<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>hacker Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/hacker/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/hacker/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Fri, 02 May 2025 14:33:43 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>hacker Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/hacker/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>North Korean Hacker Tried to Infiltrate Kraken Exchange!</title>
		<link>https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/</link>
					<comments>https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 02 May 2025 17:30:27 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[kraken]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[scam]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41385</guid>

					<description><![CDATA[<p>According to the company’s blog post, a North Korea-linked hacker recently attempted to infiltrate Kraken’s internal systems by applying for a job. However, Kraken’s security and recruitment teams detected the attempt early and turned the process into an intelligence operation. From Recruitment to Espionage Detection at Kraken The incident began with a seemingly routine application</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/">North Korean Hacker Tried to Infiltrate Kraken Exchange!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="62" data-end="360">According to the company’s <a href="https://blog.kraken.com/news/how-we-identified-a-north-korean-hacker" target="_blank" rel="noopener">blog post</a>, a <strong data-start="102" data-end="131"><a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/" target="_blank" rel="noopener">North Korea</a>-linked hacker</strong> recently attempted to infiltrate <strong data-start="165" data-end="175">Kraken</strong>’s internal systems by applying for a job. However, Kraken’s <strong data-start="236" data-end="248">security</strong> and <strong data-start="253" data-end="274">recruitment teams</strong> detected the attempt early and turned the process into an <strong data-start="333" data-end="359">intelligence operation</strong>.</p>
<h3 class="" data-start="362" data-end="415">From Recruitment to Espionage Detection at Kraken</h3>
<p class="" data-start="417" data-end="832">The incident began with a seemingly routine application for an <strong data-start="480" data-end="504">engineering position</strong>. But the candidate’s behavior quickly raised red flags. In the <strong data-start="568" data-end="587">first interview</strong>, the applicant joined under a different name than the one listed on their <strong data-start="662" data-end="672">resume</strong>, then quickly changed it. Additionally, they occasionally used different voice tones, suggesting they were being <strong data-start="786" data-end="810">coached in real time</strong> during the interview.</p>
<p class="" data-start="834" data-end="1170">Kraken had already received <strong data-start="862" data-end="897">warnings from industry partners</strong> that <strong data-start="903" data-end="933">North Korean hacker groups</strong> were actively applying for jobs at crypto companies. When one of the email addresses used by the applicant <strong data-start="1041" data-end="1073">matched a suspicious address</strong> from these warnings, Kraken’s <strong data-start="1104" data-end="1116">Red Team</strong> (penetration testing unit) launched an investigation.</p>
<p></p>
<p class="" data-start="1172" data-end="1528">Using <strong data-start="1178" data-end="1214">Open-Source Intelligence (OSINT)</strong> methods, Kraken’s team researched the applicant. They found that the <strong data-start="1284" data-end="1301">email address</strong> had been leaked in a past <strong data-start="1328" data-end="1343">data breach</strong> and was linked to <strong data-start="1362" data-end="1390">multiple fake identities</strong>. Some of these identities had even been <strong data-start="1431" data-end="1455">hired by other firms</strong>, and one of them belonged to a <strong data-start="1487" data-end="1527">foreign agent listed under sanctions</strong>.</p>
<p class="" data-start="1530" data-end="1863">The candidate was also hiding their location using a <strong data-start="1583" data-end="1590">VPN</strong> and accessing <strong data-start="1605" data-end="1628">remote Mac desktops</strong>. The <strong data-start="1634" data-end="1652">GitHub profile</strong> listed on their resume was tied to a previously exposed email. The <strong data-start="1720" data-end="1747">identification document</strong> provided appeared to be fake and likely created using <strong data-start="1802" data-end="1824">information stolen</strong> during a <strong data-start="1834" data-end="1857">2019 identity theft</strong> case.</p>
<h3 class="" data-start="1865" data-end="1890">The Hacker’s Downfall</h3>
