Binance Square

hacking

348,174 مشاهدات
180 يقومون بالنقاش
S H A H F A H A D
--
ترجمة
🚨BREAKING: DeBot Addresses Security Concerns Amid Hacking Allegations... DeBot has publicly addressed recent security concerns following allegations of a hacking incident, stating that it is actively investigating the situation and strengthening its defensive measures. The team said initial reviews have not found evidence of systemic compromise but confirmed that additional audits and monitoring are underway to ensure user safety. DeBot emphasized its commitment to transparency, noting that updates will be shared as more information becomes available. The response comes amid heightened scrutiny across the crypto sector, where platforms face increasing pressure to demonstrate robust security and rapid incident response. #SecurityAlert #hacking #CPIWatch
🚨BREAKING: DeBot Addresses Security Concerns Amid Hacking Allegations...

DeBot has publicly addressed recent security concerns following allegations of a hacking incident, stating that it is actively investigating the situation and strengthening its defensive measures. The team said initial reviews have not found evidence of systemic compromise but confirmed that additional audits and monitoring are underway to ensure user safety.

DeBot emphasized its commitment to transparency, noting that updates will be shared as more information becomes available. The response comes amid heightened scrutiny across the crypto sector, where platforms face increasing pressure to demonstrate robust security and rapid incident response.
#SecurityAlert #hacking #CPIWatch
ترجمة
ترجمة
🚨 Trust Wallet HACKED! $7M Drained! 🚨 CZ just confirmed it – Trust Wallet has been hit by a major security breach. 🤯 This isn't a drill. We're talking a $7 MILLION loss. The crypto world is on high alert. This attack underscores the constant security risks in DeFi. Your funds are NEVER truly safe – always practice extreme caution and prioritize self-custody. This is a brutal reminder that even popular wallets aren't immune. Protect your $ETH and $BTC. Stay vigilant. Move your assets if you’re holding in Trust Wallet. Don't become another statistic. Act NOW. #TrustWallet #CryptoSecurity #DeFi #Hacking 💥 {future}(BTCUSDT)
🚨 Trust Wallet HACKED! $7M Drained! 🚨

CZ just confirmed it – Trust Wallet has been hit by a major security breach. 🤯
This isn't a drill. We're talking a $7 MILLION loss.
The crypto world is on high alert. This attack underscores the constant security risks in DeFi.
Your funds are NEVER truly safe – always practice extreme caution and prioritize self-custody.
This is a brutal reminder that even popular wallets aren't immune.
Protect your $ETH and $BTC. Stay vigilant. Move your assets if you’re holding in Trust Wallet.
Don't become another statistic. Act NOW.

#TrustWallet #CryptoSecurity #DeFi #Hacking 💥
ترجمة
🚨 Trust Wallet HACKED! $7M Drained! 🚨 CZ just confirmed it – Trust Wallet has been hit by a major security breach. 🤯 This isn't a drill. We're talking a $7 MILLION loss. The crypto world is on high alert. This attack underscores the constant security risks in DeFi. Your funds are NEVER truly safe – always practice extreme caution and prioritize self-custody. Don't leave your $ETH or other assets vulnerable! This is a stark reminder to secure your wallets NOW. This breach will send shockwaves through the industry. Expect increased scrutiny and a renewed focus on wallet security. Protect yourself. Protect your crypto. The time to act is NOW. #TrustWallet #CryptoSecurity #DeFi #Hacking 🚀
🚨 Trust Wallet HACKED! $7M Drained! 🚨

CZ just confirmed it – Trust Wallet has been hit by a major security breach. 🤯
This isn't a drill. We're talking a $7 MILLION loss.
The crypto world is on high alert. This attack underscores the constant security risks in DeFi.
Your funds are NEVER truly safe – always practice extreme caution and prioritize self-custody.
Don't leave your $ETH or other assets vulnerable! This is a stark reminder to secure your wallets NOW.
This breach will send shockwaves through the industry. Expect increased scrutiny and a renewed focus on wallet security.
Protect yourself. Protect your crypto. The time to act is NOW.

