Search
What is Bitcoinlib, and how did hackers target it?
18.4.2025
Bitcoinlib, explained Bitcoinlib is an open-source Python library designed to make Bitcoin development easier. Think of it as a toolbox for programmers who want to create Bitcoin wallets, manage transactions, or build apps that interact with the Bitcoin...
North Korean hackers target crypto devs with fake recruitment tests
17.4.2025
North Korean hackers linked to the $1.4 billion Bybit exploit are reportedly targeting crypto developers using fake recruitment tests infected with malware. Cybersecurity outlet The Hacker News reported that crypto developers have received coding assignments from malicious actors posing...
Hackers Exploit Fake Microsoft Office Add-ins to Spread Crypto Miner and Wallet-Stealing Trojan
9.4.2025
In a recent security alert, Kaspersky researchers have uncovered a unique malware distribution scheme exploiting Sourceforge, a popular software hosting platform. Attackers have created a project named “officepackage” that appears to offer Microsoft Office add-ins but instead leads...
Hackers hide crypto address-swapping malware in Microsoft Office add-in bundles
9.4.2025
Malicious actors are attempting to steal crypto with malware embedded in fake Microsoft Office extensions uploaded to the software hosting site SourceForge, according to cybersecurity firm Kaspersky.One of the malicious listings, called “officepackage,” has real Microsoft Office add-ins...
Hackers are selling counterfeit phones with crypto-stealing malware
3.4.2025
Cybersecurity firm Kaspersky says it has uncovered thousands of counterfeit Android smartphones sold online with preinstalled malware designed to steal crypto and other sensitive data. The Android devices are sold at reduced prices, cybersecurity firm Kaspersky Labs said in an April...
Typosquatting in crypto, explained: How hackers exploit small mistakes
31.3.2025
What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information.In the rapidly evolving digital landscape, cryptocurrencies...
Typosquatting in crypto, explained: How hackers exploit small mistakes
31.3.2025
What is typosquatting in crypto? Typosquatting in crypto involves registering domain names that mimic popular platforms with slight misspellings to deceive users into revealing sensitive information.In the rapidly evolving digital landscape, cryptocurrencies...
Darkweb actors claim to have over 100K of Gemini, Binance user info
28.3.2025
Darkweb threat actors claim to have hundreds of thousands of user records — including names, passwords and location data — of Gemini and Binance users, putting the apparent lists up for sale on the internet. The Dark Web Informer, a Darkweb cyber news site, said in a March 27 blog...
Crypto security will always be a game of ‘cat and mouse’ — Wallet exec
23.3.2025
Cryptocurrency wallet providers are getting more sophisticated, but so are bad actors — which means the battle between security and threats is at a deadlock, says a hardware wallet firm executive.“It will always be a cat and mouse game,” Ledger chief experience officer Ian Rogers...
Crypto security will always be a game of ‘cat and mouse’ — Wallet exec
23.3.2025
Cryptocurrency wallet providers are getting more sophisticated, but so are bad actors — which means the battle between security and threats is at a deadlock, says a hardware wallet firm executive.“It will always be a cat and mouse game,” Ledger chief experience officer Ian Rogers...
Solanafrica Scam: Hackers Breach Ghanaian President’s X Account
19.3.2025
Ghanaian President John Mahama announced on March 18 that he has regained full control of his X (formerly Twitter) account from hackers who used it to promote a fraudulent cryptocurrency scheme. Two-Factor Authentication Not Enough The president’s post announcing the restoration of the account came...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
Crypto mixers and crosschain bridges help criminals obscure stolen funds, making it harder for investigators to trace illicit transactions
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Crypto mixers and crosschain bridges: How hackers launder stolen assets
10.3.2025
What are coin mixers, and how are they used in high-profile hacks? Crypto mixers, or tumblers, are basically smart contracts used to hide the origin of crypto transactions. Hackers send their cryptocurrency to a mixer’s address. The mixer blends...
Odin.fun Clarifies: Did Not Fall Prey to Hackers, Bitcoins are Safe
7.3.2025
Amid the panic on X regarding the pause of withdrawal services, the developer of the Bitcoin memecoin generator,…
Lazarus Group Completes ETH Laundering, Amassing 6,706 BTC in the Process
4.3.2025
Blockchain analysis reports from Arkham Intelligence indicate that North Korea’s Lazarus Group has fully laundered the ethereum (ETH) proceeds from the Bybit breach, with a significant share of the assets now converted into bitcoin (BTC). From ETH to BTC: Lazarus Group Now Holds 6,706...
THORChain Sees Record $4.6B Volume After Bybit's $1.4B Hack
4.3.2025
THORChain was one of the platforms Bybit hackers used to launder funds, according to observers
Return $4M or Face FBI, Interpol: Mask Network Founder to Hackers
2.3.2025
Mask Network founder Suji Yan has told hackers who recently siphoned $4 million in digital assets from his wallet to return the funds or face enforcement action. Yan stated that the Federal Bureau of Investigation, the Hong Kong Police, Interpol, and private security personnel have evidence...