed as a legitimate quantitative trading company, attending international conferences and meeting in person with the Drift team for months. They created trust bonds, Telegram groups, and even deposited $1 million of their own capital to seem like genuine partners.

Digital Trojan Horses: The intrusion was achieved through two vectors of social engineering
Malicious repositories: They exploited a vulnerability in editors like VS Code that executed hidden code when opening files.
Beta Apps: They induced a collaborator to install a fake wallet via Apple’s TestFlight.

The Connection to North Korea: Drift and the SEAL 911 security team link the attack to the UNC4736 group (AppleJeus), the cyber arm of North Korean intelligence. The funds used for the preparation were traced back to the hack of Radiant Capital in 2024.

“Durable Nonce” Attack: The hack was not a failure in smart contracts. The attackers used a legitimate function of #solana to pre-sign transactions and, after gaining administrative access via previously installed malware, drained the protocol in minutes.

Security experts like tanuki42_ rate this attack as the most elaborate in cryptocurrency history. The fact that they used physical "facilitators" (non-Koreans) to overcome due diligence sets a dangerous precedent for any development team in the sector.
#CryptoNews #HackerAlert
$DRIFT
Article
⚡ The Drift Protocol Exploit: What Happened, Why It Matters, and How to Stay Safe#DriftInvestigationLinksRecentAttackToNorthKoreanHackers⚡ The Drift Protocol Exploit: What Happened, Why It Matters, and How to Stay Safe In a startling turn of events, Drift Protocol, one of the prominent decentralized finance (DeFi) platforms, fell victim to a sophisticated exploit, leading to the theft of millions of dollars in user funds. According to early reports, the exploit took advantage of a flaw in Drift’s smart contract system. Attackers were able to manipulate liquidity parameters, draining funds from the platform in a matter of minutes. The breach sent shockwaves through the DeFi community, as Drift had built a reputation for robust risk management and innovation. This incident highlights a crucial lesson for the entire crypto ecosystem: even seemingly secure protocols are vulnerable without continuous auditing and proactive defense measures. While blockchain itself is immutable and transparent, the surrounding infrastructure—smart contracts, oracles, and front-end integrations—remains exposed to attack vectors. What makes this exploit particularly concerning is that Drift Protocol operates on top of a growing ecosystem of leveraged trading products. Users had come to trust the platform for offering advanced trading tools, but now that trust has been shaken. As of now, the team is investigating the breach, working closely with forensic specialists, and urging users to pause all interactions with the protocol until further notice. The consequences of this exploit extend beyond Drift. It is a reminder that the DeFi revolution, while empowering, still carries risks. Developers must implement rigorous, continuous smart contract audits, multi-layer security measures, and transparent incident response plans. For traders and investors, this is a critical moment to review risk management practices. Diversification, cautious engagement with new platforms, and a focus on security protocols must be top priorities. The Drift Protocol exploit underscores that in a digital economy driven by innovation, security must evolve at the same pace. Only by prioritizing trust, transparency, and resilience can DeFi deliver on its promise as a transformative financial force. 👇 How do you think DeFi security can evolve after this exploit? Let’s discuss. $PIPPIN {future}(PIPPINUSDT) $PePe {alpha}(CT_195TMacq4TDUw5q8NFBwmbY4RLXvzvG5JTkvi) $STO {future}(STOUSDT) #Write2Earn #Binance #DriftProtocolExploited #HackerAlert

⚡ The Drift Protocol Exploit: What Happened, Why It Matters, and How to Stay Safe

