<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Lazarus group Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/lazarus-group/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/lazarus-group/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 04 Nov 2025 12:03:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Lazarus group Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/lazarus-group/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Was the Balancer DEX Hack Prepared Months in Advance?</title>
		<link>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/</link>
					<comments>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 04 Nov 2025 13:30:53 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[balancer]]></category>
		<category><![CDATA[Balancer hack]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[DEX exploit]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=55990</guid>

					<description><![CDATA[<p>An experienced attacker stole $116 million from Balancer DEX on Monday after months of preparation. On-chain data shows the attacker used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance. Details of the Attack and Preparation Blockchain analyses show the attacker funded their account stealthily with</p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="57" data-end="320">An experienced attacker stole $116 million from <strong>Balancer <a href="https://coinengineer.net/blog/balancer-hack-stolen-funds-moved-to-unknown-asset/">DEX</a></strong> on Monday after months of preparation. On-chain data shows the <strong>attacker</strong> used Tornado Cash and sophisticated methods to move funds without leaving traces, indicating the operation was planned in advance.</p>
<h2 data-start="322" data-end="362">Details of the Attack and Preparation</h2>
<p data-start="364" data-end="998">Blockchain analyses show the attacker funded their account stealthily with small 0.1 ETH transfers through Tornado Cash to avoid detection. Coinbase executive Conor Grogan said the attacker stored at least 100 ETH in Tornado Cash smart contracts and that those funds may link to earlier hacks. Grogan stated, “Hacker seems experienced: seeded the account with 100 <strong>ETH</strong> and operated with 0.1 ETH Tornado Cash transfers. No opsec leaks.” This behavior clearly points to a professional actor who prepared ahead of time. Balancer announced it would offer a 20% white‑hat bounty if the stolen funds were returned in full (minus the reward).</p>
<h2 data-start="1061" data-end="1099">What Makes the Balancer Hack Unique</h2>
<p data-start="138" data-end="470">Deddy Lavid, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<p data-start="138" data-end="470">, co‑founder and CEO of blockchain security firm Cyvers, called the Balancer exploit one of the most sophisticated attacks of 2025. The attackers bypassed access control layers to manipulate asset balances directly. This represents a critical failure in operational governance rather than a flaw in core protocol logic.</p>
<p data-start="472" data-end="655">Lavid also warned that static code audits are no longer enough. He urged platforms to implement continuous, real‑time monitoring to detect suspicious flows before funds are drained.</p>
<h2 data-start="1628" data-end="1681">Lazarus Group and Long‑Term Preparation Strategies</h2>
<p data-start="1683" data-end="2246">Similarly, North Korean group <strong>Lazarus</strong> reportedly paused illicit activity for months before the Bybit hack. Chainalysis data showed a sharp decline in cybercriminal activity after July 1, 2024, which experts interpreted as regrouping to identify new targets and probe infrastructure.</p>
<p data-start="1683" data-end="2246">In the Bybit incident, attackers laundered the $1.4 billion through THORChain within 10 days. That operation demonstrates how months‑long stealth and preparation can precede large, professionally executed exploits—parallels that highlight the seriousness of the Balancer incident.</p>
<h2 data-start="2248" data-end="2285">Recommendations for Balancer Users</h2>
<p data-start="2287" data-end="2609">Store crypto assets only in trusted wallets and avoid moving large sums in single transactions. Be aware that using Tornado Cash and similar mixers can draw attention from professional attackers and investigators, and consider employing multi‑layer security practices to reduce exposure to sophisticated on‑chain exploits.</p>
