Binance Square

hack

941,109 vues
536 mentions
Nataly new season
·
--
🚀 ESTRATEGIA BINANCE 2026: ¡Súbete a la Tendencia! 1. 💎 El "Hack" de BNB No solo holdees. Mantén tus $BNBen Simple Earn. ¿Por qué? Te da acceso automático a Launchpools y HODLer Airdrops. Estás recibiendo los nuevos tokens de IA y Gaming antes que nadie y sin costo adicional. 2. 🤖 IA y Privacidad (La narrativa real) El capital se está moviendo de las "viejas" monedas a la IA Descentralizada (como ZAMA). Tip: Ve a la sección "Zonas" en Binance y busca IA o FHE. Ahí es donde está el volumen fuerte este trimestre. 3. 📉 Cero Estrés con Inversión Automática ¿Bitcoin en $78,000 te da miedo? Usa el Bot de Inversión Automática (DCA). Configura compras diarias o semanales. Así promedias tu precio de entrada y eliminas el factor emocional de comprar "caro". 4. 🛡️ Protección de Capital Mercado volátil = Peligro en Futuros. Regla de oro: Nunca operes sin Stop Loss. Si el mercado se gira, una pérdida del 2% es una lección; una cuenta liquidada es un error. 🔥 TOP WATCHLIST FEBRERO: $BNB : Para farmear airdrops. $SOL : El rey de las memecoins y el volumen rápido. $BTC : Consolidando camino a nuevos máximos. #BitcoinDropMarketImpact #EstratégiaCrypto #Hack
🚀 ESTRATEGIA BINANCE 2026: ¡Súbete a la Tendencia!
1. 💎 El "Hack" de BNB
No solo holdees. Mantén tus $BNBen Simple Earn.

¿Por qué? Te da acceso automático a Launchpools y HODLer Airdrops. Estás recibiendo los nuevos tokens de IA y Gaming antes que nadie y sin costo adicional.

2. 🤖 IA y Privacidad (La narrativa real)
El capital se está moviendo de las "viejas" monedas a la IA Descentralizada (como ZAMA).

Tip: Ve a la sección "Zonas" en Binance y busca IA o FHE. Ahí es donde está el volumen fuerte este trimestre.

3. 📉 Cero Estrés con Inversión Automática
¿Bitcoin en $78,000 te da miedo? Usa el Bot de Inversión Automática (DCA).
Configura compras diarias o semanales. Así promedias tu precio de entrada y eliminas el factor emocional de comprar "caro".

4. 🛡️ Protección de Capital
Mercado volátil = Peligro en Futuros.
Regla de oro: Nunca operes sin Stop Loss. Si el mercado se gira, una pérdida del 2% es una lección; una cuenta liquidada es un error.

🔥 TOP WATCHLIST FEBRERO:
$BNB : Para farmear airdrops.
$SOL : El rey de las memecoins y el volumen rápido.
$BTC : Consolidando camino a nuevos máximos.
#BitcoinDropMarketImpact #EstratégiaCrypto #Hack
CrossCurve HACKED! $3M GONE! Warning: Halt all CrossCurve interactions NOW. Critical vulnerability exploited. Funds drained. Hackers used fake cross-chain messages. Gateway authentication bypassed. PortalV2 contract emptied. 10 hacker wallets identified. CrossCurve offers 10% bounty for return. 72-hour ultimatum issued. Legal action threatened. Curve Finance advises caution on Eywa pools. This is the second major hack in weeks. Bridges remain prime targets. This is for informational purposes only. #crosschain #defi #hack 🚨
CrossCurve HACKED! $3M GONE!

Warning: Halt all CrossCurve interactions NOW.
Critical vulnerability exploited. Funds drained.
Hackers used fake cross-chain messages.
Gateway authentication bypassed.
PortalV2 contract emptied.
10 hacker wallets identified.
CrossCurve offers 10% bounty for return.
72-hour ultimatum issued. Legal action threatened.
Curve Finance advises caution on Eywa pools.
This is the second major hack in weeks.
Bridges remain prime targets.

This is for informational purposes only.

#crosschain #defi #hack 🚨
·
--
Haussier
🔥🦅 A FÊNIX DO ETHEREUM ⚡️ THE DAO RESSURGE COM US💲 220 MILHÕES❗ 🚀🛡️ 😱 Quase dez anos após o hack histórico de 2016 que dividiu a rede, o nome que quase destruiu o Ethereum está de volta. Mas desta vez, não como uma vulnerabilidade, mas como um Fundo de Segurança de US$ 220 milhões. 🧵👇 🧨 1. De "Hack" a Tesouro de Segurança Você lembra do hard fork que criou o Ethereum Classic ❓ Pois é, cerca de 75.109 $ETH (equivalentes a ~US$ 220M) ficaram "esquecidos" ou não reclamados em contratos legados daquele evento. A Grande Ideia ⥱ Em vez de deixar esses fundos parados, pioneiros como Griff Green e a Ethereum Foundation estão reativando o The DAO como uma dotação de segurança permanente. 📊 2. O Plano de "Segurança de Um Trilhão de Dólares" O objetivo não é apenas auditar código, mas proteger VOCÊ, o usuário final Staking Permanente ⥱ ~69.420 $ETH serão colocados em staking para gerar um rendimento anual de US$ 8 milhões, que financiará auditorias contínuas e pesquisas de segurança. Foco no Usuário ⥱ O fundo vai investir pesado no combate ao phishing, mecanismos de recuperação de carteiras e limites de saques para evitar que hackers limpem contas inteiras. 🕵️‍♂️🔒 📈 3. Quem está no Comando ❓ Este não é um projeto amador. O conselho de curadores inclui nomes de peso como Vitalik Buterin, especialistas da MetaMask e da ENS. O que antes foi uma lição dolorosa sobre "código é lei", agora se torna a base para que o Ethereum atinja escala bancária global. 📢 EU QUERO SABER DE VOCÊ Você acha que essa "redenção" do The DAO é o passo final para o Ethereum ser aceito como a infraestrutura financeira definitiva do mundo ? 🏛️ vs 🚀 👇 Comente "SEGURANÇA" se você acredita que a crypto $ETH está mais forte do que nunca em 2026❗ 💡 @Fumao 📣 Isso não é um conselho financeiro. Sempre faça seu próprio estudo antes de investir em qualquer projeto cripto. #BinanceSquareFamily #Ethereum #EthereumNews #VitalikButerin #Hack
🔥🦅 A FÊNIX DO ETHEREUM ⚡️ THE DAO RESSURGE COM US💲 220 MILHÕES❗ 🚀🛡️