#DriftInvestigationLinksRecentAttackToNorthKoreanHackers⚡ The Drift Protocol Exploit: What Happened, Why It Matters, and How to Stay Safe
In a startling turn of events, Drift Protocol, one of the prominent decentralized finance (DeFi) platforms, fell victim to a sophisticated exploit, leading to the theft of millions of dollars in user funds.
According to early reports, the exploit took advantage of a flaw in Drift’s smart contract system. Attackers were able to manipulate liquidity parameters, draining funds from the platform in a matter of minutes. The breach sent shockwaves through the DeFi community, as Drift had built a reputation for robust risk management and innovation.
This incident highlights a crucial lesson for the entire crypto ecosystem: even seemingly secure protocols are vulnerable without continuous auditing and proactive defense measures. While blockchain itself is immutable and transparent, the surrounding infrastructure—smart contracts, oracles, and front-end integrations—remains exposed to attack vectors.
What makes this exploit particularly concerning is that Drift Protocol operates on top of a growing ecosystem of leveraged trading products. Users had come to trust the platform for offering advanced trading tools, but now that trust has been shaken. As of now, the team is investigating the breach, working closely with forensic specialists, and urging users to pause all interactions with the protocol until further notice.
The consequences of this exploit extend beyond Drift. It is a reminder that the DeFi revolution, while empowering, still carries risks. Developers must implement rigorous, continuous smart contract audits, multi-layer security measures, and transparent incident response plans.
For traders and investors, this is a critical moment to review risk management practices. Diversification, cautious engagement with new platforms, and a focus on security protocols must be top priorities.
The Drift Protocol exploit underscores that in a digital economy driven by innovation, security must evolve at the same pace. Only by prioritizing trust, transparency, and resilience can DeFi deliver on its promise as a transformative financial force.
👇
How do you think DeFi security can evolve after this exploit? Let’s discuss.
$PIPPIN
$PePe
$STO
#Write2Earn #Binance #DriftProtocolExploited #HackerAlert
Article
The Drift Protocol was hacked🚨 What happened with Drift Protocol? Drift Protocol is a decentralized exchange (type futures/perpetuals) on Solana. 👉 On April 1, 2026: It was hacked Between stolen $270M and $285M It is the largest DeFi hack of the year (2026) 💣 How did the exploit occur? The interesting (and concerning): 👉 It was NOT a typical bug It was something more sophisticated: Social engineering of the protocol signers Use of 'durable nonces' (feature of Solana) Governance manipulation (Security Council) 🧠 Simple translation:

The Drift Protocol was hacked

🚨 What happened with Drift Protocol?

Drift Protocol is a decentralized exchange (type futures/perpetuals) on Solana.

👉 On April 1, 2026:

It was
hacked
Between stolen

$270M and $285M

It is the largest DeFi hack of the year (2026)

💣 How did the exploit occur?

The interesting (and concerning):

👉 It was NOT a typical bug

It was something more sophisticated:
Social engineering of the protocol signers
Use of 'durable nonces' (feature of Solana)

Governance manipulation (Security Council)

🧠 Simple translation:
·
--
Bearish
#driftprotocolexploited Hack de US$ 280 millions: how a resource from Solana became a weapon against the Drift Protocol The Drift Protocol suffered an attack that resulted in the loss of approximately US$ 280 millions in assets. The exploit did not occur due to a direct failure in the code of the smart contracts, but rather through the abuse of a legitimate resource of the Solana blockchain called durable nonce. The hacker prepared malicious transactions using durable nonce. Then managed to get members of the multisig to sign these transactions without realizing their real impact. This may have happened due to social engineering or confusing signature interfaces. @Solana_Official #HackerAlert The attack on Drift was not just a large theft; it revealed a new class of vulnerability in DeFi: exploitation of the governance process and human signing. This will likely cause protocols on Solana, Ethereum, and other networks to review deeply.
#driftprotocolexploited Hack de US$ 280 millions: how a resource from Solana became a weapon against the Drift Protocol

The Drift Protocol suffered an attack that resulted in the loss of approximately US$ 280 millions in assets.

The exploit did not occur due to a direct failure in the code of the smart contracts, but rather through the abuse of a legitimate resource of the Solana blockchain called durable nonce.

The hacker prepared malicious transactions using durable nonce.
Then managed to get members of the multisig to sign these transactions without realizing their real impact.

