<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>cyber attack Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/cyber-attack/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/cyber-attack/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Thu, 15 May 2025 13:59:57 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>cyber attack Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/cyber-attack/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Coinbase Hit by Cyber Attack: CEO Sends Message of No Ransom</title>
		<link>https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/</link>
					<comments>https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 15 May 2025 15:30:47 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Brian Armstrong]]></category>
		<category><![CDATA[coinbase]]></category>
		<category><![CDATA[Crypto Regulatio]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[Cryptocurrency Exchange]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[fraud prevention]]></category>
		<category><![CDATA[Ransomware]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Two Factor Authentication]]></category>
		<category><![CDATA[WazirX]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42465</guid>

					<description><![CDATA[<p>Cryptocurrency exchange Coinbase has been targeted by a cyber attack. The company’s CEO, Brian Armstrong, shared details of the attack on social media. Armstrong stated that users’ sensitive information remained protected, but some personal data was accessed. The hacker obtained personal details such as names, addresses, and contact information. However, passwords, private keys, funds, and</p>
<p>The post <a href="https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/">Coinbase Hit by Cyber Attack: CEO Sends Message of No Ransom</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c><strong>Cryptocurrency exchange Coinbase</strong> has been targeted by a cyber attack. The company’s <strong>CEO, Brian Armstrong</strong>, shared details of the attack on social media. Armstrong stated that users’ sensitive information remained protected, but some personal data was accessed. The <strong>hacker</strong> obtained personal details <strong>such as names, addresses, and contact</strong> information. However, <strong>passwords, private keys, funds, and Prime account</strong> details were not accessed. Most importantly, Armstrong emphasized that they will not pay any ransom to the attackers.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c><strong>Coinbase</strong> has promised compensation to all affected users. The company will also cover losses for users deceived by social engineering attacks during this process, aiming to maintain user trust. Additionally, <strong>Coinbase created a $20 million</strong> reward fund to incentivize information leading to the identification of the attackers. The <strong>crypto exchange</strong> has started implementing new security measures to prevent user harm.</span><span data-ccp-props="{}"> </span></p>
<h2>Coinbase Cyber Attack</h2>
<p><strong>In a clear stance shared on X , Coinbase CEO <a href="https://x.com/brian_armstrong/status/1922967787309256807">Brian Armstrong</a> stated: </strong></p>
<blockquote><p><span data-c>“We will not pay ransom to extortionists. Instead, we offer a $20 million reward to those who provide information leading to the identification and prosecution of the perpetrators.”</span><span data-ccp-props="{}"> </span></p></blockquote>
<p><span data-c>Following the attack, <strong>Coinbase</strong> increased its security measures. A new customer support center was established in the US, where identity verification and fraud awareness notifications became mandatory. Moreover, additional identity verification processes were added for <strong>high-value</strong> transactions. These steps aim to protect user accounts. The company also announced that it will <strong>provide regular updates</strong> to users in the coming days.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>The Method Behind the Attack</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>The attackers</strong> attempted to infiltrate the system by bribing some customer representatives working abroad. <strong>Coinbase described</strong> this as an unusual and complex social engineering attack. However, the attackers did not gain access to sensitive systems.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c><strong>Coinbase</strong> estimates that less than <strong>1% of users’</strong> data was affected. Nevertheless, it warned customers to remain vigilant against potential fraud risks. This incident has once again highlighted the growing cyber threats in the crypto sector. Last year, India-based <strong>WazirX lost $230 million</strong> in a similar attack. Coinbase’s breach underscores the urgent need for data security and regulatory measures.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c><strong>Security at crypto exchanges</strong> has become not only a technological but also a strategic priority. <a href="https://coinengineer.net/blog/change-in-arthur-hayes-crypto-portfolio/">Users</a> should protect their accounts with <strong>two-factor authentication and strong</strong> passwords.</span><span data-ccp-props="{}"> </span></p>
