1. Home
  2. Exploits

Exploits

BingX confirms the resumption of withdrawal services following hack

Monetary losses from the BingX hack were initially reported as totaling $26 million, but the figure has since swelled to $52 million.

BingX — a popular cryptocurrency exchange — has announced that withdrawal services on the platform will resume on Sept. 21, 2024, for certain digital assets.

According to the exchange's announcement, withdrawals for Tether's US dollar stablecoin (USDT), Circle's US dollar stablecoin (USDC), Bitcoin (BTC), Ethereum (ETH), Tron (TRX), and Solana (SOL) will resume first followed by withdrawal services for other tokens and digital assets over the next two weeks.

The exchange notified customers that deposit services would likewise resume in the next several weeks and told clients that withdrawal requests submitted before the disruption of withdrawal services have been canceled and must be resubmitted.

Read more

Zimbabwe Devalues Gold-Backed Currency by 44%

Ethena domain registrar hacked, Ethena Labs warns users to stay away

The Ethena website appears to have suffered a front-end attack, and users are encouraged not to interact with the platform. 

The Ethena website suffered what appears to be a front-end exploit on Sept. 18, and Ethena Labs has cautioned users not to interact with any site or application claiming to be Ethena.

According to a social media post from Ethena Labs, the website's domain registrar account was compromised, and the site is currently deactivated until the issue is resolved.

Ethena Labs also reassured clients that the Ethena protocol was not affected by the exploit and that all customer funds were safe.

Read more

Zimbabwe Devalues Gold-Backed Currency by 44%

New Android malware steals private keys from screenshots and images

According to a recent FBI warning, North Korean hackers are "aggressively targeting" the crypto industry with “well-disguised” attacks.

A new Android malware called SpyAgent, discovered by software security firm McAfee, can steal private keys stored in screenshots and images on a smartphone’s internal storage.

More specifically, the malware uses a mechanism known as optical character recognition (OCR) to scan images stored on a smartphone and extract words from them. OCR is present in many technologies, including desktop computers, which can recognize, copy, and paste text from images.

McAfee Labs explained that the malware is distributed through malicious links sent through text messages. The cybersecurity company broke down the process, beginning with an unsuspecting user clicking on a link they received.

Read more

Zimbabwe Devalues Gold-Backed Currency by 44%

Ethereum Ecosystem Suffers $400,000,000 in Losses Year-to-Date, Amount of Crypto Hacks Rise by Over 50%: SlowMist

Ethereum Ecosystem Suffers 0,000,000 in Losses Year-to-Date, Amount of Crypto Hacks Rise by Over 50%: SlowMist

New research from cybersecurity firm SlowMist reveals that the Ethereum (ETH) ecosystem has lost $400 million in exploits year-to-date as the number of crypto hacking cases sees a 50% rise. According to SlowMist’s 2024 mid-year report, the second largest digital asset by market cap saw the most funds lost due to exploits as an ecosystem, […]

The post Ethereum Ecosystem Suffers $400,000,000 in Losses Year-to-Date, Amount of Crypto Hacks Rise by Over 50%: SlowMist appeared first on The Daily Hodl.

Zimbabwe Devalues Gold-Backed Currency by 44%

New Phishing Scams on Solana (SOL) Have Stolen Over $4,000,000 in Crypto Assets: Security Firm

New Phishing Scams on Solana (SOL) Have Stolen Over ,000,000 in Crypto Assets: Security Firm

New data from a cybersecurity firm reveals that recent phishing scams over smart contract platform Solana (SOL) have stolen over $4 million in crypto assets. In a new blog post, security firm Scam Sniffer says that in the past month alone, bad actors were able to exploit $4.17 million worth of digital assets from about […]

The post New Phishing Scams on Solana (SOL) Have Stolen Over $4,000,000 in Crypto Assets: Security Firm appeared first on The Daily Hodl.

Zimbabwe Devalues Gold-Backed Currency by 44%

November most ‘damaging’ month in 2023 as thieves pilfer $363M in crypto

The Poloniex and HTX/Heco Bridge exploits as well as the KyberSwap flash loan attack were the three largest incidents in November, according to blockchain security firm CertiK.

The cryptocurrency industry has now seen its most “damaging” month for crypto thievery, scams and exploits, with crypto criminals walking away with $363 million in November, according to a blockchain security firm.