😱 Quase dez anos após o hack histórico de 2016 que dividiu a rede, o nome que quase destruiu o Ethereum está de volta. Mas desta vez, não como uma vulnerabilidade, mas como um Fundo de Segurança de US$ 220 milhões. 🧵👇

🧨 1. De "Hack" a Tesouro de Segurança

Você lembra do hard fork que criou o Ethereum Classic ❓ Pois é, cerca de 75.109 $ETH (equivalentes a ~US$ 220M) ficaram "esquecidos" ou não reclamados em contratos legados daquele evento.

A Grande Ideia ⥱ Em vez de deixar esses fundos parados, pioneiros como Griff Green e a Ethereum Foundation estão reativando o The DAO como uma dotação de segurança permanente.

📊 2. O Plano de "Segurança de Um Trilhão de Dólares"

O objetivo não é apenas auditar código, mas proteger VOCÊ, o usuário final

Staking Permanente ⥱ ~69.420 $ETH serão colocados em staking para gerar um rendimento anual de US$ 8 milhões, que financiará auditorias contínuas e pesquisas de segurança.

Foco no Usuário ⥱ O fundo vai investir pesado no combate ao phishing, mecanismos de recuperação de carteiras e limites de saques para evitar que hackers limpem contas inteiras. 🕵️‍♂️🔒

📈 3. Quem está no Comando ❓

Este não é um projeto amador. O conselho de curadores inclui nomes de peso como Vitalik Buterin, especialistas da MetaMask e da ENS. O que antes foi uma lição dolorosa sobre "código é lei", agora se torna a base para que o Ethereum atinja escala bancária global.

📢 EU QUERO SABER DE VOCÊ

Você acha que essa "redenção" do The DAO é o passo final para o Ethereum ser aceito como a infraestrutura financeira definitiva do mundo ? 🏛️ vs 🚀

👇 Comente "SEGURANÇA" se você acredita que a crypto $ETH está mais forte do que nunca em 2026❗

💡 @Fumão Crypto 📣 Isso não é um conselho financeiro. Sempre faça seu próprio estudo antes de investir em qualquer projeto cripto.

#BinanceSquareFamily #Ethereum #EthereumNews #VitalikButerin #Hack
Lebih dari $1,46 miliar telah mengalir keluar dari #Bybit dalam waktu singkat INI BISA MENJADI #HACK BESAR-BESARAN
Lebih dari $1,46 miliar
telah mengalir keluar dari #Bybit dalam waktu singkat

INI BISA MENJADI #HACK
BESAR-BESARAN
·
--
Haussier
The details of the recent hack on Bybit are continuing to emerge. Hackers successfully stole around 135,000 Ethereum, worth approximately $335 million, from the platform's hot wallets. Investigations show that the hackers managed to launder 45,900 ETH (around $113 million) within a very short period. At this rate, it’s estimated that the remaining stolen Ethereum could be fully laundered in just 8 to 10 days. In response, Bybit assured users that their funds are safe and that investigations into the attack are ongoing. The hackers have been using decentralized platforms to quickly launder the stolen Ethereum, highlighting the need for cryptocurrency exchanges and the broader crypto community to reassess their security measures. #bybit #Hack
The details of the recent hack on Bybit are continuing to emerge. Hackers successfully stole around 135,000 Ethereum, worth approximately $335 million, from the platform's hot wallets. Investigations show that the hackers managed to launder 45,900 ETH (around $113 million) within a very short period. At this rate, it’s estimated that the remaining stolen Ethereum could be fully laundered in just 8 to 10 days.

In response, Bybit assured users that their funds are safe and that investigations into the attack are ongoing. The hackers have been using decentralized platforms to quickly launder the stolen Ethereum, highlighting the need for cryptocurrency exchanges and the broader crypto community to reassess their security measures.

#bybit #Hack
⚠️ Beware of the new malware RatOn. It targets Android devices, hacks wallets (MetaMask, Trust, Phantom) and banking apps, and can even lock your screen for ransom. Active since July, spreading through fake TikTok apps. When your whole life is on your phone, device security must come first. Get proper antivirus and run regular checks. #scam #Android #Hack #tiktok #fake
⚠️ Beware of the new malware RatOn. It targets Android devices, hacks wallets (MetaMask, Trust, Phantom) and banking apps, and can even lock your screen for ransom. Active since July, spreading through fake TikTok apps.