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/">Coinbase Hit by Cyber Attack: CEO Sends Message of No Ransom</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/coinbase-cyber-attack-ceo-refuses-ransom-payment/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-15T165127.565.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-15T165127.565.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target Crypto Devs!</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 25 Apr 2025 09:00:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI deception]]></category>
		<category><![CDATA[Angeloper]]></category>
		<category><![CDATA[BlockNovas]]></category>
		<category><![CDATA[crypto developers]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fake companies]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker threat]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[metamask]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[SoftGlide]]></category>
		<category><![CDATA[Web3 threats]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40808</guid>

					<description><![CDATA[<p>A subgroup of Lazarus, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to infect developers with malware. According to Silent Push, these shell companies—BlockNovas, Angeloper Agency, and SoftGlide—are part of a campaign to lure developers through fraudulent job interviews. You Might Be Interested In: Elon Musk</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2705" data-end="3075">A <strong data-start="2707" data-end="2730">subgroup of Lazarus</strong>, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to <strong data-start="2851" data-end="2885">infect developers with malware</strong>. According to <strong data-start="2900" data-end="2915">Silent Push</strong>, these shell companies—<strong data-start="2939" data-end="2953">BlockNovas</strong>, <strong data-start="2955" data-end="2975">Angeloper Agency</strong>, and <strong data-start="2981" data-end="2994">SoftGlide</strong>—are part of a campaign to lure developers through <strong data-start="3045" data-end="3074">fraudulent job interviews</strong>.</p>
<hr />
<p data-start="3077" data-end="3333"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3077" data-end="3333">Two of these companies are even <strong data-start="3109" data-end="3143">legally registered in the U.S.</strong>, adding a layer of legitimacy. During the interview, applicants receive a fake error message while trying to record a video, leading them to copy-paste a fix that actually installs malware.</p>
<h2 data-start="3335" data-end="3390">Malware Targets Wallet Keys and Clipboard Data</h2>
<p class="" data-start="3391" data-end="3692">The campaign utilizes three malware strains: <strong data-start="3436" data-end="3450">BeaverTail</strong>, <strong data-start="3452" data-end="3471">InvisibleFerret</strong>, and <strong data-start="3477" data-end="3493">Otter Cookie</strong>. While <strong data-start="3501" data-end="3515">BeaverTail</strong> is designed for initial compromise and further payload delivery, <strong data-start="3581" data-end="3597">Otter Cookie</strong> and <strong data-start="3602" data-end="3621">InvisibleFerret</strong> focus on extracting <strong data-start="3642" data-end="3664">crypto wallet keys</strong> and <strong data-start="3669" data-end="3691">clipboard contents</strong>.</p>
<p class="" data-start="3694" data-end="4003">Silent Push also discovered that hackers are using <strong data-start="3745" data-end="3768">AI-generated images</strong> and <strong data-start="3773" data-end="3795">stolen real photos</strong> to create fake employee profiles for the companies, boosting credibility. Analyst <strong data-start="3878" data-end="3894">Zach Edwards</strong> noted that some images were subtly altered using AI tools to resemble the original person but appear unique.</p>