#TrustWallet #CryptoSecurity #DeFi #Hacking 🚀
ترجمة
Your Crypto Isn't Yours Unless You Know How to Protect It: A Survival Guide for 2025In 2025, stealing cryptocurrency has become easier than ever. Hackers no longer breach blockchains—they breach people. If you think SMS-based Two-Factor Authentication (2FA) is enough security, I have bad news for you. Let's break down the "gold standard" of security that will help you sleep soundly. 1. The "Cold" vs. "Hot" Rule Your capital must be divided. Cold Wallets (Ledger, Trezor, Keystone): Store 90% of your assets here that you don't plan to touch for months. This wallet is never connected to questionable DeFi protocols.Hot Wallets (MetaMask, Trust Wallet): Only for operational trading and minting NFTs. Keep only the amount you can afford to lose in the event of a protocol hack. 2. Seed Phrase: Your Only Key Forget about screenshots, notes in iCloud, or files on Google Drive. In 2025, AI scanners can find seed phrases in cloud storage in seconds. The Solution: Use only physical storage. A metal plate (Cryptosteel) or a good old-fashioned piece of paper in a safe. Divide the phrase into two parts and store them in different locations if the amount is substantial. 3. Digital Hygiene: The Deadly Traps Approvals: When you connect your wallet to a new site, you often grant permission to withdraw an unlimited amount of your tokens. Regularly use services like Revoke.cash to revoke permissions from old protocols.SCAM Airdrops: Do you see "free" tokens worth $5000 in your wallet? It's bait. Attempting to swap them will prompt you to sign a transaction that empties your entire wallet. Never interact with tokens you didn't purchase. 4. An Exchange is Not a Bank Binance is a great tool for trading, but storing 10 years' worth of savings there is a strategic mistake. Remember the old mantra: Not your keys, not your coins. Use exchanges for liquidity; use personal wallets for storage. 5. Account Protection: Ditch SMS SMS confirmation is vulnerable to SIM swapping. What to use: Only hardware security keys (YubiKey) or authenticator apps (Google Authenticator, Microsoft Authenticator). This eliminates 99% of phishing attempts. My Verdict: Security in crypto is not a one-time action; it's a continuous process. Hackers only need you to slip up once. You have to be vigilant always. 📍 Your Checklist: Right now, check your approvals using Revoke.cash and change the password on the email associated with your exchange account. What security rule do you consider the most important? Have you experienced attempted theft? Share your experience in the comments; perhaps your story will save someone's money today! 👇 #CryptoSecurity #SafeCrypto #BinanceSquare #Hacking #Web3Security

Your Crypto Isn't Yours Unless You Know How to Protect It: A Survival Guide for 2025

In 2025, stealing cryptocurrency has become easier than ever. Hackers no longer breach blockchains—they breach people. If you think SMS-based Two-Factor Authentication (2FA) is enough security, I have bad news for you.
Let's break down the "gold standard" of security that will help you sleep soundly.
1. The "Cold" vs. "Hot" Rule
Your capital must be divided.
Cold Wallets (Ledger, Trezor, Keystone): Store 90% of your assets here that you don't plan to touch for months. This wallet is never connected to questionable DeFi protocols.Hot Wallets (MetaMask, Trust Wallet): Only for operational trading and minting NFTs. Keep only the amount you can afford to lose in the event of a protocol hack.
2. Seed Phrase: Your Only Key
Forget about screenshots, notes in iCloud, or files on Google Drive. In 2025, AI scanners can find seed phrases in cloud storage in seconds.
The Solution: Use only physical storage. A metal plate (Cryptosteel) or a good old-fashioned piece of paper in a safe. Divide the phrase into two parts and store them in different locations if the amount is substantial.
3. Digital Hygiene: The Deadly Traps
Approvals: When you connect your wallet to a new site, you often grant permission to withdraw an unlimited amount of your tokens. Regularly use services like Revoke.cash to revoke permissions from old protocols.SCAM Airdrops: Do you see "free" tokens worth $5000 in your wallet? It's bait. Attempting to swap them will prompt you to sign a transaction that empties your entire wallet. Never interact with tokens you didn't purchase.
4. An Exchange is Not a Bank
Binance is a great tool for trading, but storing 10 years' worth of savings there is a strategic mistake. Remember the old mantra: Not your keys, not your coins. Use exchanges for liquidity; use personal wallets for storage.
5. Account Protection: Ditch SMS
SMS confirmation is vulnerable to SIM swapping.
What to use: Only hardware security keys (YubiKey) or authenticator apps (Google Authenticator, Microsoft Authenticator). This eliminates 99% of phishing attempts.
My Verdict: Security in crypto is not a one-time action; it's a continuous process. Hackers only need you to slip up once. You have to be vigilant always.
📍 Your Checklist: Right now, check your approvals using Revoke.cash and change the password on the email associated with your exchange account.
What security rule do you consider the most important? Have you experienced attempted theft? Share your experience in the comments; perhaps your story will save someone's money today! 👇
#CryptoSecurity #SafeCrypto #BinanceSquare #Hacking #Web3Security
ترجمة
TRUST WALLET HACKED! $6.77M GONE! $TWT $DCR Massive exploit. Hundreds of users hit. Millions vanished. Trust Wallet is investigating. CZ confirms full coverage for all affected. This is NOT a drill. Secure your funds NOW. The fallout is just beginning. Don't get caught unprepared. Get out or get safe. Disclaimer: This is not financial advice. #CryptoNews #Hacking #TrustWallet #Security 🚨 {future}(TWTUSDT) {spot}(DCRUSDT)
TRUST WALLET HACKED! $6.77M GONE! $TWT $DCR

Massive exploit. Hundreds of users hit. Millions vanished. Trust Wallet is investigating. CZ confirms full coverage for all affected. This is NOT a drill. Secure your funds NOW. The fallout is just beginning. Don't get caught unprepared. Get out or get safe.

