<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>crypto hack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/crypto-hack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/crypto-hack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 28 Nov 2025 06:37:59 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>crypto hack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/crypto-hack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Balancer Announces $8M Refund Plan After $128M Hack</title>
		<link>https://coinengineer.net/blog/balancer-8m-refund-after-128m-hack/</link>
					<comments>https://coinengineer.net/blog/balancer-8m-refund-after-128m-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Fri, 28 Nov 2025 08:30:56 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[BAL token]]></category>
		<category><![CDATA[balancer]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[DeFi security]]></category>
		<category><![CDATA[DeFi TVL]]></category>
		<category><![CDATA[liquidity providers]]></category>
		<category><![CDATA[whitehat recovery]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=58068</guid>

					<description><![CDATA[<p>Balancer is preparing to refund $8 million to liquidity providers following a $128 million hack in early November. The move is seen as crucial for restoring trust and stabilizing the DeFi ecosystem. Refund Plan for Recovered Assets The protocol will return the $8 million in recovered tokens, secured by whitehat teams and Balancer internal security,</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-8m-refund-after-128m-hack/">Balancer Announces $8M Refund Plan After $128M Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="825" data-end="1025"><strong>Balancer</strong> is preparing to refund $8 million to <a href="https://coinengineer.net/blog/balancer-hack-update-attacker-selling-stolen-tokens/">liquidity providers</a> following a $128 million hack in early November. The move is seen as crucial for restoring trust and stabilizing the DeFi ecosystem.</p>
<h2 data-start="1027" data-end="1065">Refund Plan for Recovered Assets</h2>
<p data-start="1067" data-end="1343">The protocol will return the $8 million in recovered tokens, secured by whitehat teams and Balancer internal security, to affected users in the same token types. StakeWise separately handles $19.7 million in osETH and osGNO positions with an independent recovery timeline.</p>
<p data-start="1369" data-end="1630">Whitehat actors, who helped secure funds ahead of the hacker, will receive 10% of the recovered assets as rewards, paid in the same token types. Some chose to waive their rewards, highlighting ethical hacking compliance under Balancer’s Safe Harbor Agreement.</p>
<p data-start="1653" data-end="1915">Affected users will connect their wallets, verify balances via snapshot, and accept a short legal agreement. Approved claims are paid instantly. The claim window is expected to be open for 90–180 days, after which unclaimed funds may be redirected by DAO vote.</p>
<h2 data-start="139" data-end="182">Market Impact and Behavioral Analysis</h2>
<p data-start="184" data-end="564">Following this, the attacker recently moved 6,999 ETH to a new wallet, triggering increased attention and scrutiny on on-chain analytics platforms. After the exploit, Balancer’s TVL dropped from $775 million to $258 million, and the BAL token lost roughly 30% of its value. Meanwhile, the announcement of the refund plan led to a 2% recovery in BAL price over the past 24 hours.</p>
<p data-start="566" data-end="762">The root cause of the attack was minor rounding errors in some v2 pool balance calculations. This flaw created extremely unbalanced pools, enabling manipulation that drained millions of dollars.</p>
<h2 data-start="2258" data-end="2282">DeFi Security Test</h2>
<p data-start="2284" data-end="2587">This refund initiative emphasizes transparency and strengthens investor confidence. The DAO expects the claim portal to go live in late December or early January, while StakeWise recovery follows its own schedule. The case underscores the importance of secure DeFi protocols for future investor trust.</p>
<p data-start="2284" data-end="2587"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-8m-refund-after-128m-hack/">Balancer Announces $8M Refund Plan After $128M Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-8m-refund-after-128m-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Was the Balancer DEX Hack Prepared Months in Advance?</title>
		<link>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/</link>
					<comments>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:30:53 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[balancer]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[DEX exploit]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=55990</guid>

					<description><![CDATA[<p>An experienced attacker stole $116 million from Balancer DEX on Monday after months of preparation. On-chain data shows the attacker used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance. Details of the Attack and Preparation Blockchain analyses show the attacker funded their account stealthily with</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="57" data-end="320">An experienced attacker stole $116 million from <strong>Balancer <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">DEX</a></strong> on Monday after months of preparation. On-chain data shows the <strong>attacker</strong> used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance.</p>
<h2 data-start="322" data-end="362">Details of the Attack and Preparation</h2>
<p data-start="364" data-end="998">Blockchain analyses show the attacker funded their account stealthily with small 0.1 ETH transfers through Tornado Cash to avoid detection. Coinbase executive Conor Grogan said the attacker stored at least 100 ETH in Tornado Cash smart contracts and that those funds may link to earlier hacks. Grogan stated, “Hacker seems experienced: seeded the account with 100 <strong>ETH</strong> and operated with 0.1 ETH Tornado Cash transfers. No opsec leaks.” This behavior clearly points to a professional actor who prepared ahead of time. Balancer announced it would offer a 20% white‑hat bounty if the stolen funds were returned in full (minus the reward).</p>