<p class="" data-start="1892" data-end="2263">Rather than cutting off contact, Kraken advanced the applicant through the <strong data-start="1967" data-end="1985">hiring process</strong> — not to hire them, but to study their <strong data-start="2025" data-end="2036">tactics</strong>. The candidate was subjected to several <strong data-start="2077" data-end="2106">cybersecurity assessments</strong> and <strong data-start="2111" data-end="2142">identity verification tasks</strong>. The final round? A “casual” interview with <strong data-start="2187" data-end="2239">Kraken Chief Security Officer (CSO) Nick Percoco</strong> and other team members.</p>
<p class="" data-start="2265" data-end="2716">During this meeting, the applicant faced <strong data-start="2306" data-end="2342">real-time verification questions</strong>: confirming their <strong data-start="2361" data-end="2373">location</strong>, showing a <strong data-start="2385" data-end="2409">government-issued ID</strong>, and even recommending some <strong data-start="2438" data-end="2459">local restaurants</strong> in the city they claimed to live in. The hacker became visibly <strong data-start="2523" data-end="2548">nervous and flustered</strong>, unable to answer the basic questions. It was now clear: this was not a legitimate job seeker, but a <strong data-start="2650" data-end="2678">state-sponsored attacker</strong> attempting to infiltrate the company.</p>
<p class="" data-start="2718" data-end="2769">Kraken CSO <strong data-start="2729" data-end="2745">Nick Percoco</strong> commented on the event:</p>
<blockquote data-start="2771" data-end="3040">
<p class="" data-start="2773" data-end="3040"><strong data-start="2774" data-end="2798">Don’t trust, verify.</strong> That’s a core principle of the crypto world and even more critical in the digital age. <strong data-start="2886" data-end="2913">State-sponsored attacks</strong> aren’t just an American issue — they’re a <strong data-start="2956" data-end="2973">global threat</strong>. Any person or business managing value is a <strong data-start="3018" data-end="3038">potential target</strong>.</p>
</blockquote>
<p class="" data-start="2904" data-end="3110"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/">North Korean Hacker Tried to Infiltrate Kraken Exchange!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hacker-tried-to-infiltrate-kraken/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/Coinmukendisi-14.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Fraud Losses Drop in March</title>
		<link>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/</link>
					<comments>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 01 Apr 2025 11:00:50 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[1inch]]></category>
		<category><![CDATA[Abracadabra.money]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[CertiK]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Phishing Attack]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[smart contract exploit]]></category>
		<category><![CDATA[wallet breach]]></category>
		<category><![CDATA[Zoth]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=39414</guid>

					<description><![CDATA[<p>Losses from crypto scams, exploits, and hacks fell to $28.8 million in March, a significant drop from February’s $1.5 billion loss following the Bybit hack. According to blockchain security firm CertiK, the most significant loss was the $13 million smart contract exploit of the Abracadabra.money decentralized lending protocol on March 25. You Might Be Interested</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/">Crypto Fraud Losses Drop in March</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="1646" data-end="1820">Losses from <strong data-start="1658" data-end="1695">crypto scams, exploits, and hacks</strong> fell to <strong data-start="1704" data-end="1721">$28.8 million</strong> in March, a significant drop from <strong data-start="1756" data-end="1788">February’s $1.5 billion loss</strong> following the <strong data-start="1803" data-end="1812">Bybit</strong> hack.</p>
<p class="" data-start="1822" data-end="2023">According to <strong data-start="1835" data-end="1870">blockchain security firm CertiK</strong>, the most significant loss was the <strong data-start="1906" data-end="1921">$13 million</strong> smart contract exploit of the <strong data-start="1952" data-end="1973">Abracadabra.money</strong> decentralized lending protocol on <strong data-start="2008" data-end="2020">March 25</strong>.</p>
<hr />
<p data-start="2025" data-end="2081"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<h2 data-start="2025" data-end="2081">Major Code Vulnerabilities and Wallet Breaches</h2>
<ul>
<li data-start="2084" data-end="2156"><strong data-start="2084" data-end="2108">Code vulnerabilities</strong> accounted for over <strong data-start="2128" data-end="2143">$14 million</strong> in losses.</li>
<li data-start="2159" data-end="2229"><strong data-start="2159" data-end="2181">Wallet compromises</strong> resulted in over <strong data-start="2199" data-end="2213">$8 million</strong> being stolen.</li>
<li data-start="2232" data-end="2331">The <strong data-start="2236" data-end="2244">Zoth</strong> protocol suffered a <strong data-start="2265" data-end="2281">$8.4 million</strong> loss after its deployer wallet was compromised.</li>