This may have happened due to social engineering or confusing signature interfaces.
@Solana Official #HackerAlert

The attack on Drift was not just a large theft; it revealed a new class of vulnerability in DeFi: exploitation of the governance process and human signing.

This will likely cause protocols on Solana, Ethereum, and other networks to review deeply.
There aren't many surprises here. Once again, it looks like the attack was carried out by people who work for the North Korean government. Elliptic, a company that analyzes blockchain data, said that the Drift Protocol vulnerability provides several signs that it was done by hackers linked to North Korea. The evaluation is based on behavior on the blockchain, patterns of money laundering, and traces of related infrastructure. The method is very similar to how prior attacks worked: Before the attack: organized planning, test transactions, and getting ready for intermediary wallets to accept money After the attack, assets quickly came together, were turned into other tokens, were moved across chains, and finally sold off through very liquid assets. It is thought that gangs affiliated to North Korea have stolen more than $6.5 billion in bitcoin in the last several years. One of the most famous events is the $1.4 billion hack of Bybit. The US Department of the Treasury says that the money made from these transactions has been used to pay for North Korea's nuclear programs. The pattern shows a bigger truth: more and more sophisticated, state-aligned actors see crypto infrastructure as both a target and a way to collect money for their plans. #HackerAlert #bybit $SIREN $STO $XRP
There aren't many surprises here. Once again, it looks like the attack was carried out by people who work for the North Korean government.

Elliptic, a company that analyzes blockchain data, said that the Drift Protocol vulnerability provides several signs that it was done by hackers linked to North Korea. The evaluation is based on behavior on the blockchain, patterns of money laundering, and traces of related infrastructure.

The method is very similar to how prior attacks worked:

Before the attack: organized planning, test transactions, and getting ready for intermediary wallets to accept money
After the attack, assets quickly came together, were turned into other tokens, were moved across chains, and finally sold off through very liquid assets.

It is thought that gangs affiliated to North Korea have stolen more than $6.5 billion in bitcoin in the last several years. One of the most famous events is the $1.4 billion hack of Bybit.

The US Department of the Treasury says that the money made from these transactions has been used to pay for North Korea's nuclear programs.

The pattern shows a bigger truth: more and more sophisticated, state-aligned actors see crypto infrastructure as both a target and a way to collect money for their plans.

#HackerAlert #bybit
$SIREN $STO $XRP
🚨HACK HACK HACK !! COINDCX WALLET WAS COMPROMISED AND HACKED BY HACKER THATS WHY I ALWAYS TRUST BINANCE !!! CoinDCX has not suspended INR withdrawals, and everything is working fine. The team is actively working and handling the situation well. If they manage to resolve it, it would be great for the entire Indian🇮🇳 #Crypto community. I will continue to support #CoinDCX in getting through this situation. #CryptoMarket4T #AltcoinSeasonLoading #GENIUSAct #HackerAlert #AltcoinBreakout
🚨HACK HACK HACK !! COINDCX WALLET WAS COMPROMISED AND HACKED BY HACKER

THATS WHY I ALWAYS TRUST BINANCE !!!

CoinDCX has not suspended INR withdrawals, and everything is working fine.

The team is actively working and handling the situation well. If they manage to resolve it, it would be great for the entire Indian🇮🇳 #Crypto community.

I will continue to support #CoinDCX in getting through this situation.

#CryptoMarket4T
#AltcoinSeasonLoading
#GENIUSAct
#HackerAlert
#AltcoinBreakout
Article
Let's talk about the trend of BNB (Binance Coin) in plain languageYou can think of BNB as the 'points' of the Binance business empire. This empire includes the world's largest cryptocurrency exchange (like Taobao), its own public chain (like Alipay's Ant Chain), and a bunch of other businesses. What is the current situation? (Current trend) In simple terms: the price of this BNB 'point' is closely tied to the rise and fall of the 'Binance Empire'. When the empire is doing well, the points are valuable; when the empire faces trouble, the points depreciate. It is currently in a very high position, but it has a bit of a 'watching people's faces' flavor.

