Binance Square

phishingattack

37,156 views
52 ກຳລັງສົນທະນາ
Crypto King2
·
--
Crypto King2 12:43 AM・Mar 14, 2024 Crypto Alert: $2 Million Lost in eETH Phishing Attack! 🚨 In a recent report by BlockBeats, a devastating phishing attack targeted a user whose address begins with 0x39b, causing them to suffer a staggering loss of $2 million in eETH. 😱 The malicious transaction, designed to boost subsidies, resulted in the substantial loss of valuable assets. This incident serves as a stark reminder for crypto holders to prioritize security measures and remain vigilant against rising phishing threats. Stay safe, stay alert! 🔒 #CryptoSecurity #phishingattack Follow | Like ❤️ | Quote 🔄 | Comment
Crypto King2

12:43 AM・Mar 14, 2024
Crypto Alert: $2 Million Lost in eETH Phishing Attack! 🚨

In a recent report by BlockBeats, a devastating phishing attack targeted a user whose address begins with 0x39b, causing them to suffer a staggering loss of $2 million in eETH. 😱 The malicious transaction, designed to boost subsidies, resulted in the substantial loss of valuable assets. This incident serves as a stark reminder for crypto holders to prioritize security measures and remain vigilant against rising phishing threats. Stay safe, stay alert! 🔒 #CryptoSecurity #phishingattack

Follow | Like ❤️ | Quote 🔄 | Comment
Cardano Users Targeted by Sophisticated Phishing AttackAccording to PANews, a sophisticated phishing attack is targeting Cardano users by distributing announcements disguised as the 'Eternl Desktop' wallet. This malicious campaign aims to trick users into downloading an MSI file containing remote control tools. The attackers impersonate official communications and reference NIGHT and ATMA token incentives to lure victims. They are using the domain download.eternldesktop.network to distribute unsigned installation packages. Security researchers have identified that the file includes the LogMeIn Resolve component, which allows for remote command execution and persistent system control. Users are advised to download wallet software only from official sources. $ADA $NIGHT #ADA #NIGHT #TAREKZOZO #news #phishingattack

Cardano Users Targeted by Sophisticated Phishing Attack

According to PANews, a sophisticated phishing attack is targeting Cardano users by distributing announcements disguised as the 'Eternl Desktop' wallet. This malicious campaign aims to trick users into downloading an MSI file containing remote control tools. The attackers impersonate official communications and reference NIGHT and ATMA token incentives to lure victims. They are using the domain download.eternldesktop.network to distribute unsigned installation packages. Security researchers have identified that the file includes the LogMeIn Resolve component, which allows for remote command execution and persistent system control. Users are advised to download wallet software only from official sources.
$ADA $NIGHT
#ADA #NIGHT #TAREKZOZO #news #phishingattack
Tron Reveals X Account Breach Was Caused by Sophisticated Social Engineering SchemeTron DAO has officially confirmed that its primary X (formerly Twitter) account was compromised late Friday evening following a highly targeted social engineering attack against one of its senior communications staff. In a statement shared early Saturday morning, Tron explained that the attacker impersonated a representative from a prominent blockchain media outlet, convincing a team member to grant access to a third-party scheduling tool. The tool was then used to bypass direct platform logins and post a fake “TRX Anniversary Airdrop” link to over 1.2 million followers. “The individual behind this breach executed a well-crafted social engineering strategy, including a fake press briefing invitation and forged NDAs,” the Tron team stated. “Once access was obtained, the account was used to spread malicious links that directed users to a phishing site.” The site, designed to mimic Tron’s official staking dashboard, lured users into connecting their wallets to claim a non-existent airdrop. Several victims have since reported unauthorized withdrawals of $TRX and TRC-20 tokens. The fraudulent post remained live for just under an hour before the team regained control of the account. Tron has since removed all malicious content and launched a full internal security audit, working with cybersecurity firms to trace stolen funds. No backend systems, smart contracts, or core infrastructure were affected, the team emphasized. However, the event has sparked renewed concerns over centralized access controls and the risks posed by third-party applications. Justin Sun, founder of Tron, took to X shortly after the incident was contained, urging users to “never trust sudden airdrop links” and assuring the community that new security protocols, including hardware key requirements, will be implemented across all Tron-managed platforms. Initial estimates suggest that over $90,000 in user funds may have been stolen, though investigations are ongoing. Users are advised to revoke permissions from any suspicious dApps and remain cautious. #TronHack #TRXAlert #CryptoSecurity #PhishingAttack #BlockchainNews

Tron Reveals X Account Breach Was Caused by Sophisticated Social Engineering Scheme

Tron DAO has officially confirmed that its primary X (formerly Twitter) account was compromised late Friday evening following a highly targeted social engineering attack against one of its senior communications staff.
In a statement shared early Saturday morning, Tron explained that the attacker impersonated a representative from a prominent blockchain media outlet, convincing a team member to grant access to a third-party scheduling tool. The tool was then used to bypass direct platform logins and post a fake “TRX Anniversary Airdrop” link to over 1.2 million followers.
“The individual behind this breach executed a well-crafted social engineering strategy, including a fake press briefing invitation and forged NDAs,” the Tron team stated. “Once access was obtained, the account was used to spread malicious links that directed users to a phishing site.”
The site, designed to mimic Tron’s official staking dashboard, lured users into connecting their wallets to claim a non-existent airdrop. Several victims have since reported unauthorized withdrawals of $TRX and TRC-20 tokens.
The fraudulent post remained live for just under an hour before the team regained control of the account. Tron has since removed all malicious content and launched a full internal security audit, working with cybersecurity firms to trace stolen funds.
No backend systems, smart contracts, or core infrastructure were affected, the team emphasized. However, the event has sparked renewed concerns over centralized access controls and the risks posed by third-party applications.
Justin Sun, founder of Tron, took to X shortly after the incident was contained, urging users to “never trust sudden airdrop links” and assuring the community that new security protocols, including hardware key requirements, will be implemented across all Tron-managed platforms.
Initial estimates suggest that over $90,000 in user funds may have been stolen, though investigations are ongoing. Users are advised to revoke permissions from any suspicious dApps and remain cautious.