</ul>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-152493 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kripto.jpg" alt="crypto" width="1056" height="1632" /></p>
<h2 data-start="2333" data-end="2368">Some Funds Were Recovered!</h2>
<p class="" data-start="2369" data-end="2608">While over <strong data-start="2380" data-end="2395">$33 million</strong> was stolen in total, decentralized exchange aggregator <strong data-start="2451" data-end="2460">1inch</strong> successfully recovered <strong data-start="2484" data-end="2517">most of the $5 million stolen</strong> in a <strong data-start="2523" data-end="2534">March 5</strong> exploit after negotiating a <strong data-start="2563" data-end="2587">bug bounty agreement</strong> with the attacker.</p>
<p class="" data-start="2610" data-end="2739">However, blockchain investigator <strong data-start="2643" data-end="2654">ZachXBT</strong> claimed that an unidentified <strong data-start="2684" data-end="2696">Coinbase</strong> user lost <strong data-start="2707" data-end="2736">400 Bitcoin ($34 million)</strong>.</p>
<p class="" data-start="2741" data-end="2887">Additionally, the <strong data-start="2759" data-end="2788">Australian Federal Police</strong> warned <strong data-start="2796" data-end="2810">130 people</strong> on <strong data-start="2814" data-end="2826">March 21</strong> about a <strong data-start="2835" data-end="2884">crypto scam impersonating exchange sender IDs</strong>.</p>
<hr />
<p data-start="2741" data-end="2887"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/">Crypto Fraud Losses Drop in March</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-fraud-losses-drop-in-march/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit Hackers Resume Laundering!</title>
		<link>https://coinengineer.net/blog/bybit-hackers-resume-laundering/</link>
					<comments>https://coinengineer.net/blog/bybit-hackers-resume-laundering/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 02 Mar 2025 14:00:04 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[cross-chain bridges]]></category>
		<category><![CDATA[Crypto Analysis]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[LazarusGroup]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37637</guid>

					<description><![CDATA[<p>The Bybit hackers accelerated their laundering activities on March 1, moving another 62,200 Ether despite efforts from U.S. authorities to block their transactions. North Korea-Linked Lazarus Group in Action! According to a pseudonymous crypto analyst, the Lazarus Group, linked to North Korea, has successfully laundered the majority of the funds stolen from Bybit on February</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1581" data-end="1763">The <strong data-start="1585" data-end="1602">Bybit hackers</strong> accelerated their laundering activities on <strong data-start="1646" data-end="1657">March 1</strong>, moving <strong data-start="1666" data-end="1690">another 62,200 Ether</strong> despite efforts from <strong data-start="1712" data-end="1732">U.S. authorities</strong> to block their transactions.</p>
<h2 data-start="1765" data-end="1818">North Korea-Linked Lazarus Group in Action!</h2>
<p data-start="1820" data-end="2108">According to a pseudonymous crypto analyst, the <strong data-start="1868" data-end="1885">Lazarus Group</strong>, linked to <strong data-start="1897" data-end="1912">North Korea</strong>, has successfully laundered the majority of the <strong data-start="1961" data-end="2003">funds stolen from Bybit on February 21</strong>. Only <strong data-start="2010" data-end="2025">156,500 ETH</strong> remains to be moved, which is expected to happen <strong data-start="2075" data-end="2105">within the next three days</strong>.</p>
<hr />
<p data-start="2110" data-end="2458"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="2110" data-end="2458">The <strong data-start="2114" data-end="2121">FBI</strong> has flagged <strong data-start="2134" data-end="2159">51 Ethereum addresses</strong>, while <strong data-start="2167" data-end="2179">Elliptic</strong> has identified <strong data-start="2195" data-end="2227">over 11,000 wallet addresses</strong> connected to the hackers. <strong data-start="2254" data-end="2269">Chainalysis</strong> reports that the attackers have converted portions of the stolen Ether into <strong data-start="2346" data-end="2392">Bitcoin (BTC), Dai (DAI), and other assets</strong> using <strong data-start="2399" data-end="2455">DEXs, cross-chain bridges, and instant swap services</strong>.</p>
<p data-start="2110" data-end="2458"><img decoding="async" class="aligncenter wp-image-149945 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/01955523-3874-73d3-8709-524c77bb80d1.jpeg" alt="" width="2234" height="462" /></p>
<h2 data-start="2460" data-end="2491">THORChain Under Fire!</h2>
<p data-start="2493" data-end="2820">Hackers have been utilizing <strong data-start="2521" data-end="2548">decentralized protocols</strong> to obscure their transactions. One of the most criticized platforms in this process has been <strong data-start="2642" data-end="2655">THORChain</strong>. Developer <strong data-start="2667" data-end="2678">“Pluto”</strong> announced they would no longer contribute to the protocol after a proposal to block North Korean hacker-linked transactions was overturned.</p>