When your whole life is on your phone, device security must come first. Get proper antivirus and run regular checks.
#scam #Android #Hack #tiktok #fake
#SBIGroup Crypto Loses $21M in Suspected North Korean #Hack Blockchain investigator ZachXBT reported Wednesday that addresses linked to SBI Group Crypto lost approximately $21 million on September 24. The stolen funds included $BTC , $ETH , $LTC , $DOGE, and Bitcoin Cash, which were subsequently laundered through Tornado Cash. SBI Crypto operates as a subsidiary of Japanese financial conglomerate SBI Group. The company did not immediately respond to requests for comment regarding the incident. Blockchain security firm Cyvers assisted #ZachXBT with the investigation. The attack exhibits characteristics similar to other exploits connected to North Korean #hackers. Stolen funds were routed through instant exchanges before being deposited into Tornado Cash, a decentralized mixing protocol designed to obscure transaction origins. ZachXBT has established a reputation as one of the most prolific cryptocurrency investigators, identifying numerous instances of illicit fund movements. In June, the sleuth reported that Iranian cryptocurrency exchange Nobitex appeared compromised for over $80 million across Tron and EVM-compatible chains. Earlier this year, Arkham Intelligence attributed the Bybit hack involving over $1.5 billion to Lazarus Group, widely believed to operate under North Korean state sponsorship. The attribution cited information provided by ZachXBT. #TornadoCash has faced sustained scrutiny as a platform enabling hackers to launder stolen funds. The Treasury Department's Office of Foreign Assets Control sanctioned the protocol in August 2022. Roman Storm faced charges in 2023 for conspiracy to commit money laundering and sanctions violations related to operating Tornado Cash.
#SBIGroup Crypto Loses $21M in Suspected North Korean #Hack

Blockchain investigator ZachXBT reported Wednesday that addresses linked to SBI Group Crypto lost approximately $21 million on September 24. The stolen funds included $BTC , $ETH , $LTC , $DOGE, and Bitcoin Cash, which were subsequently laundered through Tornado Cash.

SBI Crypto operates as a subsidiary of Japanese financial conglomerate SBI Group. The company did not immediately respond to requests for comment regarding the incident. Blockchain security firm Cyvers assisted #ZachXBT with the investigation.

The attack exhibits characteristics similar to other exploits connected to North Korean #hackers. Stolen funds were routed through instant exchanges before being deposited into Tornado Cash, a decentralized mixing protocol designed to obscure transaction origins.

ZachXBT has established a reputation as one of the most prolific cryptocurrency investigators, identifying numerous instances of illicit fund movements. In June, the sleuth reported that Iranian cryptocurrency exchange Nobitex appeared compromised for over $80 million across Tron and EVM-compatible chains.

Earlier this year, Arkham Intelligence attributed the Bybit hack involving over $1.5 billion to Lazarus Group, widely believed to operate under North Korean state sponsorship. The attribution cited information provided by ZachXBT.

#TornadoCash has faced sustained scrutiny as a platform enabling hackers to launder stolen funds. The Treasury Department's Office of Foreign Assets Control sanctioned the protocol in August 2022. Roman Storm faced charges in 2023 for conspiracy to commit money laundering and sanctions violations related to operating Tornado Cash.
30.1K #BTC ($2.1B) of #Silk Road #hack funds controlled by US government is on the move right now. 0.001 BTC ($69) transferred to a Coinbase deposit address so it’s a test transfer possibly. txn hash 9c3af4b48e66565f1da1da8278036fa1dbb09f2beaaca99c3504475390ba4590 Coinbase deposit address 3KrZVU9Jz4UKHpKUtuvkEMX1tY8zeiTvX2
30.1K #BTC ($2.1B) of #Silk Road #hack funds controlled by US government is on the move right now.

0.001 BTC ($69) transferred to a Coinbase deposit address so it’s a test transfer possibly.

txn hash
9c3af4b48e66565f1da1da8278036fa1dbb09f2beaaca99c3504475390ba4590

Coinbase deposit address
3KrZVU9Jz4UKHpKUtuvkEMX1tY8zeiTvX2
MAKINA WIPED OUT. HUGE LOSS. 5,107,871 USDC GONE. The multi-chain DeFi execution engine Makina was just hit hard on Ethereum. Attackers exploited a vulnerability. They manipulated pool prices. They inflated LP assets. Arbitrage attack executed. This is a massive blow. Don't get caught in the crossfire. Stay sharp. Disclaimer: This is not financial advice. #DeFi #Hack #CryptoNews 🚨
MAKINA WIPED OUT. HUGE LOSS.

5,107,871 USDC GONE.

The multi-chain DeFi execution engine Makina was just hit hard on Ethereum. Attackers exploited a vulnerability. They manipulated pool prices. They inflated LP assets. Arbitrage attack executed. This is a massive blow. Don't get caught in the crossfire. Stay sharp.

Disclaimer: This is not financial advice.

#DeFi #Hack #CryptoNews 🚨
#ScrollCoFounderXAccountHacked Bigger Lesson for Web3 Founders 🔐 #ScrollCoFounderXAccountHacked This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels #Hack #HackerAlert #Hacked
#ScrollCoFounderXAccountHacked
Bigger Lesson for Web3 Founders
🔐 #ScrollCoFounderXAccountHacked
This incident is another wake-up call for Web3 founders and teams. As public-facing figures, their accounts carry massive influence and are prime targets for hackers. A single compromised post can lead to financial losses for followers and reputational damage for projects. Best practices like hardware-based 2FA, limited access permissions, and rapid response protocols are no longer optional. For users, the key takeaway is simple: never trust announcements blindly—even from well-known founders—without cross-checking official project channels
#Hack #HackerAlert #Hacked
🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸🌐 The Crypto Market in Shock! In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks. 💎 DeFi: Fewer losses, but major hacks persist Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million. 🏦 CeFi in Trouble: Losses Double! CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million). 🎮 Games and Metaverses Lose Hundreds of Millions The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲 🚩 Rug Pulls Shift to Solana Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈 🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month! In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors. 👨‍💻 Phishing and North Korean Hackers Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion. ⚠️ Stay Alert! Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting! #Hack #scamriskwarning #solana

🔥 Scammers on the Rise: How the Meme Coin Boom on Solana Unlocked New Ways to Steal Millions 💸

🌐 The Crypto Market in Shock!
In 2024, total Web3 losses exceeded $2.9 billion. From DeFi to metaverses, no sector was spared. 🚨 The main vulnerability? Access control issues, responsible for 78% of all attacks.