Disclaimer: This is not financial advice.

#CryptoNews #Hacking #TrustWallet #Security 🚨
ترجمة
🚨 Trust Wallet HACKED! $7 Million Drained! 🚨 Trust Wallet has confirmed a major security breach. 💸 CZ just dropped the news – hackers made off with $7 million. But here’s the kicker: Trust Wallet is stepping up and will FULLY reimburse everyone affected. 🛡️ This is a HUGE test for self-custody wallets. While Trust Wallet is making things right, it’s a stark reminder to prioritize security. Don't leave your $ETH vulnerable! Secure your seed phrase NOW. This isn't a drill. #TrustWallet #CryptoSecurity #Binance #Hacking 🚀 {future}(ETHUSDT)
🚨 Trust Wallet HACKED! $7 Million Drained! 🚨
Trust Wallet has confirmed a major security breach. 💸
CZ just dropped the news – hackers made off with $7 million. But here’s the kicker: Trust Wallet is stepping up and will FULLY reimburse everyone affected. 🛡️
This is a HUGE test for self-custody wallets. While Trust Wallet is making things right, it’s a stark reminder to prioritize security. Don't leave your $ETH vulnerable! Secure your seed phrase NOW. This isn't a drill.
#TrustWallet #CryptoSecurity #Binance #Hacking 🚀
ترجمة
--- 🚨 STAY SAFE — $40,000,000 MORE STOLEN IN A CRYPTO HACK This wasn’t a smash-and-grab. This was slow, precise, and surgical. $BTC A multisig wallet was compromised minutes after creation — then quietly drained over weeks. No panic. No alerts. No noise. Just patience. ⚠️ This is how modern crypto attacks work: Attackers don’t rush They blend in They move funds in batches They even open DeFi positions to look “normal” This is next-level crypto crime. But here’s what most people miss 👇 Every major exploit forces the ecosystem to level up. After Mt. Gox → security improved After DAO → tooling evolved After FTX → awareness exploded 🔐 Multisig still works — when done RIGHT Hardware wallets Isolated signers Proper multisig setups (no shortcuts) The technology already exists. The industry is just learning to use it better. 🧠 LESSON: Keep your eyes on your wallet. Your wallet can be compromised from the very start — without you ever noticing. #CryptoMarketNews #CryptoMarketWatch #ScamAlert #HackAlert #hacking #CryptoSecurity ---
---

🚨 STAY SAFE — $40,000,000 MORE STOLEN IN A CRYPTO HACK

This wasn’t a smash-and-grab.
This was slow, precise, and surgical.
$BTC
A multisig wallet was compromised minutes after creation — then quietly drained over weeks.
No panic. No alerts. No noise.
Just patience.

⚠️ This is how modern crypto attacks work:

Attackers don’t rush

They blend in

They move funds in batches

They even open DeFi positions to look “normal”

This is next-level crypto crime.

But here’s what most people miss 👇
Every major exploit forces the ecosystem to level up.

After Mt. Gox → security improved
After DAO → tooling evolved
After FTX → awareness exploded

🔐 Multisig still works — when done RIGHT

Hardware wallets

Isolated signers

Proper multisig setups (no shortcuts)

The technology already exists.
The industry is just learning to use it better.

🧠 LESSON:
Keep your eyes on your wallet.
Your wallet can be compromised from the very start — without you ever noticing.

#CryptoMarketNews #CryptoMarketWatch #ScamAlert #HackAlert #hacking #CryptoSecurity

---
ترجمة
🚨 STAY SAFE! Another $40,000,000 STOLEN in CRYPTO HACK! This was not a smash and grab. It was a slow, surgical operation. A multisig wallet was taken over minutes after creation and quietly drained over weeks. No panic. No noise. Just patience. That is the real takeaway. Modern attackers do not rush. They blend in. They wait. They move funds in batches. They even open DeFi positions to look normal. This is how sophisticated crypto crime looks now. But here is the bigger picture most people miss. Every major exploit forces the ecosystem to level up. We saw it after Mt Gox. After DAO. After FTX. Security practices improved. Tooling evolved. Awareness skyrocketed. Multisig, when done right, is still one of the strongest protections in crypto. Hardware wallets. Isolated signers. Real multisig setups, not shortcuts. The tech already exists. The industry just keeps learning how to use it better. Lesson: KEEP YOUR EYES ON YOUR WALLET & take all necessary measures to STAY SAFE! Your wallet could be comprimised from the very START without you noticing! #CryptoMarketNews #CryptoMarketWatch #ScamAlert #Hacking #HackAlert
🚨 STAY SAFE! Another $40,000,000 STOLEN in CRYPTO HACK!

