Binance Square

hack

941,918 megtekintés
552 beszélgető
ImCryptOpus
·
--
🥷 #STEP Step: We announce the cessation of operations for Step Finance, SolanaFloor, and Remora Markets. Following the hack in late January, we explored all possible solutions to the issue, including funding and acquisition opportunities. Unfortunately, we were unable to find a viable option, and we have made the difficult decision to immediately cease all operations. #hack #crypto
🥷 #STEP Step: We announce the cessation of operations for Step Finance, SolanaFloor, and Remora Markets. Following the hack in late January, we explored all possible solutions to the issue, including funding and acquisition opportunities. Unfortunately, we were unable to find a viable option, and we have made the difficult decision to immediately cease all operations. #hack

#crypto
🥷 Dragonfly managing partner Haseeb announced that the firm has raised $650 million for Fund IV and now manages approximately $4 billion in assets in a post titled “How to Build a Venture Capital Firm.” Former co-founder Alexander Pack publicly responded, stating he and Bo Feng co-founded Dragonfly over a year prior to Haseeb's hiring and had already made significant investments, accusing Haseeb of “rewriting history.” Haseeb countered that before his arrival, Dragonfly “had never led a deal” and functioned as a fund of funds. #hack #crypto
🥷 Dragonfly managing partner Haseeb announced that the firm has raised $650 million for Fund IV and now manages approximately $4 billion in assets in a post titled “How to Build a Venture Capital Firm.” Former co-founder Alexander Pack publicly responded, stating he and Bo Feng co-founded Dragonfly over a year prior to Haseeb's hiring and had already made significant investments, accusing Haseeb of “rewriting history.” Haseeb countered that before his arrival, Dragonfly “had never led a deal” and functioned as a fund of funds. #hack

#crypto
Solana-Based Step Finance Collapses Following Major Treasury HackStep Finance, one of the best-known portfolio management platforms on the Solana network, has officially ceased operations following a massive security breach and unsuccessful attempts to secure emergency funding. Key Takeaways Step Finance shut down after a January 31 hack that drained over 261,000 SOL from its treasury.Losses were estimated between $27M and nearly $40M, and recovery funding efforts failed.The closure includes SolanaFloor and Remora Markets.The STEP token collapsed more than 96%, with buyback and redemption plans now in development. The shutdown, announced on February 23-24, 2026, marks a dramatic end for a project that once served as a central dashboard for Solana DeFi users. The decision follows weeks of financial strain after attackers compromised executive-level devices and drained treasury funds. Security Breach Triggered Collapse According to the team, the incident occurred on January 31, 2026, when hackers executed what was described as a sophisticated attack targeting senior staff devices. The breach allowed unauthorized access to treasury and fee wallets. Roughly 261,854 SOL was stolen in the attack. Initial loss estimates ranged between $27 million and $30 million, but some reports later placed total damage closer to $40 million as market conditions fluctuated. Despite the setback, the team spent nearly four weeks pursuing emergency liquidity solutions, including bridge financing and potential acquisition talks. Those efforts ultimately failed, leaving closure as the only viable option. Entire Ecosystem Winds Down The shutdown extends beyond the core platform. SolanaFloor, the project’s integrated news and analytics arm, will halt new reporting activities but keep its digital archive accessible. Remora Markets, the tokenized equities division, is also winding down operations as part of the broader shutdown process. The collapse highlights how interconnected services within crypto ecosystems can unravel quickly when treasury exposure becomes critical. STEP Token Crashes The platform’s native asset, STEP, suffered catastrophic losses. Following the January hack, the token plunged more than 96%. After the official shutdown announcement, its market capitalization fell below $200,000, effectively wiping out most remaining value. The crash underscores the extreme risk associated with protocol-level treasury breaches, especially when token economics rely heavily on operational continuity. Compensation and Redemption Plans The team has outlined preliminary recovery measures for affected users: STEP holders may be eligible for a buyback program based on a pre-hack snapshot taken before January 31. Further details are expected in upcoming communications. For users of Remora’s rTokens, the situation appears more stable. These assets are reportedly backed 1:1, and holders will be able to redeem them for USDC through an independent process. Users with remaining DeFi positions connected to the ecosystem are being urged to transfer assets to alternative platforms as soon as possible. For updates regarding redemption timelines and procedural instructions, the team has advised monitoring the project’s official X account. The shutdown represents one of the most significant Solana ecosystem failures of 2026 so far, reinforcing ongoing concerns around operational security, executive device vulnerabilities, and treasury risk management within DeFi platforms. #Hack

Solana-Based Step Finance Collapses Following Major Treasury Hack

Step Finance, one of the best-known portfolio management platforms on the Solana network, has officially ceased operations following a massive security breach and unsuccessful attempts to secure emergency funding.