💎 DeFi: Fewer losses, but major hacks persist
Losses decreased by 40%, but still reached $474 million. The biggest incident was the hack of Radiant Capital, costing $55 million.

🏦 CeFi in Trouble: Losses Double!
CeFi losses skyrocketed to $694 million. Notable attacks include a key leak at DMM Exchange ($305 million) and a multisignature vulnerability at WazirX ($230 million).

🎮 Games and Metaverses Lose Hundreds of Millions
The gaming sector reported $389 million in losses, accounting for 18% of all attacks. 🎲

🚩 Rug Pulls Shift to Solana
Scammers moved from BNB Chain to Solana, driven by the growing popularity of meme coins. 📈

🎯 Presales Turn into Traps: $122.5 Million Stolen in One Month!
In April 2024, scammers executed 27 fraud schemes using presales. 💰 They also exploited the names of celebrities and influencers to deceive investors.

👨‍💻 Phishing and North Korean Hackers
Phishing attacks led to $600 million in stolen funds, while North Korean hackers siphoned off $1.34 billion.

⚠️ Stay Alert!
Crypto scams are becoming increasingly sophisticated. 🛡️ Behind every meme coin, a trap could be waiting!
#Hack #scamriskwarning #solana
North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates🔹 Fake Zoom meeting invites and update links deceive Web3 teams 🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques 🔹 Attackers steal browser data, passwords, and Telegram chats Web3 and Crypto Companies Under Siege by NimDoor Malware Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection. The Setup: Fake Zoom Meetings Through Telegram Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files. These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload. NimDoor Malware: Spyware Specifically Targeting macOS Once executed, the NimDoor malware operates in two main phases: 🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc. 🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files. A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline. Built to Survive: Evasion and Reinstallation Techniques NimDoor employs a range of advanced persistence mechanisms: 🔹 Automatically reinstalls itself if users try to terminate or delete it 🔹 Creates hidden files and folders that look like legitimate macOS system components 🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic 🔹 Delays execution for 10 minutes to avoid early detection by security software Difficult to Remove Without Professional Tools Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely. Conclusion: Modern Cyberattacks Now Look Like Calendar Invites Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise. Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations. #CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

North Korean Hackers Target Crypto with Nim-Based Malware Disguised as Zoom Updates

🔹 Fake Zoom meeting invites and update links deceive Web3 teams

🔹 New NimDoor malware infiltrates macOS with advanced evasion techniques

🔹 Attackers steal browser data, passwords, and Telegram chats

Web3 and Crypto Companies Under Siege by NimDoor Malware
Security experts at SentinelLabs have uncovered a sophisticated malware campaign targeting Web3 startups and cryptocurrency firms. The attacks, linked to North Korean groups, use a combination of social engineering and technical stealth to deploy NimDoor malware, written in the rarely used Nim programming language to bypass antivirus detection.

The Setup: Fake Zoom Meetings Through Telegram
Hackers initiate contact via Telegram, posing as known contacts. They invite victims to schedule meetings via Calendly, then send them links to what appear to be Zoom software updates. These links lead to fake domains like support.us05web-zoom.cloud, mimicking Zoom's legitimate URLs and hosting malicious installation files.
These files contain thousands of lines of whitespace, making them appear "legitimately large." Hidden within are only three crucial lines of code, which download and execute the real attack payload.

NimDoor Malware: Spyware Specifically Targeting macOS
Once executed, the NimDoor malware operates in two main phases:
🔹 Data extraction – stealing saved passwords, browsing histories, and login credentials from popular browsers like Chrome, Firefox, Brave, Edge, and Arc.

🔹 System persistence – maintaining long-term access through stealth background processes and disguised system files.
A key component specifically targets Telegram, stealing encrypted chat databases and decryption keys, giving attackers access to private conversations offline.

Built to Survive: Evasion and Reinstallation Techniques
NimDoor employs a range of advanced persistence mechanisms:
🔹 Automatically reinstalls itself if users try to terminate or delete it

🔹 Creates hidden files and folders that look like legitimate macOS system components

🔹 Connects to the attacker’s server every 30 seconds for instructions, disguised as normal internet traffic

🔹 Delays execution for 10 minutes to avoid early detection by security software

Difficult to Remove Without Professional Tools
Because of these techniques, NimDoor is extremely hard to remove with standard tools. Specialized security software or professional intervention is often required to clean infected systems completely.

Conclusion: Modern Cyberattacks Now Look Like Calendar Invites
Attacks like NimDoor prove how cleverly North Korean groups mimic daily workflows to penetrate even cautious targets. Fake Zoom links and innocent-looking updates can lead to full system compromise.
Users should never download updates from unofficial sources, always verify domain names, and stay vigilant against unexpected software prompts or invitations.

