<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>crypto attack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/crypto-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/crypto-attack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 04 Nov 2025 12:03:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>crypto attack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/crypto-attack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Was the Balancer DEX Hack Prepared Months in Advance?</title>
		<link>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/</link>
					<comments>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:30:53 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[balancer]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[DEX exploit]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=55990</guid>

					<description><![CDATA[<p>An experienced attacker stole $116 million from Balancer DEX on Monday after months of preparation. On-chain data shows the attacker used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance. Details of the Attack and Preparation Blockchain analyses show the attacker funded their account stealthily with</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="57" data-end="320">An experienced attacker stole $116 million from <strong>Balancer <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">DEX</a></strong> on Monday after months of preparation. On-chain data shows the <strong>attacker</strong> used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance.</p>
<h2 data-start="322" data-end="362">Details of the Attack and Preparation</h2>
<p data-start="364" data-end="998">Blockchain analyses show the attacker funded their account stealthily with small 0.1 ETH transfers through Tornado Cash to avoid detection. Coinbase executive Conor Grogan said the attacker stored at least 100 ETH in Tornado Cash smart contracts and that those funds may link to earlier hacks. Grogan stated, “Hacker seems experienced: seeded the account with 100 <strong>ETH</strong> and operated with 0.1 ETH Tornado Cash transfers. No opsec leaks.” This behavior clearly points to a professional actor who prepared ahead of time. Balancer announced it would offer a 20% white‑hat bounty if the stolen funds were returned in full (minus the reward).</p>
<h2 data-start="1061" data-end="1099">What Makes the Balancer Hack Unique</h2>
<p data-start="138" data-end="470">Deddy Lavid, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<p data-start="138" data-end="470">, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<h2 data-start="1628" data-end="1681">Lazarus Group and Long‑Term Preparation Strategies</h2>
<p data-start="1683" data-end="2246">Similarly, North Korean group <strong>Lazarus</strong> reportedly paused illicit activity for months before the Bybit hack. Chainalysis data showed a sharp decline in cybercriminal activity after July 1, 2024, which experts interpreted as regrouping to identify new targets and probe infrastructure.</p>
<p data-start="1683" data-end="2246">In the Bybit incident, attackers laundered the $1.4 billion through THORChain within 10 days. That operation demonstrates how months‑long stealth and preparation can precede large, professionally executed exploits—parallels that highlight the seriousness of the Balancer incident.</p>
<h2 data-start="2248" data-end="2285">Recommendations for Balancer Users</h2>
<p data-start="2287" data-end="2609">Store crypto assets only in trusted wallets and avoid moving large sums in single transactions. Be aware that using Tornado Cash and similar mixers can draw attention from professional attackers and investigators, and consider employing multi‑layer security practices to reduce exposure to sophisticated on‑chain exploits.</p>
<p data-start="2287" data-end="2609"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>NFT Heist! HyperEVM (HYPE) Airdrop Stolen Instantly</title>
		<link>https://coinengineer.net/blog/hyperevm-hype-nft-airdrop-heist-2025/</link>
					<comments>https://coinengineer.net/blog/hyperevm-hype-nft-airdrop-heist-2025/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Sun, 28 Sep 2025 18:12:26 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Blockchain News]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[hyperevm]]></category>
		<category><![CDATA[Hyperliquid]]></category>
		<category><![CDATA[Hypurr NFT]]></category>
		<category><![CDATA[NFT Airdrop]]></category>
		<category><![CDATA[NFT Heist]]></category>
		<category><![CDATA[NFT Scam]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=52585</guid>

					<description><![CDATA[<p>On HyperEVM blockchain, a planned security breach targeted Hypurr NFT holders. On-chain records show an attacker stole 8+ airdropped NFTs in under an hour, selling them for roughly $400,000.   Details &#38; On-Chain Evidence  The incident occurred on HyperEVM, Hyperliquid’s Layer-1 blockchain, seconds after the NFTs dropped.   Attacker’s Movement: Transaction records show extraordinary activity on the suspected attacker wallet 0x72785D42&#8230;e1a5238df. Multiple Hypurr NFTs (#2394, #4419, #4084,</p>
<p>The post <a href="https://coinengineer.net/blog/hyperevm-hype-nft-airdrop-heist-2025/">NFT Heist! HyperEVM (HYPE) Airdrop Stolen Instantly</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c>On <strong>HyperEVM</strong> blockchain, a planned security breach targeted <strong>Hypurr NFT</strong> holders. On-chain records show an attacker stole 8+ airdropped NFTs in under an hour, selling them for roughly $400,000. </span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Details &amp; On-Chain Evidence </span></h2>