Key Takeaways
Step Finance shut down after a January 31 hack that drained over 261,000 SOL from its treasury.Losses were estimated between $27M and nearly $40M, and recovery funding efforts failed.The closure includes SolanaFloor and Remora Markets.The STEP token collapsed more than 96%, with buyback and redemption plans now in development.
The shutdown, announced on February 23-24, 2026, marks a dramatic end for a project that once served as a central dashboard for Solana DeFi users. The decision follows weeks of financial strain after attackers compromised executive-level devices and drained treasury funds.
Security Breach Triggered Collapse
According to the team, the incident occurred on January 31, 2026, when hackers executed what was described as a sophisticated attack targeting senior staff devices. The breach allowed unauthorized access to treasury and fee wallets.
Roughly 261,854 SOL was stolen in the attack. Initial loss estimates ranged between $27 million and $30 million, but some reports later placed total damage closer to $40 million as market conditions fluctuated.
Despite the setback, the team spent nearly four weeks pursuing emergency liquidity solutions, including bridge financing and potential acquisition talks. Those efforts ultimately failed, leaving closure as the only viable option.
Entire Ecosystem Winds Down
The shutdown extends beyond the core platform.
SolanaFloor, the project’s integrated news and analytics arm, will halt new reporting activities but keep its digital archive accessible.
Remora Markets, the tokenized equities division, is also winding down operations as part of the broader shutdown process.
The collapse highlights how interconnected services within crypto ecosystems can unravel quickly when treasury exposure becomes critical.
STEP Token Crashes
The platform’s native asset, STEP, suffered catastrophic losses. Following the January hack, the token plunged more than 96%. After the official shutdown announcement, its market capitalization fell below $200,000, effectively wiping out most remaining value.
The crash underscores the extreme risk associated with protocol-level treasury breaches, especially when token economics rely heavily on operational continuity.
Compensation and Redemption Plans
The team has outlined preliminary recovery measures for affected users:
STEP holders may be eligible for a buyback program based on a pre-hack snapshot taken before January 31. Further details are expected in upcoming communications.
For users of Remora’s rTokens, the situation appears more stable. These assets are reportedly backed 1:1, and holders will be able to redeem them for USDC through an independent process.
Users with remaining DeFi positions connected to the ecosystem are being urged to transfer assets to alternative platforms as soon as possible.
For updates regarding redemption timelines and procedural instructions, the team has advised monitoring the project’s official X account.
The shutdown represents one of the most significant Solana ecosystem failures of 2026 so far, reinforcing ongoing concerns around operational security, executive device vulnerabilities, and treasury risk management within DeFi platforms.
#Hack
HOLDSTATION DRAINED! $462K GONE. DeFAI Smart Wallet HOLDSTATION just got hit. A massive security breach has wiped out 462,000 USDT. The team is scrambling, investigating the chaos, and beefing up defenses. A compensation plan is coming. Stay tuned. This is a wake-up call. This is not financial advice. #DeFi #Hack #CryptoNews #SecurityBreach 🚨
HOLDSTATION DRAINED! $462K GONE.

DeFAI Smart Wallet HOLDSTATION just got hit. A massive security breach has wiped out 462,000 USDT. The team is scrambling, investigating the chaos, and beefing up defenses. A compensation plan is coming. Stay tuned. This is a wake-up call.

This is not financial advice.

#DeFi #Hack #CryptoNews #SecurityBreach 🚨
$388K GONE. PHISHING ATTACK ROCKS GO+ Malicious transaction exploited. USDT drained from compromised address. Over 388,000 USDT vanished. Security alert issued. This is a wake-up call. Protect your assets. Disclaimer: Not financial advice. #crypto #scam #hack #USDT 🚨
$388K GONE. PHISHING ATTACK ROCKS GO+

Malicious transaction exploited. USDT drained from compromised address. Over 388,000 USDT vanished. Security alert issued. This is a wake-up call. Protect your assets.