This was not a smash and grab. It was a slow, surgical operation. A multisig wallet was taken over minutes after creation and quietly drained over weeks. No panic. No noise. Just patience.

That is the real takeaway. Modern attackers do not rush. They blend in. They wait. They move funds in batches. They even open DeFi positions to look normal. This is how sophisticated crypto crime looks now.

But here is the bigger picture most people miss. Every major exploit forces the ecosystem to level up. We saw it after Mt Gox. After DAO. After FTX. Security practices improved. Tooling evolved. Awareness skyrocketed.

Multisig, when done right, is still one of the strongest protections in crypto. Hardware wallets. Isolated signers. Real multisig setups, not shortcuts. The tech already exists. The industry just keeps learning how to use it better.

Lesson: KEEP YOUR EYES ON YOUR WALLET & take all necessary measures to STAY SAFE! Your wallet could be comprimised from the very START without you noticing! #CryptoMarketNews #CryptoMarketWatch #ScamAlert #Hacking #HackAlert
ترجمة
STILL NOT SECURE? $40,000,000 STOLEN IN LATEST CRYPTO HEIST! Listen up, fam. As someone who’s been navigating these charts for 15+ years, I’ve seen it all—but the latest $40 million exploit is a massive wake-up call for everyone from minnows to whales. If you think your funds are "safe" just because they’re in a cold wallet, you need to read this now. The Reality Check: Total crypto theft has already crossed a staggering $3.4 billion in 2025. While we’ve seen massive exchange breaches like the $1.5 billion Bybit hack earlier this year, the latest $40M hit on a high-net-worth individual shows that hackers are getting scarily personal. How it happened: It wasn’t a "math" breach; it was a social engineering masterpiece. The attackers used: Fake "Death" Notifications: Phishing emails claiming the user’s Google account was being settled due to their "death". Support Ticket Hijacking: They intercepted legitimate support channels to trick the victim into revealing extended public keys. Multi-Platform Coordination: Using Reddit and fake support accounts to build a wall of "credibility" around the scam. The "Pro Trader" Safety Checklist: Kill the SMS 2FA: If you are still using SMS, you are inviting a SIM swap. Switch to Google Authenticator or a physical YubiKey immediately. Verify the Source: Never click links in "urgent" security emails. If an exchange or wallet provider contacts you, log in directly through their official app or bookmarked URL. The SAFU Advantage: This is why I keep a significant portion of my active trading capital on Binance. Between their bank-level cold storage and the $1 Billion SAFU Fund, there’s a safety net that most "hot" protocols simply don't have. Zero Trust Policy: Treat every "support agent" or "recruiter" reaching out on LinkedIn or Telegram as a potential threat. North Korean groups (Lazarus) are currently flooding the market with fake job offers to plant malware. Bottom Line: The tech is getting stronger, but humans are still the weakest link. Don't let your 30 days of gains vanish in 30 seconds of carelessness. What’s your #1 security rule? Have you moved away from SMS 2FA yet? Let’s talk below—staying educated is the only way we stay ahead of the hackers. 👇 #CryptoSecurity #Hacking #BinanceSquare #SAFU #LazarusGroup #Bitcoin #Web3Safety $BTC $BNB $ETH

STILL NOT SECURE? $40,000,000 STOLEN IN LATEST CRYPTO HEIST!