<p><span data-c>The incident occurred on HyperEVM, Hyperliquid’s Layer-1 blockchain, seconds after the NFTs dropped. </span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Attacker’s Movement: Transaction records show extraordinary activity on the suspected attacker wallet 0x72785D42&#8230;e1a5238df. Multiple Hypurr NFTs (#2394, #4419, #4084, #4250) were transferred in from different wallets between 50 and 23 minutes ago. </span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Immediate Sale: NFTs were quickly sold on NFT marketplaces (likely Match Advance), showing the attacker used market liquidity for instant profit. </span><span data-ccp-props="{}"> </span></p>
<p><span data-c> </span><span data-ccp-props="{}"> <img fetchpriority="high" decoding="async" class="aligncenter wp-image-52586 " src="https://coinengineer.net/blog/wp-content/uploads/2025/09/hyper-nft-hack-1024x709.jpg" alt="" width="794" height="550" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/09/hyper-nft-hack-1024x709.jpg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/09/hyper-nft-hack-300x208.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/09/hyper-nft-hack-768x532.jpg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/09/hyper-nft-hack.jpg 1280w" sizes="(max-width: 794px) 100vw, 794px" /></span></p>
<h2><span data-c>Hypurr NFT Value &amp; Official Warning </span></h2>
<p><span data-c>The stolen collection is highly valuable: </span><span data-ccp-props="{}"> </span></p>
<ul>
<li><span data-c>Given to Genesis Event participants in Nov 2024. </span><span data-ccp-props="{}"> </span></li>
<li><span data-c>Total supply capped at 4,600 NFTs. </span><span data-ccp-props="{}"> </span></li>
<li><span data-c>Users warned no new minting needed and to beware of scams. </span><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-c>The warning suggests NFTs were stolen from wallets compromised earlier via phishing or suspicious contract approvals, not during the airdrop itself. </span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Urgent Security Measures for Users </span><span data-ccp-props="{}"> </span></h2>
<ul>
<li><span data-c>Revoke Permissions: Use revoke.cash to cancel any old or suspicious smart contract approvals. </span><span data-ccp-props="{}"> </span></li>
<li><span data-c>Asset Transfer: Move remaining crypto and NFTs to a new secure wallet if keys may be compromised. </span><span data-ccp-props="{}"> </span></li>
<li><span data-c>The $<a href="https://coinengineer.net/blog/paxos-usdh-hype-token-hyperliquid/">HYPE</a> team and security units are expected to release full details and attack mechanisms soon. </span><span data-ccp-props="{}"> </span></li>
</ul>
<p><span data-ccp-props="{}"> <em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </strong></a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/hyperevm-hype-nft-airdrop-heist-2025/">NFT Heist! HyperEVM (HYPE) Airdrop Stolen Instantly</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/hyperevm-hype-nft-airdrop-heist-2025/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Shibarium Shiba Bridge Hit by $2.3M Flash Loan Attack!</title>
		<link>https://coinengineer.net/blog/shibarium-flash-loan-attack-shiba-inu-funds-safe/</link>
					<comments>https://coinengineer.net/blog/shibarium-flash-loan-attack-shiba-inu-funds-safe/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Sun, 14 Sep 2025 09:04:10 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[altcoin market]]></category>
		<category><![CDATA[BONE token]]></category>
		<category><![CDATA[cross-chain bridge]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[DeFi security]]></category>
		<category><![CDATA[flash loan]]></category>
		<category><![CDATA[SHIB Price]]></category>
		<category><![CDATA[shiba inu]]></category>
		<category><![CDATA[Shibarium]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=51059</guid>

					<description><![CDATA[<p>Shiba Inu confirmed that the Shibarium bridge experienced a $2.3 million flash loan attack. Only a limited amount of ETH and SHIB was affected, and all investor funds remain secure.  Shibarium Bridge Flash Loan Attack Details  On September 14, the Shibarium cross-chain bridge became the target of a sophisticated flash loan attack. The hacker borrowed</p>
<p>The post <a href="https://coinengineer.net/blog/shibarium-flash-loan-attack-shiba-inu-funds-safe/">Shibarium Shiba Bridge Hit by $2.3M Flash Loan Attack!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c><strong>Shiba Inu</strong> confirmed that the Shibarium bridge experienced a $2.3 million flash loan attack. Only a limited amount of ETH and SHIB was affected, and all investor funds remain secure.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<h2><span data-c>Shibarium Bridge Flash Loan Attack Details</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></h2>