#CyberSecurity , #NorthKoreaHackers , #Web3Security , #CryptoNews , #Hack

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
Gala Games CEO Attributes $23M Exploit to Internal Control FailuresGala Games CEO Eric Schiermeyer has confirmed that a "security incident" led to the unauthorized sale of 600 million GALA tokens, worth approximately $23 million. The breach, which Schiermeyer attributed to "messed up" internal controls, has raised significant concerns within the blockchain gaming community. Incident Overview On May 20, at 7:32 pm UTC, blockchain observers reported the minting of 5 billion GALA tokens, valued at around $200 million at the time. The compromised wallet was selling the tokens in batches, leading to a sharp drop in GALA's price. The token hit a 24-hour low of $0.038, a 20% decrease from its daily high, before recovering slightly to $0.041, according to CoinGecko. “We had an incident that resulted in the unauthorized sale of 600 million GALA tokens and the effective burn of 4.4 billion tokens,” Schiermeyer wrote in a May 20 post on X (formerly Twitter). He admitted, “We messed up our internal controls. This shouldn’t have happened, and we are taking steps to ensure it doesn’t happen again.” Response and Mitigation Gala Games quickly identified the compromise and revoked unauthorized access to the GALA contract. Schiermeyer assured users that the Ethereum contract was secure and had not been compromised. The company believes it has identified the person responsible and is collaborating with the FBI, the U.S. Justice Department, and international authorities to address the incident. In a follow-up post on X, Gala Games announced that the security breach had been contained and the affected wallet frozen. However, details about the perpetrator and the method of access to the GALA contract remain undisclosed. Ongoing Legal Disputes This security incident occurs amid ongoing legal battles between Schiermeyer and Gala Games co-founder Wright Thurston. Both have filed lawsuits against each other, with Thurston accusing Schiermeyer of squandering millions in company assets, while Schiermeyer alleges that Thurston stole $130 million worth of GALA tokens. Gala Games did not respond to requests for additional comments. The incident underscores the critical need for robust internal controls and security measures in the cryptocurrency and blockchain industries, as companies continue to navigate complex technological and legal landscapes. $GALA #GALA #GalaGames #hack Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Gala Games CEO Attributes $23M Exploit to Internal Control Failures

Gala Games CEO Eric Schiermeyer has confirmed that a "security incident" led to the unauthorized sale of 600 million GALA tokens, worth approximately $23 million. The breach, which Schiermeyer attributed to "messed up" internal controls, has raised significant concerns within the blockchain gaming community.
Incident Overview
On May 20, at 7:32 pm UTC, blockchain observers reported the minting of 5 billion GALA tokens, valued at around $200 million at the time. The compromised wallet was selling the tokens in batches, leading to a sharp drop in GALA's price. The token hit a 24-hour low of $0.038, a 20% decrease from its daily high, before recovering slightly to $0.041, according to CoinGecko.
“We had an incident that resulted in the unauthorized sale of 600 million GALA tokens and the effective burn of 4.4 billion tokens,” Schiermeyer wrote in a May 20 post on X (formerly Twitter). He admitted, “We messed up our internal controls. This shouldn’t have happened, and we are taking steps to ensure it doesn’t happen again.”
Response and Mitigation
Gala Games quickly identified the compromise and revoked unauthorized access to the GALA contract. Schiermeyer assured users that the Ethereum contract was secure and had not been compromised. The company believes it has identified the person responsible and is collaborating with the FBI, the U.S. Justice Department, and international authorities to address the incident.
In a follow-up post on X, Gala Games announced that the security breach had been contained and the affected wallet frozen. However, details about the perpetrator and the method of access to the GALA contract remain undisclosed.
Ongoing Legal Disputes
This security incident occurs amid ongoing legal battles between Schiermeyer and Gala Games co-founder Wright Thurston. Both have filed lawsuits against each other, with Thurston accusing Schiermeyer of squandering millions in company assets, while Schiermeyer alleges that Thurston stole $130 million worth of GALA tokens.
Gala Games did not respond to requests for additional comments.
The incident underscores the critical need for robust internal controls and security measures in the cryptocurrency and blockchain industries, as companies continue to navigate complex technological and legal landscapes.
$GALA #GALA #GalaGames #hack

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
·
--
Baissier
🚨💸 $7M LOSS AND 80% DIVE FOR HACKED HLG TOKEN 💸🚨 Holograph, a leading omnichain tokenization platform which recently was part of the BINANCE AIRDROPS, recently experienced a major smart contract exploit, resulting in the loss of 1 billion HLG tokens valued at approximately $7 million. This incident has caused a significant drop in the value of the HLG token. 📉 Token Impact: Following the exploit, the project’s native HLG token plunged by about 80% within 24 hours after the attack, dropping to as low as $0.0029 before slightly recovering to $0.0068. The tokens had been airdropped to the community in May. 🔍 The Hack: The platform confirmed on X (formerly Twitter) that its Holograph Operator Contract had been compromised by a malicious actor who minted 1 billion HLG tokens. Initial Response: The exploit has been patched, and Holograph’s team is working with exchanges to lock compromised accounts. The team has also launched an investigation and is in the process of contacting law enforcement. Value at Theft: On-chain data indicates the stolen tokens were valued at around $7 million at the time of the incident. 🕵️‍♂️ Hacker Strategy: Blockchain security platform Cyvers reported that some of the stolen tokens were swapped for the USDT stablecoin, which the attacker used to acquire 300 ETH. The hacker then distributed the funds to various addresses, including those linked to privacy protocols like Tornado Cash and Railgun. Current Holdings: On-chain data shows the exploiter’s address still holds about 47.59 ETH, valued at around $167,000 at press time. 📊 Analysis: Matt Casto, a DeFi researcher at CMT Digital, suggested that the attacker was likely “a rogue dev who funded the address 26 days ago,” noting that the address used to receive the minted supply. 👇 What are your thoughts on the recent Holograph hack? I guess it shows us that no project is totally save! #HLG #Binanceairdrops #airdrop #hack #alert $SHIB $PEPE $DOGE
🚨💸 $7M LOSS AND 80% DIVE FOR HACKED HLG TOKEN 💸🚨

Holograph, a leading omnichain tokenization platform which recently was part of the BINANCE AIRDROPS, recently experienced a major smart contract exploit, resulting in the loss of 1 billion HLG tokens valued at approximately $7 million. This incident has caused a significant drop in the value of the HLG token.