<p class="" data-start="4005" data-end="4273">The campaign has been active <strong data-start="4034" data-end="4048">since 2024</strong>, and <strong data-start="4054" data-end="4081">at least two developers</strong> were directly affected—one of whom had their <strong data-start="4127" data-end="4158">MetaMask wallet compromised</strong>. The <strong data-start="4164" data-end="4171">FBI</strong> has since shut down <strong data-start="4192" data-end="4206">BlockNovas</strong>, but <strong data-start="4212" data-end="4225">SoftGlide</strong> and other parts of the operation remain online.</p>
<p data-start="4005" data-end="4273"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-154152 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kuzey-kore.jpg" alt="Kuzey Kore" width="899" height="387" /></p>
<hr />
<p data-start="4005" data-end="4273"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Kaito AI and Founder Yu Hu’s X Accounts Hacked!</title>
		<link>https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/</link>
					<comments>https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 16 Mar 2025 10:00:32 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Canada scam]]></category>
		<category><![CDATA[CanCap scam]]></category>
		<category><![CDATA[crypto market]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[DeFi Warhol]]></category>
		<category><![CDATA[investor safety]]></category>
		<category><![CDATA[Jupiter DAO]]></category>
		<category><![CDATA[Justin Trudeau]]></category>
		<category><![CDATA[kaito ai]]></category>
		<category><![CDATA[Kaito token]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Pump.fun]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media hack]]></category>
		<category><![CDATA[X platform]]></category>
		<category><![CDATA[Yu Hu]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38526</guid>

					<description><![CDATA[<p>Crypto-focused artificial intelligence platform Kaito AI and its founder Yu Hu became victims of a cyberattack on the social media platform X on March 15. In several now-deleted posts, hackers falsely claimed that Kaito wallets had been compromised and warned users that their funds were no longer safe. However, the Kaito AI team quickly regained</p>
<p>The post <a href="https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/">Kaito AI and Founder Yu Hu’s X Accounts Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="232" data-end="398">Crypto-focused artificial intelligence platform <strong data-start="280" data-end="292">Kaito AI</strong> and its founder <strong data-start="309" data-end="318">Yu Hu</strong> became victims of a cyberattack on the social media platform <strong data-start="380" data-end="385">X</strong> on March 15.</p>
<p data-start="400" data-end="700">In several now-deleted posts, hackers falsely claimed that <strong data-start="459" data-end="468">Kaito</strong> wallets had been compromised and warned users that their funds were no longer safe. However, the <strong data-start="566" data-end="578">Kaito AI</strong> team quickly regained control of the accounts and reassured users that Kaito token wallets were unaffected by the breach.</p>
<h2 data-start="702" data-end="734">KAITO Token Price Drops!</h2>
<p data-start="736" data-end="980">According to <strong data-start="749" data-end="764">DeFi Warhol</strong>, the attackers opened short positions on KAITO tokens before spreading the false information. The goal was to trigger panic selling and cause a price crash, allowing the hackers to profit from their short positions.</p>
<hr />
<p data-start="982" data-end="1056"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="982" data-end="1056">The <strong data-start="986" data-end="998">Kaito AI</strong> team addressed the incident with the following statement:</p>
<p data-start="982" data-end="1056"><em><span style="font-size: 14.4px;">“Despite having high-standard security measures in place, we were still compromised. It seems to be similar to other recent X account hacks.”</span></em></p>
<figure id="attachment_38527" aria-describedby="caption-attachment-38527" style="width: 1835px" class="wp-caption aligncenter"><img decoding="async" class="wp-image-38527 size-full" src="https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI.png" alt="Kaito AI" width="1835" height="1018" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI.png 1835w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-300x166.png 300w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-1024x568.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-768x426.png 768w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-1536x852.png 1536w" sizes="(max-width: 1835px) 100vw, 1835px" /><figcaption id="caption-attachment-38527" class="wp-caption-text"><em>KAITO/USDT 15-minute chart.</em></figcaption></figure>