Disclaimer: Not financial advice.

#crypto #scam #hack #USDT 🚨
Step Finance is shutting down — and the way it happened is more instructive than the headline number. On January 31, 2026, during APAC hours, attackers compromised devices belonging to members of Step Finance's executive team. There was no smart contract exploit. No code vulnerability. No on-chain flaw. The breach was entirely operational — compromised endpoints gave attackers access to treasury and fee wallets, from which they unstaked and transferred roughly 261,854 $SOL . At the time of the attack, that was worth somewhere between $27M and $30M. A later full review placed total losses closer to $40M after accounting for cascading impacts. The team spent the following three weeks exploring every recovery path — bridge financing, acquisition offers, partnership structures. They recovered approximately $4.7M working with security partners and using protections built into Solana's newer token standards. The gap was still too wide. On February 23rd, Step Finance announced the immediate wind-down of all operations, including SolanaFloor — one of the most consistently useful Solana ecosystem media outlets — and Remora Markets, its tokenized equity trading platform. STEP token collapsed more than 96% to $0.00057 after the hack, then dropped another 36% on the shutdown announcement. A pre-incident snapshot buyback program for STEP holders is in development. Remora rToken holders can redeem 1:1 for $USDC through a separate process. SolanaFloor's archive stays online. What I keep coming back to is the nature of the attack. Solana's smart contract layer was never touched. The vulnerability was entirely in the human and device infrastructure surrounding a team managing tens of millions in treasury assets. That's not a Solana problem — it's a DeFi operations problem that exists across every chain and never shows up in a security audit. #solana #StepFinance #defi #CryptoSecurity #Hack
Step Finance is shutting down — and the way it happened is more instructive than the headline number.

On January 31, 2026, during APAC hours, attackers compromised devices belonging to members of Step Finance's executive team. There was no smart contract exploit. No code vulnerability. No on-chain flaw. The breach was entirely operational — compromised endpoints gave attackers access to treasury and fee wallets, from which they unstaked and transferred roughly 261,854 $SOL . At the time of the attack, that was worth somewhere between $27M and $30M. A later full review placed total losses closer to $40M after accounting for cascading impacts.

The team spent the following three weeks exploring every recovery path — bridge financing, acquisition offers, partnership structures. They recovered approximately $4.7M working with security partners and using protections built into Solana's newer token standards. The gap was still too wide. On February 23rd, Step Finance announced the immediate wind-down of all operations, including SolanaFloor — one of the most consistently useful Solana ecosystem media outlets — and Remora Markets, its tokenized equity trading platform.

STEP token collapsed more than 96% to $0.00057 after the hack, then dropped another 36% on the shutdown announcement. A pre-incident snapshot buyback program for STEP holders is in development. Remora rToken holders can redeem 1:1 for $USDC through a separate process. SolanaFloor's archive stays online.

What I keep coming back to is the nature of the attack. Solana's smart contract layer was never touched. The vulnerability was entirely in the human and device infrastructure surrounding a team managing tens of millions in treasury assets. That's not a Solana problem — it's a DeFi operations problem that exists across every chain and never shows up in a security audit.

#solana #StepFinance #defi #CryptoSecurity #Hack
$STEP COLLAPSE $2.9M GONE. NO RESCUE. Entry: 0.00058 🟩 Target 1: 0.00015 🎯 Stop Loss: 0.00080 🛑 Step Finance is DEAD. All operations STOPPED immediately. They failed to find funding. The STEP token is down 97.6%. Attackers breached executive devices, not smart contracts. 261,854 SOL vanished. No recovery plan. Remora Markets' plans are wiped out. SolanaFloor halts new content. This is a massive blow to Solana DeFi. Total value locked on Solana is down 52%. SOL itself is trading 74% below its all-time high. A simple device hack drained the treasury. Not financial advice. #STEP #Solana #DeFi #Crypto #Hack 💥
$STEP COLLAPSE $2.9M GONE. NO RESCUE.

Entry: 0.00058 🟩
Target 1: 0.00015 🎯
Stop Loss: 0.00080 🛑

Step Finance is DEAD. All operations STOPPED immediately. They failed to find funding. The STEP token is down 97.6%. Attackers breached executive devices, not smart contracts. 261,854 SOL vanished. No recovery plan. Remora Markets' plans are wiped out. SolanaFloor halts new content. This is a massive blow to Solana DeFi. Total value locked on Solana is down 52%. SOL itself is trading 74% below its all-time high. A simple device hack drained the treasury.