<h2 data-start="1061" data-end="1099">What Makes the Balancer Hack Unique</h2>
<p data-start="138" data-end="470">Deddy Lavid, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<p data-start="138" data-end="470">, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<h2 data-start="1628" data-end="1681">Lazarus Group and Long‑Term Preparation Strategies</h2>
<p data-start="1683" data-end="2246">Similarly, North Korean group <strong>Lazarus</strong> reportedly paused illicit activity for months before the Bybit hack. Chainalysis data showed a sharp decline in cybercriminal activity after July 1, 2024, which experts interpreted as regrouping to identify new targets and probe infrastructure.</p>
<p data-start="1683" data-end="2246">In the Bybit incident, attackers laundered the $1.4 billion through THORChain within 10 days. That operation demonstrates how months‑long stealth and preparation can precede large, professionally executed exploits—parallels that highlight the seriousness of the Balancer incident.</p>
<h2 data-start="2248" data-end="2285">Recommendations for Balancer Users</h2>
<p data-start="2287" data-end="2609">Store crypto assets only in trusted wallets and avoid moving large sums in single transactions. Be aware that using Tornado Cash and similar mixers can draw attention from professional attackers and investigators, and consider employing multi‑layer security practices to reduce exposure to sophisticated on‑chain exploits.</p>
<p data-start="2287" data-end="2609"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bunni DEX Shuts Down After $8.4 Million Security Breach</title>
		<link>https://coinengineer.net/blog/bunni-dex-shutdown-8-4m-exploit/</link>
					<comments>https://coinengineer.net/blog/bunni-dex-shutdown-8-4m-exploit/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 23 Oct 2025 09:13:38 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Bunni DEX]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto project shutdown]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[DeFi closure]]></category>
		<category><![CDATA[liquidity distribution]]></category>
		<category><![CDATA[MIT license]]></category>
		<category><![CDATA[security breach]]></category>
		<category><![CDATA[Uniswap v4]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=54938</guid>

					<description><![CDATA[<p>The decentralized exchange Bunni DEX has announced that it will fully cease operations following an $8.4 million security breach in September. The project team stated that continuing operations is no longer feasible due to a lack of funds and high auditing costs. In their announcement, the team said: “The recent incident halted our growth, and</p>
<p>The post <a href="https://coinengineer.net/blog/bunni-dex-shutdown-8-4m-exploit/">Bunni DEX Shuts Down After $8.4 Million Security Breach</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The decentralized exchange <strong>Bunni DEX</strong> has announced that it will fully cease operations following an $8.4 million security breach in September. The project team stated that continuing operations is no longer feasible due to a lack of funds and high auditing costs.</p>
<p>In their announcement, the team said: “The recent incident halted our growth, and safely restarting would require six- to seven-figure costs for audits and monitoring, which we do not have.” This adds another closure to the recent wave of shutdowns in the DeFi sector.</p>
<h2>DeFi Security in Focus After $8.4 Million Exploit</h2>
<p>Bunni DEX was built on the Uniswap v4 infrastructure and used a custom Liquidity Distribution Function to optimize returns for liquidity providers. However, the September attack affected both the Ethereum mainnet and the Layer 2 UniChain network, resulting in total losses of $8.4 million.</p>
<p>Following the exploit, the platform’s Total Value Locked (TVL) fell from $80 million to nearly zero within just two months. The team paused all smart contract functions and announced that users could withdraw their assets via the website. Remaining treasury assets will be distributed to BUNNI, LIT, and veBUNNI token holders once legal procedures are completed.</p>
<h2>Smart Contracts Made Open-Source Under MIT License</h2>
<p>Despite shutting down, the Bunni team took a noteworthy step by transferring its v2 smart contracts from the Business Source License (BUSL) to the MIT license. This change allows developers to access all features previously created by Bunni, including liquidity distribution functions, volatility fees, and autonomous rebalancing systems.</p>
<p>This move ensures that even after the project’s closure, Bunni continues to contribute to the DeFi ecosystem. Experts suggest that the open-source MIT license may inspire the development of safer and more transparent decentralized exchanges in the future.</p>
<h2>Chain of Closures in the DeFi Ecosystem</h2>
<p>The closure of Bunni DEX came shortly after <a href="https://coinengineer.net/blog/kadena-halts-operations-kda-price-drops-40-percent/"><strong>Kadena</strong></a> announced the termination of its operations the same week. This highlights the ongoing impact of the crypto winter and the significant challenges DeFi projects face in maintaining sustainability.</p>
<p>Experts emphasize that these recent events have shaken investor confidence, making security audits, capital management, and risk controls more critical than ever for decentralized finance projects.</p>
<h2>Conclusion</h2>
<p>The closure of Bunni DEX is more than just the loss of a single project—it serves as a warning for the DeFi ecosystem. Innovative platforms may offer high returns, but security vulnerabilities and a lack of sustainable funding create the weakest link in the ecosystem.</p>