<h2 data-start="1203" data-end="1255">Rising Cyber Threats in the Crypto Industry!</h2>
<p data-start="1257" data-end="1502">This incident adds to a growing list of social media hacks, social engineering scams, and cybersecurity concerns within the crypto space. In recent weeks, the <strong data-start="1416" data-end="1428">Pump.fun</strong> and <strong data-start="1433" data-end="1448">Jupiter DAO</strong> accounts were also compromised using similar tactics.</p>
<p data-start="1504" data-end="1849">Additionally, Canada’s Alberta Securities Commission issued a warning about the <strong data-start="1584" data-end="1594">CanCap</strong> scam, where malicious actors used fake news and fabricated endorsements from Canadian politicians to promote fraudulent crypto investments. The scammers exploited concerns over a potential trade war between Canada and the United States to lure investors.</p>
<h2 data-start="1851" data-end="1887">Lazarus Group Strikes Again!</h2>
<p data-start="1889" data-end="2260">State-sponsored hacker group <strong data-start="1918" data-end="1929">Lazarus</strong> has also launched a new scam. They pose as venture capitalists in Zoom meetings and claim to experience audio-visual issues. Victims are then redirected to malicious chatrooms where they are instructed to download a &#8220;patch.&#8221; This software is designed to steal private crypto keys and other sensitive data from the victim&#8217;s device.</p>
<p data-start="1889" data-end="2260"><img decoding="async" class="aligncenter wp-image-151176 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/kaito-ai.webp" alt="Kaito AI" width="1000" height="548" /></p>
<hr />
<p data-start="1889" data-end="2260"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/">Kaito AI and Founder Yu Hu’s X Accounts Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/coinbase_ce-33.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/coinbase_ce-33.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit Hackers Resume Laundering!</title>
		<link>https://coinengineer.net/blog/bybit-hackers-resume-laundering/</link>
					<comments>https://coinengineer.net/blog/bybit-hackers-resume-laundering/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 02 Mar 2025 14:00:04 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[cross-chain bridges]]></category>
		<category><![CDATA[Crypto Analysis]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[LazarusGroup]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37637</guid>

					<description><![CDATA[<p>The Bybit hackers accelerated their laundering activities on March 1, moving another 62,200 Ether despite efforts from U.S. authorities to block their transactions. North Korea-Linked Lazarus Group in Action! According to a pseudonymous crypto analyst, the Lazarus Group, linked to North Korea, has successfully laundered the majority of the funds stolen from Bybit on February</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1581" data-end="1763">The <strong data-start="1585" data-end="1602">Bybit hackers</strong> accelerated their laundering activities on <strong data-start="1646" data-end="1657">March 1</strong>, moving <strong data-start="1666" data-end="1690">another 62,200 Ether</strong> despite efforts from <strong data-start="1712" data-end="1732">U.S. authorities</strong> to block their transactions.</p>
<h2 data-start="1765" data-end="1818">North Korea-Linked Lazarus Group in Action!</h2>
<p data-start="1820" data-end="2108">According to a pseudonymous crypto analyst, the <strong data-start="1868" data-end="1885">Lazarus Group</strong>, linked to <strong data-start="1897" data-end="1912">North Korea</strong>, has successfully laundered the majority of the <strong data-start="1961" data-end="2003">funds stolen from Bybit on February 21</strong>. Only <strong data-start="2010" data-end="2025">156,500 ETH</strong> remains to be moved, which is expected to happen <strong data-start="2075" data-end="2105">within the next three days</strong>.</p>
<hr />
<p data-start="2110" data-end="2458"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="2110" data-end="2458">The <strong data-start="2114" data-end="2121">FBI</strong> has flagged <strong data-start="2134" data-end="2159">51 Ethereum addresses</strong>, while <strong data-start="2167" data-end="2179">Elliptic</strong> has identified <strong data-start="2195" data-end="2227">over 11,000 wallet addresses</strong> connected to the hackers. <strong data-start="2254" data-end="2269">Chainalysis</strong> reports that the attackers have converted portions of the stolen Ether into <strong data-start="2346" data-end="2392">Bitcoin (BTC), Dai (DAI), and other assets</strong> using <strong data-start="2399" data-end="2455">DEXs, cross-chain bridges, and instant swap services</strong>.</p>