Not financial advice.

#STEP #Solana #DeFi #Crypto #Hack 💥
SOLANA SHOCKWAVE: 40 MILLION DRAINED, MAJOR PLATFORMS SHUTTERED Step Finance, SolanaFloor, and Remora Markets are GONE. A massive $40 million hack has crippled the Solana ecosystem. Recovery efforts failed. Operations have ceased. The project team is enacting a buyout plan for $STEP holders and a 1:1 redemption for $rToken holders. This is a brutal market reset. News is for reference, not investment advice. #Solana #DeFi #CryptoNews #Hack 💥
SOLANA SHOCKWAVE: 40 MILLION DRAINED, MAJOR PLATFORMS SHUTTERED

Step Finance, SolanaFloor, and Remora Markets are GONE. A massive $40 million hack has crippled the Solana ecosystem. Recovery efforts failed. Operations have ceased. The project team is enacting a buyout plan for $STEP holders and a 1:1 redemption for $rToken holders. This is a brutal market reset.

News is for reference, not investment advice.

#Solana #DeFi #CryptoNews #Hack 💥
SOLANA EXPLODES: $40 MILLION HACK SHUTS DOWN MAJOR PROJECTS Step Finance, SolanaFloor, and Remora Markets are GONE. A devastating $40 million hack has forced them to cease all operations. The Solana DeFi landscape is reeling. This is a brutal cleansing of the market. Funds are irretrievable. The team is scrambling to implement a buyout for $STEP holders and a 1:1 redemption for rToken holders. This signals extreme risk in current DeFi. Disclaimer: This is not financial advice. #Solana #DeFi #CryptoNews #Hack 💥
SOLANA EXPLODES: $40 MILLION HACK SHUTS DOWN MAJOR PROJECTS

Step Finance, SolanaFloor, and Remora Markets are GONE. A devastating $40 million hack has forced them to cease all operations. The Solana DeFi landscape is reeling. This is a brutal cleansing of the market. Funds are irretrievable. The team is scrambling to implement a buyout for $STEP holders and a 1:1 redemption for rToken holders. This signals extreme risk in current DeFi.

Disclaimer: This is not financial advice.

#Solana #DeFi #CryptoNews #Hack 💥
🚨 MAJOR SOLANA DEFI PLATFORM SHUTS DOWN AFTER $26M HACK Step Finance — known as the “front page of Solana” — is officially winding down. The team tried: ❌ New funding ❌ Acquisition talks Nothing worked. One exploit was enough to end it. Security is still the biggest risk in DeFi. ⚠️ #Solana #DeFi #Crypto #Hack #SOL #CryptoNews #Blockchain #Web3 #SmartContracts #CyberSecurity #Altcoins #CryptoInvesting #OnChain #DigitalAssets #Rekt #CryptoRisk #Bearish #CryptoMarket
🚨 MAJOR SOLANA DEFI PLATFORM SHUTS DOWN AFTER $26M HACK

Step Finance — known as the “front page of Solana” — is officially winding down.

The team tried:
❌ New funding
❌ Acquisition talks

Nothing worked.

One exploit was enough to end it.

Security is still the biggest risk in DeFi. ⚠️

#Solana #DeFi #Crypto #Hack #SOL #CryptoNews #Blockchain #Web3 #SmartContracts #CyberSecurity #Altcoins #CryptoInvesting #OnChain #DigitalAssets #Rekt #CryptoRisk #Bearish #CryptoMarket
·
--
🚨 USD1 E WLFI: DEPEG TEMPORANEO PER IL PROGETTO TRUMP 🚨 La stablecoin USD1 legata a Trump ha subito un depeg improvviso, scivolando a circa $0,98 su Binance prima di recuperare in pochi minuti. Contemporaneamente, il token $WLFI di World Liberty Financial è crollato del 7% circa. World Liberty Financial, progetto crypto della famiglia Trump (con Donald come "chief crypto advocate" e i figli come ambasciatori Web3), ha dichiarato di aver respinto un "attacco coordinato". Coinvolti account X hackerati, disinformazione e short-selling per manipolare il mercato. USD1, ancorata al dollaro USA, è parte delle iniziative crypto trumpiane, collegate al Board of Peace per Gaza. Il depeg evidenzia rischi di volatilità nelle stablecoin non fully collateralizzate o sotto pressione speculativa, nonostante claim di backing solido. WLFI, token DeFi per lending e trading, amplifica l'impatto familiare nel settore. Esperti notano vulnerabilità: hack social, FUD (fear, uncertainty, doubt) e vendite allo scoperto possono causare panic selling. World Liberty insiste sulla resilienza, ma l'episodio solleva dubbi su sicurezza e regolamentazione. Possibile segnale di manipolazione o stress liquidity? Il recupero rapido suggerisce liquidità forte, ma sicuramente, da monitorare. #breakingnews #WLFI #USD1 #Hack
🚨 USD1 E WLFI: DEPEG TEMPORANEO PER IL PROGETTO TRUMP 🚨