Around $316.4 million came from exploits alone, flash loans inflicted $45.5 million in damage, and $1.1 million was lost to various exit scams, CertiK stated in a Nov.

The largest exploits in November occurred on Poloniex and HTX/Heco Bridge, with losses of $131.4 million and $113.3 million, respectively.

The third largest exploit was inflicted on a single victim who lost $27 million from a phishing attack.

Meanwhile, the $45 million KyberSwap attack accounted for nearly all damage done for flash loan attacks in the month.

The latest monthly figure has surpassed an earlier record of $329 million, set in September, caused mainly by the $200 million Mixin Network attack.

As of the end of November, about $1.7 billion has now been lost to exploits, exit scams and flash loan attacks in 2023.

Read more

Zimbabwe Devalues Gold-Backed Currency by 44%

September becomes the biggest month for crypto exploits in 2023: CertiK

The Mixin Network cross-chain protocol accounted for almost two-thirds of the crypto exploit losses in September.

September has officially become the worst month in 2023 (so far) for crypto-related exploits — with a whopping $329.8 million in crypto stolen.

On Oct. 2, blockchain security firm CertiK said the most significant contributor to the month’s totals came from the Mixin Network attack on Sept. 23 when the Hong Kong-based decentralized cross-chain transfer protocol lost $200 million due to a breach of its cloud service provider.

Other major incidents for the month included the attacks on the CoinEx exchange and Stake.com resulting in losses of $53 million and $41 million respectively.

As reported by Cointelegraph, North Korean hacking collective the Lazarus Group has been fingered for both attacks. The latest figures from Dune Analytics claim that the group currently holds $45.6 million in crypto assets.

The attack has taken the yearly total of crypto lost to exploits to $925.4 million. July was the second-highest month for exploit losses with $285.8 million pilfered.

Meanwhile, the month also saw $1.9 million lost to exit scams, $400,000 to flash loan attacks, and another $25 million to phishing attacks, according to CertiK.

The total lost in 2023 to exploits, scams, and hacks has now totaled $1.34 billion.

Related: North Korean Lazarus Group amasses over $40M in Bitcoin, data reveals

According to blockchain security firm Beosin, total losses from hacks, phishing scams, and exit scams were just under $890 million for the third quarter of 2023.

Losses in Q3 even exceeded the combined sum of the first two quarters which was $330 million in Q1 and $333 million in Q2, it reported late last week.

Magazine: $3.4B of Bitcoin in a popcorn tin: The Silk Road hacker’s story

Zimbabwe Devalues Gold-Backed Currency by 44%

North Korean Hackers Tapping Russian Crypto Exchanges To Funnel Illicit Digital Assets, According to Chainalysis

North Korean Hackers Tapping Russian Crypto Exchanges To Funnel Illicit Digital Assets, According to Chainalysis

A market intelligence firm says that hackers from North Korea are using Russian crypto exchanges known to launder money to move stolen digital assets. In a new blog post, crypto analytics platform Chainalysis says on-chain data reveals that hacking groups linked with North Korea are using Russian crypto exchanges to launder funds stolen from the […]

The post North Korean Hackers Tapping Russian Crypto Exchanges To Funnel Illicit Digital Assets, According to Chainalysis appeared first on The Daily Hodl.

Zimbabwe Devalues Gold-Backed Currency by 44%

Firms have mere hours to deflect cyber attacks, warns cybersecurity CEO

Palo Alto Networks CEO Nikesh Arora has warned that “bad actors are getting faster” and stressed that companies need to beef up cybersecurity defenses.

Palo Alto Networks CEO Nikesh Arora has urged companies to modernize their cybersecurity systems, cautioning that bad actors have become much faster at breaching company defenses than ever before. 

Speaking to Jim Cramer on CNBC’s “Mad Money” on Aug. 21, the cybersecurity firm CEO said that companies with outdated security systems need to take particular heed, as cybercriminals are only getting faster.

“It’s important for us to make sure we’re ready to deflect the stuff in hours, not in days,” Arora explained.

He stressed that outdated cybersecurity solutions need modernizing, and even suggested that artificial intelligence could be put to the task.

“Put that in some sort of an AI stack, so you can actually do this in more real time. Because the bad actors are moving faster.”