<p data-start="2110" data-end="2458"><img loading="lazy" decoding="async" class="aligncenter wp-image-149945 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/01955523-3874-73d3-8709-524c77bb80d1.jpeg" alt="" width="2234" height="462" /></p>
<h2 data-start="2460" data-end="2491">THORChain Under Fire!</h2>
<p data-start="2493" data-end="2820">Hackers have been utilizing <strong data-start="2521" data-end="2548">decentralized protocols</strong> to obscure their transactions. One of the most criticized platforms in this process has been <strong data-start="2642" data-end="2655">THORChain</strong>. Developer <strong data-start="2667" data-end="2678">“Pluto”</strong> announced they would no longer contribute to the protocol after a proposal to block North Korean hacker-linked transactions was overturned.</p>
<p data-start="2822" data-end="3010">The <strong data-start="2826" data-end="2840">Bybit hack</strong>, with a <strong data-start="2849" data-end="2865">$1.4 billion</strong> loss, is the <strong data-start="2879" data-end="2916">biggest exploit in crypto history</strong>, surpassing the <strong data-start="2933" data-end="2983">$650 million Ronin Bridge hack from March 2022</strong> by more than <strong data-start="2997" data-end="3007">double</strong>.</p>
<hr />
<p data-start="2822" data-end="3010"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hackers-resume-laundering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>FBI Calls for Blocking Transactions Linked to Bybit Hack</title>
		<link>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/</link>
					<comments>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 27 Feb 2025 16:00:02 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain analysis]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[financial crimes]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37479</guid>

					<description><![CDATA[<p>The U.S. Federal Bureau of Investigation (FBI) has called on crypto exchanges, node operators, and private sector entities to block transactions from addresses linked to the Bybit hack. FBI and Bybit Hack Investigation The FBI has confirmed that North Korea was behind the $1.4 billion Bybit hack on October 21. In a public service announcement</p>
<p>The post <a href="https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/">FBI Calls for Blocking Transactions Linked to Bybit Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="64" data-end="259">The <strong data-start="68" data-end="114">U.S. Federal Bureau of Investigation (FBI)</strong> has called on <strong data-start="129" data-end="256">crypto exchanges, node operators, and private sector entities to block transactions from addresses linked to the Bybit hack</strong>.</p>
<h2 data-start="261" data-end="303">FBI and Bybit Hack Investigation</h2>
<p data-start="305" data-end="510">The FBI has confirmed that <strong data-start="332" data-end="400">North Korea was behind the $1.4 billion Bybit hack on October 21</strong>. In a <strong data-start="407" data-end="453">public service announcement on February 26</strong>, the agency referred to the attack as “TraderTraitor.”</p>
<hr />
<p data-start="512" data-end="753"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="512" data-end="753">According to the FBI, <strong data-start="534" data-end="624">TraderTraitor is also known as Lazarus Group, APT38, BlueNoroff, and Stardust Chollima</strong>. The agency stated that the group had <strong data-start="663" data-end="750">rapidly converted some of the stolen assets into Bitcoin and other cryptocurrencies</strong>.</p>
<p data-start="512" data-end="753"><img loading="lazy" decoding="async" class="aligncenter wp-image-149610 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/02/bybit.webp" alt="" width="1018" height="717" /></p>
<h2 data-start="755" data-end="804">Bybit Hack and Money Laundering Process</h2>
<p data-start="806" data-end="1040">The FBI revealed that <strong data-start="828" data-end="887">over 135,000 Ethereum (ETH) have already been laundered</strong>, with the attackers using <strong data-start="914" data-end="1011">decentralized exchanges, cross-chain bridges, and instant swap services with no KYC protocols</strong> to move the stolen assets.</p>
<p data-start="1042" data-end="1258">Additionally, <strong data-start="1056" data-end="1104">363,900 ETH (~$825 million) remain untouched</strong>. The FBI has shared <strong data-start="1125" data-end="1150">51 Ethereum addresses</strong> linked to the hackers and urged industry players to <strong data-start="1203" data-end="1255">block or avoid interactions with these addresses</strong>.</p>