<p data-start="2287" data-end="2609"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/">Was the Balancer DEX Hack Prepared Months in Advance?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/balancer-dex-hack-116m-expert-attacker/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit Hack Aftermath: Greece Freezes Crypto Assets!</title>
		<link>https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/</link>
					<comments>https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 10 Jul 2025 11:13:47 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AML Greece]]></category>
		<category><![CDATA[blockchain analytics]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[CeFi security]]></category>
		<category><![CDATA[crypto asset seizure]]></category>
		<category><![CDATA[crypto freeze]]></category>
		<category><![CDATA[Crypto Regulation]]></category>
		<category><![CDATA[Crypto-laundering]]></category>
		<category><![CDATA[cybercrime fight]]></category>
		<category><![CDATA[DeFi TVL]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[North Korea cyberattack]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<category><![CDATA[TRM Labs]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=45851</guid>

					<description><![CDATA[<p>Greece officially froze crypto assets linked to the $1.46 billion Bybit hack that occurred in February 2025. This move marks the country’s first-ever asset freeze targeting cryptocurrencies. The Greek AML authority carried out the operation in collaboration with Chainalysis.  The Bybit hack was executed by Lazarus, a North Korea-linked cybercrime group. The FBI labeled the</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/">Bybit Hack Aftermath: Greece Freezes Crypto Assets!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c><strong>Greece</strong> officially froze crypto assets linked to the <strong>$1.46 billion</strong> <a href="https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/"><strong>Bybit hack</strong></a> that occurred in February 2025. This move marks the country’s first-ever asset freeze targeting cryptocurrencies. The <strong>Greek AML</strong> authority carried out the operation in collaboration with Chainalysis.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>The Bybit hack was executed by <strong>Lazarus</strong>, a North Korea-linked cybercrime group. The FBI labeled the incident as the “<strong>TraderTraitor”</strong> operation. The stolen amount surpassed all North Korea-related cyber thefts in 2024.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Lazarus’s “Flood the Zone” Tactic Exposed</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>After the attack, <a href="https://coinengineer.net/blog/bybit-declares-war-on-lazarus-group/"><strong>Lazarus</strong></a> rapidly laundered the stolen funds through multidirectional, high-frequency transactions. This method, called “flood the zone” by TRM Labs, aims to overwhelm exchange compliance teams and <strong>blockchain analytics</strong> firms.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>TRM Labs stated, “This tactic involves intense, simultaneous transfers designed to drown regulators and analysts. The <strong>Bybit hack</strong> clearly showed an increased use of this method.” This reveals significant security gaps in the digital asset ecosystem.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Meanwhile, <strong>Chainalysis</strong> experts traced suspicious wallets linked to a local crypto exchange in Greece. As a result, the assets held by the exchange were frozen. This step underlines the critical role of international cooperation in fighting crypto crimes.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>A New Chapter in Global Crypto Regulation</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>Greek Finance Minister Kyriakos Pierrakakis commented on the case:</span> <span data-c>“Thanks to blockchain’s traceability, international cooperation can stop financial crimes.”</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>This operation may inspire similar actions in countries like South Korea and the U.S. Centralized exchanges such as <strong>Bybit</strong> must strengthen security after such attacks. The rise in investments across <strong>DeFi and CeFi</strong> platforms makes this increasingly important. According to <a href="https://defillama.com/"><strong>DeFiLlama</strong></a>, the total value locked (TVL) reached <strong>$121 billion</strong> in July 2025.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>This development highlights cybersecurity as a top priority in crypto markets. Moreover, blockchain’s transparency enables more effective combat against cybercrime.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/">Bybit Hack Aftermath: Greece Freezes Crypto Assets!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-hack-aftermath-greece-freezes-crypto-assets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-17T000247.642.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>$244M Lost To Crypto Hacks In May Despite 40% Drop In Attacks</title>