<p data-start="2822" data-end="3010">The <strong data-start="2826" data-end="2840">Bybit hack</strong>, with a <strong data-start="2849" data-end="2865">$1.4 billion</strong> loss, is the <strong data-start="2879" data-end="2916">biggest exploit in crypto history</strong>, surpassing the <strong data-start="2933" data-end="2983">$650 million Ronin Bridge hack from March 2022</strong> by more than <strong data-start="2997" data-end="3007">double</strong>.</p>
<hr />
<p data-start="2822" data-end="3010"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hackers-resume-laundering/">Bybit Hackers Resume Laundering!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hackers-resume-laundering/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Lost Hacker Returns with New Altcoin After $60 Million Disappearance!</title>
		<link>https://coinengineer.net/blog/lost-hacker-returns-with-new-altcoin-after-60-million-disappearance/</link>
					<comments>https://coinengineer.net/blog/lost-hacker-returns-with-new-altcoin-after-60-million-disappearance/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Sun, 11 Aug 2024 09:00:48 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[ANKH]]></category>
		<category><![CDATA[AnubisDAO]]></category>
		<category><![CDATA[hacker]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=26421</guid>

					<description><![CDATA[<p>Self-Proclaimed Hacker Makes a Comeback: New Altcoin Sees 153% Surge! After being off the radar since 2021, a self-proclaimed hacker has launched a new altcoin today. This surprising move has led to a 153% increase in the altcoin&#8217;s price. The development has caught the attention of investors and crypto enthusiasts alike. Stay tuned for more</p>
<p>The post <a href="https://coinengineer.net/blog/lost-hacker-returns-with-new-altcoin-after-60-million-disappearance/">Lost Hacker Returns with New Altcoin After $60 Million Disappearance!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Self-Proclaimed Hacker Makes a Comeback: New Altcoin Sees 153% Surge! After being off the radar since 2021, a self-proclaimed hacker has launched a new altcoin today. This surprising move has led to a 153% increase in the altcoin&#8217;s price. The development has caught the attention of investors and crypto enthusiasts alike. Stay tuned for more details and updates on this intriguing situation!</p>
<p>The infamous hacker Anubis has resurfaced after a three-year hiatus, introducing a new token that has already shown a staggering 153-fold increase in value. Initially launched with just 2 <a href="https://coinengineer.net/blog/ripple-begins-beta-testing-ripple-usd-on-xrpl-and-ethereum/"><strong>ETH</strong> </a>in liquidity, the token has quickly gained attention within the cryptocurrency community.</p>
<h2><strong>New Token: ANKH</strong></h2>
<p>The new token, named ANKH, has rapidly gained popularity among investors. However, caution is advised with this token due to the hacker&#8217;s previous history of disappearing with investors&#8217; ETH in past projects.</p>
<h3><strong>Leaked Seed Phrase and Security Concerns</strong></h3>
<p>The launch of the token has already been marred by a security scandal. There are claims that the seed phrase for the ANKH contract address has been leaked, allowing anyone with access to it to mint additional <strong>ANKH</strong> tokens, potentially driving the token’s value to zero.</p>
<h4><strong>Past Scandal: AnubisDAO</strong></h4>
<p>n 2021, Anubis made headlines with the <strong>AnubisDAO</strong> project. This project faced allegations from investors claiming they were defrauded of a total of 60 million USD in ETH. Marketed as a decentralized reserve currency supported by bond sales and liquidity provider fees, AnubisDAO managed to attract significant investment through its Discord servers and active Twitter accounts, despite lacking a website.</p>
<p>&nbsp;</p>
<blockquote><p><strong><a href="https://coinengineer.net/blog/pyth-network-launches-express-relay-to-combat-mev-in-defi/">READ: Pyth Network Launches Express Relay to Combat MEV in DeFi.</a></strong></p></blockquote>
<p>&nbsp;</p>
<p>On October 28, 2021, AnubisDAO launched a token sale on the Copper platform. Participants exchanged ETH for ANKH tokens, raising 60 million dollars in ETH in less than 24 hours. However, just twenty hours after the sale, a shocking event occurred where 13,597 ETH was mysteriously withdrawn from the token sale pool and transferred to an unknown address.</p>
<p><strong>Conclusion and Investment Warning</strong></p>
<p>The developments surrounding the ANKH token and the previous scandal highlight significant risks for investors. It is crucial to consider these factors before making any investment decisions.</p>
<p>This article does not constitute investment advice</p>