<p data-start="1260" data-end="1496">Blockchain analytics firm <strong data-start="1286" data-end="1298">Elliptic</strong> has already flagged <strong data-start="1319" data-end="1381">11,084 crypto wallet addresses linked to the Bybit exploit</strong>. The FBI has called on anyone with relevant information to report it to the <strong data-start="1458" data-end="1493">Internet Crime Complaint Center</strong>.</p>
<hr />
<p data-start="1260" data-end="1496"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/">FBI Calls for Blocking Transactions Linked to Bybit Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/fbi-calls-for-blocking-transactions-linked-to-bybit-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/riot-platforms-1.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/riot-platforms-1.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Massive Bybit Hack: $1.5 Billion Loss Explained!</title>
		<link>https://coinengineer.net/blog/massive-bybit-hack-1-5-billion-loss-explained/</link>
					<comments>https://coinengineer.net/blog/massive-bybit-hack-1-5-billion-loss-explained/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Wed, 26 Feb 2025 17:30:41 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[centralized exchanges]]></category>
		<category><![CDATA[cold wallet]]></category>
		<category><![CDATA[crypto exchange]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[digital assets]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[financial security]]></category>
		<category><![CDATA[hack attack]]></category>
		<category><![CDATA[hacker attack]]></category>
		<category><![CDATA[investment security]]></category>
		<category><![CDATA[security breach]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37411</guid>

					<description><![CDATA[<p>Crypto exchange Bybit has officially revealed the cause of the recent $1.5 billion hack. According to the company’s statement, the attack occurred due to a major infrastructure failure. How did this happen, and what does it mean for users? Here are the details! As one of the leading cryptocurrency exchanges, Bybit has been at the</p>
<p>The post <a href="https://coinengineer.net/blog/massive-bybit-hack-1-5-billion-loss-explained/">Massive Bybit Hack: $1.5 Billion Loss Explained!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="56" data-end="323">Crypto exchange <strong data-start="72" data-end="81">Bybit</strong> has officially revealed the cause of the recent $1.5 billion hack. According to the company’s statement, the attack occurred due to a major infrastructure failure. How did this happen, and what does it mean for users? Here are the details!</p>
<p data-start="385" data-end="747">As one of the leading cryptocurrency exchanges, <strong data-start="433" data-end="442">Bybit</strong> has been at the center of a major security crisis. Company officials stated that a serious technical collapse in the exchange&#8217;s infrastructure allowed hackers to infiltrate the system. This vulnerability compromised Bybit’s security mechanisms, enabling attackers to steal $1.5 billion worth of assets.</p>
<hr />
<p data-start="749" data-end="785"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<h2 data-start="749" data-end="785">How Did the Attack Happen?</h2>
<p data-start="786" data-end="1179">According to Bybit’s report, attackers identified security loopholes within the infrastructure and exploited them to gain unauthorized access. Initially appearing as a user account breach, the attack was later revealed to have directly targeted the company’s internal systems. Hackers managed to transfer massive amounts of funds to their own wallets by taking advantage of these weaknesses.</p>
<h2 data-start="1181" data-end="1215">Are Bybit Users at Risk?</h2>
<p data-start="1216" data-end="1561">Following the large-scale attack, Bybit assured users that their funds would remain secure. The company announced that most of the stolen assets would be covered from its reserves and that user losses would be reimbursed. However, some analysts have raised concerns about how Bybit will manage such a significant financial hit in the long run.</p>
<hr />
<p data-start="1933" data-end="2105"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/massive-bybit-hack-1-5-billion-loss-explained/">Massive Bybit Hack: $1.5 Billion Loss Explained!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/massive-bybit-hack-1-5-billion-loss-explained/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce-1.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce-1.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Binance Aids BtcTurk in Recovering Stolen Funds After Cyber Attack</title>