📉 Token Impact:
Following the exploit, the project’s native HLG token plunged by about 80% within 24 hours after the attack, dropping to as low as $0.0029 before slightly recovering to $0.0068. The tokens had been airdropped to the community in May.

🔍 The Hack:
The platform confirmed on X (formerly Twitter) that its Holograph Operator Contract had been compromised by a malicious actor who minted 1 billion HLG tokens.

Initial Response: The exploit has been patched, and Holograph’s team is working with exchanges to lock compromised accounts. The team has also launched an investigation and is in the process of contacting law enforcement.

Value at Theft: On-chain data indicates the stolen tokens were valued at around $7 million at the time of the incident.

🕵️‍♂️ Hacker Strategy:
Blockchain security platform Cyvers reported that some of the stolen tokens were swapped for the USDT stablecoin, which the attacker used to acquire 300 ETH. The hacker then distributed the funds to various addresses, including those linked to privacy protocols like Tornado Cash and Railgun.

Current Holdings: On-chain data shows the exploiter’s address still holds about 47.59 ETH, valued at around $167,000 at press time.

📊 Analysis:
Matt Casto, a DeFi researcher at CMT Digital, suggested that the attacker was likely “a rogue dev who funded the address 26 days ago,” noting that the address used to receive the minted supply.

👇 What are your thoughts on the recent Holograph hack?
I guess it shows us that no project is totally save!

#HLG #Binanceairdrops #airdrop #hack #alert

$SHIB $PEPE $DOGE
Hacker Moves $10 Million from Phishing Attack to Tornado CashIn 2023, financial assets were removed from a cryptocurrency "whale" due to a phishing attack, where the victim authorized transactions allowing the attacker to access their financial resources. The joint account involved in the September 2023 phishing incident transferred $10 million worth of Ether to the cryptocurrency mixing service Tornado Cash. On March 21, blockchain security firm CertiK identified an account involved in the hack for $24 million, which sent 3,700 ETH to Tornado Cash. These funds were taken from the cryptocurrency whale during the phishing incident on September 6, 2023. At that time, an investor lost $24 million in staked ETH through the Rocket Pool liquidity staking service. The attack occurred in two phases: the first removed 9,579 stETH, while the second took away 4,851 rETH from the crypto whale. The Scam Sniffer project, dedicated to fraud detection, stated that the victim authorized an "Increase Allowance" transaction, enabling the hacker to approve tokens for their own use. Using smart contracts, this functionality allows third parties to spend ERC-20 tokens owned by others with their consent. The topic of token approvals sparked much discussion in the crypto community, with some warning of the risks associated with potentially deploying malicious smart contracts for fraudulent purposes. Blockchain security firm PeckShield recorded that the attacker converted assets into 13,785 ETH and 1.64 million Dai. Some of these DAI were transferred to the FixedFload exchange, while the rest of the stolen funds were moved to other wallets. Phishing attacks remain a significant problem for the crypto sector. A report from the Scam Sniffer project showed that nearly $47 million was lost in February due to phishing-related scams.  The report emphasized that 78% of these thefts occurred on the Ethereum network, with ERC-20 tokens accounting for 86% of all stolen funds.  Recent losses caused by token approvals have also raised concerns among cryptocurrency users. On March 20, an old contract previously used by the Dolomite exchange was exploited to drain $1.8 million from users. The exploitation affected users who had given consent to the contract. As a result, Dolomite developers urged users to revoke all consents granted to the old contract address. Although some attempts to defraud cryptocurrencies result in the loss of millions, there are cases where fraudulent efforts are quickly detected and thwarted. For example, on March 20, the Layerswap team managed to prevent further damages after their website was compromised by an attack, thanks to the quick response from the domain provider. However, hackers were still able to siphon off assets worth $100,000 from approximately 50 users. Layerswap announced that they would refund the lost funds to affected users and offer additional compensation for the inconvenience caused. These incidents highlight the persistent risk of phishing attacks and the need for constant vigilance in the crypto world. The abuse of token approval functions and smart contracts underscores the need for further education and caution among cryptocurrency users to prevent unnecessary losses. With the increasing number of sophisticated attacks, it is important for cryptocurrency users to be vigilant and thoroughly verify all transactions and contract approvals. The community and security firms must collaborate to develop better tools and procedures to protect against phishing attacks and other fraudulent activities, ensuring a safer environment for all cryptocurrency users. #crypto #scam #hack   Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Hacker Moves $10 Million from Phishing Attack to Tornado Cash

In 2023, financial assets were removed from a cryptocurrency "whale" due to a phishing attack, where the victim authorized transactions allowing the attacker to access their financial resources.
The joint account involved in the September 2023 phishing incident transferred $10 million worth of Ether to the cryptocurrency mixing service Tornado Cash.