<p>The post <a href="https://coinengineer.net/blog/lost-hacker-returns-with-new-altcoin-after-60-million-disappearance/">Lost Hacker Returns with New Altcoin After $60 Million Disappearance!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/lost-hacker-returns-with-new-altcoin-after-60-million-disappearance/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/09/hacker3-e1693553231270.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/09/hacker3-e1693553231270.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Hacker Launders 1100 ETH Through Tornado Cash</title>
		<link>https://coinengineer.net/blog/hacker-launders-1100-eth-through-tornado-cash/</link>
					<comments>https://coinengineer.net/blog/hacker-launders-1100-eth-through-tornado-cash/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 07 May 2024 14:30:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[ban]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[laundering]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[poloniex]]></category>
		<category><![CDATA[privacy]]></category>
		<category><![CDATA[Samurai Wallet]]></category>
		<category><![CDATA[tornado cash]]></category>
		<category><![CDATA[USA]]></category>
		<guid isPermaLink="false">https://coinengineer.io/?p=19837</guid>

					<description><![CDATA[<p>The hacker(s) who hacked the Poloniex exchange nearly 6 months ago have laundered 1100 ETH, worth $3.3 million, by sending it to the mixing app Tornado Cash in the early hours of this morning. The hacker(s), who had not moved the ETH for a long time, sent the ETH to Tornado Cash in batches of</p>
<p>The post <a href="https://coinengineer.net/blog/hacker-launders-1100-eth-through-tornado-cash/">Hacker Launders 1100 ETH Through Tornado Cash</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The hacker(s) who hacked the Poloniex exchange nearly 6 months ago have laundered 1100 ETH, worth $3.3 million, by sending it to the mixing app Tornado Cash in the early hours of this morning.</p>
<p>The hacker(s), who had not moved the <strong><a href="https://coinengineer.net/blog/whale-who-accumulated-ethereum-from-last-years-dip-starts-selling-on-binance/">ETH</a></strong> for a long time, sent the ETH to Tornado Cash in batches of 100. Experts believe that the Lazarus Group, which is linked to North Korea, is behind the attack and theft. The fact that the attackers have not responded to any of Poloniex&#8217;s reward offers so far further strengthens this possibility.</p>
<p>The Lazarus Group made a name for itself in 2022 with the Ronin Network attack, stealing $600 million worth of cryptocurrency.</p>
<p>The US banned Tornado Cash last year, citing its use in laundering funds from attacks to support North Korea&#8217;s nuclear weapons program. A Tornado Cash developer was also arrested in the Netherlands last year for this reason.</p>
<p>The cryptocurrency world argues that applications like Tornado Cash protect privacy, a human right, and should not be banned.</p>
<p>The US recently arrested the developers and founders of Samurai Wallet for similar reasons.</p>
<p>The post <a href="https://coinengineer.net/blog/hacker-launders-1100-eth-through-tornado-cash/">Hacker Launders 1100 ETH Through Tornado Cash</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/hacker-launders-1100-eth-through-tornado-cash/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/05/hacker.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>KyberSwap Hacker Shocked Community!</title>
		<link>https://coinengineer.net/blog/kyberswap-hacker-community-shocked/</link>
					<comments>https://coinengineer.net/blog/kyberswap-hacker-community-shocked/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 30 Nov 2023 19:05:40 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[20 million stolen]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[kyberswap]]></category>
		<category><![CDATA[kyberswap hack]]></category>
		<category><![CDATA[kyberswap hack 20 million]]></category>
		<category><![CDATA[kyberswap hack comment]]></category>
		<category><![CDATA[kyberswap hack effect]]></category>
		<category><![CDATA[kyberswap hacker]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=7513</guid>

					<description><![CDATA[<p>The KyberSwap hacking community shocked everyone! The hacker has rocked the crypto community with his audacious demands for the return of the stolen funds. In an unprecedented move, the hacker is demanding full administrative control over the Kyber company and the KyberDAO management mechanism, all company documents and assets, and a large payment to the</p>
<p>The post <a href="https://coinengineer.net/blog/kyberswap-hacker-community-shocked/">KyberSwap Hacker Shocked Community!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The KyberSwap hacking community shocked everyone! The hacker has rocked the crypto community with his audacious demands for the return of the stolen funds. In an unprecedented move, the hacker is demanding full administrative control over the Kyber company and the KyberDAO management mechanism, all company documents and assets, and a large payment to the company&#8217;s administrators.</p>
<p>In an ambitious on-chain message, the hacker laid out his vision for transforming <a href="https://kyberswap.com/" target="_blank" rel="noopener">KyberSwap</a>. They are promising to overhaul the entire platform, something that will elevate it from its current position as the 7th most popular decentralized exchange (DEX) to a groundbreaking cryptographic project. They claim that liquidity providers will get their rewards for their market-making efforts.</p>