		<link>https://coinengineer.net/blog/binance-aids-btcturk-in-stolen-funds/</link>
					<comments>https://coinengineer.net/blog/binance-aids-btcturk-in-stolen-funds/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Sun, 23 Jun 2024 07:00:06 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[Genel]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[BtcTurk]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">https://coinengineer.io/?p=23363</guid>

					<description><![CDATA[<p>Investigating a recent cyber incident on Turkish cryptocurrency exchange BtcTurk is aggressively underlined by Binance. Binance CEO Richard Teng reports that over $5 million in pilfers have already been blocked. Teng said in a June 22 X post, &#8220;Binance is helping BtcTurk with investigations and have frozen over $5.3M in stolen funds so far.&#8221; Affect</p>
<p>The post <a href="https://coinengineer.net/blog/binance-aids-btcturk-in-stolen-funds/">Binance Aids BtcTurk in Recovering Stolen Funds After Cyber Attack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Investigating a recent cyber incident on Turkish cryptocurrency exchange <strong>BtcTurk</strong> is aggressively underlined by <strong>Binance</strong>. Binance CEO Richard Teng reports that over $5 million in pilfers have already been blocked. Teng said in a June 22 X post, &#8220;Binance is helping BtcTurk with investigations and have frozen over $5.3M in stolen funds so far.&#8221;</p>
<h2>Affect on Hot wallets</h2>
<p>With more than 5 million users, <strong>BtcTurk</strong> verified that the assault mostly targeted software-based crypto wallets linked to the internet, hot wallets. Though they enable regular transactions, hot wallets are more vulnerable to hacking than cold storage. &#8220;Only a portion of the balances of 10 cryptocurrencies in our hot wallets were affected by this cyber attack; most of assets held in our cold wallets remain safe,&#8221; BtcTurk said on June 22.</p>
<p><a href="https://coinengineer.net/blog/bitcoin-mining-faces-challenges-but-remains-stable/"><em><span style="font-weight: 400">This Might Interest You: Bitcoin Mining Faces Challenges but Remains Stable<br />
</span></em></a></p>
<p>Teng told his 299,800 X followers that security personnel and investigations by Binance are assiduously seeking further data. &#8220;As part of our proactive efforts to keep the ecosystem free from criminal actors, our investigations and security teams operate nonstop. As pertinent, we will provide further updates, Teng said. Blockchain investigator ZackXBT commended Binance for its actions, pointing out, &#8220;Binance gets crucified by the media when in reality their security team generally does more for victims + goes out of their way to assist in incident response.&#8221;</p>
<p><strong>BtcTurk CEO Özgür Güneri</strong> has not yet said anything publicly on the topic.</p>
<h2>Recent Crypto Exchange Security Events</h2>
<p>This event followed a previous hack on June 4, wherein Lykke, a crypto exchange located in Switzerland, stopped withdrawals following a security compromise. &#8220;@lykke CTX got exploited and lost $19.5.5 million worth of crypto assets but the team is still trying to hide this fact,&#8221; blockchain security expert SomaXBT said accusing Lykke of trying to cover the vulnerability.</p>
<p><span style="font-weight: 400"><a href="https://t.me/coinengineernews">Click here to get the latest news from Coin Engineer!</a> </span></p>
<p>The post <a href="https://coinengineer.net/blog/binance-aids-btcturk-in-stolen-funds/">Binance Aids BtcTurk in Recovering Stolen Funds After Cyber Attack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/binance-aids-btcturk-in-stolen-funds/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/02/PlayDapp-Hack.jpeg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/02/PlayDapp-Hack.jpeg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Io.net Faces Cyberattack: Security Breach Impacts GPU Network</title>
		<link>https://coinengineer.net/blog/io-net-faces-cyberattack-security-breach-impacts-gpu-network/</link>
					<comments>https://coinengineer.net/blog/io-net-faces-cyberattack-security-breach-impacts-gpu-network/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Mon, 29 Apr 2024 10:00:47 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[GPU]]></category>
		<category><![CDATA[Io.net]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=19001</guid>