<p><span data-c>On September 14, the Shibarium cross-chain bridge became the target of a sophisticated flash loan attack. The hacker borrowed 4.6 million BONE tokens and gained control of 10 out of 12 validator signing keys, achieving a two-thirds majority. Using this power, the attacker attempted to withdraw approximately 224.57 ETH and 92.6 billion <a href="https://coinengineer.net/blog/?s=shiba"><strong>SHIB</strong></a>.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-c>Shiba Inu developers acted quickly to suspend staking and unstaking functions, locking the BONE tokens and removing majority control from the attacker. In addition, the hacker held about $700,000 worth of KNINE tokens from the K9 Finance DAO project. <span class="TextRun SCXW259442676 BCX0" lang="EN-US" xml:lang="EN-US" data-c><span class="NormalTextRun SCXW259442676 BCX0">The K9 Finance DAO denylisted the attacker’s address to prevent KNINE token liquidation.</span></span> LEASH, ROAR, TREAT, BAD, and SHIFU coins were also affected but have not been moved or sold.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">UPDATE 13/09/25</p>
<p>What we know so far about the recent incident <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f447.png" alt="👇" class="wp-smiley"  /></p>
<p>How the exploit was executed:</p>
<p>• The attacker used funds from the bridge hack in the same block as the attack to acquire 4.6M BONE to temporarily gain validator voting power, attempting to do it in one… <a href="https://t.co/4Ft1VMxeBv">https://t.co/4Ft1VMxeBv</a></p>
<p>&mdash; Shib (@Shibtoken) <a href="https://twitter.com/Shibtoken/status/1966845298774278444?ref_src=twsrc%5Etfw">September 13, 2025</a></p></blockquote>
<p></p>
<h2><span data-c>Developer Actions and Security Measures</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></h2>
<p><span data-c>The Shiba Inu team secured investor funds by transferring them from proxy contracts to a multisig cold storage wallet. They collaborated with security firms Hexens, Seal911, and <strong>PeckShield</strong> to conduct a thorough investigation. The developers confirmed that the 4.6 million BONE tokens remain locked, and all validator assets are secure. They continue monitoring and freezing attacker-linked funds while preparing a full incident report.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<h2><span data-c>Market Impact and Token Performance</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></h2>
<p><span data-c>Despite the attack, <strong>BONE token</strong> surged by 40% while SHIB gained over 8%. These movements reflect investor confidence following the team&#8217;s rapid intervention. The Shibarium attack highlights DeFi ecosystem risks, but Shiba Inu’s swift measures ensured all funds stayed safe.</span><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559685&quot;:0,&quot;335559737&quot;:0,&quot;335559738&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:279}"> </span><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/shibarium-flash-loan-attack-shiba-inu-funds-safe/">Shibarium Shiba Bridge Hit by $2.3M Flash Loan Attack!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/shibarium-flash-loan-attack-shiba-inu-funds-safe/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-54.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-54.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Breaking: Sui-Based DeFi Platform Hacked!</title>
		<link>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/</link>
					<comments>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Mon, 08 Sep 2025 08:07:31 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[cross-chain risk]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto vulnerability]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[defi platform]]></category>
		<category><![CDATA[Ethereum bridge]]></category>
		<category><![CDATA[smart contract exploit]]></category>
		<category><![CDATA[sui network]]></category>
		<category><![CDATA[USDC theft]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=50434</guid>

					<description><![CDATA[<p>Today, Nemo Protocol, a Sui-based decentralized finance (DeFi) platform, suffered a major hack, losing approximately $2.4 million in USDC. The attacker exploited a vulnerability in the platform’s smart contracts. They transferred the stolen funds to Ethereum via Arbitrum, making it difficult to trace. This incident highlights the persistent security risks in DeFi platforms and cross-chain</p>
<p>The post <a href="https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/">Breaking: Sui-Based DeFi Platform Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c>Today, <strong>Nemo Protocol</strong>, a <a href="https://coinengineer.net/blog/sui-network-announces-and-deletes-robinhood-listing-announcement/"><strong>Sui-based</strong></a> decentralized finance (DeFi) platform, suffered a major hack, losing approximately $2.4 million in USDC. The attacker exploited a vulnerability in the platform’s smart contracts. They transferred the stolen funds to Ethereum via Arbitrum, making it difficult to trace. This incident highlights the persistent security risks in DeFi platforms and cross-chain bridges.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Platform users are closely monitoring the situation to secure their assets. The Nemo Protocol team has yet to provide a detailed public statement. Meanwhile, the community seeks clarity on whether the lost funds can be recovered. Security researchers are actively investigating the attack and tracking the attacker’s wallet movements.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <img decoding="async" class="aligncenter wp-image-50435 " src="https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-1024x647.jpeg" alt="" width="678" height="428" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-1024x647.jpeg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-300x189.jpeg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack-768x485.jpeg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/09/nemo-sui-hack.jpeg 1110w" sizes="(max-width: 678px) 100vw, 678px" /></span></p>