#TronHack #TRXAlert #CryptoSecurity #PhishingAttack #BlockchainNews
⚠️ $15M+ Lost in DeFi Hacks – Bunni DEX & Venus Protocol Hit⚠️ 🔴 Bunni DEX Exploit On Sept 2, Bunni was exploited for $2.3M on Ethereum. Attackers hit the USDT & USDC vaults and moved funds through the DeFi. Bunni has paused all the contracts across networks. 🟠 Venus Protocol Phishing Venus lost $13.5M from a phishing attack (not a contract bug). Ops are paused while security checks run. ⚠️ Reminder:Watch out for phishing, double-check links, and stay careful with DeFi. 👉 Stay safe out there! #StaySafeCryptoCommunity #phishingattack #DEFİ $XRP {future}(XRPUSDT)
⚠️ $15M+ Lost in DeFi Hacks – Bunni DEX & Venus Protocol Hit⚠️

🔴 Bunni DEX Exploit
On Sept 2, Bunni was exploited for $2.3M on Ethereum. Attackers hit the USDT & USDC vaults and moved funds through the DeFi. Bunni has paused all the contracts across networks.

🟠 Venus Protocol Phishing
Venus lost $13.5M from a phishing attack (not a contract bug). Ops are paused while security checks run.

⚠️ Reminder:Watch out for phishing, double-check links, and stay careful with DeFi.

👉 Stay safe out there!

#StaySafeCryptoCommunity #phishingattack #DEFİ
$XRP
Cardano phishing attack warning: Scammers are distributing fake 'Eternl Desktop' wallet announcements to trick users into downloading an MSI file that contains remote control tools. The malicious campaign impersonates official communications and mentions NIGHT and ATMA token incentives. The attackers use the domain download.eternldesktop.network to host unsigned installation packages. Security researchers found the file includes the LogMeIn Resolve component, allowing remote command execution and persistent system control. Only download wallet software from official sources. #Cardano #PhishingAttack #CryptoSecurity #EternlDesktop #CyberSecurity $ADA {spot}(ADAUSDT)
Cardano phishing attack warning: Scammers are distributing fake 'Eternl Desktop' wallet announcements to trick users into downloading an MSI file that contains remote control tools. The malicious campaign impersonates official communications and mentions NIGHT and ATMA token incentives. The attackers use the domain download.eternldesktop.network to host unsigned installation packages. Security researchers found the file includes the LogMeIn Resolve component, allowing remote command execution and persistent system control. Only download wallet software from official sources.

#Cardano #PhishingAttack #CryptoSecurity #EternlDesktop #CyberSecurity $ADA
🚨 *Phishing Attack: 50M USDT Stolen, 48-Hour Ultimatum! ⏳* A victim of a massive phishing scam has fought back! 💪 - _50 million USDT stolen_, but the attacker has been tracked 🔍 - Victim’s message to hacker: _"We’ve filed a case, and you’re under 24/7 surveillance"_ 😱 - Offer: Return 98% of funds + keep $1M bounty 🤑 - Deadline: *48 hours* ⏰ 👮‍♂️ _No cooperation?_ Legal & law enforcement action incoming! 🔗 Track the address: [Victim’s specified address] #PhishingAttack #CryptoSecurity #USDT #WhiteHat #Blockchain
🚨 *Phishing Attack: 50M USDT Stolen, 48-Hour Ultimatum! ⏳*

A victim of a massive phishing scam has fought back! 💪
- _50 million USDT stolen_, but the attacker has been tracked 🔍
- Victim’s message to hacker: _"We’ve filed a case, and you’re under 24/7 surveillance"_ 😱
- Offer: Return 98% of funds + keep $1M bounty 🤑
- Deadline: *48 hours* ⏰

👮‍♂️ _No cooperation?_ Legal & law enforcement action incoming!
🔗 Track the address: [Victim’s specified address]

#PhishingAttack #CryptoSecurity #USDT #WhiteHat #Blockchain
🚨 $48 MILLION GONE IN A CLICK — SOUTH KOREA’S BITCOIN BLUNDER 🚨#SouthKoreaSeizedBTCLoss South Korea has just suffered a staggering $48M loss in seized Bitcoin—and it didn’t happen through a hack on the blockchain. It happened through a phishing scam 😬 Here’s what went wrong 👇 💻 A fake website fooled a government employee 🔑 Wallet credentials were compromised 💰 ~70 billion won in BTC vanished—just like that The breach surfaced during a routine audit at the Gwangju District Prosecutors’ Office, exposing uncomfortable truths about how state-held crypto is actually protected. This isn’t just a financial loss—it’s a global wake-up call 🔔 “Offline” storage isn’t invincible. Human error is still the weakest link. And governments are not immune to basic crypto security failures. 🔍 Authorities are now racing to trace the missing BTC 📉 Markets are paying attention ⚖️ Regulators may be forced to rethink custody standards for seized digital assets If governments can lose Bitcoin to phishing… who’s really safe? #CryptoSecurity #Bitcoin #PhishingAttack $BTC {future}(BTCUSDT) $BNB {future}(BNBUSDT) Follow RJCryptoX for real-time alerts.