					<description><![CDATA[<p>The security of the decentralized physical infrastructure network (DePIN), Io.net, was recently violated by a cyberattack. Malicious users performed an SQL injection attack by exploiting the exposed user ID tokens. The outcome was the modification of device metadata in the GPU network was illegal. The CISO of Io.net, Husky.io responded immediately by locking down the</p>
<p>The post <a href="https://coinengineer.net/blog/io-net-faces-cyberattack-security-breach-impacts-gpu-network/">Io.net Faces Cyberattack: Security Breach Impacts GPU Network</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The security of the <a href="https://academy.binance.com/tr/articles/what-is-depin-in-crypto">decentralized physical infrastructure network (DePIN)</a>, <strong>Io.net</strong>, was recently violated by a cyberattack. Malicious users performed an SQL injection attack by exploiting the exposed user ID tokens. The outcome was the modification of device metadata in the <a href="https://coinengineer.net/blog/nvidias-share-price-surge-triggers-speculation-on-ai-crypto-tokens/">GPU</a> network was illegal.</p>
<p>The CISO of <strong>Io.net</strong>, Husky.io responded immediately by locking down the network with patches and improvements. Due to the powerful permission layers of their GPUs, the real hardware of the GPUs survived the attack.<img loading="lazy" decoding="async" class="aligncenter size-full wp-image-19002" src="https://coinengineer.net/blog/wp-content/uploads/2024/04/745936e6-f702-4436-a202-b6e8cf32e548.webp" alt="" width="707" height="605" srcset="https://coinengineer.net/blog/wp-content/uploads/2024/04/745936e6-f702-4436-a202-b6e8cf32e548.webp 707w, https://coinengineer.net/blog/wp-content/uploads/2024/04/745936e6-f702-4436-a202-b6e8cf32e548-300x257.webp 300w" sizes="auto, (max-width: 707px) 100vw, 707px" /></p>
<p>Between 07:27:43 and 07:29:05 AM PST on April 25, write operations increased within the GPU metadata API to trigger the breach detection and the alarm activation.</p>
<p>The security measures included making it more complex to inject SQL queries into the APIs and helping to document illegal attempts better. To complement the problems of universal authorization tokens, a user-specific authentication solution was promptly deployed using Auth0 with OKTA.</p>
<p>Furthermore, the anticipated reduction in supply force participants was aggravated by the fact that this security patch update happened at the time when one of the reward program snapshots occurred. As legitimate GPUs did not restart and update, they were unable to use the uptime API, resulting in a drastic drop in the number of active GPU connections from 600,000 to 10,000.</p>
<p>In response to these issues, we initiated Ignition Rewards Season 2 in May to stimulate the participation of the supply side. The supply chain collaboration regarding device upgrades, reboots, and reconnections is a continuous process.</p>
<h2>Io.net API Vulnerability Exposed</h2>
<p>The problem with the intruder was flaws in the proof-of-work (PoW) method used to detect fake GPUs. Attacking tactics intensified as a result of all aggressive security measures that were applied even before the incident, thus proving the need for continuous security research and advancement.</p>
<p>To present the content in input/output Explorer, the attackers exploited a vulnerability in an API. Therefore, in the process, user IDs were exposed upon device ID searches. Data had been dumped into the database by some malicious attackers a few weeks before the incident.</p>
<p>The attackers managed to get into the ‘worker-API,’ which allowed them to alter device metadata without needing user-level authentication by using a valid universal authentication token.</p>
<p>For early threat detection and neutralization, Husky.io emphasized continuous full assessment and penetration testing of public endpoints. Despite hurdles, we continue to rebuild network connectivity and stimulate supply-side participation in order for the platform to remain operational and deliver hundreds of thousands of compute hours per month.</p>
<p><strong>Io.net</strong> wanted to integrate Apple silicon chip technology in March to enhance its AI and ML offerings.</p>
<p>The post <a href="https://coinengineer.net/blog/io-net-faces-cyberattack-security-breach-impacts-gpu-network/">Io.net Faces Cyberattack: Security Breach Impacts GPU Network</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/io-net-faces-cyberattack-security-breach-impacts-gpu-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/04/1_LLrpqYWMhxj1IRX86TLeCQ.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/04/1_LLrpqYWMhxj1IRX86TLeCQ.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