La stablecoin USD1 legata a Trump ha subito un depeg improvviso, scivolando a circa $0,98 su Binance prima di recuperare in pochi minuti.
Contemporaneamente, il token $WLFI di World Liberty Financial è crollato del 7% circa.

World Liberty Financial, progetto crypto della famiglia Trump (con Donald come "chief crypto advocate" e i figli come ambasciatori Web3), ha dichiarato di aver respinto un "attacco coordinato".
Coinvolti account X hackerati, disinformazione e short-selling per manipolare il mercato.

USD1, ancorata al dollaro USA, è parte delle iniziative crypto trumpiane, collegate al Board of Peace per Gaza.
Il depeg evidenzia rischi di volatilità nelle stablecoin non fully collateralizzate o sotto pressione speculativa, nonostante claim di backing solido.
WLFI, token DeFi per lending e trading, amplifica l'impatto familiare nel settore.
Esperti notano vulnerabilità: hack social, FUD (fear, uncertainty, doubt) e vendite allo scoperto possono causare panic selling.

World Liberty insiste sulla resilienza, ma l'episodio solleva dubbi su sicurezza e regolamentazione.
Possibile segnale di manipolazione o stress liquidity?
Il recupero rapido suggerisce liquidità forte, ma sicuramente, da monitorare.
#breakingnews #WLFI #USD1 #Hack
CRYPTO WEEKEND WRAP: $11B Scandal, $2M Hack & A.I. News You Can’t MissGM, Square family! 🌅 If you checked out for the weekend, you missed a WILD 24 hours. Between geopolitical bombshells, bridge hacks, and a genius idea from Vitalik—here is everything you need to look smart on Monday. 1/ 🇷🇺 THE $11 BILLION SHADOW NETWORK Blockchain sleuths at Elliptic just dropped a nuke. They uncovered a network of Russian crypto exchanges helping sanctioned entities move money. One platform called ABCeX reportedly handled $11 Billion in transactions. This is the big one, guys. Regulators are watching. Is this the moment they crack down—or finally admit crypto is just a tool? Either way, volatility incoming. 2/ 🔓 IOTEX HACKED: $2M Gone Bridge exploits are back, and they are brutal. The IoTeX network was forced to halt after a private key leak let hackers drain $2 Million from the treasury (USDC, USDT, and IOTX). The team says they contained it and are working with cops/exchanges to recover funds. Moral of the story: Not your keys? Not your coins. Stay safe out there. 3/ 🤖 VITALIK’S BIG IDEA: A.I. VOTING Ethereum’s co-founder just gave us hope for the future. Vitalik proposed using Artificial Intelligence to help normal people vote in DAOs. Imagine an A.I. assistant that reads the fine print on those boring governance proposals for you, filters out scams, and lets YOU make the final call. This is how we scale decentralization. Bullish on A.I. x Crypto. 4/ 📉 THE MACRO CLOUD (Trump Edition) Let’s be real—prices are hurting. Bitcoin is hovering near $66k and "Extreme Fear" is back in the chat. 😱 Why? Trump Tariffs: Proposed tariffs jumped from 10% to 15%, spooking global markets.ETF Bleed: Spot Bitcoin ETFs have seen 4 weeks of straight outflows. Institutions are scared. But as Tim Draper says... that just means it's time to buy the dip? 💬 SQUARE TALK: Are these Russia sanctions the start of a new crypto war? Or just FUD before the weekend pump? Drop your hottest take below. 👇 And follow for more news that actually matters. #Bitcoin  #Ethereum  #CryptoNews  #Altcoin  #Hack {spot}(BNBUSDT) {spot}(ETHUSDT) {spot}(BTCUSDT)