<p>The decision to make Bunni’s code open-source under the MIT license leaves a positive legacy for the sector. However, the financial losses underscore the need for stricter regulatory and auditing processes for decentralized finance projects in the future.</p>
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bunni-dex-shutdown-8-4m-exploit/">Bunni DEX Shuts Down After $8.4 Million Security Breach</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bunni-dex-shutdown-8-4m-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/10/shuts-down.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/10/shuts-down.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>SUI Price Plunges After Cetus Hack, All Eyes On Key Support</title>
		<link>https://coinengineer.net/blog/sui-price-plunges-after-cetus-hack-all-eyes-on-key-support/</link>
					<comments>https://coinengineer.net/blog/sui-price-plunges-after-cetus-hack-all-eyes-on-key-support/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 22 May 2025 13:30:14 +0000</pubDate>
				<category><![CDATA[Coin Analysis]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[3.83$]]></category>
		<category><![CDATA[4.01$]]></category>
		<category><![CDATA[4.20$]]></category>
		<category><![CDATA[Altcoin Analysis]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[Cetus hack]]></category>
		<category><![CDATA[Cetus Protocol]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto market update]]></category>
		<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[crypto technical analysis]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[sui]]></category>
		<category><![CDATA[SUI price]]></category>
		<category><![CDATA[SUI recovery]]></category>
		<category><![CDATA[SUI support level]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42980</guid>

					<description><![CDATA[<p>After a relatively calm period, the crypto market is once again shaken — this time by a hack targeting Cetus Protocol. The incident has sent shockwaves through the SUI price chart, reminding investors how fragile support levels can be in volatile markets. Cetus Protocol Breach Pressures SUI: $4.01 Support In Jeopardy Following the news of</p>
<p>The post <a href="https://coinengineer.net/blog/sui-price-plunges-after-cetus-hack-all-eyes-on-key-support/">SUI Price Plunges After Cetus Hack, All Eyes On Key Support</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="2203" data-end="2466">After a relatively calm period, the crypto market is once again shaken — this time by a <strong data-start="2291" data-end="2324">hack targeting Cetus Protocol</strong>. The incident has sent shockwaves through the <strong data-start="2371" data-end="2378">SUI</strong> price chart, reminding investors how fragile support levels can be in volatile markets.</p>
<h2 data-start="2468" data-end="2538">Cetus Protocol Breach Pressures SUI: $4.01 Support In Jeopardy</h2>
<p data-start="2540" data-end="2816">Following the news of the security breach, <strong data-start="2583" data-end="2590">SUI</strong> witnessed sharp selling pressure and is currently attempting to hold above the crucial <strong data-start="2678" data-end="2687">$4.01</strong> support. Analysts warn that if this level is <strong data-start="2733" data-end="2759">lost on a 4-hour close</strong>, the price may retreat further to the <strong data-start="2798" data-end="2807">$3.83</strong> support.</p>
<hr />
<p data-start="2818" data-end="2979"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="2818" data-end="2979">Increased trading volume in recent hours signals that this level is under heavy scrutiny. A confirmed breakdown could open the door to further downside pressure.</p>
<h2 data-start="2981" data-end="3037">Recovery Scenario: Targeting A Move Toward $4.20</h2>
<p data-start="3039" data-end="3294">Still, if <strong data-start="3049" data-end="3058">$4.01</strong> holds and buyers regain control, a short-term rebound is possible. In such a case, a recovery move toward <strong data-start="3165" data-end="3174">$4.20</strong> is likely. Technical indicators suggest an increased probability of testing this level again if support remains intact.</p>
<figure id="attachment_156605" aria-describedby="caption-attachment-156605" style="width: 1809px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" class="wp-image-156605 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/SUI-1.png" alt="SUI" width="1809" height="866" /><figcaption id="caption-attachment-156605" class="wp-caption-text"><em>SUI/USDT pair 4-hour chart.</em></figcaption></figure>
<p data-start="3296" data-end="3419">The coming hours could prove pivotal for SUI, as traders await confirmation of either a breakdown or a bounce from support.</p>
<hr />
<p data-start="3296" data-end="3419"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/sui-price-plunges-after-cetus-hack-all-eyes-on-key-support/">SUI Price Plunges After Cetus Hack, All Eyes On Key Support</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/sui-price-plunges-after-cetus-hack-all-eyes-on-key-support/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/03/kripto_ce-14.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/03/kripto_ce-14.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Mobius Token Smart Contracts Exploited on BNB Chain</title>
		<link>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/</link>
					<comments>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 11 May 2025 12:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[BTC theft]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[Crypto Exploit]]></category>
		<category><![CDATA[crypto forensics]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto investing]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[digital asset theft]]></category>
		<category><![CDATA[MBU]]></category>
		<category><![CDATA[Mobius Token]]></category>
		<category><![CDATA[PeckShield]]></category>
		<category><![CDATA[smart contract hack]]></category>
		<category><![CDATA[smart contract vulnerability]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[usdt]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42119</guid>