Listen up, fam. As someone who’s been navigating these charts for 15+ years, I’ve seen it all—but the latest $40 million exploit is a massive wake-up call for everyone from minnows to whales. If you think your funds are "safe" just because they’re in a cold wallet, you need to read this now.
The Reality Check:
Total crypto theft has already crossed a staggering $3.4 billion in 2025. While we’ve seen massive exchange breaches like the $1.5 billion Bybit hack earlier this year, the latest $40M hit on a high-net-worth individual shows that hackers are getting scarily personal.
How it happened:
It wasn’t a "math" breach; it was a social engineering masterpiece. The attackers used:
Fake "Death" Notifications: Phishing emails claiming the user’s Google account was being settled due to their "death".
Support Ticket Hijacking: They intercepted legitimate support channels to trick the victim into revealing extended public keys.
Multi-Platform Coordination: Using Reddit and fake support accounts to build a wall of "credibility" around the scam.
The "Pro Trader" Safety Checklist:
Kill the SMS 2FA: If you are still using SMS, you are inviting a SIM swap. Switch to Google Authenticator or a physical YubiKey immediately.
Verify the Source: Never click links in "urgent" security emails. If an exchange or wallet provider contacts you, log in directly through their official app or bookmarked URL.
The SAFU Advantage: This is why I keep a significant portion of my active trading capital on Binance. Between their bank-level cold storage and the $1 Billion SAFU Fund, there’s a safety net that most "hot" protocols simply don't have.
Zero Trust Policy: Treat every "support agent" or "recruiter" reaching out on LinkedIn or Telegram as a potential threat. North Korean groups (Lazarus) are currently flooding the market with fake job offers to plant malware.
Bottom Line: The tech is getting stronger, but humans are still the weakest link. Don't let your 30 days of gains vanish in 30 seconds of carelessness.
What’s your #1 security rule? Have you moved away from SMS 2FA yet? Let’s talk below—staying educated is the only way we stay ahead of the hackers. 👇
#CryptoSecurity #Hacking #BinanceSquare #SAFU #LazarusGroup #Bitcoin #Web3Safety $BTC $BNB $ETH
ترجمة
🚨 $2Z BILLION HACKED! 🤯 North Korean hackers just pulled off the biggest crypto heist *ever*, stealing a record $2Z billion in $BTC and other digital assets this year alone. This isn't just a number – it's a stark warning. As crypto goes mainstream, security can’t be an afterthought. We need robust defenses and smarter security protocols. Protecting your assets is paramount. 🛡️ This highlights the critical need for self-custody and secure wallets. #CryptoSecurity #Hacking #Bitcoin #Cybersecurity 🚀 {future}(BTCUSDT)
🚨 $2Z BILLION HACKED! 🤯

North Korean hackers just pulled off the biggest crypto heist *ever*, stealing a record $2Z billion in $BTC and other digital assets this year alone. This isn't just a number – it's a stark warning. As crypto goes mainstream, security can’t be an afterthought. We need robust defenses and smarter security protocols. Protecting your assets is paramount. 🛡️ This highlights the critical need for self-custody and secure wallets.

#CryptoSecurity #Hacking #Bitcoin #Cybersecurity 🚀
ترجمة
ترجمة
🚨 Хакерский шантаж: Утечка данных Pornhub на миллионы пользователей Группировка ShinyHunters нанесла сокрушительный удар по кибербезопасности, заявив о взломе одного из крупнейших ресурсов мира. В руках хакеров оказалась база данных объемом около 200 млн записей, что ставит под угрозу приватность огромного количества людей. 🔓 Масштаб катастрофы Утечка затронула преимущественно Premium-пользователей. Похищенная информация включает: Email-адреса и метаданные. Полную историю просмотров и поисковые запросы. Конфиденциальную информацию, которая может быть использована для деанонимизации. 💰 Ультиматум в $BTC Злоумышленники требуют выкуп в Биткоинах за неразглашение данных. В случае отказа хакеры угрожают опубликовать базу в открытом доступе, что может привести к волне персонального шантажа пользователей по всему миру. Эта ситуация — суровое напоминание о важности цифровой гигиены и анонимности в сети. $BTC {spot}(BTCUSDT) #CyberSecurity #hacking #bitcoin
🚨 Хакерский шантаж: Утечка данных Pornhub на миллионы пользователей

Группировка ShinyHunters нанесла сокрушительный удар по кибербезопасности, заявив о взломе одного из крупнейших ресурсов мира. В руках хакеров оказалась база данных объемом около 200 млн записей, что ставит под угрозу приватность огромного количества людей.

🔓 Масштаб катастрофы

Утечка затронула преимущественно Premium-пользователей. Похищенная информация включает:

Email-адреса и метаданные.

Полную историю просмотров и поисковые запросы.

Конфиденциальную информацию, которая может быть использована для деанонимизации.

💰 Ультиматум в $BTC

Злоумышленники требуют выкуп в Биткоинах за неразглашение данных. В случае отказа хакеры угрожают опубликовать базу в открытом доступе, что может привести к волне персонального шантажа пользователей по всему миру.
Эта ситуация — суровое напоминание о важности цифровой гигиены и анонимности в сети.
$BTC


#CyberSecurity #hacking #bitcoin
ترجمة
🚨SCAMALERT: 1 YEAR Prison for $3,500,000 SCAM! This is a wild story of a fraudster who used a crypto scam to try and build an online reputation. A crypto influencer named Charles O. Parks III was just sentenced to a year in prison for a cryptojacking operation that defrauded two cloud computing providers out of $3.5 million in resources. Parks used fake identities to get elevated computing privileges, which he then used to mine almost $1 million worth of Ether, Litecoin, and Monero. He laundered the crypto to buy luxury items like a Mercedes Benz and jewelry, all while promoting himself online as a thought leader with a "MultiMillionaire Mentality". The US Attorney said that Parks was "merely a fraudster whose secret to getting rich quick was lying and stealing". He was ordered to forfeit $500,000 and the Mercedes Benz. This is another powerful reminder that while crypto is all about freedom, it is not a free pass to commit crimes. #Scamalert #Scam #Scams #Hacking #Fraud
🚨SCAMALERT: 1 YEAR Prison for $3,500,000 SCAM!

