Binance Square

haker

13,042 views
7 Discussing
Mar 21
See original
#Haker šŸ•µļøā€ā™‚ļø The story of the hacker who returned $600 million in crypto šŸŽ­ In 2021, one of the largest hacks in the history of cryptocurrencies occurred. An unknown hacker stole $611 million in digital assets from Poly Network, a DeFi platform. However, what happened next surprised everyoneā€¦ šŸ”¹ The theft: The hacker exploited a vulnerability in Poly Network's smart contracts and took funds in ETH, USDC, and other cryptos. šŸ”¹ The unexpected twist: Instead of disappearing with the money, the hacker began to return the funds gradually. In messages within the transactions, he claimed he did it ā€œfor funā€ and to teach a lesson about security. šŸ”¹ The surprising ending: After returning all the money, Poly Network offered him a position as a "security advisor," although it is unknown if he accepted. The community nicknamed him "Mr. White Hat," in reference to ethical hackers. šŸ”„ Do you think it was an act of ethics or did he simply fear being caught? Let me know your opinion in the comments. šŸ‘‡šŸ‘‡ $BTC $ETH $BNB
#Haker šŸ•µļøā€ā™‚ļø The story of the hacker who returned $600 million in crypto šŸŽ­

In 2021, one of the largest hacks in the history of cryptocurrencies occurred. An unknown hacker stole $611 million in digital assets from Poly Network, a DeFi platform. However, what happened next surprised everyoneā€¦

šŸ”¹ The theft:
The hacker exploited a vulnerability in Poly Network's smart contracts and took funds in ETH, USDC, and other cryptos.

šŸ”¹ The unexpected twist:
Instead of disappearing with the money, the hacker began to return the funds gradually. In messages within the transactions, he claimed he did it ā€œfor funā€ and to teach a lesson about security.

šŸ”¹ The surprising ending:
After returning all the money, Poly Network offered him a position as a "security advisor," although it is unknown if he accepted. The community nicknamed him "Mr. White Hat," in reference to ethical hackers.

šŸ”„ Do you think it was an act of ethics or did he simply fear being caught? Let me know your opinion in the comments. šŸ‘‡šŸ‘‡

$BTC $ETH $BNB
Feb 18
#cryptojackers Cryptojacking: Hackers just want to borrow your CPU Cryptojackers are individuals or groups who engage in the unauthorized use of computing resources to mine cryptocurrency. This process, known as cryptojacking, involves exploiting a victim's device to mine cryptocurrencies without their consent or knowledge. Cryptojackers typically target various devices such as desktops, laptops, smartphones, servers, and even cloud infrastructure. They employ a range of techniques to gain access to these resources, including embedding malicious scripts in websites, using phishing emails to trick users into downloading mining software, and compromising open-source code repositories. One of the most common methods used by cryptojackers is to inject JavaScript-based mining scripts into websites, which run when users visit the site. Another method involves tricking users into downloading mining software through phishing emails. Cryptojackers often target high-value assets like servers and cloud infrastructure due to their powerful computational capabilities. They may also exploit vulnerabilities in software and hardware to gain unauthorized access to computing resources. The primary motivation for cryptojackers is financial gain. By using stolen computing resources, they can mine cryptocurrency without incurring the costs associated with purchasing and maintaining mining hardware and paying for electricity. Cryptojacking can lead to performance issues for victims, including slower device performance, overheating, increased electricity bills, and shortened device lifespan. #Write2Earn #Haker #BinanceSquareFamily
#cryptojackers

Cryptojacking:

Hackers just want to borrow your CPU

Cryptojackers are individuals or groups who engage in the unauthorized use of

computing resources to mine cryptocurrency.

This process, known as cryptojacking, involves exploiting a victim's device to

mine cryptocurrencies without their consent or knowledge.

Cryptojackers typically target various devices such as desktops, laptops,

smartphones, servers, and even cloud infrastructure.

They employ a range of techniques to gain access to these resources,

including embedding malicious scripts in websites, using phishing emails to

trick users into downloading mining software, and compromising open-source code repositories.

One of the most common methods used by cryptojackers is to inject

JavaScript-based mining scripts into websites, which run when users visit

the site.

Another method involves tricking users into downloading mining software

through phishing emails.

Cryptojackers often target high-value assets like servers and cloud

infrastructure due to their powerful computational capabilities.

They may also exploit vulnerabilities in software and hardware to gain

unauthorized access to computing resources.

The primary motivation for cryptojackers is financial gain.

By using stolen computing resources, they can mine cryptocurrency without

incurring the costs associated with purchasing and maintaining mining

hardware and paying for electricity.

Cryptojacking can lead to performance issues for victims, including slower

device performance, overheating, increased electricity bills, and

shortened device lifespan.