<h2><span data-c>Attack Details and Implications for Nemo Protocol</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Nemo Protocol allows users to deposit assets and take positions based on changing interest rates. All operations are automated through smart contracts, making the system fast and efficient. However, even minor coding errors can lead to significant losses. In this case, the attacker exploited a weak point and quickly moved the funds across different networks, evading detection.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>The scale of this single attack is concerning. <strong>DeFi hacks</strong> continue to account for a large portion of crypto losses in 2025. Every month, new incidents increase the total loss, with August alone seeing millions of dollars stolen in 16 separate attacks.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Cross-Chain Bridges: Key Vulnerabilities for DeFi</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Cross-chain bridges allow users to transfer assets between different blockchains. While convenient, these bridges concentrate large funds, making them prime targets for hackers. Attackers exploit the complexity of DeFi systems to move stolen assets across multiple networks. Cross-chain vulnerabilities remain one of the biggest security concerns in DeFi.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Developers must prioritize security measures to prevent attacks. Even sophisticated users cannot fully mitigate risks if bridge and contract vulnerabilities exist.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/">Breaking: Sui-Based DeFi Platform Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/sui-based-defi-platform-hacked-2-4-million-usdc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/08/ethereum_hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Ethereum Pectra Update Contains a Critical Vulnerability!</title>
		<link>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/</link>
					<comments>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 11 May 2025 16:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[cross-chain risk]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[DeFi risk]]></category>
		<category><![CDATA[EIP-7702]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Ethereum upgrade]]></category>
		<category><![CDATA[hardware wallet]]></category>
		<category><![CDATA[multisig wallet]]></category>
		<category><![CDATA[offchain signature]]></category>
		<category><![CDATA[Pectra]]></category>
		<category><![CDATA[phishing risk]]></category>
		<category><![CDATA[signature delegation]]></category>
		<category><![CDATA[smart contract]]></category>
		<category><![CDATA[wallet security]]></category>
		<category><![CDATA[Web3 threat]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42132</guid>

					<description><![CDATA[<p>In the fast-paced world of crypto, innovation often walks hand-in-hand with new risks. Ethereum&#8217;s latest upgrade, Pectra, is a double-edged sword — bringing advanced smart wallet features while exposing users to an unprecedented attack vector. One message. That’s all it takes for hackers to drain your entire wallet. A signed offchain message is now powerful</p>
<p>The post <a href="https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/">Ethereum Pectra Update Contains a Critical Vulnerability!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3574" data-end="3821">In the fast-paced world of crypto, innovation often walks hand-in-hand with new risks. Ethereum&#8217;s latest upgrade, <strong data-start="3688" data-end="3698">Pectra</strong>, is a double-edged sword — bringing advanced smart wallet features while exposing users to an unprecedented attack vector.</p>
<p class="" data-start="3823" data-end="4015">One message. That’s all it takes for hackers to drain your entire wallet. A signed offchain message is now powerful enough to hand over control of your funds — no onchain transaction required.</p>
<h2 data-start="4017" data-end="4065">EIP-7702: The Risky New Delegation Mechanism</h2>
<p class="" data-start="4067" data-end="4257">Activated on May 7, 2025, Pectra’s centerpiece <strong data-start="4114" data-end="4126">EIP-7702</strong> introduces a transaction type called SetCode, which allows users to <strong data-start="4195" data-end="4232">delegate control of their wallets</strong> via a simple signature.</p>
<p class="" data-start="4259" data-end="4509"><strong data-start="4259" data-end="4273">Arda Usman</strong>, a Solidity smart contract auditor, confirmed: <em>“An attacker can use this offchain signature to install malicious code into an externally owned account (EOA) and move ETH or tokens — without the user ever signing a transaction.”</em></p>
<p class="" data-start="4511" data-end="4633">This feature effectively transforms user wallets into smart contracts, opening the door to silent yet devastating attacks.</p>
<p data-start="4511" data-end="4633"><img decoding="async" class="aligncenter wp-image-155606 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/ethereum-1024x504.webp" alt="ethereum" width="734" height="361" /></p>
