Search
How hackers use fake X links to steal crypto, and how to spot them
10.6.2025
Cybercriminals hijack or impersonate trusted X accounts to post phishing links that lead users to fake sites or malicious smart contracts designed to steal crypto
$2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK
4.6.2025
Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK
$2.1B crypto stolen in 2025 as hackers shift focus from code to users: CertiK
4.6.2025
Hackers are moving from smart contract vulnerabilities to exploiting human behavioural weaknesses, according to the co-founder of Web3 cybersecurity firm CertiK
Hackers using fake Ledger Live app to steal seed phrases and drain crypto
23.5.2025
Cybercriminals are using fake Ledger Live apps to drain macOS users’ crypto through malware that steals seed phrases, a cybersecurity firm warns. The malware replaces the legitimate Ledger Live app on victims’ devices and then prompts the user to input their seed phrase through...
Hackers using fake Ledger Live app to steal seed phrases and drain crypto
23.5.2025
Cybercriminals are using fake Ledger Live apps to drain macOS users’ crypto through malware that steals seed phrases, a cybersecurity firm warns. The malware replaces the legitimate Ledger Live app on victims’ devices and then prompts the user to input their seed phrase through...
Australian Police Seize Hacker’s Bitcoin, Mansion and Luxury Car
19.5.2025
The Australian police recently seized 25 bitcoins, a luxury car, and a mansion in Beachmere from a man previously convicted of hacking an American gaming company. AFP Targets Illegal Profits of Hacker The Australian Federal Police (AFP) recently seized 25 bitcoins, a luxury car, and a mansion...
Pectra lets hackers drain wallets with just an offchain signature
11.5.2025
Ethereum’s latest network upgrade, Pectra, introduced powerful new features aimed at improving scalability and smart account functionality — but it also opened a dangerous new attack vector that could allow hackers to drain funds from user wallets using only an offchain signature.Under...
Hackers use New York Post’s X account to send scam DMs, users report
5.5.2025
Malicious actors appear to have infiltrated the New York Post’s X account in an attempt to scam crypto users on the microblogging platform. Some X users from the crypto community have recently reported having received a private message from the New York Post’s X account inviting...
Crypto hackers hit DeFi for $92M in April as attacks double from March
30.4.2025
Cryptocurrency hackers stole more than $90 million in April, dealing another blow to the industry’s mainstream reputation despite ongoing efforts to improve cybersecurity.Hackers made off with $92 million of digital assets across 15 incidents in April, according to an April 30 research report...
Crypto hackers hit DeFi for $92M in April as attacks double from March
30.4.2025
Cryptocurrency hackers stole more than $90 million in April, dealing another blow to the industry’s mainstream reputation despite ongoing efforts to improve cybersecurity.Hackers made off with $92 million of digital assets across 15 incidents in April, according to an April 30 research report...
North Korean Hackers Targeting Crypto Developers With U.S. Shell Firms
25.4.2025
Illicitly downloaded programs can steal data, provide remote access to infected systems, and serve as entry points for additional spyware or ransomware
North Korean hackers set up 3 shell companies to scam crypto devs
25.4.2025
A subgroup of the North Korea-linked hacker organization Lazarus set up three shell companies, two in the US, to deliver malware to unsuspecting users.The three sham crypto consulting firms — BlockNovas, Angeloper Agency and SoftGlide — are being used by the North Korean hacker group...
North Korean hackers set up 3 shell companies to scam crypto devs
25.4.2025
A subgroup of the North Korea-linked hacker organization Lazarus set up three shell companies, two in the United States, to deliver malware to unsuspecting users.The three sham crypto consulting firms — BlockNovas, Angeloper Agency and SoftGlide — are being used by the North Korean...
StarCraft 2 Hackers Are Forcing Players To Watch Mass Shooting Videos
22.4.2025
StarCraft 2 hackers are reportedly exposing unsuspecting players to horrific footage of a real-life shooting as well as videos featuring bright flashing lights, seemingly designed to trigger seizures. While Blizzard is investigating, it seems this has been happening for nearly a year or more.Read...
KiloEx's ‘Sophisticated’ Hack Shows DeFi Risks — But This Time, Recovery Was Swift
18.4.2025
The firm will be awarding a 10% bounty to white hat hackers involved in the resolution of the exploit
What is Bitcoinlib, and how did hackers target it?
18.4.2025
Bitcoinlib, explained Bitcoinlib is an open-source Python library designed to make Bitcoin development easier. Think of it as a toolbox for programmers who want to create Bitcoin wallets, manage transactions, or build apps that interact with the Bitcoin...
North Korean hackers target crypto devs with fake recruitment tests
17.4.2025
North Korean hackers linked to the $1.4 billion Bybit exploit are reportedly targeting crypto developers using fake recruitment tests infected with malware. Cybersecurity outlet The Hacker News reported that crypto developers have received coding assignments from malicious actors posing...
Hackers Exploit Fake Microsoft Office Add-ins to Spread Crypto Miner and Wallet-Stealing Trojan
9.4.2025
In a recent security alert, Kaspersky researchers have uncovered a unique malware distribution scheme exploiting Sourceforge, a popular software hosting platform. Attackers have created a project named “officepackage” that appears to offer Microsoft Office add-ins but instead leads...
Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles
9.4.2025
Malicious actors are attempting to steal crypto with malware embedded in fake Microsoft Office extensions uploaded to the software hosting site SourceForge, according to cybersecurity firm Kaspersky.One of the malicious listings, called “officepackage,” has real Microsoft Office add-ins...
Hackers are selling counterfeit phones with crypto-stealing malware
3.4.2025
Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April...