This is a wild story of a fraudster who used a crypto scam to try and build an online reputation. A crypto influencer named Charles O. Parks III was just sentenced to a year in prison for a cryptojacking operation that defrauded two cloud computing providers out of $3.5 million in resources.

Parks used fake identities to get elevated computing privileges, which he then used to mine almost $1 million worth of Ether, Litecoin, and Monero. He laundered the crypto to buy luxury items like a Mercedes Benz and jewelry, all while promoting himself online as a thought leader with a "MultiMillionaire Mentality".

The US Attorney said that Parks was "merely a fraudster whose secret to getting rich quick was lying and stealing". He was ordered to forfeit $500,000 and the Mercedes Benz. This is another powerful reminder that while crypto is all about freedom, it is not a free pass to commit crimes. #Scamalert #Scam #Scams #Hacking #Fraud
ترجمة
Microsoft Hack Puts U.S. Nuclear Security at RiskThe U.S. National Nuclear Security Administration (NNSA), which oversees the design and maintenance of America’s nuclear weapons arsenal, has become one of the victims of a cyberattack targeting Microsoft SharePoint. The incident also affected several other key government agencies – and all signs point once again to China-linked hackers. Microsoft Targeted Again – Along with the U.S. Nuclear Authority The vulnerability in Microsoft SharePoint was exploited on July 18, and according to a spokesperson from the Department of Energy, some systems were affected. Fortunately, due to widespread use of Microsoft 365 cloud services and robust cybersecurity measures, the damage was reportedly minimal, with only a few systems impacted – all of which are now being restored. Representatives of the NNSA confirmed that no classified information was leaked during the incident. Still, the fact that someone managed to access infrastructure related to U.S. nuclear operations is highly concerning. SharePoint – The Weak Link The vulnerability only affected locally hosted SharePoint systems – not the cloud-based ones – which opened the door to this breach. The attack extended far beyond U.S. borders, hitting Middle Eastern and EU government systems as well. Other U.S. victims included the Department of Education, the Florida Department of Financial Services, and Rhode Island’s General Assembly. Earlier reports revealed that hackers stole login credentials, tokens, and hash codes, potentially giving them access to sensitive internal systems. China-Linked Groups Suspected Microsoft has named several hacking groups believed to be backed by the Chinese government – specifically Violet Typhoon, Linen Typhoon, and Storm-2603. Cybersecurity firm Mandiant, owned by Google, stated that at least one attacker was very likely of Chinese origin. U.S. cybersecurity agency CISA confirmed that the SharePoint vulnerability is being actively exploited. Microsoft has already released three updates to fix the issue. The Chinese embassy in Washington responded by denying any involvement and warned against “groundless accusations.” Microsoft Under Fire Microsoft has become a repeated target of high-level cyberattacks in recent years. In 2021, a separate Chinese group called Hafnium breached systems via a vulnerability in Microsoft Exchange Server. After facing sharp criticism for its previous response, Microsoft CEO Satya Nadella declared that cybersecurity is now the company’s top priority. Recently, Microsoft also announced it would no longer rely on Chinese engineers for developing cloud services tied to the U.S. Department of Defense – following concerns that such arrangements may have enabled access to sensitive systems. The Flaw Was First Discovered – by Ethical Hackers Interestingly, the SharePoint vulnerability was first discovered in May during a hacking contest in Berlin organized by cybersecurity firm Trend Micro. The event offered $100,000 rewards for discovering zero-day vulnerabilities, demonstrating just how valuable – and dangerous – these flaws can be. Summary: Another Security Blow for the U.S. Although no classified data was leaked, confidence in government infrastructure has taken another hit. The NNSA was among several high-profile victims, and China-sponsored cyber threats continue to rise. The U.S. once again finds itself needing to strengthen its cyber defenses – not just against foreign adversaries, but also against its own systemic vulnerabilities. #CyberSecurity , #Microsoft , #cyberattack , #hacking , #CryptoNews Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Microsoft Hack Puts U.S. Nuclear Security at Risk

The U.S. National Nuclear Security Administration (NNSA), which oversees the design and maintenance of America’s nuclear weapons arsenal, has become one of the victims of a cyberattack targeting Microsoft SharePoint. The incident also affected several other key government agencies – and all signs point once again to China-linked hackers.