<h2 data-start="4635" data-end="4685">A Stealth Threat Via Innocent-Looking Messages</h2>
<p class="" data-start="4687" data-end="4918"><strong data-start="4687" data-end="4705">Yehor Rudytsia</strong>, an onchain researcher at Hacken, emphasized that this transaction type allows arbitrary code to be installed in wallets. Previously, such a change required an actual transaction; now, only a signature is enough.</p>
<hr />
<p data-start="4920" data-end="5136"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="4920" data-end="5136">This shift means phishing attempts, fake DApps, or Discord scams can now result in complete wallet takeovers. <em>“We believe this will become the most common attack vector following the Pectra upgrade,”</em> Rudytsia warned.</p>
<p class="" data-start="5138" data-end="5243">Wallet applications that fail to correctly interpret transaction type <strong data-start="5208" data-end="5216">0x04</strong> are especially vulnerable.</p>
<p data-start="5138" data-end="5243"><img loading="lazy" decoding="async" class="aligncenter wp-image-155608 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/ethereum-1-1024x728.webp" alt="ethereum" width="739" height="525" /></p>
<h2 data-start="5245" data-end="5288">Hardware Wallets Are Not Immune Anymore</h2>
<p class="" data-start="5290" data-end="5526">The once-clear distinction between hot and cold wallets is fading. Rudytsia highlighted that <strong data-start="5383" data-end="5403">hardware wallets</strong> are now just as vulnerable if users unknowingly sign malicious messages: <em>“Once signed, all funds can be gone in a moment.”</em></p>
<p class="" data-start="5528" data-end="5555">To stay safe, users should:</p>
<ul>
<li data-start="5559" data-end="5608">Never sign messages they do not fully understand.</li>
<li data-start="5611" data-end="5685">Look out for delegation requests, especially those involving nonce values.</li>
<li data-start="5688" data-end="5782">Be aware that some delegation signatures can be replayed on <strong data-start="5748" data-end="5781">any Ethereum-compatible chain</strong>.</li>
</ul>
<p class="" data-start="5784" data-end="5934">While multisig wallets offer more robust protection, single-key wallets — including hardware ones — must adopt new safeguards to prevent exploitation.</p>
<hr />
<p data-start="5784" data-end="5934"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/">Ethereum Pectra Update Contains a Critical Vulnerability!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/ethereum-pectra-update-contains-a-critical-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kripto_ce-2-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/kripto_ce-2-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Mobius Token Smart Contracts Exploited on BNB Chain</title>
		<link>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/</link>
					<comments>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 11 May 2025 12:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[BTC theft]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[Crypto Exploit]]></category>
		<category><![CDATA[crypto forensics]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto investing]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[digital asset theft]]></category>
		<category><![CDATA[MBU]]></category>
		<category><![CDATA[Mobius Token]]></category>
		<category><![CDATA[PeckShield]]></category>
		<category><![CDATA[smart contract hack]]></category>
		<category><![CDATA[smart contract vulnerability]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[usdt]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42119</guid>

					<description><![CDATA[<p>According to blockchain security firm Cyvers Alerts, Mobius Token (MBU) smart contracts on the BNB Chain were exploited in a critical attack on May 11, resulting in the theft of 28.5 million MBU tokens, worth over $2.15 million. Millions Lost Within Minutes The attacker deployed a smart contract from address 0xb32a53… at 07:31 UTC and</p>
<p>The post <a href="https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/">Mobius Token Smart Contracts Exploited on BNB Chain</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2622" data-end="2870">According to blockchain security firm Cyvers Alerts, <strong data-start="2675" data-end="2697">Mobius Token (MBU)</strong> smart contracts on the <strong data-start="2721" data-end="2734">BNB Chain</strong> were exploited in a <strong data-start="2755" data-end="2774">critical attack</strong> on May 11, resulting in the theft of <strong data-start="2812" data-end="2832">28.5 million MBU</strong> tokens, worth over <strong data-start="2852" data-end="2869">$2.15 million</strong>.</p>
<h2 data-start="2872" data-end="2908">Millions Lost Within Minutes</h2>
<p class="" data-start="2909" data-end="3172">The attacker deployed a smart contract from address 0xb32a53… at 07:31 UTC and launched the exploit two minutes later from contract 0x631adf…, draining funds from wallet 0xb5252f… The stolen tokens were quickly converted into <strong data-start="3135" data-end="3143">USDT</strong>, totaling <strong data-start="3154" data-end="3171">$2,152,219.99</strong>.</p>
<hr />
