Search
Hackers are selling counterfeit phones with crypto-stealing malware
3.4.2025
Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April...
Typosquatting in crypto, explained: How hackers exploit small mistakes
31.3.2025
What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information.In the rapidly evolving digital landscape, cryptocurrencies...
Typosquatting in crypto, explained: How hackers exploit small mistakes
31.3.2025
What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information.In the rapidly evolving digital landscape, cryptocurrencies...
Darkweb actors claim to have over 100K of Gemini, Binance user info
28.3.2025
Darkweb threat actors claim to have hundreds of thousands of user records — including names, passwords and location data — of Gemini and Binance users, putting the apparent lists up for sale on the internet. The Dark Web Informer, a Darkweb cyber news site, said in a March 27 blog...
Crypto security will always be a game of ‘cat and mouse’ — Wallet exec
23.3.2025
Cryptocurrency wallet providers are getting more sophisticated, but so are bad actors — which means the battle between security and threats is at a deadlock, says a hardware wallet firm executive.“It will always be a cat and mouse game,” Ledger chief experience officer Ian Rogers...
Crypto security will always be a game of ‘cat and mouse’ — Wallet exec
23.3.2025
Cryptocurrency wallet providers are getting more sophisticated, but so are bad actors — which means the battle between security and threats is at a deadlock, says a hardware wallet firm executive.“It will always be a cat and mouse game,” Ledger chief experience officer Ian Rogers...
Solanafrica Scam: Hackers Breach Ghanaian President’s X Account
19.3.2025
Ghanaian President John Mahama announced on March 18 that he has regained full control of his X (formerly Twitter) account from hackers who used it to promote a fraudulent cryptocurrency scheme. Two-Factor Authentication Not Enough The president’s post announcing the restoration of the account came...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
Crypto mixers and crosschain bridges help criminals obscure stolen funds, making it harder for investigators to trace illicit transactions
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Odin.fun Clarifies: Did Not Fall Prey to Hackers, Bitcoins are Safe
7.3.2025
Amid the panic on X regarding the pause of withdrawal services, the developer of the Bitcoin memecoin generator,…
Lazarus Group Completes ETH Laundering, Amassing 6,706 BTC in the Process
4.3.2025
Blockchain analysis reports from Arkham Intelligence indicate that North Korea’s Lazarus Group has fully laundered the ethereum (ETH) proceeds from the Bybit breach, with a significant share of the assets now converted into bitcoin (BTC). From ETH to BTC: Lazarus Group Now Holds 6,706...
THORChain Sees Record $4.6B Volume After Bybit's $1.4B Hack
4.3.2025
THORChain was one of the platforms Bybit hackers used to launder funds, according to observers
Return $4M or Face FBI, Interpol: Mask Network Founder to Hackers
2.3.2025
Mask Network founder Suji Yan has told hackers who recently siphoned $4 million in digital assets from his wallet to return the funds or face enforcement action. Yan stated that the Federal Bureau of Investigation, the Hong Kong Police, Interpol, and private security personnel have evidence...
Bybit hackers resume laundering activities, moving another 62,200 ETH
2.3.2025
The Bybit hackers picked up the pace on March 1, laundering another 62,200 Ether amid efforts from US authorities to block transactions tied to the exploiters
Bybit hackers resume laundering activities, moving another 62,200 ETH
2.3.2025
The Bybit hackers picked up the pace on March 1, laundering another 62,200 Ether amid efforts from US authorities to block transactions tied to the exploiters
Bybit hackers resume laundering activities, moving another 62,200 ETH
2.3.2025
The Bybit hackers picked up the pace on March 1, laundering another 62,200 Ether amid efforts from US authorities to block transactions tied to the exploiters
Bybit hackers resume laundering activities, moving another 62,200 ETH
2.3.2025
The Bybit hackers picked up the pace on March 1, laundering another 62,200 Ether amid efforts from US authorities to block transactions tied to the exploiters