Microsoft Targeted Again – Along with the U.S. Nuclear Authority
The vulnerability in Microsoft SharePoint was exploited on July 18, and according to a spokesperson from the Department of Energy, some systems were affected. Fortunately, due to widespread use of Microsoft 365 cloud services and robust cybersecurity measures, the damage was reportedly minimal, with only a few systems impacted – all of which are now being restored.
Representatives of the NNSA confirmed that no classified information was leaked during the incident. Still, the fact that someone managed to access infrastructure related to U.S. nuclear operations is highly concerning.

SharePoint – The Weak Link
The vulnerability only affected locally hosted SharePoint systems – not the cloud-based ones – which opened the door to this breach. The attack extended far beyond U.S. borders, hitting Middle Eastern and EU government systems as well. Other U.S. victims included the Department of Education, the Florida Department of Financial Services, and Rhode Island’s General Assembly.
Earlier reports revealed that hackers stole login credentials, tokens, and hash codes, potentially giving them access to sensitive internal systems.

China-Linked Groups Suspected
Microsoft has named several hacking groups believed to be backed by the Chinese government – specifically Violet Typhoon, Linen Typhoon, and Storm-2603. Cybersecurity firm Mandiant, owned by Google, stated that at least one attacker was very likely of Chinese origin.
U.S. cybersecurity agency CISA confirmed that the SharePoint vulnerability is being actively exploited. Microsoft has already released three updates to fix the issue.
The Chinese embassy in Washington responded by denying any involvement and warned against “groundless accusations.”

Microsoft Under Fire
Microsoft has become a repeated target of high-level cyberattacks in recent years. In 2021, a separate Chinese group called Hafnium breached systems via a vulnerability in Microsoft Exchange Server. After facing sharp criticism for its previous response, Microsoft CEO Satya Nadella declared that cybersecurity is now the company’s top priority.
Recently, Microsoft also announced it would no longer rely on Chinese engineers for developing cloud services tied to the U.S. Department of Defense – following concerns that such arrangements may have enabled access to sensitive systems.

The Flaw Was First Discovered – by Ethical Hackers
Interestingly, the SharePoint vulnerability was first discovered in May during a hacking contest in Berlin organized by cybersecurity firm Trend Micro. The event offered $100,000 rewards for discovering zero-day vulnerabilities, demonstrating just how valuable – and dangerous – these flaws can be.

Summary: Another Security Blow for the U.S.
Although no classified data was leaked, confidence in government infrastructure has taken another hit. The NNSA was among several high-profile victims, and China-sponsored cyber threats continue to rise.
The U.S. once again finds itself needing to strengthen its cyber defenses – not just against foreign adversaries, but also against its own systemic vulnerabilities.

#CyberSecurity , #Microsoft , #cyberattack , #hacking , #CryptoNews

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
ترجمة
It was a major security breach in which Euphoria. Official Account was hacked by hackers. A massive security breach has shaken the cryptocurrency market with the official account of Euphoria, one of the largest crypto derivatives trading apps that are built on MegaETH, becoming infected by a high-end assault on September 27, 2025, as revealed by the wisdom word on September 28, 2025, This is a worrying case, where the compromised account has been used to distribute phishing links, and the hackers still have the account under their full control, which is highly dangerous to users of the platform. The attack highlights how the security of digital assets is currently a daunting problem in the ever-changing environment. The attackers have used the account to conduct a targeted attack, leaving fake links intended to trick users to provide sensitive data or give authorization to fraudulent transactions that may empty their online wallets. This is an aggressive step that emphasizes the increased complexity of cyber threats taking advantage of trusted platforms to have the most impact. The inability to control the account is an ongoing cause of the urgency, which makes it strongly desirable to users and stakeholders. Professionals are in a state of panic, greatly recommending that users stop all communication with the compromised account to secure their prized possessions. This proactive measure will help to avert the risks, and people will be able to protect their assets in the context of the ongoing crisis. The case can also be viewed as a wake-up call and acts as a reminder of the importance of strong security initiatives and alert measures in the crypto scene. With the situation taking new dimensions, the breach preconditions a revolutionary reaction, and attempts are being made to restore the situation and tighten the belts. This high profile attack is set to intrigue the community leading to a revival of attention to cybersecurity and resilience to guarantee the safety of digital assets in a more volatile environment. #euphoria #hacking
It was a major security breach in which Euphoria. Official Account was hacked by hackers.

A massive security breach has shaken the cryptocurrency market with the official account of Euphoria, one of the largest crypto derivatives trading apps that are built on MegaETH, becoming infected by a high-end assault on September 27, 2025, as revealed by the wisdom word on September 28, 2025, This is a worrying case, where the compromised account has been used to distribute phishing links, and the hackers still have the account under their full control, which is highly dangerous to users of the platform. The attack highlights how the security of digital assets is currently a daunting problem in the ever-changing environment.