🚨 $48 MILLION GONE IN A CLICK — SOUTH KOREA’S BITCOIN BLUNDER 🚨

#SouthKoreaSeizedBTCLoss South Korea has just suffered a staggering $48M loss in seized Bitcoin—and it didn’t happen through a hack on the blockchain. It happened through a phishing scam 😬
Here’s what went wrong 👇
💻 A fake website fooled a government employee
🔑 Wallet credentials were compromised
💰 ~70 billion won in BTC vanished—just like that
The breach surfaced during a routine audit at the Gwangju District Prosecutors’ Office, exposing uncomfortable truths about how state-held crypto is actually protected.
This isn’t just a financial loss—it’s a global wake-up call 🔔
“Offline” storage isn’t invincible.
Human error is still the weakest link.
And governments are not immune to basic crypto security failures.
🔍 Authorities are now racing to trace the missing BTC
📉 Markets are paying attention
⚖️ Regulators may be forced to rethink custody standards for seized digital assets
If governments can lose Bitcoin to phishing… who’s really safe?
#CryptoSecurity #Bitcoin #PhishingAttack
$BTC
$BNB

Follow RJCryptoX for real-time alerts.
·
--
ສັນຍານກະທິງ
🚨 $48M Gone in a Click — South Korea’s Bitcoin Blunder 🚨 South Korea reportedly lost $48 million in seized Bitcoin — not to a hack, but a phishing scam 😬 💻 Fake website fooled a government employee 🔑 Wallet credentials compromised 💰 ~70 billion won in BTC vanished The breach surfaced during an audit at the Gwangju District Prosecutors’ Office, exposing a harsh reality: 🔔 Cold storage isn’t invincible ⚠️ Human error is still the weakest link 🏛️ Governments aren’t immune to crypto security failures 🔍 Authorities are tracing the funds ⚖️ Custody standards may now face scrutiny If governments can lose BTC to phishing… who’s really safe? #bitcoin.” #CryptoSecurity #phishingattack $BTC {spot}(BTCUSDT)
🚨 $48M Gone in a Click — South Korea’s Bitcoin Blunder 🚨
South Korea reportedly lost $48 million in seized Bitcoin — not to a hack, but a phishing scam 😬
💻 Fake website fooled a government employee
🔑 Wallet credentials compromised
💰 ~70 billion won in BTC vanished
The breach surfaced during an audit at the Gwangju District Prosecutors’ Office, exposing a harsh reality:
🔔 Cold storage isn’t invincible
⚠️ Human error is still the weakest link
🏛️ Governments aren’t immune to crypto security failures
🔍 Authorities are tracing the funds
⚖️ Custody standards may now face scrutiny
If governments can lose BTC to phishing… who’s really safe?
#bitcoin.” #CryptoSecurity #phishingattack $BTC
SARKARI OFFICE SE $48 MILLION GAIB! 🚨 ​South Korea ki Gwangju District Prosecutors’ Office ne ek routine audit ke dauran paya ki unka 70 Billion Won ($48 Million) worth ka seized Bitcoin ($BTC) gayab ho chuka hai. 😱 ​📉 Hua Kya? ​Ek government employee ek Phishing Scam ka shikar ho gaya. Jab woh seized assets (jo USB devices par store the) ko check kar raha tha, usne galti se ek Fake Website par click kar diya. ​Result: Wallet ke credentials aur passwords leak ho gaye aur hackers ne pura fund saaf kar diya! ​🔍 Key Highlights: ​Huge Loss: Takreeban 70 Billion Won ki chori. ​Security Breach: Itni badi agency hone ke bawajood security protocols mein itni badi chook. ​Offline Storage Fail: Yeh incident dikhata hai ki agar credentials safe nahi hain, toh "offline" storage bhi khatre mein hai. ​💡 Sabak Kya Milta Hai? ​Agar ek sarkari agency jiske paas layered security hoti hai, woh phishing ka shikar ho sakti hai, toh hum aur aap kitne safe hain? ​Never click on suspicious links. ​Hamesha Double-check karein ki website asli hai ya nahi. ​Institutional custody aur security rules ko globally rethink karne ka waqt aa gaya hai. ​Kya aapko lagta hai ki seized crypto ko store karne ka koi behtar tareeka hai? Comment mein apni rai dein! 👇 ​#SouthKoreaSeizedBTCLoss #BTC #CryptoSecurity #PhishingAttack #BlockchainNews #GwangjuNews #CryptoSafety$BTC {spot}(BTCUSDT)
SARKARI OFFICE SE $48 MILLION GAIB! 🚨
​South Korea ki Gwangju District Prosecutors’ Office ne ek routine audit ke dauran paya ki unka 70 Billion Won ($48 Million) worth ka seized Bitcoin ($BTC ) gayab ho chuka hai. 😱
​📉 Hua Kya?
​Ek government employee ek Phishing Scam ka shikar ho gaya. Jab woh seized assets (jo USB devices par store the) ko check kar raha tha, usne galti se ek Fake Website par click kar diya.
​Result: Wallet ke credentials aur passwords leak ho gaye aur hackers ne pura fund saaf kar diya!
​🔍 Key Highlights:
​Huge Loss: Takreeban 70 Billion Won ki chori.
​Security Breach: Itni badi agency hone ke bawajood security protocols mein itni badi chook.
​Offline Storage Fail: Yeh incident dikhata hai ki agar credentials safe nahi hain, toh "offline" storage bhi khatre mein hai.
​💡 Sabak Kya Milta Hai?
​Agar ek sarkari agency jiske paas layered security hoti hai, woh phishing ka shikar ho sakti hai, toh hum aur aap kitne safe hain?
​Never click on suspicious links.
​Hamesha Double-check karein ki website asli hai ya nahi.
​Institutional custody aur security rules ko globally rethink karne ka waqt aa gaya hai.
​Kya aapko lagta hai ki seized crypto ko store karne ka koi behtar tareeka hai? Comment mein apni rai dein! 👇
#SouthKoreaSeizedBTCLoss #BTC #CryptoSecurity #PhishingAttack #BlockchainNews #GwangjuNews #CryptoSafety$BTC
·
--
ສັນຍານໝີ
South Korea Reports Loss of $48 Million in Seized Bitcoin Following Phishing Attack A routine audit at the Gwangju District Prosecutors’ Office uncovered the theft of approximately 70 billion won ($48 million USD) in seized Bitcoin. The breach occurred after a government employee fell victim to a phishing scam, compromising the credentials to the official wallet. Key Details: · Method: An employee was tricked into entering wallet credentials on a fraudulent website. · Assets: The stolen Bitcoin was part of assets seized and held by the prosecution service. · Discovery: The loss was identified during a standard internal audit procedure. · Status: An investigation is active, focusing on tracing the stolen funds. Broader Implications: This incident underscores critical vulnerabilities in how governments and institutions secure seized digital assets. It highlights that offline ("cold") storage solutions are only as secure as their access protocols. The event is prompting urgent reassessment of: · Digital asset custody standards for public institutions. · Security training to prevent social engineering attacks. · Potential regulatory frameworks for managing seized cryptocurrency. Authorities continue their investigation into the theft. #SouthKorea #CryptoSecurity #PhishingAttack #Bitcoin #Regulation $BTC {future}(BTCUSDT)
South Korea Reports Loss of $48 Million in Seized Bitcoin Following Phishing Attack