					<description><![CDATA[<p>According to blockchain security firm Cyvers Alerts, Mobius Token (MBU) smart contracts on the BNB Chain were exploited in a critical attack on May 11, resulting in the theft of 28.5 million MBU tokens, worth over $2.15 million. Millions Lost Within Minutes The attacker deployed a smart contract from address 0xb32a53… at 07:31 UTC and</p>
<p>The post <a href="https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/">Mobius Token Smart Contracts Exploited on BNB Chain</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2622" data-end="2870">According to blockchain security firm Cyvers Alerts, <strong data-start="2675" data-end="2697">Mobius Token (MBU)</strong> smart contracts on the <strong data-start="2721" data-end="2734">BNB Chain</strong> were exploited in a <strong data-start="2755" data-end="2774">critical attack</strong> on May 11, resulting in the theft of <strong data-start="2812" data-end="2832">28.5 million MBU</strong> tokens, worth over <strong data-start="2852" data-end="2869">$2.15 million</strong>.</p>
<h2 data-start="2872" data-end="2908">Millions Lost Within Minutes</h2>
<p class="" data-start="2909" data-end="3172">The attacker deployed a smart contract from address 0xb32a53… at 07:31 UTC and launched the exploit two minutes later from contract 0x631adf…, draining funds from wallet 0xb5252f… The stolen tokens were quickly converted into <strong data-start="3135" data-end="3143">USDT</strong>, totaling <strong data-start="3154" data-end="3171">$2,152,219.99</strong>.</p>
<hr />
<p data-start="3174" data-end="3450"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3174" data-end="3450">Cyvers classified the exploit as &#8220;critical,&#8221; citing <strong data-start="3226" data-end="3259">abnormal transaction patterns</strong> and <strong data-start="3264" data-end="3292">suspicious contract code</strong>. As of publication, the attacker’s wallet remains active and has not moved the stolen assets. No official statement has been issued by the Mobius Token team.</p>
<p class="" data-start="3452" data-end="3591">Cyvers noted their system had flagged the malicious contract <strong data-start="3513" data-end="3534">two minutes prior</strong> to the exploit, but it was too late to prevent the loss.</p>
<p data-start="3452" data-end="3591"><img decoding="async" class="aligncenter wp-image-155590 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/mobius.png" alt="mobius" width="701" height="494" /></p>
<h2 data-start="3593" data-end="3630">Crypto Exploits Surge in 2025</h2>
<p class="" data-start="3631" data-end="3899">This incident follows a wave of crypto hacks reported in <strong data-start="3688" data-end="3702">April 2025</strong>, when <strong data-start="3709" data-end="3723">PeckShield</strong> identified over <strong data-start="3740" data-end="3756">$360 million</strong> in digital asset losses from 18 attacks — a <strong data-start="3801" data-end="3818">990% increase</strong> from March. The largest was a <strong data-start="3849" data-end="3869">$330 million BTC</strong> theft via social engineering.</p>
<p class="" data-start="3901" data-end="4097">As the crypto space grows, so do the threats. This attack highlights the importance of not only decentralization but <strong data-start="4018" data-end="4052">robust smart contract security</strong> in protecting investors and protocols alike.</p>
<hr />
<p data-start="3901" data-end="4097"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/">Mobius Token Smart Contracts Exploited on BNB Chain</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/mobius-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/mobius-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>OKX Claps Back at Justin Sun Over Alleged Freeze Request</title>
		<link>https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/</link>
					<comments>https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 04 May 2025 15:00:48 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto community]]></category>
		<category><![CDATA[crypto exchanges]]></category>
		<category><![CDATA[crypto freeze]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[htx]]></category>
		<category><![CDATA[Justin Sun]]></category>
		<category><![CDATA[KAITO]]></category>
		<category><![CDATA[kaito ai]]></category>
		<category><![CDATA[Lucy Powell]]></category>
		<category><![CDATA[okx]]></category>
		<category><![CDATA[Pump.fun]]></category>
		<category><![CDATA[security incident]]></category>
		<category><![CDATA[social media fraud]]></category>
		<category><![CDATA[Star Xu]]></category>
		<category><![CDATA[token scam]]></category>
		<category><![CDATA[tron]]></category>
		<category><![CDATA[Tron attack]]></category>
		<category><![CDATA[tron dao]]></category>
		<category><![CDATA[X account hack]]></category>
		<category><![CDATA[X security breach]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41557</guid>

					<description><![CDATA[<p>Following the hack of Tron’s official X account, tensions have risen between Tron founder Justin Sun and crypto exchange OKX. Sun claimed OKX failed to act on a law enforcement request to freeze stolen funds, but OKX CEO Star Xu fired back strongly. “OKX cannot freeze a customer’s funds based on a personal X post</p>
<p>The post <a href="https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/">OKX Claps Back at Justin Sun Over Alleged Freeze Request</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2942" data-end="3215">Following the hack of <strong data-start="2964" data-end="2972">Tron</strong>’s official <strong data-start="2984" data-end="2989">X</strong> account, tensions have risen between <strong data-start="3027" data-end="3035">Tron</strong> founder <strong data-start="3044" data-end="3058">Justin Sun</strong> and crypto exchange <strong data-start="3079" data-end="3086">OKX</strong>. Sun claimed OKX failed to act on a law enforcement request to freeze stolen funds, but <strong data-start="3175" data-end="3194">OKX CEO Star Xu</strong> fired back strongly.</p>