The attackers have used the account to conduct a targeted attack, leaving fake links intended to trick users to provide sensitive data or give authorization to fraudulent transactions that may empty their online wallets. This is an aggressive step that emphasizes the increased complexity of cyber threats taking advantage of trusted platforms to have the most impact. The inability to control the account is an ongoing cause of the urgency, which makes it strongly desirable to users and stakeholders.

Professionals are in a state of panic, greatly recommending that users stop all communication with the compromised account to secure their prized possessions. This proactive measure will help to avert the risks, and people will be able to protect their assets in the context of the ongoing crisis. The case can also be viewed as a wake-up call and acts as a reminder of the importance of strong security initiatives and alert measures in the crypto scene.

With the situation taking new dimensions, the breach preconditions a revolutionary reaction, and attempts are being made to restore the situation and tighten the belts. This high profile attack is set to intrigue the community leading to a revival of attention to cybersecurity and resilience to guarantee the safety of digital assets in a more volatile environment.

#euphoria #hacking
ترجمة
Ransomware Payouts Drop 35% as Victims Resist DemandsRansomware Attacks Surge, but Payouts Decline Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands. According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified. Declining Payouts Despite Increasing Attacks 🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023. 🔹 The first half of the year saw a 2.3% increase in successful extortion attempts. 🔹 The Dark Angels Group alone collected $75 million. 🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations. Law Enforcement Crackdowns Disrupt Cybercrime Operations 🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks. 🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering. According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat. Ransomware Victims Increasingly Refuse to Pay 🔹 Less than 50% of ransomware attacks resulted in payouts. 🔹 Those who did comply paid up to $250,000 in ransom on average. 🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks. Cybercriminals Adapt to Heightened Security Measures 🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying. 🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code. 🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration. Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake. While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨 #CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies! Notice: ,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“

Ransomware Payouts Drop 35% as Victims Resist Demands

Ransomware Attacks Surge, but Payouts Decline
Despite a significant rise in ransomware attacks in 2024, the total ransom payments from victims dropped by 35%, as more companies and individuals refused to comply with hackers' demands.
According to the Chainalysis Cybercrime Report, ransomware generated less revenue compared to the previous year, even though hacker activity intensified.
Declining Payouts Despite Increasing Attacks
🔹 Total ransomware payments in 2024 reached $813 million, down from a record $1.25 billion in 2023.
🔹 The first half of the year saw a 2.3% increase in successful extortion attempts.
🔹 The Dark Angels Group alone collected $75 million.
🔹 However, in the second half of the year, law enforcement efforts significantly disrupted ransomware operations.
Law Enforcement Crackdowns Disrupt Cybercrime Operations
🔹 Enhanced investigative techniques, sanctions, and asset seizures severely impacted cybercriminal networks.
🔹 The shutdown of the Russian crypto exchange Cryptex and Germany's crackdown on 47 Russian platforms weakened ransomware-related money laundering.
According to Jacqueline Burns Koven, Head of Cyber Threat Intelligence at Chainalysis, criminals became more cautious when moving funds through centralized exchanges (CEX). However, non-KYC platforms remain the preferred method for converting stolen crypto into fiat.

Ransomware Victims Increasingly Refuse to Pay
🔹 Less than 50% of ransomware attacks resulted in payouts.
🔹 Those who did comply paid up to $250,000 in ransom on average.
🔹 With improved tracking tools and stronger investigations, more victims chose not to pay, despite the growing frequency of attacks.
Cybercriminals Adapt to Heightened Security Measures
🔹 Hackers are evolving, developing new tactics to bypass security defenses and pressure victims into paying.
🔹 New ransomware variants are emerging, often derived from leaked, rebranded, or purchased code.
🔹 Attacks are now executed faster, with ransom negotiations starting within hours of data exfiltration.
Ransomware operations now range from state-sponsored hackers to ransomware-as-a-service (RaaS) groups and independent cybercriminals. One of the most notable recent cases was the data theft from cloud service provider Snowflake.
While ransomware tactics continue to evolve, enhanced cybersecurity efforts and law enforcement actions are making it harder for cybercriminals to profit. 🚨

#CyberSecurity , #hacking , #cryptohacks , #cybercrime , #CryptoNewss

Stay one step ahead – follow our profile and stay informed about everything important in the world of cryptocurrencies!
Notice:
,,The information and views presented in this article are intended solely for educational purposes and should not be taken as investment advice in any situation. The content of these pages should not be regarded as financial, investment, or any other form of advice. We caution that investing in cryptocurrencies can be risky and may lead to financial losses.“
سجّل الدخول لاستكشاف المزيد من المُحتوى
استكشف أحدث أخبار العملات الرقمية
⚡️ كُن جزءًا من أحدث النقاشات في مجال العملات الرقمية
💬 تفاعل مع صنّاع المُحتوى المُفضّلين لديك
👍 استمتع بالمحتوى الذي يثير اهتمامك
البريد الإلكتروني / رقم الهاتف