A routine audit at the Gwangju District Prosecutors’ Office uncovered the theft of approximately 70 billion won ($48 million USD) in seized Bitcoin. The breach occurred after a government employee fell victim to a phishing scam, compromising the credentials to the official wallet.

Key Details:

· Method: An employee was tricked into entering wallet credentials on a fraudulent website.
· Assets: The stolen Bitcoin was part of assets seized and held by the prosecution service.
· Discovery: The loss was identified during a standard internal audit procedure.
· Status: An investigation is active, focusing on tracing the stolen funds.

Broader Implications:
This incident underscores critical vulnerabilities in how governments and institutions secure seized digital assets. It highlights that offline ("cold") storage solutions are only as secure as their access protocols. The event is prompting urgent reassessment of:
· Digital asset custody standards for public institutions.
· Security training to prevent social engineering attacks.
· Potential regulatory frameworks for managing seized cryptocurrency.

Authorities continue their investigation into the theft.

#SouthKorea #CryptoSecurity #PhishingAttack #Bitcoin #Regulation
$BTC
This screenshot, is one of the most dangerous thing in web3 right now. Don't know why? Let me explain... This is the preferred method that Discord phishers are using lately. It is a pop up window, it looks like one your browser made, but it isn't. It is javascript, and you never left the webpage they sent you to. Usually fake Discord verification bot page. Entering your Discord information on this page will not send it to Discord, it is sending it straight to the attacker. totp 2FA will not save you (a security key here probably would save you.) This Browser-in-the-Browser attack is easy to foil, here's how you protect yourself: NEVER SIGN INTO ANY SERVICE THAT POPS UP IN A NEW WINDOW FROM A LINK. Close the pop up, open a new browser window. Navigate to the service yourself. Log in there. That's it, do that every time. This can apply to crypto too. Never sign a txn that pops up after clicking a link someone sent you. #Hackers #phishingattack #BitEagleNews
This screenshot, is one of the most dangerous thing in web3 right now.

Don't know why? Let me explain...

This is the preferred method that Discord phishers are using lately.

It is a pop up window, it looks like one your browser made, but it isn't.

It is javascript, and you never left the webpage they sent you to. Usually fake Discord verification bot page.

Entering your Discord information on this page will not send it to Discord, it is sending it straight to the attacker.

totp 2FA will not save you (a security key here probably would save you.)

This Browser-in-the-Browser attack is easy to foil, here's how you protect yourself:

NEVER SIGN INTO ANY SERVICE THAT POPS UP IN A NEW WINDOW FROM A LINK.

Close the pop up, open a new browser window. Navigate to the service yourself. Log in there.

That's it, do that every time. This can apply to crypto too. Never sign a txn that pops up after clicking a link someone sent you.

#Hackers #phishingattack #BitEagleNews
TON-Based Wallet Dryer Shuts Down and Shifts Focus to BitcoinA wallet drainer operating on The Open Network (TON) blockchain has announced it is ceasing operations due to a lack of large investors (so-called "whales") in the network. Service Shutdown and User Redirection On October 7, an announcement was made by the TON-based wallet drainer, stating that it is officially shutting down and recommending its users move to another cryptocurrency draining service. Scam Sniffer, a Web3 platform focused on anti-fraud protection, shared a screenshot of this announcement. The #hackers explained that the lack of large investors in the TON ecosystem was the reason for the shutdown: "Since TON has no whales and the community is small, we are closing down." The announcement also urged users to switch to draining #bitcoin☀️ instead of TON, claiming that those who enjoyed draining on TON would "love" draining #BTC☀ as well. New Focus and Departure from TON ( #Toncoin ) The wallet drainer directed its users to another service and announced that the TON-based draining system would not return. Back in June, some drainers had started focusing more on the TON ecosystem. Raz Niv, co-founder of Blockaid, noted that the amount of value flowing through TON had attracted the attention of more drainers. Fake Transactions as a Trap for Users One trick used by TON drainers involved fake transactions of 5,000 USDT. This scam exploited TON’s comment feature, which allows transfers to include custom messages, effectively masking the real purpose of signatures. Users were lured by messages such as "Receive 5,000 USDT" and a "Confirm" button, but once the transaction was signed, the tokens began to be drained. Losses Due to Phishing Scam Sniffer reported that similar scams in May resulted in the loss of 22,000 toncoins, which were worth over $150,000 at the time. Additionally, data shows that approximately 10,800 people fell victim to #phishingattack in September, with around $46.6 million in digital assets lost that month. The largest portion of these losses came from a single phishing transaction, which drained over $32 million in cryptocurrencies. phising attack trick crypto holders into linking their wallets to fraudulent services like drainers, allowing malicious actors to withdraw their victim's funds without further verification. Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“  