<p data-start="3174" data-end="3450"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3174" data-end="3450">Cyvers classified the exploit as &#8220;critical,&#8221; citing <strong data-start="3226" data-end="3259">abnormal transaction patterns</strong> and <strong data-start="3264" data-end="3292">suspicious contract code</strong>. As of publication, the attacker’s wallet remains active and has not moved the stolen assets. No official statement has been issued by the Mobius Token team.</p>
<p class="" data-start="3452" data-end="3591">Cyvers noted their system had flagged the malicious contract <strong data-start="3513" data-end="3534">two minutes prior</strong> to the exploit, but it was too late to prevent the loss.</p>
<p data-start="3452" data-end="3591"><img loading="lazy" decoding="async" class="aligncenter wp-image-155590 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/mobius.png" alt="mobius" width="701" height="494" /></p>
<h2 data-start="3593" data-end="3630">Crypto Exploits Surge in 2025</h2>
<p class="" data-start="3631" data-end="3899">This incident follows a wave of crypto hacks reported in <strong data-start="3688" data-end="3702">April 2025</strong>, when <strong data-start="3709" data-end="3723">PeckShield</strong> identified over <strong data-start="3740" data-end="3756">$360 million</strong> in digital asset losses from 18 attacks — a <strong data-start="3801" data-end="3818">990% increase</strong> from March. The largest was a <strong data-start="3849" data-end="3869">$330 million BTC</strong> theft via social engineering.</p>
<p class="" data-start="3901" data-end="4097">As the crypto space grows, so do the threats. This attack highlights the importance of not only decentralization but <strong data-start="4018" data-end="4052">robust smart contract security</strong> in protecting investors and protocols alike.</p>
<hr />
<p data-start="3901" data-end="4097"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/">Mobius Token Smart Contracts Exploited on BNB Chain</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/mobius-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/mobius-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>OKX Claps Back at Justin Sun Over Alleged Freeze Request</title>
		<link>https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/</link>
					<comments>https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 04 May 2025 15:00:48 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto community]]></category>
		<category><![CDATA[crypto exchanges]]></category>
		<category><![CDATA[crypto freeze]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[htx]]></category>
		<category><![CDATA[Justin Sun]]></category>
		<category><![CDATA[KAITO]]></category>
		<category><![CDATA[kaito ai]]></category>
		<category><![CDATA[Lucy Powell]]></category>
		<category><![CDATA[okx]]></category>
		<category><![CDATA[Pump.fun]]></category>
		<category><![CDATA[security incident]]></category>
		<category><![CDATA[social media fraud]]></category>
		<category><![CDATA[Star Xu]]></category>
		<category><![CDATA[token scam]]></category>
		<category><![CDATA[tron]]></category>
		<category><![CDATA[Tron attack]]></category>
		<category><![CDATA[tron dao]]></category>
		<category><![CDATA[X account hack]]></category>
		<category><![CDATA[X security breach]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41557</guid>

					<description><![CDATA[<p>Following the hack of Tron’s official X account, tensions have risen between Tron founder Justin Sun and crypto exchange OKX. Sun claimed OKX failed to act on a law enforcement request to freeze stolen funds, but OKX CEO Star Xu fired back strongly. “OKX cannot freeze a customer’s funds based on a personal X post</p>
<p>The post <a href="https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/">OKX Claps Back at Justin Sun Over Alleged Freeze Request</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2942" data-end="3215">Following the hack of <strong data-start="2964" data-end="2972">Tron</strong>’s official <strong data-start="2984" data-end="2989">X</strong> account, tensions have risen between <strong data-start="3027" data-end="3035">Tron</strong> founder <strong data-start="3044" data-end="3058">Justin Sun</strong> and crypto exchange <strong data-start="3079" data-end="3086">OKX</strong>. Sun claimed OKX failed to act on a law enforcement request to freeze stolen funds, but <strong data-start="3175" data-end="3194">OKX CEO Star Xu</strong> fired back strongly.</p>
<p class="" data-start="3217" data-end="3594"><em>“OKX cannot freeze a customer’s funds based on a personal X post or verbal communication. We follow legal consumer protection policies. As a CEO yourself, you should understand this,”</em> Xu said. He added that no such request had been received via official channels. <em>“Our LE team checked all inboxes — including spam. No request related to this case was found,”</em> Xu stated.</p>
<h2 data-start="3596" data-end="3636">Tron DAO Confirms Account Breach</h2>
<p class="" data-start="3637" data-end="3865">On May 3, <strong data-start="3647" data-end="3659">Tron DAO</strong> informed its 1.7 million followers that the organization’s <strong data-start="3719" data-end="3724">X</strong> account was compromised. The hacker reportedly shared a malicious smart contract address, sent suspicious DMs, and followed random accounts.</p>
<hr />
<p data-start="3867" data-end="4120"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3867" data-end="4120">Sun claimed, <em>“These stolen funds are not mine. I’m acting to protect the community.”</em> His original post, which accused OKX of negligence, was later deleted. Xu responded by asking Sun to publicly share a screenshot of the alleged law enforcement request.</p>