On March 21, blockchain security firm CertiK identified an account involved in the hack for $24 million, which sent 3,700 ETH to Tornado Cash. These funds were taken from the cryptocurrency whale during the phishing incident on September 6, 2023.
At that time, an investor lost $24 million in staked ETH through the Rocket Pool liquidity staking service. The attack occurred in two phases: the first removed 9,579 stETH, while the second took away 4,851 rETH from the crypto whale.
The Scam Sniffer project, dedicated to fraud detection, stated that the victim authorized an "Increase Allowance" transaction, enabling the hacker to approve tokens for their own use. Using smart contracts, this functionality allows third parties to spend ERC-20 tokens owned by others with their consent.
The topic of token approvals sparked much discussion in the crypto community, with some warning of the risks associated with potentially deploying malicious smart contracts for fraudulent purposes.
Blockchain security firm PeckShield recorded that the attacker converted assets into 13,785 ETH and 1.64 million Dai. Some of these DAI were transferred to the FixedFload exchange, while the rest of the stolen funds were moved to other wallets.
Phishing attacks remain a significant problem for the crypto sector. A report from the Scam Sniffer project showed that nearly $47 million was lost in February due to phishing-related scams. 
The report emphasized that 78% of these thefts occurred on the Ethereum network, with ERC-20 tokens accounting for 86% of all stolen funds. 
Recent losses caused by token approvals have also raised concerns among cryptocurrency users. On March 20, an old contract previously used by the Dolomite exchange was exploited to drain $1.8 million from users.
The exploitation affected users who had given consent to the contract. As a result, Dolomite developers urged users to revoke all consents granted to the old contract address.
Although some attempts to defraud cryptocurrencies result in the loss of millions, there are cases where fraudulent efforts are quickly detected and thwarted. For example, on March 20, the Layerswap team managed to prevent further damages after their website was compromised by an attack, thanks to the quick response from the domain provider.
However, hackers were still able to siphon off assets worth $100,000 from approximately 50 users. Layerswap announced that they would refund the lost funds to affected users and offer additional compensation for the inconvenience caused.
These incidents highlight the persistent risk of phishing attacks and the need for constant vigilance in the crypto world. The abuse of token approval functions and smart contracts underscores the need for further education and caution among cryptocurrency users to prevent unnecessary losses.
With the increasing number of sophisticated attacks, it is important for cryptocurrency users to be vigilant and thoroughly verify all transactions and contract approvals. The community and security firms must collaborate to develop better tools and procedures to protect against phishing attacks and other fraudulent activities, ensuring a safer environment for all cryptocurrency users.
#crypto #scam #hack  

Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
 🎯️WazirX bị hack, thiệt hại hơn 230 triệu USD 💲Theo nguồn tin từ Cyvers Alerts, ví Safe Multisig trên mạng Ethereum của WazirX vừa bị tấn công. Tổng cộng 234.9 triệu USD tài sản bị chuyển đến địa chỉ mới. Địa chỉ đáng ngờ này hoán đổi PEPE, GALA và USDT thành ETH và tiếp tục giao dịch các tài sản kỹ thuật số khác. 🔓Theo Lookonchain, vụ tấn công lấy đi 17 loại tài sản, Một số cái tên nổi bật bị lấy cắp bao gồm: 5,433 tỷ SHIB trị giá khoảng 102 triệu USD, 15,298 ETH trị giá khoảng 52.5 triệu USD, 20.5 triệu MATIC trị giá khoảng 11.24 triệu USD, 640.27 tỷ PEPE có giá khoảng 7.6 triệu USD, 5.79 triệu USDT trị giá 135 triệu USD, 135 triệu GALA trị giá 3.5 triệu USD. 🏅️Số tài sản chưa xác định khác trị giá khoảng 25.78 triệu USD đang tiếp tục được điều xác minh. Ví có địa chỉ bắt đầu tư "0x04b2" đang bán những tài sản này. 📌Các giao dịch được thực hiện có sự hỗ trợ của nền tảng TornadoCash. Cyvers Alerts phát hiện và cố gắng liên hệ với dự án nhưng không nhận được phản hồi.  ✅Sau thông tin bị tấn công, token của sàn sụt giảm nhanh chóng từ 0.1689 USD xuống 0.1618 USD. Hiện tại, đội ngũ dự án chưa có phản hồi chính thức về vụ việc. ⏰WazirX là sàn giao dịch tiền mã hóa lớn nhất và phát triển nhanh nhất Ấn Độ với hơn 200,000 lượt tải xuống ứng dụng với xếp hạng trung bình là 4.5. Dự án được biết đến nhiều hơn khi mở rộng truy cập cho công chúng toàn cầu vào đầu năm. #Coinbay #WazirX #hack
 🎯️WazirX bị hack, thiệt hại hơn 230 triệu USD

💲Theo nguồn tin từ Cyvers Alerts, ví Safe Multisig trên mạng Ethereum của WazirX vừa bị tấn công. Tổng cộng 234.9 triệu USD tài sản bị chuyển đến địa chỉ mới. Địa chỉ đáng ngờ này hoán đổi PEPE, GALA và USDT thành ETH và tiếp tục giao dịch các tài sản kỹ thuật số khác.

🔓Theo Lookonchain, vụ tấn công lấy đi 17 loại tài sản, Một số cái tên nổi bật bị lấy cắp bao gồm: 5,433 tỷ SHIB trị giá khoảng 102 triệu USD, 15,298 ETH trị giá khoảng 52.5 triệu USD, 20.5 triệu MATIC trị giá khoảng 11.24 triệu USD, 640.27 tỷ PEPE có giá khoảng 7.6 triệu USD, 5.79 triệu USDT trị giá 135 triệu USD, 135 triệu GALA trị giá 3.5 triệu USD.

🏅️Số tài sản chưa xác định khác trị giá khoảng 25.78 triệu USD đang tiếp tục được điều xác minh. Ví có địa chỉ bắt đầu tư "0x04b2" đang bán những tài sản này.

📌Các giao dịch được thực hiện có sự hỗ trợ của nền tảng TornadoCash. Cyvers Alerts phát hiện và cố gắng liên hệ với dự án nhưng không nhận được phản hồi. 