TON-Based Wallet Dryer Shuts Down and Shifts Focus to Bitcoin

A wallet drainer operating on The Open Network (TON) blockchain has announced it is ceasing operations due to a lack of large investors (so-called "whales") in the network.
Service Shutdown and User Redirection
On October 7, an announcement was made by the TON-based wallet drainer, stating that it is officially shutting down and recommending its users move to another cryptocurrency draining service. Scam Sniffer, a Web3 platform focused on anti-fraud protection, shared a screenshot of this announcement. The #hackers explained that the lack of large investors in the TON ecosystem was the reason for the shutdown:
"Since TON has no whales and the community is small, we are closing down."
The announcement also urged users to switch to draining #bitcoin☀️ instead of TON, claiming that those who enjoyed draining on TON would "love" draining #BTC☀ as well.
New Focus and Departure from TON ( #Toncoin )
The wallet drainer directed its users to another service and announced that the TON-based draining system would not return. Back in June, some drainers had started focusing more on the TON ecosystem. Raz Niv, co-founder of Blockaid, noted that the amount of value flowing through TON had attracted the attention of more drainers.
Fake Transactions as a Trap for Users
One trick used by TON drainers involved fake transactions of 5,000 USDT. This scam exploited TON’s comment feature, which allows transfers to include custom messages, effectively masking the real purpose of signatures. Users were lured by messages such as "Receive 5,000 USDT" and a "Confirm" button, but once the transaction was signed, the tokens began to be drained.
Losses Due to Phishing
Scam Sniffer reported that similar scams in May resulted in the loss of 22,000 toncoins, which were worth over $150,000 at the time. Additionally, data shows that approximately 10,800 people fell victim to #phishingattack in September, with around $46.6 million in digital assets lost that month. The largest portion of these losses came from a single phishing transaction, which drained over $32 million in cryptocurrencies.
phising attack trick crypto holders into linking their wallets to fraudulent services like drainers, allowing malicious actors to withdraw their victim's funds without further verification.

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

 
#SouthKoreaSeizedBTCLoss $BTC 🚨 **$48 MILLION GONE IN A CLICK** 🚨 South Korea just lost **$48M worth of seized Bitcoin** after a government employee fell for a **phishing scam** 😬 💻 A fake website 🔑 Compromised wallet credentials 💰 **70 billion won in BTC vanished** The breach was uncovered during a routine audit at the **Gwangju District Prosecutors’ Office**, exposing serious flaws in how governments secure seized crypto assets. This isn’t just a loss — it’s a **wake-up call** 🔔 Even “offline” crypto storage isn’t immune, and the incident raises big questions about **digital asset custody, security protocols, and regulation** worldwide. 🔍 Investigations are ongoing to trace the missing BTC 📉 Markets are watching closely ⚖️ Regulators may be forced to rethink how seized crypto is protected **If governments can lose Bitcoin… who’s really safe?** #SouthKoreaSeizedBTCLoss #CryptoSecurity #phishingattack #BlockchainNews
#SouthKoreaSeizedBTCLoss
$BTC

🚨 **$48 MILLION GONE IN A CLICK** 🚨
South Korea just lost **$48M worth of seized Bitcoin** after a government employee fell for a **phishing scam** 😬

💻 A fake website
🔑 Compromised wallet credentials
💰 **70 billion won in BTC vanished**
The breach was uncovered during a routine audit at the **Gwangju District Prosecutors’ Office**, exposing serious flaws in how governments secure seized crypto assets.

This isn’t just a loss — it’s a **wake-up call** 🔔
Even “offline” crypto storage isn’t immune, and the incident raises big questions about **digital asset custody, security protocols, and regulation** worldwide.
🔍 Investigations are ongoing to trace the missing BTC

📉 Markets are watching closely
⚖️ Regulators may be forced to rethink how seized crypto is protected
**If governments can lose Bitcoin… who’s really safe?**
#SouthKoreaSeizedBTCLoss #CryptoSecurity #phishingattack #BlockchainNews
📉 #SouthKoreaSeizedBTCLoss — South Korean Prosecutors Lose Tens of Millions in Seized Bitcoin! 🇰🇷💸 In a shocking development for the crypto world, authorities in South Korea’s Gwangju District Prosecutors’ Office have revealed that a huge amount of seized Bitcoin has gone missing while in state custody. Officials discovered the loss during a routine internal inspection of confiscated digital assets. 🔍 What Happened? • About 70 billion won (~$47 – 48 million USD) worth of Bitcoin that had been seized from criminal cases disappeared. • Prosecutors believe the loss occurred after someone mistakenly accessed a phishing website, which exposed private key credentials stored on USB drives. Once the credentials were exposed, the BTC was irreversibly transferred out. • The exact amount and destination of the stolen Bitcoin have not been officially confirmed, and the investigation is ongoing. ⚠️ Why This Matters This incident highlights security challenges even for official state custody of digital assets — if law enforcement can fall victim to a phishing attack, it raises questions about broader institutional readiness to manage cryptocurrencies securely. Officials are working to trace the missing funds and are reviewing custody procedures, but there’s currently no public clarity on recovery or accountability. 🔐 Takeaway for Crypto Users This story reinforces something the crypto community already knows: security practices matter hugely, whether you’re an individual or an institution. #bitcoin #phishingattack #CryptoSecurity $BTC {spot}(BTCUSDT) $BNB {spot}(BNBUSDT)
📉 #SouthKoreaSeizedBTCLoss — South Korean Prosecutors Lose Tens of Millions in Seized Bitcoin! 🇰🇷💸

In a shocking development for the crypto world, authorities in South Korea’s Gwangju District Prosecutors’ Office have revealed that a huge amount of seized Bitcoin has gone missing while in state custody. Officials discovered the loss during a routine internal inspection of confiscated digital assets.