Let's talk about the trend of BNB (Binance Coin) in plain language

You can think of BNB as the 'points' of the Binance business empire. This empire includes the world's largest cryptocurrency exchange (like Taobao), its own public chain (like Alipay's Ant Chain), and a bunch of other businesses.
What is the current situation? (Current trend)
In simple terms: the price of this BNB 'point' is closely tied to the rise and fall of the 'Binance Empire'. When the empire is doing well, the points are valuable; when the empire faces trouble, the points depreciate. It is currently in a very high position, but it has a bit of a 'watching people's faces' flavor.
·
--
Bearish
#BREAKING 🚨 Balancer Exploit: $100M+ Drained DeFi protocol Balancer was hit by a massive exploit early today. The attackers drained over $100M from core vaults, including: ~7,800 WETH ($28M) ~6,300 osETH ($25M) ~5,400 wstETH ($20M) Total losses are now estimated at $116M+. No full statement from Balancer yet. 🔍 Further analysis: Exploit appears tied to access-control vulnerabilities. This likely triggered a short-term confidence dip across DeFi markets. That would explain the crypto market crash today. Highlights that even major “blue-chip” protocols carry real smart-contract risk. Who do you think is behind this attack? North Korea... again? $LINEA $ASTER $ETH #Linea @Aster_DEX #BinanceLiveFutures #HackerAlert #DEFİ
#BREAKING
🚨 Balancer Exploit: $100M+ Drained

DeFi protocol Balancer was hit by a massive exploit early today. The attackers drained over $100M from core vaults, including:

~7,800 WETH ($28M)

~6,300 osETH ($25M)

~5,400 wstETH ($20M)

Total losses are now estimated at $116M+. No full statement from Balancer yet.

🔍 Further analysis:

Exploit appears tied to access-control vulnerabilities.

This likely triggered a short-term confidence dip across DeFi markets. That would explain the crypto market crash today.

Highlights that even major “blue-chip” protocols carry real smart-contract risk.

Who do you think is behind this attack?
North Korea... again?

$LINEA $ASTER $ETH

#Linea @Aster DEX

#BinanceLiveFutures #HackerAlert #DEFİ
🔥 BREAKING: Russian Hacker Arrested in Phuket — U.S. Extradition Underway 🔥 A 35-year-old Russian national has been arrested in Phuket, Thailand, after a joint operation between Thai authorities and the FBI. He now faces extradition to the United States. 🇷🇺 The Russian Embassy says it is seeking consular access and is still “clarifying the circumstances.” 🔍 Key Facts: • Entered Thailand on Oct 30, 2025, via Phuket Airport • Located in a hotel in Thalang District • Arrest followed an FBI tip sent to Thailand’s CCIB • Police seized laptops, phones & digital wallets for forensic review • Detained under Thailand’s Extradition Act 2008 and moved to Bangkok 🌍 Why He’s Wanted: Thai media report he carried out cyberattacks on government systems across Europe and the U.S., breaching high-security networks and gaining global law-enforcement attention. 🕵️‍♂️ Identity? Police haven’t revealed his name, but Russian outlet Vot Tak suggests he could be Aleksey Lukashev, a GRU officer indicted for the 2016 APT28/Fancy Bear election-related hacks — though this is not confirmed. ⚡ Big Picture: His arrest follows several recent captures of Russian suspects in Thailand linked to international ransomware operations targeting over 17 companies. 🌐 Global cybercrime crackdowns are escalating — even tourist havens aren’t safe anymore. $ADA {future}(ADAUSDT) $INIT {future}(INITUSDT) $ONDO {future}(ONDOUSDT) #CYBER #HackerAlert
🔥 BREAKING: Russian Hacker Arrested in Phuket — U.S. Extradition Underway 🔥
A 35-year-old Russian national has been arrested in Phuket, Thailand, after a joint operation between Thai authorities and the FBI. He now faces extradition to the United States.
🇷🇺 The Russian Embassy says it is seeking consular access and is still “clarifying the circumstances.”
🔍 Key Facts:
• Entered Thailand on Oct 30, 2025, via Phuket Airport
• Located in a hotel in Thalang District
• Arrest followed an FBI tip sent to Thailand’s CCIB
• Police seized laptops, phones & digital wallets for forensic review
• Detained under Thailand’s Extradition Act 2008 and moved to Bangkok
🌍 Why He’s Wanted:
Thai media report he carried out cyberattacks on government systems across Europe and the U.S., breaching high-security networks and gaining global law-enforcement attention.
🕵️‍♂️ Identity?
Police haven’t revealed his name, but Russian outlet Vot Tak suggests he could be Aleksey Lukashev, a GRU officer indicted for the 2016 APT28/Fancy Bear election-related hacks — though this is not confirmed.
⚡ Big Picture:
His arrest follows several recent captures of Russian suspects in Thailand linked to international ransomware operations targeting over 17 companies.
🌐 Global cybercrime crackdowns are escalating — even tourist havens aren’t safe anymore.
$ADA
$INIT
$ONDO