		<link>https://coinengineer.net/blog/244m-lost-to-crypto-hacks-in-may-despite-40-drop-in-attacks/</link>
					<comments>https://coinengineer.net/blog/244m-lost-to-crypto-hacks-in-may-despite-40-drop-in-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 01 Jun 2025 14:00:53 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[binance]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[Bybit breach]]></category>
		<category><![CDATA[Cetus exploit]]></category>
		<category><![CDATA[cork protocol]]></category>
		<category><![CDATA[crypto cybercrime]]></category>
		<category><![CDATA[crypto exchange attacks]]></category>
		<category><![CDATA[crypto hacks]]></category>
		<category><![CDATA[Crypto Risk]]></category>
		<category><![CDATA[Dedaub]]></category>
		<category><![CDATA[DeFi vulnerabilities]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[May 2025 crypto losses]]></category>
		<category><![CDATA[PeckShield report]]></category>
		<category><![CDATA[sui network]]></category>
		<category><![CDATA[wstETH]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43567</guid>

					<description><![CDATA[<p>According to blockchain security firm PeckShield, around $244.1 million was lost in 20 major crypto hacks during May 2025 — a 39% drop compared to April. However, the decline doesn’t paint a full picture, as one attack alone accounted for nearly $223 million in damages. The biggest blow came on May 22, when Cetus, a</p>
<p>The post <a href="https://coinengineer.net/blog/244m-lost-to-crypto-hacks-in-may-despite-40-drop-in-attacks/">$244M Lost To Crypto Hacks In May Despite 40% Drop In Attacks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="3462" data-end="3752">According to blockchain security firm <strong data-start="3500" data-end="3514">PeckShield</strong>, around $244.1 million was lost in 20 major crypto hacks during May 2025 — a 39% drop compared to April. However, the decline doesn’t paint a full picture, as one attack alone accounted for nearly $223 million in damages.</p>
<p data-start="3754" data-end="4049">The biggest blow came on May 22, when <strong data-start="3796" data-end="3805">Cetus</strong>, a decentralized exchange, was compromised. Hackers exploited a flaw in the <em>“most significant bits”</em> (MSB) check, manipulating liquidity parameters and creating disproportionately large positions, according to cybersecurity firm <strong data-start="4038" data-end="4048">Dedaub</strong>.</p>
<hr />
<p data-start="4051" data-end="4205"><em>You Might Be Interested In: <span style="color: #0000ff;"><a style="color: #0000ff;" href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></span></em></p>
<hr />
<p data-start="4051" data-end="4205">In a partial win for the ecosystem, <strong data-start="4087" data-end="4096">Cetus</strong> and the <strong data-start="4105" data-end="4120">Sui Network</strong> managed to freeze $157 million, representing about 71% of the stolen assets.</p>
<p data-start="4051" data-end="4205"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-157358 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/06/kripto-hack.png" alt="kripto, hack" width="770" height="550" /></p>
<h2 data-start="4212" data-end="4249">DeFi Platforms Remain Under Siege</h2>
<p data-start="4251" data-end="4461">The second-largest incident in May targeted the <strong data-start="4299" data-end="4316">Cork Protocol</strong>, resulting in a $12 million loss. Attackers stole approximately 3,761 Wrapped Staked Ether (wstETH) and quickly converted it to <strong data-start="4453" data-end="4460">ETH</strong>.</p>
<p data-start="4463" data-end="4493">Other major breaches included:</p>
<ul>
<li data-start="4497" data-end="4551">A suspected North Korea-linked $5.2 million hack</li>
<li data-start="4554" data-end="4603">An <strong data-start="4557" data-end="4570">MBU token</strong> exploit worth $2.2 million</li>
<li data-start="4606" data-end="4683">A <strong data-start="4608" data-end="4631">MapleStory Universe</strong> vulnerability that led to a $1.2 million loss</li>