🔍 What Happened?
• About 70 billion won (~$47 – 48 million USD) worth of Bitcoin that had been seized from criminal cases disappeared.

• Prosecutors believe the loss occurred after someone mistakenly accessed a phishing website, which exposed private key credentials stored on USB drives. Once the credentials were exposed, the BTC was irreversibly transferred out.

• The exact amount and destination of the stolen Bitcoin have not been officially confirmed, and the investigation is ongoing.

⚠️ Why This Matters
This incident highlights security challenges even for official state custody of digital assets — if law enforcement can fall victim to a phishing attack, it raises questions about broader institutional readiness to manage cryptocurrencies securely.

Officials are working to trace the missing funds and are reviewing custody procedures, but there’s currently no public clarity on recovery or accountability.

🔐 Takeaway for Crypto Users
This story reinforces something the crypto community already knows: security practices matter hugely, whether you’re an individual or an institution.
#bitcoin #phishingattack #CryptoSecurity
$BTC
$BNB
Постачальник шкідливого програмного забезпечення Inferno Drainer оголосив про припинення діяльності #InfernoDrainer Drainer, постачальник програмного забезпечення для крадіжки криптовалют, звернув свою діяльність. За даними розробників, цього року за допомогою Inferno Drainer було вкрадено криптоактиви на $80 млн. Згідно із заявою, всі файли, сервери та інфраструктура, необхідні для запуску шкідливих програм, не будуть знищені та залишаться активними. Команда Inferno Drainer видалила свій обліковий запис у Telegram і попередила своїх «клієнтів», щоб вони не довіряли іншим сервісам, які можуть використовувати схожу назву. «Це був довгий шлях. Але, на жаль, ніщо не вічне. Дуже дякую всім, хто працював з нами. Ми сподіваємося, що ви запам'ятаєте нас як найкращу систему для створення фішингових сайтів, яка будь-коли існувала», - написано у зверненні Inferno Drainer. Inferno Drainer набув популярності на початку цього року і став широко використовуватися зловмисниками після закриття сервісу Monkey Drainer. Як і його попередник, Inferno Drainer пропонував своє програмне забезпечення для спустошення криптовалютних гаманців, отримуючи комісійні - 20% вкрадених коштів. За даними аналітичної платформи Web3 Scam Sniffer, з лютого 2023 року за допомогою Inferno Drainer було вкрадено майже $70 млн у понад 100 000 жертв. Проте, за підрахунками самої команди Inferno Drainer, вкрадені криптоактиви оцінюються на суму понад $80 млн. Останнім часом фішери часто користуються сервісом контекстної реклами Google Ads. За даними платформи #ScamSniffer , у квітні користувачі втратили близько $4 млн на рекламованих Google Ads фішингових криптовалютних сайтах. #radionovcrypto #phishingattack #BTC
Постачальник шкідливого програмного забезпечення Inferno Drainer оголосив про припинення діяльності

#InfernoDrainer Drainer, постачальник програмного забезпечення для крадіжки криптовалют, звернув свою діяльність. За даними розробників, цього року за допомогою Inferno Drainer було вкрадено криптоактиви на $80 млн. Згідно із заявою, всі файли, сервери та інфраструктура, необхідні для запуску шкідливих програм, не будуть знищені та залишаться активними. Команда Inferno Drainer видалила свій обліковий запис у Telegram і попередила своїх «клієнтів», щоб вони не довіряли іншим сервісам, які можуть використовувати схожу назву. «Це був довгий шлях. Але, на жаль, ніщо не вічне. Дуже дякую всім, хто працював з нами. Ми сподіваємося, що ви запам'ятаєте нас як найкращу систему для створення фішингових сайтів, яка будь-коли існувала», - написано у зверненні Inferno Drainer. Inferno Drainer набув популярності на початку цього року і став широко використовуватися зловмисниками після закриття сервісу Monkey Drainer. Як і його попередник, Inferno Drainer пропонував своє програмне забезпечення для спустошення криптовалютних гаманців, отримуючи комісійні - 20% вкрадених коштів. За даними аналітичної платформи Web3 Scam Sniffer, з лютого 2023 року за допомогою Inferno Drainer було вкрадено майже $70 млн у понад 100 000 жертв. Проте, за підрахунками самої команди Inferno Drainer, вкрадені криптоактиви оцінюються на суму понад $80 млн. Останнім часом фішери часто користуються сервісом контекстної реклами Google Ads. За даними платформи #ScamSniffer , у квітні користувачі втратили близько $4 млн на рекламованих Google Ads фішингових криптовалютних сайтах.