<p class="" data-start="3217" data-end="3594"><em>“OKX cannot freeze a customer’s funds based on a personal X post or verbal communication. We follow legal consumer protection policies. As a CEO yourself, you should understand this,”</em> Xu said. He added that no such request had been received via official channels. <em>“Our LE team checked all inboxes — including spam. No request related to this case was found,”</em> Xu stated.</p>
<h2 data-start="3596" data-end="3636">Tron DAO Confirms Account Breach</h2>
<p class="" data-start="3637" data-end="3865">On May 3, <strong data-start="3647" data-end="3659">Tron DAO</strong> informed its 1.7 million followers that the organization’s <strong data-start="3719" data-end="3724">X</strong> account was compromised. The hacker reportedly shared a malicious smart contract address, sent suspicious DMs, and followed random accounts.</p>
<hr />
<p data-start="3867" data-end="4120"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3867" data-end="4120">Sun claimed, <em>“These stolen funds are not mine. I’m acting to protect the community.”</em> His original post, which accused OKX of negligence, was later deleted. Xu responded by asking Sun to publicly share a screenshot of the alleged law enforcement request.</p>
<p data-start="3867" data-end="4120"><img decoding="async" class="aligncenter wp-image-154997 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/okx.png" alt="okx" width="880" height="263" /></p>
<h2 data-start="4122" data-end="4164">Crypto Twitter Faces Wave of Hacks</h2>
<p class="" data-start="4165" data-end="4407">The <strong data-start="4169" data-end="4177">Tron</strong> incident follows a series of high-profile security breaches targeting crypto accounts on <strong data-start="4267" data-end="4272">X</strong>. On March 15, <strong data-start="4287" data-end="4299">Kaito AI</strong> and its founder <strong data-start="4316" data-end="4325">Yu Hu</strong> were hacked; attackers shorted <strong data-start="4357" data-end="4366">KAITO</strong> tokens and posted fake security alerts.</p>
<p class="" data-start="4409" data-end="4612">Earlier on February 26, <strong data-start="4433" data-end="4445">Pump.fun</strong>’s <strong data-start="4448" data-end="4453">X</strong> account was hijacked to promote a fraudulent governance token. On April 15, <strong data-start="4530" data-end="4551">UK MP Lucy Powell</strong> also had her account compromised to push a scam crypto coin.</p>
<hr />
<p data-start="4409" data-end="4612"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/">OKX Claps Back at Justin Sun Over Alleged Freeze Request</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/okx-claps-back-at-justin-sun-over-alleged-freeze-request/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/justin-sun.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/justin-sun.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</title>
		<link>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/</link>
					<comments>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 29 Apr 2025 15:00:53 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[2025 crypto hack]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain exploit]]></category>
		<category><![CDATA[bounty system]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[DeFi fund recovery]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Loopscale]]></category>
		<category><![CDATA[RateX PT]]></category>
		<category><![CDATA[sol]]></category>
		<category><![CDATA[Term Finance]]></category>
		<category><![CDATA[USDC]]></category>
		<category><![CDATA[white hat hacker]]></category>
		<category><![CDATA[WSOL]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41019</guid>

					<description><![CDATA[<p>DeFi protocol Loopscale has recovered a significant portion of the funds stolen during a major exploit over the weekend. The platform confirmed that 19,463 Wrapped SOL (WSOL) — worth around $2.88 million — was returned to its wallets as of April 28. The exploit occurred on April 26 when attackers manipulated Loopscale&#8217;s RateX PT token</p>
<p>The post <a href="https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/">Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2900" data-end="3161">DeFi protocol <strong data-start="2914" data-end="2927">Loopscale</strong> has recovered a significant portion of the funds stolen during a major exploit over the weekend. The platform confirmed that <strong data-start="3053" data-end="3082">19,463 Wrapped SOL (WSOL)</strong> — worth around <strong data-start="3098" data-end="3115">$2.88 million</strong> — was returned to its wallets as of April 28.</p>
<p class="" data-start="3163" data-end="3419">The exploit occurred on <strong data-start="3187" data-end="3199">April 26</strong> when attackers manipulated <strong data-start="3227" data-end="3251">Loopscale&#8217;s RateX PT</strong> token pricing. Approximately <strong data-start="3281" data-end="3297">$5.7 million</strong> worth of <strong data-start="3307" data-end="3315">USDC</strong> and <strong data-start="3320" data-end="3342">1,200 Solana (SOL)</strong> were drained from the protocol, accounting for about <strong data-start="3396" data-end="3403">12%</strong> of total funds.</p>
<h2 data-start="3426" data-end="3471">Hope for Settlement With White Hat Hacker</h2>
<p class="" data-start="3473" data-end="3728">After the attack, Loopscale&#8217;s team sent an onchain message to the exploiter on <strong data-start="3552" data-end="3564">April 27</strong>, offering a <strong data-start="3577" data-end="3584">10%</strong> bounty and full legal immunity in exchange for <strong data-start="3632" data-end="3639">90%</strong> of the funds. On <strong data-start="3657" data-end="3669">April 28</strong>, the attacker responded, showing willingness to negotiate.</p>
<hr />
<p data-start="3730" data-end="3866"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3730" data-end="3866">So far, <strong data-start="3738" data-end="3763">10,000 WSOL (~$1.48M)</strong> and <strong data-start="3768" data-end="3791">4,463 WSOL (~$660K)</strong> have been returned, following an earlier <strong data-start="3833" data-end="3856">5,000 WSOL (~$740K)</strong> recovery.</p>