✅Sau thông tin bị tấn công, token của sàn sụt giảm nhanh chóng từ 0.1689 USD xuống 0.1618 USD. Hiện tại, đội ngũ dự án chưa có phản hồi chính thức về vụ việc.

⏰WazirX là sàn giao dịch tiền mã hóa lớn nhất và phát triển nhanh nhất Ấn Độ với hơn 200,000 lượt tải xuống ứng dụng với xếp hạng trung bình là 4.5. Dự án được biết đến nhiều hơn khi mở rộng truy cập cho công chúng toàn cầu vào đầu năm.

#Coinbay #WazirX #hack
WazirX #hack Yaklaşık 230 milyon #dolar hacklendi, bakiyeniz varsa #metamask cüzdanınıza ya da binance hesabınıza taşıyın!
WazirX #hack

Yaklaşık 230 milyon #dolar hacklendi, bakiyeniz varsa #metamask cüzdanınıza ya da binance hesabınıza taşıyın!
Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New YearThe cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million. The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet. A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation. It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system. The Orbit Bridge was struck by a number of significant discharges. An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol. According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions. After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack. The hacking of Orbit Chain has been confirmed. Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident. #hack #OrbitChain

Breaking News: Orbit Chain Hackers Unveil $81.4 Million Exploit to Ring in the New Year

The cross-chain bridge of Orbit Chain was compromised by an exploit, which led to the loss of Tether, DAI, USDC, wBTC, and ETH with a combined value of around $81.4 million.
The vulnerability was exploited by the exploiter, who then transferred funds to a new wallet.
A weakness in the bridge or a hack in the centralized server was discovered as the primary reason by the blockchain security company SlowMist which was responsible for the investigation.
It has been revealed that a hack occurred on Orbit Bridge, which is a protocol for interchain communication that is utilized for asset conversion. A total of around $81.4 million worth of cryptocurrency were stolen from the system.
The Orbit Bridge was struck by a number of significant discharges.
An vulnerability that was worth $81.4 million was apparently used by hackers to ring in the New Year with Orbit Bridge. A number of significant outflows were discovered by the blockchain security company SlowMist and the on-chain intelligence service LookOnChain. These outflows were encountered via the cross-chain protocol.
According to the latter, the Orbit Bridge was responsible for the transfer of 30 million Tether (USDT), 10 million DAI, 10 million USDCoin (USDC), 231 wBTC (worth over $10 million), and 9,500 ETH (worth around $21.5 million) in five distinct transactions.

After doing a preliminary examination from the outside, SlowMist came to the conclusion that either the centralized server has been compromised or there is a potential vulnerability in the Orbit Chain bridge. A further in-depth investigation is currently being carried out by the company in order to obtain additional information on the attack.
The hacking of Orbit Chain has been confirmed.
Orbit Chain reported the hack on its protocol in a tweet that was published not too long ago on X. The tweet described the breach as a "unidentified access" to the bridge. A comprehensive investigation into the underlying cause of the assault is currently being carried out by the company, which has said that it is actively collaborating with law enforcement authorities in order to identify the perpetrator of the incident.
#hack #OrbitChain
·
--
Stay #SAFU on X and other socials. @JasonYanowitz on X narrates his #hack odeal. I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked. Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole. I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed. This was the real hack. I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address. But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it. Some takeaways: - Don't click links - If you do click a link, review the actual email address - Set up non-text 2FA on everything - If you've done that, trust your own security process - If you think you've been hacked, slow down and think about how this could have happened Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly. If you're still reading, go read the self-audit series from @samczsun. And this best practices from @bobbyong. Lot more you can do but start there. #phishing
Stay #SAFU on X and other socials.

@JasonYanowitz on X narrates his #hack odeal.

I got hacked yesterday. At the risk of looking foolish, I'll share how it happened so you can avoid this nightmare. For the past few weeks, people have been trying to get into my accounts. #Crypto accounts, email, twitter, etc... every few days I get an email that someone is trying to access one of my accounts. Thankfully I have non-text #2FA set up for everything so nothing got hacked. So when I got back from dinner last night and saw this email, I panicked.
Someone in North Cyprus had finally managed to hack into my account. I guess my security wasn't strong enough and they found a loophole.
I clicked the link to "secure my account". I entered my username and password, updated to a new password, and voila: I'm back in. Crisis averted. Or so I thought. Moments later, I got an email saying my email address had been changed.

This was the real hack.

I was now officially locked out of my account. So how did this happen? It turns out the original email, which looks incredibly real, was not so real. Most email clients hide the actual address.
But when you expand it, you can see that this email was sent from "verify@x-notify.com" Fake address. I got phished. Very foolish mistake. I don't open Google Docs when they're sent to me. I don't click links. I typically check addresses. But Friday 8pm after a long week, they got me. I am aware this thread exposes a pretty dumb mistake but if I can save one person from this same mistake, it's worth it.

Some takeaways:
- Don't click links
- If you do click a link, review the actual email address
- Set up non-text 2FA on everything
- If you've done that, trust your own security process
- If you think you've been hacked, slow down and think about how this could have happened
Big thank you to @KeithGrossman and some folks at X for helping me get my account back so quickly.
If you're still reading, go read the self-audit series from @samczsun.
And this best practices from @bobbyong.
Lot more you can do but start there. #phishing
Connectez-vous pour découvrir d’autres contenus
Découvrez les dernières actus sur les cryptos
⚡️ Prenez part aux dernières discussions sur les cryptos
💬 Interagissez avec vos créateurs préféré(e)s
👍 Profitez du contenu qui vous intéresse
Adresse e-mail/Nº de téléphone