#radionovcrypto #phishingattack #BTC
Breaking: Alleged Phishing Attack on #SAVM Whale - OnChain Analysis1/ 🚨 Breaking: Alleged Phishing Attack on #SAVM Whale 🚨 🔗 Ongoing Outflow 🌐 Address: 0x0c008e6479a83be6a6c49d95c2029a6064136688 💼 Token: SatoshiVM | Amount: 193.676K 💰 Transaction: $2.55M | Price: $0.215 🗓️ Jan 25, 20:57 🔍 Details: Whale 0x0c0 transferred out 193,676 SAVM to two addresses, 0xea5 and 0x406. Allegedly, the whale fell victim to a phishing attack, leading to the transfer of all SAVM to these addresses. 💸 Profit Turned Loss: In the past 11 hours, the SAVM tokens were sold for only 437 ETH ($892K) by the two receivers. The SAVM price plummeted by 48.39% in the last 24 hours. 🛡️ Stay Alert: This incident highlights the vulnerability of large holders to phishing attacks. The immediate sell-off and drop in SAVM price emphasize the market impact. 📊 Market Impact: Traders and investors should monitor the fallout from this event. The sudden sell-off could create uncertainty and impact the broader market sentiment. 2/ 🔄 Understanding the Alleged Phishing Attack The whale, 0x0c0, bought 193,676 SAVM with 2.1M USDT in the last 2 days. The phishing attack resulted in the transfer of all acquired SAVM to addresses 0xea5 and 0x406 (Fake_Phishing276021). 🌐 SAVM Sell-Off: The quick sell-off of the acquired SAVM raises questions about the security measures in place and the impact on the token's value. 💻 Lessons Learned: This incident serves as a reminder for the crypto community to prioritize security measures, including two-factor authentication and vigilant fund management. 3/ 📈 Moving Forward: Impact on SAVM and Community As the market reacts to this alleged phishing attack, considerations for SAVM and the broader community include: 🚀 SAVM Project: The SAVM project's response to the incident will be crucial. Communication and transparency will be key in maintaining community trust. 📉 Community Sentiment: Watch for shifts in community sentiment. Traders and investors may react to the news, potentially influencing market dynamics. 🛡️ Security Measures: Evaluate security measures implemented by projects and individual holders. A focus on enhancing security practices is imperative. 📈📉 #cryptonews #SAVM #phishingattack #CryptoSecurityIssue (Note: This information is for educational purposes only. Conduct thorough research and seek professional advice before making investment decisions.)

Breaking: Alleged Phishing Attack on #SAVM Whale - OnChain Analysis

1/ 🚨 Breaking: Alleged Phishing Attack on #SAVM Whale 🚨
🔗 Ongoing Outflow
🌐 Address: 0x0c008e6479a83be6a6c49d95c2029a6064136688
💼 Token: SatoshiVM | Amount: 193.676K
💰 Transaction: $2.55M | Price: $0.215
🗓️ Jan 25, 20:57
🔍 Details:
Whale 0x0c0 transferred out 193,676 SAVM to two addresses, 0xea5 and 0x406. Allegedly, the whale fell victim to a phishing attack, leading to the transfer of all SAVM to these addresses.
💸 Profit Turned Loss: In the past 11 hours, the SAVM tokens were sold for only 437 ETH ($892K) by the two receivers. The SAVM price plummeted by 48.39% in the last 24 hours.
🛡️ Stay Alert: This incident highlights the vulnerability of large holders to phishing attacks. The immediate sell-off and drop in SAVM price emphasize the market impact.
📊 Market Impact: Traders and investors should monitor the fallout from this event. The sudden sell-off could create uncertainty and impact the broader market sentiment.
2/ 🔄 Understanding the Alleged Phishing Attack
The whale, 0x0c0, bought 193,676 SAVM with 2.1M USDT in the last 2 days. The phishing attack resulted in the transfer of all acquired SAVM to addresses 0xea5 and 0x406 (Fake_Phishing276021).
🌐 SAVM Sell-Off: The quick sell-off of the acquired SAVM raises questions about the security measures in place and the impact on the token's value.
💻 Lessons Learned: This incident serves as a reminder for the crypto community to prioritize security measures, including two-factor authentication and vigilant fund management.
3/ 📈 Moving Forward: Impact on SAVM and Community
As the market reacts to this alleged phishing attack, considerations for SAVM and the broader community include:
🚀 SAVM Project: The SAVM project's response to the incident will be crucial. Communication and transparency will be key in maintaining community trust.
📉 Community Sentiment: Watch for shifts in community sentiment. Traders and investors may react to the news, potentially influencing market dynamics.
🛡️ Security Measures: Evaluate security measures implemented by projects and individual holders. A focus on enhancing security practices is imperative.
📈📉 #cryptonews #SAVM #phishingattack #CryptoSecurityIssue
(Note: This information is for educational purposes only. Conduct thorough research and seek professional advice before making investment decisions.)
·
--
Phishing Attack And How Does It Work?What Is Phishing Attack? Phishing stands out as one of the most prevalent and widespread cyber attack techniques. This form of assault falls under the umbrella of social engineering attacks, relying on psychological manipulation and exploiting human vulnerabilities. At its core, a phishing attack unfolds when a malicious actor assumes the identity of a trustworthy entity or business to deceive individuals and extract sensitive information, including credit card details, usernames, and passwords. Typically, phishing attacks unfold through deceptive emails crafted to persuade users to access a fraudulent website. These emails commonly prompt users to reset passwords or verify credit card information, leading them to a counterfeit website that closely mimics the legitimate one. The primary variants of phishing include clone phishing, spear phishing, and pharming. How Does It Work? You might encounter an email urging you to visit a seemingly familiar website. However, this website is deceptive, and when you log in, you unwittingly furnish your credentials to the attacker. Other phishing tactics may involve concocted narratives and appeals for money, exemplified by infamous scams like the “Nigerian Prince” email scheme. In the realm of cryptocurrency, phishing techniques have extended to stealing digital assets. For instance, a cybercriminal might craft a fraudulent replica of a website, altering the merchant’s wallet address to their own. This manipulation tricks users into making payments for a service that appears legitimate but is, in reality, a scam. Recognizing and understanding phishing scams is crucial to avoid falling victim to them. Some scams exhibit high levels of sophistication, and a single unsuspecting click or a careless keystroke could result in significant losses. Stay vigilant to protect yourself from these evolving threats. #Webgtr #phishingattack #BinanceTournament #BTC #etf

Phishing Attack And How Does It Work?