<p data-start="3867" data-end="4120"><img loading="lazy" decoding="async" class="aligncenter wp-image-154997 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/okx.png" alt="okx" width="880" height="263" /></p>
<h2 data-start="4122" data-end="4164">Crypto Twitter Faces Wave of Hacks</h2>
<p class="" data-start="4165" data-end="4407">The <strong data-start="4169" data-end="4177">Tron</strong> incident follows a series of high-profile security breaches targeting crypto accounts on <strong data-start="4267" data-end="4272">X</strong>. On March 15, <strong data-start="4287" data-end="4299">Kaito AI</strong> and its founder <strong data-start="4316" data-end="4325">Yu Hu</strong> were hacked; attackers shorted <strong data-start="4357" data-end="4366">KAITO</strong> tokens and posted fake security alerts.</p>
<p class="" data-start="4409" data-end="4612">Earlier on February 26, <strong data-start="4433" data-end="4445">Pump.fun</strong>’s <strong data-start="4448" data-end="4453">X</strong> account was hijacked to promote a fraudulent governance token. On April 15, <strong data-start="4530" data-end="4551">UK MP Lucy Powell</strong> also had her account compromised to push a scam crypto coin.</p>
<hr />
<p data-start="4409" data-end="4612"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/">OKX Claps Back at Justin Sun Over Alleged Freeze Request</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/justin-sun.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/justin-sun.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</title>
		<link>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/</link>
					<comments>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 29 Apr 2025 15:00:53 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[2025 crypto hack]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain exploit]]></category>
		<category><![CDATA[bounty system]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[DeFi fund recovery]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Loopscale]]></category>
		<category><![CDATA[RateX PT]]></category>
		<category><![CDATA[sol]]></category>
		<category><![CDATA[Term Finance]]></category>
		<category><![CDATA[USDC]]></category>
		<category><![CDATA[white hat hacker]]></category>
		<category><![CDATA[WSOL]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41019</guid>

					<description><![CDATA[<p>DeFi protocol Loopscale has recovered a significant portion of the funds stolen during a major exploit over the weekend. The platform confirmed that 19,463 Wrapped SOL (WSOL) — worth around $2.88 million — was returned to its wallets as of April 28. The exploit occurred on April 26 when attackers manipulated Loopscale&#8217;s RateX PT token</p>
<p>The post <a href="https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/">Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2900" data-end="3161">DeFi protocol <strong data-start="2914" data-end="2927">Loopscale</strong> has recovered a significant portion of the funds stolen during a major exploit over the weekend. The platform confirmed that <strong data-start="3053" data-end="3082">19,463 Wrapped SOL (WSOL)</strong> — worth around <strong data-start="3098" data-end="3115">$2.88 million</strong> — was returned to its wallets as of April 28.</p>
<p class="" data-start="3163" data-end="3419">The exploit occurred on <strong data-start="3187" data-end="3199">April 26</strong> when attackers manipulated <strong data-start="3227" data-end="3251">Loopscale&#8217;s RateX PT</strong> token pricing. Approximately <strong data-start="3281" data-end="3297">$5.7 million</strong> worth of <strong data-start="3307" data-end="3315">USDC</strong> and <strong data-start="3320" data-end="3342">1,200 Solana (SOL)</strong> were drained from the protocol, accounting for about <strong data-start="3396" data-end="3403">12%</strong> of total funds.</p>
<h2 data-start="3426" data-end="3471">Hope for Settlement With White Hat Hacker</h2>
<p class="" data-start="3473" data-end="3728">After the attack, Loopscale&#8217;s team sent an onchain message to the exploiter on <strong data-start="3552" data-end="3564">April 27</strong>, offering a <strong data-start="3577" data-end="3584">10%</strong> bounty and full legal immunity in exchange for <strong data-start="3632" data-end="3639">90%</strong> of the funds. On <strong data-start="3657" data-end="3669">April 28</strong>, the attacker responded, showing willingness to negotiate.</p>
<hr />
<p data-start="3730" data-end="3866"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3730" data-end="3866">So far, <strong data-start="3738" data-end="3763">10,000 WSOL (~$1.48M)</strong> and <strong data-start="3768" data-end="3791">4,463 WSOL (~$660K)</strong> have been returned, following an earlier <strong data-start="3833" data-end="3856">5,000 WSOL (~$740K)</strong> recovery.</p>
<p data-start="3730" data-end="3866"><img loading="lazy" decoding="async" class="aligncenter wp-image-154444 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/loopscale.webp" alt="loopscale" width="780" height="803" /></p>
<h2 data-start="3873" data-end="3908">10% Bounty Offer Yields Results</h2>