#CYBER #HackerAlert
⚡️ Thought to be a Genius, Turned Out to Panic — This Hacker Burned $5.5 Million in an Instant! In the crypto world, calmness is the most expensive weapon. But this time, a hacker lost control — and lost everything. 💥 According to Lookonchain data, the hacker reportedly lost up to US$5.5 Million after panic selling thousands of ETH as prices plummeted. Ironically, he then bought back at a higher price. A fatal move usually made by beginner traders — not experienced hackers. 📉 This moment occurred when the ETH market was experiencing sharp fluctuations. In a matter of minutes, the “smart” strategy turned into a financial disaster. This story reminds us of one thing: Even the most skilled can fall under the pressure of emotions. 🔥 In the crypto world, it’s not about who is the fastest — but who is the calmest, that is the one who survives. #Write2Earn #ETH #HackerAlert #CryptoNewss #TradingPsychologie $ETH {future}(ETHUSDT)
⚡️ Thought to be a Genius, Turned Out to Panic — This Hacker Burned $5.5 Million in an Instant!

In the crypto world, calmness is the most expensive weapon. But this time, a hacker lost control — and lost everything. 💥

According to Lookonchain data, the hacker reportedly lost up to US$5.5 Million after panic selling thousands of ETH as prices plummeted. Ironically, he then bought back at a higher price.
A fatal move usually made by beginner traders — not experienced hackers.

📉 This moment occurred when the ETH market was experiencing sharp fluctuations. In a matter of minutes, the “smart” strategy turned into a financial disaster.

This story reminds us of one thing:

Even the most skilled can fall under the pressure of emotions.



🔥 In the crypto world, it’s not about who is the fastest — but who is the calmest, that is the one who survives.

#Write2Earn #ETH #HackerAlert #CryptoNewss #TradingPsychologie

$ETH

🚨 The Balancer hacker is back — and now they’re washing the loot through Tornado Cash 😳 According to Odaily, on-chain monitors at Onchain Lens spotted the attacker behind the Balancer exploit moving $ETH into Tornado Cash, the classic playbook for hiding stolen funds. Clear signal: the laundering phase has begun. On-chain never sleeps… and neither do hackers. 👀 #HackerAlert #ETHBreaksATH #BuiltonSolayer
🚨 The Balancer hacker is back — and now they’re washing the loot through Tornado Cash 😳

According to Odaily, on-chain monitors at Onchain Lens spotted the attacker behind the Balancer exploit moving $ETH into Tornado Cash, the classic playbook for hiding stolen funds.