What Is Phishing Attack?
Phishing stands out as one of the most prevalent and widespread cyber attack techniques. This form of assault falls under the umbrella of social engineering attacks, relying on psychological manipulation and exploiting human vulnerabilities. At its core, a phishing attack unfolds when a malicious actor assumes the identity of a trustworthy entity or business to deceive individuals and extract sensitive information, including credit card details, usernames, and passwords.
Typically, phishing attacks unfold through deceptive emails crafted to persuade users to access a fraudulent website. These emails commonly prompt users to reset passwords or verify credit card information, leading them to a counterfeit website that closely mimics the legitimate one. The primary variants of phishing include clone phishing, spear phishing, and pharming.
How Does It Work?
You might encounter an email urging you to visit a seemingly familiar website. However, this website is deceptive, and when you log in, you unwittingly furnish your credentials to the attacker. Other phishing tactics may involve concocted narratives and appeals for money, exemplified by infamous scams like the “Nigerian Prince” email scheme.
In the realm of cryptocurrency, phishing techniques have extended to stealing digital assets. For instance, a cybercriminal might craft a fraudulent replica of a website, altering the merchant’s wallet address to their own. This manipulation tricks users into making payments for a service that appears legitimate but is, in reality, a scam.
Recognizing and understanding phishing scams is crucial to avoid falling victim to them. Some scams exhibit high levels of sophistication, and a single unsuspecting click or a careless keystroke could result in significant losses. Stay vigilant to protect yourself from these evolving threats.
#Webgtr #phishingattack #BinanceTournament #BTC #etf
·
--
ສັນຍານໝີ
@lookonchain Someone lost 12,083.6 $spWETH (worth $32.33M)! due to a #phishing attack! According to #ArkhamIntel , the wallet may be related to DiscusFish (@bitfish1). To avoid being phished, please do not click on any unknown links and do not sign any unknown signatures. Always double-check when signing signatures. (trxn# 0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb) #phishingattack
@lookonchain

Someone lost 12,083.6 $spWETH (worth $32.33M)! due to a #phishing attack!

According to #ArkhamIntel , the wallet may be related to DiscusFish (@bitfish1).

To avoid being phished, please do not click on any unknown links and do not sign any unknown signatures.
Always double-check when signing signatures.
(trxn# 0xf7c00f18175cdea49f8fdad6a1d45edeb318f18f3009f51ab9f4675171c1d8fb)
#phishingattack
User Ne Phishing Transactions Ki Wajah Se $629,000 Se Zyada Ka Nuksan Jhela Aave WETH Mein 😱💸 $XRP $BNB $SOL Odaily ke according, ek user ko multiple phishing transactions ke chakkar mein kaafi bada financial loss hua hai. Scam Sniffer monitoring ke mutabik, is user ne Aave WETH mein $629,812 ka nuksan uthaya, jo ki lagbhag 225.08 aEthWETH aur 2 Doodle tokens ke barabar hai! 🚨💥 Yeh ek warning hai sabhi crypto users ke liye ki phishing scams se bachke rahe, aur hamesha apne transactions ko dhyan se monitor karein. 🔒🔍 #CryptoScams #PhishingAttack #AaveWETH
User Ne Phishing Transactions Ki Wajah Se $629,000 Se Zyada Ka Nuksan Jhela Aave WETH Mein 😱💸
$XRP $BNB $SOL

Odaily ke according, ek user ko multiple phishing transactions ke chakkar mein kaafi bada financial loss hua hai. Scam Sniffer monitoring ke mutabik, is user ne Aave WETH mein $629,812 ka nuksan uthaya, jo ki lagbhag 225.08 aEthWETH aur 2 Doodle tokens ke barabar hai! 🚨💥

Yeh ek warning hai sabhi crypto users ke liye ki phishing scams se bachke rahe, aur hamesha apne transactions ko dhyan se monitor karein. 🔒🔍

#CryptoScams #PhishingAttack #AaveWETH
•NUEVAS AMENAZAS DE PHISHING. -Grupos de phishing están lanzando nuevos ataques utilizando subdominios de Google para engañar a los usuarios y hacer que se revelen sus contraseñas. -Yu Xian, fundador de Slow Mist, informo que el desarrollador principal de ENS fue víctima de un esquema de Phishing que explotó una vulnerabilidad en la infraestructura de Google. -Los correos electrónicos de ataque parecían legítimos y pasaron la verificación DKIM, llevando a los usuarios a un portal de soporte falso. NO confíen en correos electrónicos desconocidos y siempre mantengan sus datos personales los más protegidos posibles. Ya que puede que sus criptos pueden verse amenazadas por este nuevo tipo de ataques. {spot}(BTCUSDT) {spot}(BNBUSDT) #criptonews #bnb #phishingattack #phishing $BTC $BNB
•NUEVAS AMENAZAS DE PHISHING.

-Grupos de phishing están lanzando nuevos ataques utilizando subdominios de Google para engañar a los usuarios y hacer que se revelen sus contraseñas.

-Yu Xian, fundador de Slow Mist, informo que el desarrollador principal de ENS fue víctima de un esquema de Phishing que explotó una vulnerabilidad en la infraestructura de Google.

-Los correos electrónicos de ataque parecían legítimos y pasaron la verificación DKIM, llevando a los usuarios a un portal de soporte falso.

NO confíen en correos electrónicos desconocidos y siempre mantengan sus datos personales los más protegidos posibles. Ya que puede que sus criptos pueden verse amenazadas por este nuevo tipo de ataques.


#criptonews #bnb #phishingattack #phishing $BTC $BNB
ເຂົ້າສູ່ລະບົບເພື່ອສຳຫຼວດເນື້ອຫາເພີ່ມເຕີມ
ສຳຫຼວດຂ່າວສະກຸນເງິນຄຣິບໂຕຫຼ້າສຸດ
⚡️ ເປັນສ່ວນໜຶ່ງຂອງການສົນທະນາຫຼ້າສຸດໃນສະກຸນເງິນຄຣິບໂຕ
💬 ພົວພັນກັບຜູ້ສ້າງທີ່ທ່ານມັກ
👍 ເພີດເພີນກັບເນື້ອຫາທີ່ທ່ານສົນໃຈ
ອີເມວ / ເບີໂທລະສັບ