</ul>
<p data-start="4685" data-end="5045">Amid growing pressure, the crypto industry is boosting its defense posture. On May 31, <strong data-start="4772" data-end="4789">Cointelegraph</strong> reported that <strong data-start="4804" data-end="4816">BitMEX’s</strong> security team identified operational gaps within the <strong data-start="4870" data-end="4887">Lazarus Group</strong>, a state-sponsored North Korean hacker unit. The counter-operation exposed key infrastructure elements like IP addresses, databases, and tracking algorithms.</p>
<p data-start="5047" data-end="5270">Despite the dip in May, earlier months were worse. In Q1 2025 alone, hackers stole over $1.63 billion, with <strong data-start="5159" data-end="5170">Bybit</strong>’s February breach accounting for $1.53 billion — one of the most severe crypto thefts in history.</p>
<hr />
<p data-start="5047" data-end="5270"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <span style="color: #0000ff;"><a href="https://t.me/coinengineernews">Telegram</a><span style="color: #000000;">,</span> <a style="color: #0000ff;" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a></span><span style="color: #000000;">,</span> and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><span style="color: #0000ff;">Twitter</span></a> channels for the latest<span style="color: #0000ff;"> <a style="color: #0000ff;" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a></span> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/244m-lost-to-crypto-hacks-in-may-despite-40-drop-in-attacks/">$244M Lost To Crypto Hacks In May Despite 40% Drop In Attacks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/244m-lost-to-crypto-hacks-in-may-despite-40-drop-in-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>G7 Summit to Address North Korea’s Crypto Thefts! </title>
		<link>https://coinengineer.net/blog/g7-summit-2025-north-korea-crypto-thefts/</link>
					<comments>https://coinengineer.net/blog/g7-summit-2025-north-korea-crypto-thefts/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Thu, 08 May 2025 09:45:09 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[Alberta Canada]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Chainalysis]]></category>
		<category><![CDATA[crypto exchanges]]></category>
		<category><![CDATA[crypto regulations]]></category>
		<category><![CDATA[Crypto Theft]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[G7 Summit]]></category>
		<category><![CDATA[global finance]]></category>
		<category><![CDATA[international cooperation]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[nuclear weapons]]></category>
		<category><![CDATA[siber attacks]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41917</guid>

					<description><![CDATA[<p>North Korea is threatening global finance with crypto thefts. The G7 Summit, to be held in Alberta, Canada, in June 2025, is bringing this issue to the forefront. Leaders will discuss how Pyongyang’s cyberattacks, stealing cryptocurrencies, are funding its weapons programs.  Why Are North Korea’s Crypto Thefts Significant?  North Korea has been conducting cyberattacks on</p>
<p>The post <a href="https://coinengineer.net/blog/g7-summit-2025-north-korea-crypto-thefts/">G7 Summit to Address North Korea’s Crypto Thefts! </a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c><strong>North Korea</strong> is threatening global finance with crypto thefts. The <strong>G7 Summit</strong>, to be held in Alberta, Canada, in <strong>June 2025</strong>, is bringing this issue to the forefront. Leaders will discuss how Pyongyang’s cyberattacks, stealing <strong>cryptocurrencies</strong>, are funding its weapons programs.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Why Are North Korea’s Crypto Thefts Significant?</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>North Korea has been conducting cyberattacks on crypto exchanges for years. These attacks have now become one of the regime’s main sources of income. <strong>Since 2023</strong>, hackers have stolen billions of dollars in <strong>cryptocurrencies</strong>. These funds are supporting nuclear weapons and missile programs. <strong>G7 leaders</strong> will develop strategies to counter this threat.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>Moreover, <strong>North Korea’s hacker groups</strong> are targeting vulnerabilities in blockchain technology. Teams like the <strong>Lazarus Group</strong> are hitting exchanges with sophisticated methods. These attacks are undermining the credibility of the crypto market. The summit will seek solutions to these issues.</span></p>