<p><strong>You might also like: <a href="https://coinengineer.net/blog/what-is-yearn-finance-yfi/" target="_blank" rel="noopener">What is Yearn Finance?</a></strong></p>
<p>While some people view the hacker’s demands as a desperate attempt to legitimize their actions, others are concerned that this sets a dangerous precedent for the future of decentralized finance (DeFi). There are doubts about claims that the hacker has a better plan than the current management of the platform, and the threat of invalidating the “agreement” if any legal action is taken has raised concerns about the hacker’s intentions.</p>
<p>The KyberSwap team has yet to respond to the hacker’s demands, but the pressure is mounting. The deadline of December 10th is approaching and the fate of KyberSwap remains uncertain. Even while the hacker holds the stolen funds, and has the power to disrupt the platform’s operations.</p>
<p>The post <a href="https://coinengineer.net/blog/kyberswap-hacker-community-shocked/">KyberSwap Hacker Shocked Community!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/kyberswap-hacker-community-shocked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/11/tempory-109.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/11/tempory-109.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Hacker Responded: Be Civil!</title>
		<link>https://coinengineer.net/blog/hacker-responded-be-civil/</link>
					<comments>https://coinengineer.net/blog/hacker-responded-be-civil/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 29 Nov 2023 16:38:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[kyberswap hack]]></category>
		<category><![CDATA[kyberswap hack 20 million]]></category>
		<category><![CDATA[kyberswap hack comment]]></category>
		<category><![CDATA[kyberswap hack effect]]></category>
		<category><![CDATA[kyberswap hacker]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=7431</guid>

					<description><![CDATA[<p>Hacker Responded: Be Civil! In a shocking development, the hacker behind the $46 million crypto theft against KyberSwap gave an ultimatum to the exchange&#8217;s managers and token holders, demanding a more civil negotiation tone. He threatened to delay negotiations until everyone was “more civil” and threw a shadow of uncertainty on the fate of the</p>
<p>The post <a href="https://coinengineer.net/blog/hacker-responded-be-civil/">Hacker Responded: Be Civil!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hacker Responded: Be Civil! In a shocking development, the hacker behind the <strong>$46 million</strong> crypto theft against KyberSwap gave an ultimatum to the exchange&#8217;s managers and token holders, demanding a more civil negotiation tone. He threatened to delay negotiations until everyone was <strong>“more civil”</strong> and threw a shadow of uncertainty on the fate of the stolen funds.</p>
<p>The hacker’s latest message came in response to the reward deal initially suggested by <strong>KyberSwap</strong>. Under that agreement, the hacker would return <strong>90% of the stolen funds</strong> and keep the remaining <strong>10%</strong>. However, <strong>KyberSwap</strong> responded with the threat of legal action if the attacker did not comply immediately.</p>
<figure class="wp-caption alignnone" style="width: 1008px;"><img loading="lazy" decoding="async" src="https://pbs.twimg.com/media/GADuHCFWkAEngDb?format=jpg&amp;name=medium" alt="Image" width="1008" height="365" /></figure>
<p>Undeterred by <strong>KyberSwap&#8217;s</strong> threats, the hacker continued to challenge, stating they would be willing to negotiate if treated with respect. The attacker proposed a new deal with <strong>KyberSwap</strong> to be announced on <strong>November 30th</strong>, but cautioned it <strong>would not be published</strong> if the hostility continued.</p>
<p><strong>You may be interested: <a href="https://coinengineer.net/blog/chainlink-upgrades-staking-mechanism/" target="_blank" rel="noopener">New Mechanism from Chainlink!</a></strong></p>
<p>This latest development sent shockwaves through the <strong>cryptocurrency</strong> community as the fate of the stolen funds remained up in the air. The hacker&#8217;s demands for a more civil negotiation tone may signal a desire to reach a friendly resolution, but insistence on legal action by the KyberSwap team could escalate the situation further.</p>
<p>As negotiations continue, the cryptocurrency community watches with bated breath, hoping for a solution that will see the stolen funds returned to their rightful owners. However, as both sides continue to stand their ground, the outcome remains uncertain.</p>
<p>The post <a href="https://coinengineer.net/blog/hacker-responded-be-civil/">Hacker Responded: Be Civil!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/hacker-responded-be-civil/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/11/tempory-99.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/11/tempory-99.jpg' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