<p data-start="3730" data-end="3866"><img loading="lazy" decoding="async" class="aligncenter wp-image-154444 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/loopscale.webp" alt="loopscale" width="780" height="803" /></p>
<h2 data-start="3873" data-end="3908">10% Bounty Offer Yields Results</h2>
<p class="" data-start="3910" data-end="4171">Recoveries like this are rare in the DeFi world. But Loopscale’s communication strategy appears to have worked. Meanwhile, <strong data-start="4033" data-end="4049">Term Finance</strong> — another Ethereum-based lending protocol — also recently recovered <strong data-start="4118" data-end="4125">$1M</strong> out of <strong data-start="4133" data-end="4142">$1.6M</strong> lost due to an oracle issue.</p>
<p class="" data-start="4173" data-end="4417">According to an April report from blockchain security firm <strong data-start="4232" data-end="4246">PeckShield</strong>, more than <strong data-start="4258" data-end="4274">$1.6 billion</strong> in crypto was stolen in Q1 2025. Of that, <strong data-start="4317" data-end="4333">$1.5 billion</strong> came from a massive attack on <strong data-start="4364" data-end="4373">Bybit</strong>, linked to North Korea’s <strong data-start="4399" data-end="4416">Lazarus Group</strong>.</p>
<hr />
<p data-start="4173" data-end="4417"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/">Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Solana&#8217;s DeFi Protocol Loopscale Halts Lending After $5.8M Hack</title>
		<link>https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/</link>
					<comments>https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 27 Apr 2025 14:00:03 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Aave]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[BONK]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cryptocurrency theft]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[DeFi lending]]></category>
		<category><![CDATA[DeFi security]]></category>
		<category><![CDATA[JitoSOL]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Loopscale]]></category>
		<category><![CDATA[Loopscale hack]]></category>
		<category><![CDATA[Loopscale update]]></category>
		<category><![CDATA[order book model]]></category>
		<category><![CDATA[sol]]></category>
		<category><![CDATA[solana]]></category>
		<category><![CDATA[TVL]]></category>
		<category><![CDATA[USDC]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40921</guid>

					<description><![CDATA[<p>Solana-based decentralized finance (DeFi) protocol Loopscale temporarily paused its lending operations after suffering an approximately $5.8 million exploit. On April 26, a hacker siphoned around $5.7 million USDC and 1,200 SOL by executing a series of undercollateralized loans, co-founder Mary Gooneratne said. Following the attack, Loopscale announced it had re-enabled loan repayments, balance top-ups, and</p>
<p>The post <a href="https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/">Solana&#8217;s DeFi Protocol Loopscale Halts Lending After $5.8M Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3154" data-end="3365">Solana-based decentralized finance (<strong data-start="3230" data-end="3238">DeFi</strong>) protocol <strong data-start="3249" data-end="3262">Loopscale</strong> temporarily paused its lending operations after suffering an approximately <strong data-start="3338" data-end="3354">$5.8 million</strong> exploit.</p>
<p class="" data-start="3367" data-end="3531">On April 26, a hacker siphoned around <strong data-start="3405" data-end="3426">$5.7 million USDC</strong> and <strong data-start="3431" data-end="3444">1,200 SOL</strong> by executing a series of undercollateralized loans, co-founder Mary Gooneratne said.</p>
<p class="" data-start="3533" data-end="3779">Following the attack, <strong data-start="3555" data-end="3568">Loopscale</strong> announced it had re-enabled loan repayments, balance top-ups, and loop closing. However, <em>“all other app functionalities, including Vault withdrawals, remain temporarily restricted”</em> as investigations continue.</p>
<hr />
<p data-start="3781" data-end="3947"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3781" data-end="3947">Gooneratne clarified that only the <strong data-start="3816" data-end="3824">USDC</strong> and <strong data-start="3829" data-end="3836">SOL</strong> vaults were impacted, with the losses representing about 12% of the protocol&#8217;s total value locked (<strong data-start="3936" data-end="3943">TVL</strong>).</p>
<h2 data-start="3949" data-end="4138">DeFi Sector Continues to Face Cyber Threats!</h2>
<p class="" data-start="3949" data-end="4138">The <strong data-start="4003" data-end="4016">Loopscale</strong> team emphasized that they are fully mobilized to investigate the incident, recover the stolen funds, and protect users.</p>
<p class="" data-start="4140" data-end="4441">In the first quarter of 2025, hackers stole over <strong data-start="4189" data-end="4205">$1.6 billion</strong> in cryptocurrencies from exchanges and on-chain smart contracts. Over 90% of these losses were attributed to the <strong data-start="4319" data-end="4335">$1.5 billion</strong> hack on the centralized exchange <strong data-start="4369" data-end="4378">ByBit</strong>, reportedly orchestrated by North Korea&#8217;s <strong data-start="4421" data-end="4438">Lazarus Group</strong>.</p>
<p data-start="4140" data-end="4441"><img loading="lazy" decoding="async" class="aligncenter wp-image-154293 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/loopscale.jpeg" alt="loopscale" width="1049" height="547" /></p>
<h2 data-start="4443" data-end="4654">Loopscale&#8217;s Innovative Lending Model</h2>
<p class="" data-start="4443" data-end="4654"><strong data-start="4486" data-end="4499">Loopscale</strong> officially launched on April 10 after a six-month closed beta. The platform aims to boost capital efficiency by directly matching lenders and borrowers.</p>