#Write2Earn
#Haker
#BinanceSquareFamily
Bybit Security Breach.What Happened?On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a significant security breach, resulting in the theft of approximately $1.5 billion worth of Ethereum ($ETH ). This incident is considered one of the largest in the history of cryptocurrency thefts. Details of the Breach The attack occurred during a routine transfer from one of Bybit's cold wallets to a warm wallet. The perpetrator manipulated the transaction interface, gaining control over the cold wallet and transferring around 401,000 ETH to an unidentified address. Bybit's CEO, Ben Zhou, confirmed the breach, stating that the attacker exploited a "masked" user interface and URL, deceiving wallet signers into approving a malicious transaction. This manipulation altered the smart contract logic, granting the attacker control over the wallet's contents. Immediate Response and Assurances In the aftermath of the breach, Bybit assured its users that all client assets remain secure and fully backed. The exchange processed over 350,000 withdrawal requests promptly, emphasizing its commitment to maintaining operational integrity. Despite the substantial loss, Zhou emphasized that Bybit remains solvent and capable of absorbing the financial impact without compromising user funds. Ongoing Investigation Bybit is actively collaborating with blockchain forensic experts and authorities to trace and recover the stolen funds. Preliminary analyses suggest that the attack may be linked to North Korean hacker groups, known for previous large-scale cryptocurrency thefts. The stolen ETH is reportedly being moved to new addresses, complicating recovery efforts. Industry Implications This breach underscores the persistent security challenges within the cryptocurrency sector. In 2024 alone, approximately $2.2 billion was stolen from various crypto platforms, highlighting the need for enhanced security measures. The Bybit incident serves as a stark reminder for exchanges and users alike to prioritize robust security protocols to safeguard digital assets. As the investigation continues, the cryptocurrency community remains vigilant, awaiting further updates on the situation and potential measures to prevent such incidents in the future. #BybitSecurityBreach #VIRTUALWhale #Haker #SecurityAlert

Bybit Security Breach.What Happened?

On February 21, 2025, Dubai-based cryptocurrency exchange Bybit experienced a significant security breach, resulting in the theft of approximately $1.5 billion worth of Ethereum ($ETH ). This incident is considered one of the largest in the history of cryptocurrency thefts.
Details of the Breach
The attack occurred during a routine transfer from one of Bybit's cold wallets to a warm wallet. The perpetrator manipulated the transaction interface, gaining control over the cold wallet and transferring around 401,000 ETH to an unidentified address. Bybit's CEO, Ben Zhou, confirmed the breach, stating that the attacker exploited a "masked" user interface and URL, deceiving wallet signers into approving a malicious transaction. This manipulation altered the smart contract logic, granting the attacker control over the wallet's contents.
Immediate Response and Assurances
In the aftermath of the breach, Bybit assured its users that all client assets remain secure and fully backed. The exchange processed over 350,000 withdrawal requests promptly, emphasizing its commitment to maintaining operational integrity. Despite the substantial loss, Zhou emphasized that Bybit remains solvent and capable of absorbing the financial impact without compromising user funds.
Ongoing Investigation
Bybit is actively collaborating with blockchain forensic experts and authorities to trace and recover the stolen funds. Preliminary analyses suggest that the attack may be linked to North Korean hacker groups, known for previous large-scale cryptocurrency thefts. The stolen ETH is reportedly being moved to new addresses, complicating recovery efforts.
Industry Implications
This breach underscores the persistent security challenges within the cryptocurrency sector. In 2024 alone, approximately $2.2 billion was stolen from various crypto platforms, highlighting the need for enhanced security measures. The Bybit incident serves as a stark reminder for exchanges and users alike to prioritize robust security protocols to safeguard digital assets.
As the investigation continues, the cryptocurrency community remains vigilant, awaiting further updates on the situation and potential measures to prevent such incidents in the future.
#BybitSecurityBreach #VIRTUALWhale #Haker #SecurityAlert
Oct 3, 2024
See original
Report: Cryptocurrency Thefts Decline, Measures Complicate Digital FraudSlumistā€™s Q3 2024 report on cryptocurrency theft reveals a decline in overall theft incidents. However, the report highlights a rise in sophisticated phishing attempts, which often involve advanced social engineering tactics. One worrying trend is that sponsored search results can lead to fraudulent links. However, the most common thefts are simpler, resulting from key leaks.

Report: Cryptocurrency Thefts Decline, Measures Complicate Digital Fraud

Slumistā€™s Q3 2024 report on cryptocurrency theft reveals a decline in overall theft incidents. However, the report highlights a rise in sophisticated phishing attempts, which often involve advanced social engineering tactics.
One worrying trend is that sponsored search results can lead to fraudulent links. However, the most common thefts are simpler, resulting from key leaks.
Login to explore more contents