Clear signal: the laundering phase has begun.
On-chain never sleeps… and neither do hackers. 👀
#HackerAlert #ETHBreaksATH #BuiltonSolayer
·
--
Bullish
🚨MILLION DOLLAR MISTAKE:😭$ETH A victim (0xd674) lost 4556 $ETH ($12.4M) due to a copy-paste address mistake. Victim 0xd674 frequently transfers funds to Galaxy Digital via 0x6D90CC...dD2E48. The attacker generated a poison address with the same first and last 4 characters as Galaxy Digital's deposit address and repeatedly sent dust transactions. 11 hours ago, the victim copied an address directly from transaction history to deposit into Galaxy Digital but copied the poison address instead. As a result, 4,556 $ETH ($12.4M) was sent to the attacker. 💢A painful lesson! Always double-check the address before making a transfer. Don't copy addresses from your transaction history for convenience. Victim address: 0xd6741220a947941bF290799811FcDCeA8AE4A7Da #Mistake #crypto #Hack #HackerAlert #hackers
🚨MILLION DOLLAR MISTAKE:😭$ETH

A victim (0xd674) lost 4556 $ETH ($12.4M) due to a copy-paste address mistake.

Victim 0xd674 frequently transfers funds to Galaxy Digital via
0x6D90CC...dD2E48.

The attacker generated a poison address with the same first and last 4 characters as Galaxy Digital's deposit address and repeatedly sent dust transactions.

11 hours ago, the victim copied an address directly from transaction history to deposit into Galaxy Digital but copied the poison address instead.

As a result, 4,556 $ETH ($12.4M) was sent to the attacker.

💢A painful lesson!

Always double-check the address before making a transfer.

Don't copy addresses from your transaction history for convenience.

Victim address:
0xd6741220a947941bF290799811FcDCeA8AE4A7Da

#Mistake #crypto #Hack #HackerAlert #hackers
·
--
Bearish
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨 Another major blow to DeFi security! The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol. 🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi. 📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations! 🔐 This is a harsh reminder to: — Stay updated on security risks — Use cold wallets for long-term holdings — Never go all-in on unverified protocols 👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem. #gmx #defi #HackerAlert #CryptoNewss
🚨 BREAKING: $GMX HACKED FOR $40 MILLION! 🚨

Another major blow to DeFi security!

The on-chain perpetuals exchange GMX has reportedly suffered a $40 million exploit 😱. Initial reports suggest the attacker manipulated smart contract vulnerabilities to drain funds from the protocol.

🧠 $GMX is a popular decentralized trading platform for perpetuals, with a strong community and TVL—this exploit is shaking trust across DeFi.

📉 Expect short-term fear and volatility in related tokens and DeFi platforms. Always use caution in these situations!

🔐 This is a harsh reminder to: — Stay updated on security risks
— Use cold wallets for long-term holdings
— Never go all-in on unverified protocols

👉 More details to come as the post-mortem unfolds. For now, be alert, especially if you hold GMX or are exposed to the Arbitrum ecosystem.