<p class="" data-start="3910" data-end="4171">Recoveries like this are rare in the DeFi world. But Loopscale’s communication strategy appears to have worked. Meanwhile, <strong data-start="4033" data-end="4049">Term Finance</strong> — another Ethereum-based lending protocol — also recently recovered <strong data-start="4118" data-end="4125">$1M</strong> out of <strong data-start="4133" data-end="4142">$1.6M</strong> lost due to an oracle issue.</p>
<p class="" data-start="4173" data-end="4417">According to an April report from blockchain security firm <strong data-start="4232" data-end="4246">PeckShield</strong>, more than <strong data-start="4258" data-end="4274">$1.6 billion</strong> in crypto was stolen in Q1 2025. Of that, <strong data-start="4317" data-end="4333">$1.5 billion</strong> came from a massive attack on <strong data-start="4364" data-end="4373">Bybit</strong>, linked to North Korea’s <strong data-start="4399" data-end="4416">Lazarus Group</strong>.</p>
<hr />
<p data-start="4173" data-end="4417"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/">Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Fraud Losses Drop in March</title>
		<link>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/</link>
					<comments>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 01 Apr 2025 11:00:50 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[1inch]]></category>
		<category><![CDATA[Abracadabra.money]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[CertiK]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[smart contract exploit]]></category>
		<category><![CDATA[wallet breach]]></category>
		<category><![CDATA[Zoth]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=39414</guid>

					<description><![CDATA[<p>Losses from crypto scams, exploits, and hacks fell to $28.8 million in March, a significant drop from February’s $1.5 billion loss following the Bybit hack. According to blockchain security firm CertiK, the most significant loss was the $13 million smart contract exploit of the Abracadabra.money decentralized lending protocol on March 25. You Might Be Interested</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/">Crypto Fraud Losses Drop in March</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="1646" data-end="1820">Losses from <strong data-start="1658" data-end="1695">crypto scams, exploits, and hacks</strong> fell to <strong data-start="1704" data-end="1721">$28.8 million</strong> in March, a significant drop from <strong data-start="1756" data-end="1788">February’s $1.5 billion loss</strong> following the <strong data-start="1803" data-end="1812">Bybit</strong> hack.</p>
<p class="" data-start="1822" data-end="2023">According to <strong data-start="1835" data-end="1870">blockchain security firm CertiK</strong>, the most significant loss was the <strong data-start="1906" data-end="1921">$13 million</strong> smart contract exploit of the <strong data-start="1952" data-end="1973">Abracadabra.money</strong> decentralized lending protocol on <strong data-start="2008" data-end="2020">March 25</strong>.</p>
<hr />
<p data-start="2025" data-end="2081"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<h2 data-start="2025" data-end="2081">Major Code Vulnerabilities and Wallet Breaches</h2>
<ul>
<li data-start="2084" data-end="2156"><strong data-start="2084" data-end="2108">Code vulnerabilities</strong> accounted for over <strong data-start="2128" data-end="2143">$14 million</strong> in losses.</li>
<li data-start="2159" data-end="2229"><strong data-start="2159" data-end="2181">Wallet compromises</strong> resulted in over <strong data-start="2199" data-end="2213">$8 million</strong> being stolen.</li>
<li data-start="2232" data-end="2331">The <strong data-start="2236" data-end="2244">Zoth</strong> protocol suffered a <strong data-start="2265" data-end="2281">$8.4 million</strong> loss after its deployer wallet was compromised.</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-152493 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kripto.jpg" alt="crypto" width="1056" height="1632" /></p>
<h2 data-start="2333" data-end="2368">Some Funds Were Recovered!</h2>
<p class="" data-start="2369" data-end="2608">While over <strong data-start="2380" data-end="2395">$33 million</strong> was stolen in total, decentralized exchange aggregator <strong data-start="2451" data-end="2460">1inch</strong> successfully recovered <strong data-start="2484" data-end="2517">most of the $5 million stolen</strong> in a <strong data-start="2523" data-end="2534">March 5</strong> exploit after negotiating a <strong data-start="2563" data-end="2587">bug bounty agreement</strong> with the attacker.</p>
<p class="" data-start="2610" data-end="2739">However, blockchain investigator <strong data-start="2643" data-end="2654">ZachXBT</strong> claimed that an unidentified <strong data-start="2684" data-end="2696">Coinbase</strong> user lost <strong data-start="2707" data-end="2736">400 Bitcoin ($34 million)</strong>.</p>
<p class="" data-start="2741" data-end="2887">Additionally, the <strong data-start="2759" data-end="2788">Australian Federal Police</strong> warned <strong data-start="2796" data-end="2810">130 people</strong> on <strong data-start="2814" data-end="2826">March 21</strong> about a <strong data-start="2835" data-end="2884">crypto scam impersonating exchange sender IDs</strong>.</p>
<hr />
<p data-start="2741" data-end="2887"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/">Crypto Fraud Losses Drop in March</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