CRYPTO WEEKEND WRAP: $11B Scandal, $2M Hack & A.I. News You Can’t Miss

GM, Square family! 🌅
If you checked out for the weekend, you missed a WILD 24 hours. Between geopolitical bombshells, bridge hacks, and a genius idea from Vitalik—here is everything you need to look smart on Monday.
1/ 🇷🇺 THE $11 BILLION SHADOW NETWORK
Blockchain sleuths at Elliptic just dropped a nuke.
They uncovered a network of Russian crypto exchanges helping sanctioned entities move money.
One platform called ABCeX reportedly handled $11 Billion in transactions.
This is the big one, guys. Regulators are watching. Is this the moment they crack down—or finally admit crypto is just a tool?
Either way, volatility incoming.
2/ 🔓 IOTEX HACKED: $2M Gone
Bridge exploits are back, and they are brutal.
The IoTeX network was forced to halt after a private key leak let hackers drain $2 Million from the treasury (USDC, USDT, and IOTX).
The team says they contained it and are working with cops/exchanges to recover funds.
Moral of the story: Not your keys? Not your coins. Stay safe out there.
3/ 🤖 VITALIK’S BIG IDEA: A.I. VOTING
Ethereum’s co-founder just gave us hope for the future.
Vitalik proposed using Artificial Intelligence to help normal people vote in DAOs.
Imagine an A.I. assistant that reads the fine print on those boring governance proposals for you, filters out scams, and lets YOU make the final call.
This is how we scale decentralization. Bullish on A.I. x Crypto.
4/ 📉 THE MACRO CLOUD (Trump Edition)
Let’s be real—prices are hurting.
Bitcoin is hovering near $66k and "Extreme Fear" is back in the chat. 😱
Why?
Trump Tariffs: Proposed tariffs jumped from 10% to 15%, spooking global markets.ETF Bleed: Spot Bitcoin ETFs have seen 4 weeks of straight outflows.
Institutions are scared. But as Tim Draper says... that just means it's time to buy the dip?
💬 SQUARE TALK:
Are these Russia sanctions the start of a new crypto war? Or just FUD before the weekend pump?
Drop your hottest take below. 👇
And follow for more news that actually matters.
#Bitcoin  #Ethereum  #CryptoNews  #Altcoin  #Hack
TREASURY DRAINED. $IOTX HOLDINGS WIPED OUT. Private key exploit. Over $4.3 million VANISHED. Attacker drained USDC, USDT, IOTX, WBTC, BUSD. Swapped for ETH, bridged to Bitcoin. 111 million CIOTX minted. This is a CATASTROPHE. Your assets are NOT safe. Disclaimer: This is not financial advice. #IoTeX #CryptoNews #Exploit #Hack 🚨 {future}(IOTXUSDT)
TREASURY DRAINED. $IOTX HOLDINGS WIPED OUT.

Private key exploit. Over $4.3 million VANISHED. Attacker drained USDC, USDT, IOTX, WBTC, BUSD. Swapped for ETH, bridged to Bitcoin. 111 million CIOTX minted. This is a CATASTROPHE. Your assets are NOT safe.

Disclaimer: This is not financial advice.

#IoTeX #CryptoNews #Exploit #Hack 🚨
MOONWELL DEBACLE: $1.78M GONE IN SECONDS! Oracle error wiped out 1096.317 cbETH. Liquidators feasted on collateral. Protocol is reeling. Borrowing and supply caps slashed to zero. The damage is done. Disclaimer: This is not financial advice. #DeFi #Crypto #Hack #Moonwell #cbETH 🚨
MOONWELL DEBACLE: $1.78M GONE IN SECONDS!

Oracle error wiped out 1096.317 cbETH. Liquidators feasted on collateral. Protocol is reeling. Borrowing and supply caps slashed to zero. The damage is done.

Disclaimer: This is not financial advice.

#DeFi #Crypto #Hack #Moonwell #cbETH 🚨
DATA BREACH EXPOSES $COW CUSTOMERS! $COW insiders hacked. 2.5GB of data leaked. Names, addresses, phone numbers compromised. Figure refused ransom. Users notified. Fallout contained. This is a critical security event. Stay vigilant. Disclaimer: This is not financial advice. #crypto #hack #security #datacrime 🚨 {future}(COWUSDT)
DATA BREACH EXPOSES $COW CUSTOMERS!