<p><img decoding="async" class="alignnone wp-image-41918 size-full" src="https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-103154.png" alt="" width="973" height="631" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-103154.png 973w, https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-103154-300x195.png 300w, https://coinengineer.net/blog/wp-content/uploads/2025/05/Ekran-goruntusu-2025-05-08-103154-768x498.png 768w" sizes="(max-width: 973px) 100vw, 973px" /></p>
<h2><span data-c>What Topics Are on the Table at the G7 Summit?</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c>The summit in Canada will take place in mid-June 2025. <strong>G7 leaders</strong> will closely examine North Korea’s cyber activities. Cybersecurity measures and international cooperation are among the key topics. Leaders may propose new regulations to enhance the <strong>security of crypto exchanges</strong>. According to <a href="https://coinengineer.net/blog/tether-expands-with-kaia-blockchain-reaches-196m-users-through-line/">blockchain</a> analytics firm <a href="https://www.chainalysis.com/blog/crypto-hacking-stolen-funds-2025/"><strong>Chainalysis</strong></a>, North Korea-linked <strong>hackers</strong> carried out over <strong>$1.3 billion</strong> in hacks through <strong>47 crypto heists in 2024</strong>.</span><span data-ccp-props="{}"> </span><span data-c>However, the summit will not focus solely on North Korea. The regulation of the global crypto market will also be discussed.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>Solutions for Global Security and the Crypto Market</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>The G7 Summit</strong> could take concrete steps against North Korea’s crypto thefts. International cybersecurity agencies may strengthen their cooperation. The White House has officially claimed that <strong>North Korea</strong> uses these crypto thefts to fund destructive weapons. Additionally, <strong>crypto exchanges</strong> security protocols could be tightened. These measures will protect investors and bolster the market’s reputation.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c><strong>The G7 Summit is addressing one of the crypto world’s biggest challenges</strong>. The summit will be a significant step toward resolving this issue.</span><span data-ccp-props="{}"> </span></p>
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p><span data-ccp-props="{}"> </span></p>
<p>The post <a href="https://coinengineer.net/blog/g7-summit-2025-north-korea-crypto-thefts/">G7 Summit to Address North Korea’s Crypto Thefts! </a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/g7-summit-2025-north-korea-crypto-thefts/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-82.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-82.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>US Treasury Moves to Cut Off Huione Group Over Crypto Crime Ties</title>
		<link>https://coinengineer.net/blog/us-treasury-moves-to-cut-off-huione-group-over-crypto-crime-ties/</link>
					<comments>https://coinengineer.net/blog/us-treasury-moves-to-cut-off-huione-group-over-crypto-crime-ties/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 02 May 2025 10:30:42 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain fraud]]></category>
		<category><![CDATA[Cambodia]]></category>
		<category><![CDATA[Crypto Regulation]]></category>
		<category><![CDATA[crypto scams]]></category>
		<category><![CDATA[Crypto-laundering]]></category>
		<category><![CDATA[financial crime]]></category>
		<category><![CDATA[FinCEN]]></category>
		<category><![CDATA[Haowang Guarantee]]></category>
		<category><![CDATA[Huione Crypto]]></category>
		<category><![CDATA[Huione Group]]></category>
		<category><![CDATA[Huione Pay]]></category>
		<category><![CDATA[illicit finance]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Money laundering]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Pig Butchering]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[US Treasury]]></category>
		<category><![CDATA[USDh]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41311</guid>

					<description><![CDATA[<p>The US Treasury Department has proposed barring Cambodia-based Huione Group from accessing the US banking system, accusing the firm of facilitating crypto-related money laundering for North Korea’s Lazarus Group. In a rule proposal released on May 1, the Treasury’s Financial Crimes Enforcement Network (FinCEN) urged US banks to terminate correspondent and payable-through account services for</p>