In June, ChatGPT creator OpenAI announced a $1 million cybersecurity grant program to enhance and measure the impact of AI-driven cybersecurity technologies.

This year has been a bumper one for crypto hackers, particularly when it comes to decentralized finance protocols.

More than $300 million in crypto was lost to hacks and exploits in the second quarter of 2023, as reported by Cointelegraph.

Meanwhile, August has already seen its fair share of crypto exploited with seven-figure losses for Exactly Protocol, Zunami Protocol, Steadefi Protocol, and Cypher Protocol, according to the De.Fi Rekt database. However, not all of them were traditional cybersecurity breaches, as many consisted of smart contract code bugs and flash loan exploits.

Related: Two-thirds of AI Chrome extensions could endanger user security

In late July, the Securities and Exchange Commission voted to adopt new rules on cybersecurity disclosure, which would impact listed companies, including cryptocurrency firms.

The regulator will require public companies to disclose “material” cybersecurity breaches within four days claiming it was necessary to collect the data “to protect investors.”

However, corporations pushed back claiming that the short announcement period is unreasonable. They are also concerned that it would require public disclosure which could harm corporations and open them to further exploitation by cybercriminals.

“You really don’t want to be exposed, telling the SEC that you have been breached, you haven’t fixed it yet,” Arora said urging that its clients fix things much faster.

Magazine: Web3 Gamer: GTA 6 crypto rumors, Dr Who/Sandbox, Thai tourist NFTs review

Zimbabwe Devalues Gold-Backed Currency by 44%

Connext, Alchemix launch cross-chain token standard to reduce bridge exploit losses

The two protocols will implement a standard for issuers to control the "canonical" minting of tokens, helping to reduce losses from unofficial bridges.

Connext cross-chain bridging protocol has announced a new token standard to reduce losses from bridge hacks. According to a July 24 announcement, the new “xERC-20” standard allows token-issuers to maintain a list of official bridges and control how many tokens can be minted by each.

In addition to Connext, DeFi platform Alchemix Finance will implement xERC-20 tokens, the announcement stated.

The new token standard was originally put forth on July 7 as Ethereum Improvement Proposal (EIP) 7281. It was co-authored by Connext’s founder, Arjun Bhuptani. At the time, Bhuptani said it would help to minimize losses from bridge hacks by acting on the principle that “Token issuers are the ones who get rekt when bridges get hacked.”

Instead of each bridge issuing its own version of a token on every network, the new standard would allow bridges to mint “official” or “canonical” versions of each token. However, they can only do this with the permission of the token issuer, and this permission would be enforced through smart contracts. Token-issuers would also be able to limit the number of coins that a particular bridge could mint, the proposal stated.

Under EIP-7281, bridges could still mint their own versions of tokens, but such derivative coins would not be considered “canonical” versions. As a result, consumers would eventually come to reject unofficial versions of coins. In Bhuptani’s view, this would lead to a safer DeFi space because it would put the responsibility of avoiding bridge hacks squarely on the shoulders of each token-issuer, which would help to prevent end-users from suffering losses.

To become an official part of the Ethereum ecosystem, an EIP has to be approved by EIP Editors, a process that can take months. The July 24 announcement said the standard will now be implemented in Connext and Alchemix ahead of its official approval, allowing end-users to rely on it immediately.

Related: Multichain bridge hack was a “big blow” to Fantom ecosystem, says Cronje

In the announcement, Connext stated that the token standard will be “forward compatible” with the official version should it eventually be approved by the EIP Editors. Bhuptani argued that the new implementation will prevent bridges with bad security or excessive centralization from being taken seriously, stating:

“This approach [...] encourages open competition and innovation as token issuers now have the flexibility [to] granularly update their preferences for supported bridges over time. Instead of prioritizing building a monopoly on liquidity, or trying to corner market share by locking-in token issuers (or in some cases entire chains), bridges are now forced to have an ongoing focus on their security and quality of service, lest they be delisted."

The issue of bridge security has become a hot topic in the crypto community. These concerns were amplified on July 7, when over $100 million was mysteriously withdrawn from the Multichain bridging protocol. The Multichain team at first only referred to the withdrawals as “abnormal,” but later clarified that an unknown individual had accessed their CEO’s cloud storage system to withdraw the funds without users’ consent.

Zimbabwe Devalues Gold-Backed Currency by 44%