$COW insiders hacked. 2.5GB of data leaked. Names, addresses, phone numbers compromised. Figure refused ransom. Users notified. Fallout contained.

This is a critical security event. Stay vigilant.

Disclaimer: This is not financial advice.

#crypto #hack #security #datacrime 🚨
·
--
Bikajellegű
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa. 💀 La estafa del Memecoin de Grimace 👾 Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos. 📊 Pump & Dump Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos. 💸 El desembolso En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana". ⚠️ Consecuencias Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas. #scam #hack #Solana⁩ $SOL #RiskManagement {spot}(SOLUSDT)
🍔 Hackeo de Memecoin de McDonald's: ladrones ciberneticos roban alrededor de $700,000 en Solana

En un giro inesperado, el 21 de agosto, estafadores hackearon la cuenta oficial de Instagram de McDonald's, utilizando la plataforma del gigante de la comida rápida para vender una memecoin falsa basada en la mascota Grimace. Los hackers lograron recaudar más de $700,000 en Solana antes de que se descubriera la estafa.

💀 La estafa del Memecoin de Grimace 👾

Aprovechando la página de Instagram de McDonald's, con 5.1 millones de seguidores, los hackers promocionaron el token falso de Grimace como un "experimento de McDonald's en Solana". Esta táctica rápidamente captó la atención de la comunidad criptográfica, haciendo que la capitalización de mercado del token pasara de unos pocos miles de dólares a $25 millones en solo 30 minutos.

📊 Pump & Dump

Los malandros ya habían asegurado el 75% del suministro de tokens Grimace usando el implementador de memecoin Solana pump.fun. Luego distribuyeron estos tokens en 100 billeteras diferentes. A medida que el valor del token aumentaba, los hackers comenzaron a vender sus tenencias, lo que provocó que el precio del token cayera a $650,000 en solo 40 minutos.

💸 El desembolso

En total, los choros se llevaron alrededor de $700,000 en Solana de este esquema de pump and dump. Incluso editaron la biografía de Instagram de McDonald's para presumir de su éxito, escribiendo: "Lo siento, India_X_Kr3w acaba de engañarte, gracias por los $700,000 en Solana".

⚠️ Consecuencias

Las publicaciones y la biografía finalmente fueron restauradas, y McDonald's emitió una declaración reconociendo el ataque como un "incidente aislado". Este incidente es un recordatorio de los peligros en el mundo de las criptomonedas, donde incluso marcas conocidas pueden ser utilizadas para facilitar estafas.

#scam #hack #Solana⁩ $SOL #RiskManagement
·
--
Actualización del Hackeo en DeFi: ¿Un hacker "ético"? 🤔😇 Novedades sobre el hackeo de $40M a Vector Finance: El atacante ha devuelto $15 millones en ETH a la billetera del protocolo esta mañana. Junto con la transacción, el hacker dejó un mensaje on-chain afirmando que solo quería "exponer una vulnerabilidad crítica" y que se quedará con un 10% como "recompensa por el bug". El equipo de Vector está intentando negociar la devolución del resto de los fondos. #DeFi #Hack #Seguridad #Arbitrum #WhiteHats $BTC {future}(BTCUSDT) $ETH {future}(ETHUSDT) $BNB {future}(BNBUSDT)
Actualización del Hackeo en DeFi: ¿Un hacker "ético"? 🤔😇
Novedades sobre el hackeo de $40M a Vector Finance: El atacante ha devuelto $15 millones en ETH a la billetera del protocolo esta mañana.
Junto con la transacción, el hacker dejó un mensaje on-chain afirmando que solo quería "exponer una vulnerabilidad crítica" y que se quedará con un 10% como "recompensa por el bug". El equipo de Vector está intentando negociar la devolución del resto de los fondos.
#DeFi #Hack #Seguridad #Arbitrum #WhiteHats $BTC
$ETH
$BNB
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
A további tartalmak felfedezéséhez jelentkezz be
Fedezd fel a legfrissebb kriptovaluta-híreket
⚡️ Vegyél részt a legfrissebb kriptovaluta megbeszéléseken
💬 Lépj kapcsolatba a kedvenc alkotóiddal
👍 Élvezd a téged érdeklő tartalmakat
E-mail-cím/telefonszám