<p class="" data-start="4656" data-end="4781">Unlike traditional DeFi platforms like <strong data-start="4695" data-end="4703">Aave</strong>, <strong data-start="4705" data-end="4718">Loopscale</strong> operates on an order book model rather than liquidity pools.</p>
<p class="" data-start="4783" data-end="5031">Its main <strong data-start="4792" data-end="4800">USDC</strong> and <strong data-start="4805" data-end="4812">SOL</strong> vaults currently offer annual percentage rates (<strong data-start="4861" data-end="4869">APRs</strong>) exceeding 5% and 10%, respectively. It also supports lending markets for tokens such as <strong data-start="4959" data-end="4970">JitoSOL</strong>, <strong data-start="4972" data-end="4980">BONK</strong>, and looping strategies for over 40 token pairs.</p>
<p class="" data-start="5033" data-end="5178"><strong data-start="5033" data-end="5046">Loopscale</strong> holds approximately <strong data-start="5067" data-end="5082">$40 million</strong> in total value locked and has attracted over 7,000 lenders, according to researcher OurNetwork.</p>
<hr />
<p data-start="5033" data-end="5178"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/">Solana&#8217;s DeFi Protocol Loopscale Halts Lending After $5.8M Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Big Bet from ZachXBT on Whale in Hyperliquid!</title>
		<link>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/</link>
					<comments>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 14:00:07 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin short]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[Chainlink short]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[Crypto Investigation]]></category>
		<category><![CDATA[crypto market]]></category>
		<category><![CDATA[crypto whale]]></category>
		<category><![CDATA[cybercriminal]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[Ethereum short]]></category>
		<category><![CDATA[GMX]]></category>
		<category><![CDATA[Hyperliquid]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[leverage trading]]></category>
		<category><![CDATA[Leveraged Trading]]></category>
		<category><![CDATA[Lookonchain]]></category>
		<category><![CDATA[stolen funds]]></category>
		<category><![CDATA[ZachXBT]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38634</guid>

					<description><![CDATA[<p>The famous on-chain investigator has exposed the much-discussed Hyperliquid whale. Allegedly, the whale has made $9 million in profits using stolen funds. A major development has shaken the crypto investment world. Well-known on-chain investigator ZachXBT has claimed that the so-called &#8220;Hyperliquid whale,&#8221; who trades with 50x leverage on the Hyperliquid exchange, is in fact a</p>
<p>The post <a href="https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/">Big Bet from ZachXBT on Whale in Hyperliquid!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="203" data-end="365">The famous on-chain investigator has exposed the much-discussed Hyperliquid whale. Allegedly, the whale has made $9 million in profits using stolen funds.</p>
<p data-start="367" data-end="640">A major development has shaken the crypto investment world. Well-known on-chain investigator <strong data-start="460" data-end="471">ZachXBT</strong> has claimed that the so-called &#8220;Hyperliquid whale,&#8221; who trades with 50x leverage on the Hyperliquid exchange, is in fact <strong data-start="593" data-end="639">a cybercriminal gambling with stolen funds</strong>.</p>
<p data-start="642" data-end="1043">This whale managed to survive liquidation attempts by crypto investors and secured an impressive <strong data-start="739" data-end="753">$9 million</strong> in net profit. <strong data-start="769" data-end="780">ZachXBT</strong> emphasized that this whale <strong data-start="808" data-end="869">has no connection to the North Korea-backed Lazarus Group</strong>. Earlier this year, in February 2025, ZachXBT had linked the <strong data-start="931" data-end="958">$1.5 billion Bybit hack</strong> to that hacker collective. Now, he has followed the trail to this Hyperliquid whale.</p>
<h2 data-start="1050" data-end="1121">&#8220;Crypto Twitter Is Speculating, But the Truth Is More Sinister&#8221;</h2>
<p data-start="1123" data-end="1309">ZachXBT made the following statement on X (Twitter):</p>
<p data-start="1123" data-end="1309"><em>“It’s funny watching CT speculate on the ‘Hyperliquid whale’ when in reality it’s just a cybercriminal gambling with stolen funds.”</em></p>
<p data-start="1311" data-end="1452">Responding to a follower&#8217;s question regarding potential ties to the Lazarus Group, ZachXBT replied:</p>
<p data-start="1311" data-end="1452"><em>“No, there’s no connection to Lazarus.”</em></p>
<p data-start="1454" data-end="1627">Some users asked ZachXBT to reveal the whale’s identity. However, he responded by saying:</p>
<p data-start="1454" data-end="1627"><em>“We’ll see, it’s just not enjoyable posting investigations on X/Twitter anymore.”</em></p>
<p data-start="1454" data-end="1627"><img loading="lazy" decoding="async" class="aligncenter wp-image-151335 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/zachxbt.png" alt="zachxbt" width="882" height="822" /></p>
<h2 data-start="1634" data-end="1680">Failed Attempts to Liquidate the Whale</h2>
<p data-start="1682" data-end="1912">For weeks, the crypto market has speculated about <strong data-start="1732" data-end="1794">who the Hyperliquid whale is and how they could be stopped</strong>. The whale had opened <strong data-start="1817" data-end="1884">40x and 50x short positions on Bitcoin (BTC) and Ethereum (ETH)</strong>, drawing massive attention.</p>
<hr />