#gmx #defi
#HackerAlert
#CryptoNewss
·
--
Bullish
#HackerAlert JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report. $BTC $ETH $TRX
#HackerAlert
JUST IN: BigONE exchange has been hacked of over $27 million and the hacker has exchanged stolen assets for BTC, TRX, ETH, and SOL, per report.
$BTC $ETH $TRX
Article
Solana Co-Founder’s Personal Data Leaked in Instagram Hack Amid Alleged Extortion AttemptCrypto hacks surge over 130% in Q1 2025 Raj Gokal, co-founder of the Solana blockchain, has become the target of a serious cyberattack. Hackers published his personal identification documents on the compromised Instagram account of rapper Migos. The leak appears to be tied to an unsuccessful extortion attempt — reportedly demanding over $4.3 million. 🔐 Extortion Message: “You Should Have Paid the 40 BTC” Circulating online are photos of Gokal and his wife, alongside their IDs and passports — resembling typical KYC (Know Your Customer) data used on regulated crypto platforms. The sensitive documents were shared on the official Instagram page of rapper Migos, which was apparently hacked as well. A caption under one of the posts read: “You should have paid the 40 BTC” — a statement that led many to speculate the leak followed a failed ransom attempt. At current Bitcoin prices, that would equate to a ransom demand of over $4.3 million. Instagram has since removed the post. 🧠 Social Engineering Suspected Renowned Web3 investigator ZachXBT believes the attack was a result of social engineering — where cybercriminals tricked their way into accessing Gokal’s personal accounts and data. “Raj’s accounts were likely compromised and used in an extortion attempt. Since he didn’t pay, the attackers trolled him by leaking the data through Migos’ Instagram,” said ZachXBT. Interestingly, a week before the incident, Gokal had already warned his followers on X that someone was trying to access his email and social media accounts. 📈 Crypto Hacks in 2025: A Dangerous Spike This attack is just one in a wave of escalating crypto hacks in 2025. 🔹 Q1 2025: According to security firm PeckShield, there were over 60 major hacking incidents, resulting in $1.63 billion in losses — a 131% increase from $706 million in Q1 2024. 🔹 The largest breach targeted Bybit, while Q2 saw the Cetus Protocol on the Sui network lose over $223 million. 🔹 Following the Coinbase data breach confirmed on May 15, reported compensation claims could exceed $400 million — further highlighting that DeFi and centralized platforms remain prime targets. ⚠️ A Call for Caution With the rising number of cyberattacks, the need for increased vigilance is critical — especially when dealing with unknown links or individuals posing as support staff from crypto exchanges. #solana , #CryptoHack , #HackerAlert , #CyberSecurity , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Solana Co-Founder’s Personal Data Leaked in Instagram Hack Amid Alleged Extortion Attempt

Crypto hacks surge over 130% in Q1 2025
Raj Gokal, co-founder of the Solana blockchain, has become the target of a serious cyberattack. Hackers published his personal identification documents on the compromised Instagram account of rapper Migos. The leak appears to be tied to an unsuccessful extortion attempt — reportedly demanding over $4.3 million.

🔐 Extortion Message: “You Should Have Paid the 40 BTC”
Circulating online are photos of Gokal and his wife, alongside their IDs and passports — resembling typical KYC (Know Your Customer) data used on regulated crypto platforms.
The sensitive documents were shared on the official Instagram page of rapper Migos, which was apparently hacked as well. A caption under one of the posts read: “You should have paid the 40 BTC” — a statement that led many to speculate the leak followed a failed ransom attempt.
At current Bitcoin prices, that would equate to a ransom demand of over $4.3 million. Instagram has since removed the post.

🧠 Social Engineering Suspected
Renowned Web3 investigator ZachXBT believes the attack was a result of social engineering — where cybercriminals tricked their way into accessing Gokal’s personal accounts and data.
“Raj’s accounts were likely compromised and used in an extortion attempt. Since he didn’t pay, the attackers trolled him by leaking the data through Migos’ Instagram,” said ZachXBT.

Interestingly, a week before the incident, Gokal had already warned his followers on X that someone was trying to access his email and social media accounts.

📈 Crypto Hacks in 2025: A Dangerous Spike
This attack is just one in a wave of escalating crypto hacks in 2025.
🔹 Q1 2025: According to security firm PeckShield, there were over 60 major hacking incidents, resulting in $1.63 billion in losses — a 131% increase from $706 million in Q1 2024.
🔹 The largest breach targeted Bybit, while Q2 saw the Cetus Protocol on the Sui network lose over $223 million.
🔹 Following the Coinbase data breach confirmed on May 15, reported compensation claims could exceed $400 million — further highlighting that DeFi and centralized platforms remain prime targets.

⚠️ A Call for Caution
With the rising number of cyberattacks, the need for increased vigilance is critical — especially when dealing with unknown links or individuals posing as support staff from crypto exchanges.

#solana , #CryptoHack , #HackerAlert , #CyberSecurity , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Login to explore more contents
Join global crypto users on Binance Square
⚡️ Get latest and useful information about crypto.
💬 Trusted by the world’s largest crypto exchange.
👍 Discover real insights from verified creators.
Email / Phone number