<p>The post <a href="https://coinengineer.net/blog/us-treasury-moves-to-cut-off-huione-group-over-crypto-crime-ties/">US Treasury Moves to Cut Off Huione Group Over Crypto Crime Ties</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3040" data-end="3268">The <strong data-start="3044" data-end="3070">US Treasury Department</strong> has proposed barring <strong data-start="3092" data-end="3123">Cambodia-based Huione Group</strong> from accessing the US banking system, accusing the firm of facilitating <strong data-start="3196" data-end="3231">crypto-related money laundering</strong> for <strong data-start="3236" data-end="3267">North Korea’s Lazarus Group</strong>.</p>
<p class="" data-start="3270" data-end="3471">In a rule proposal released on <strong data-start="3301" data-end="3310">May 1</strong>, the Treasury’s <strong data-start="3327" data-end="3376">Financial Crimes Enforcement Network (FinCEN)</strong> urged US banks to terminate <strong data-start="3405" data-end="3459">correspondent and payable-through account services</strong> for Huione.</p>
<p class="" data-start="3473" data-end="3669">Deputy Treasury Secretary <strong data-start="3499" data-end="3516">Scott Bessent</strong> described Huione as the “<strong data-start="3542" data-end="3594">marketplace of choice for malicious cyber actors</strong>,” accusing it of aiding the theft of <strong data-start="3632" data-end="3668">billions from ordinary Americans</strong>.</p>
<h2 data-start="3671" data-end="3708">$4B Laundered, USDH Highlighted</h2>
<p class="" data-start="3709" data-end="3969">According to FinCEN, Huione laundered over <strong data-start="3752" data-end="3783">$4 billion in illicit funds</strong> between <strong data-start="3792" data-end="3824">August 2021 and January 2025</strong>, including at least <strong data-start="3845" data-end="3860">$36 million</strong> from crypto “<strong data-start="3874" data-end="3898">pig butchering scams</strong>” and <strong data-start="3904" data-end="3919">$37 million</strong> directly linked to <strong data-start="3939" data-end="3968">North Korean cyberattacks</strong>.</p>
<hr />
<p data-start="3971" data-end="4135"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3971" data-end="4135">Its online service <strong data-start="3990" data-end="4011">Haowang Guarantee</strong> has turned Huione into a <strong data-start="4037" data-end="4071">one-stop crypto laundering hub</strong>, offering illegal goods and converting crypto to fiat currency.</p>
<p class="" data-start="4137" data-end="4291">FinCEN also flagged Huione’s stablecoin, the <strong data-start="4182" data-end="4209">USDH (US dollar Huione)</strong>, for its <strong data-start="4219" data-end="4242">unfreezeable nature</strong>, which allegedly supports laundering operations.</p>
<p data-start="4137" data-end="4291"><img decoding="async" class="aligncenter wp-image-154832 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/abd.png" alt="us" width="937" height="468" /></p>
<h2 data-start="4293" data-end="4344">Indirect US Bank Access and Regulatory Action</h2>
<p class="" data-start="4345" data-end="4538">While Huione doesn’t hold direct accounts with US banks, FinCEN revealed it <strong data-start="4421" data-end="4471">maintains accounts with foreign intermediaries</strong> that do, giving it <strong data-start="4491" data-end="4510">indirect access</strong> to the US financial system.</p>
<p class="" data-start="4540" data-end="4664">The <strong data-start="4544" data-end="4573">National Bank of Cambodia</strong> revoked Huione’s local banking license in <strong data-start="4616" data-end="4630">March 2025</strong>, citing digital asset violations.</p>
<p class="" data-start="4666" data-end="4767">The proposed rule will undergo a <strong data-start="4699" data-end="4731">30-day public comment period</strong> before potentially being finalized.</p>
<hr />
<p data-start="4666" data-end="4767"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/us-treasury-moves-to-cut-off-huione-group-over-crypto-crime-ties/">US Treasury Moves to Cut Off Huione Group Over Crypto Crime Ties</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/us-treasury-moves-to-cut-off-huione-group-over-crypto-crime-ties/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/abd_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/abd_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</title>