<p data-start="1914" data-end="2287"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1914" data-end="2287">The whale notably opened a <strong data-start="1941" data-end="1979">$450 million short position on BTC</strong>, which triggered a major reaction across the market. Traders attempted to counter this by aggressively buying up BTC, trying to force a liquidation. However, they ultimately failed. According to <strong data-start="2175" data-end="2190">Lookonchain</strong>, the whale deposited an additional <strong data-start="2226" data-end="2245">$5 million USDC</strong> to increase margin and avoid liquidation.</p>
<p data-start="2289" data-end="2441">Aside from BTC and ETH, the whale also opened a <strong data-start="2337" data-end="2387">$31 million short position on Chainlink (LINK)</strong> with 10x leverage and placed short orders on <strong data-start="2433" data-end="2440">GMX</strong>.</p>
<h2 data-start="2448" data-end="2530">A Major Threat in the Crypto Market: Stolen Funds and High-Leverage Trades</h2>
<p data-start="2532" data-end="2831">ZachXBT’s comments have reignited concerns about <strong data-start="2581" data-end="2668">stolen funds re-entering circulation through decentralized finance (DeFi) protocols</strong>. The situation also highlights how <strong data-start="2704" data-end="2781">cybercriminals exploit high-leverage trading to gamble with illicit funds</strong>, posing a significant risk to the overall market.</p>
<p data-start="2833" data-end="3040">While the true identity of this whale remains undisclosed, the broader question for the crypto ecosystem is how to address these <strong data-start="2962" data-end="3039">high-risk scenarios and prevent bad actors from destabilizing the markets</strong>.</p>
<hr />
<p data-start="2833" data-end="3040"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/">Big Bet from ZachXBT on Whale in Hyperliquid!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/ZachXBT.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/ZachXBT.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit Hackers Resume Laundering!</title>
		<link>https://coinengineer.net/blog/bybit-hackers-resume-laundering/</link>
					<comments>https://coinengineer.net/blog/bybit-hackers-resume-laundering/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 02 Mar 2025 14:00:04 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[cross-chain bridges]]></category>
		<category><![CDATA[Crypto Analysis]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[LazarusGroup]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37637</guid>

					<description><![CDATA[<p>The Bybit hackers accelerated their laundering activities on March 1, moving another 62,200 Ether despite efforts from U.S. authorities to block their transactions. North Korea-Linked Lazarus Group in Action! According to a pseudonymous crypto analyst, the Lazarus Group, linked to North Korea, has successfully laundered the majority of the funds stolen from Bybit on February</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1581" data-end="1763">The <strong data-start="1585" data-end="1602">Bybit hackers</strong> accelerated their laundering activities on <strong data-start="1646" data-end="1657">March 1</strong>, moving <strong data-start="1666" data-end="1690">another 62,200 Ether</strong> despite efforts from <strong data-start="1712" data-end="1732">U.S. authorities</strong> to block their transactions.</p>
<h2 data-start="1765" data-end="1818">North Korea-Linked Lazarus Group in Action!</h2>
<p data-start="1820" data-end="2108">According to a pseudonymous crypto analyst, the <strong data-start="1868" data-end="1885">Lazarus Group</strong>, linked to <strong data-start="1897" data-end="1912">North Korea</strong>, has successfully laundered the majority of the <strong data-start="1961" data-end="2003">funds stolen from Bybit on February 21</strong>. Only <strong data-start="2010" data-end="2025">156,500 ETH</strong> remains to be moved, which is expected to happen <strong data-start="2075" data-end="2105">within the next three days</strong>.</p>
<hr />
<p data-start="2110" data-end="2458"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="2110" data-end="2458">The <strong data-start="2114" data-end="2121">FBI</strong> has flagged <strong data-start="2134" data-end="2159">51 Ethereum addresses</strong>, while <strong data-start="2167" data-end="2179">Elliptic</strong> has identified <strong data-start="2195" data-end="2227">over 11,000 wallet addresses</strong> connected to the hackers. <strong data-start="2254" data-end="2269">Chainalysis</strong> reports that the attackers have converted portions of the stolen Ether into <strong data-start="2346" data-end="2392">Bitcoin (BTC), Dai (DAI), and other assets</strong> using <strong data-start="2399" data-end="2455">DEXs, cross-chain bridges, and instant swap services</strong>.</p>
<p data-start="2110" data-end="2458"><img loading="lazy" decoding="async" class="aligncenter wp-image-149945 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/01955523-3874-73d3-8709-524c77bb80d1.jpeg" alt="" width="2234" height="462" /></p>
<h2 data-start="2460" data-end="2491">THORChain Under Fire!</h2>
<p data-start="2493" data-end="2820">Hackers have been utilizing <strong data-start="2521" data-end="2548">decentralized protocols</strong> to obscure their transactions. One of the most criticized platforms in this process has been <strong data-start="2642" data-end="2655">THORChain</strong>. Developer <strong data-start="2667" data-end="2678">“Pluto”</strong> announced they would no longer contribute to the protocol after a proposal to block North Korean hacker-linked transactions was overturned.</p>
<p data-start="2822" data-end="3010">The <strong data-start="2826" data-end="2840">Bybit hack</strong>, with a <strong data-start="2849" data-end="2865">$1.4 billion</strong> loss, is the <strong data-start="2879" data-end="2916">biggest exploit in crypto history</strong>, surpassing the <strong data-start="2933" data-end="2983">$650 million Ronin Bridge hack from March 2022</strong> by more than <strong data-start="2997" data-end="3007">double</strong>.</p>
<hr />
<p data-start="2822" data-end="3010"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hackers-resume-laundering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