		<link>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/</link>
					<comments>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 29 Apr 2025 15:00:53 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[2025 crypto hack]]></category>
		<category><![CDATA[bitcoin]]></category>
		<category><![CDATA[blockchain exploit]]></category>
		<category><![CDATA[bounty system]]></category>
		<category><![CDATA[btc]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[DeFi fund recovery]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Loopscale]]></category>
		<category><![CDATA[RateX PT]]></category>
		<category><![CDATA[sol]]></category>
		<category><![CDATA[Term Finance]]></category>
		<category><![CDATA[USDC]]></category>
		<category><![CDATA[white hat hacker]]></category>
		<category><![CDATA[WSOL]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41019</guid>

					<description><![CDATA[<p>DeFi protocol Loopscale has recovered a significant portion of the funds stolen during a major exploit over the weekend. The platform confirmed that 19,463 Wrapped SOL (WSOL) — worth around $2.88 million — was returned to its wallets as of April 28. The exploit occurred on April 26 when attackers manipulated Loopscale&#8217;s RateX PT token</p>
<p>The post <a href="https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/">Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2900" data-end="3161">DeFi protocol <strong data-start="2914" data-end="2927">Loopscale</strong> has recovered a significant portion of the funds stolen during a major exploit over the weekend. The platform confirmed that <strong data-start="3053" data-end="3082">19,463 Wrapped SOL (WSOL)</strong> — worth around <strong data-start="3098" data-end="3115">$2.88 million</strong> — was returned to its wallets as of April 28.</p>
<p class="" data-start="3163" data-end="3419">The exploit occurred on <strong data-start="3187" data-end="3199">April 26</strong> when attackers manipulated <strong data-start="3227" data-end="3251">Loopscale&#8217;s RateX PT</strong> token pricing. Approximately <strong data-start="3281" data-end="3297">$5.7 million</strong> worth of <strong data-start="3307" data-end="3315">USDC</strong> and <strong data-start="3320" data-end="3342">1,200 Solana (SOL)</strong> were drained from the protocol, accounting for about <strong data-start="3396" data-end="3403">12%</strong> of total funds.</p>
<h2 data-start="3426" data-end="3471">Hope for Settlement With White Hat Hacker</h2>
<p class="" data-start="3473" data-end="3728">After the attack, Loopscale&#8217;s team sent an onchain message to the exploiter on <strong data-start="3552" data-end="3564">April 27</strong>, offering a <strong data-start="3577" data-end="3584">10%</strong> bounty and full legal immunity in exchange for <strong data-start="3632" data-end="3639">90%</strong> of the funds. On <strong data-start="3657" data-end="3669">April 28</strong>, the attacker responded, showing willingness to negotiate.</p>
<hr />
<p data-start="3730" data-end="3866"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3730" data-end="3866">So far, <strong data-start="3738" data-end="3763">10,000 WSOL (~$1.48M)</strong> and <strong data-start="3768" data-end="3791">4,463 WSOL (~$660K)</strong> have been returned, following an earlier <strong data-start="3833" data-end="3856">5,000 WSOL (~$740K)</strong> recovery.</p>
<p data-start="3730" data-end="3866"><img loading="lazy" decoding="async" class="aligncenter wp-image-154444 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/loopscale.webp" alt="loopscale" width="780" height="803" /></p>
<h2 data-start="3873" data-end="3908">10% Bounty Offer Yields Results</h2>
<p class="" data-start="3910" data-end="4171">Recoveries like this are rare in the DeFi world. But Loopscale’s communication strategy appears to have worked. Meanwhile, <strong data-start="4033" data-end="4049">Term Finance</strong> — another Ethereum-based lending protocol — also recently recovered <strong data-start="4118" data-end="4125">$1M</strong> out of <strong data-start="4133" data-end="4142">$1.6M</strong> lost due to an oracle issue.</p>
<p class="" data-start="4173" data-end="4417">According to an April report from blockchain security firm <strong data-start="4232" data-end="4246">PeckShield</strong>, more than <strong data-start="4258" data-end="4274">$1.6 billion</strong> in crypto was stolen in Q1 2025. Of that, <strong data-start="4317" data-end="4333">$1.5 billion</strong> came from a massive attack on <strong data-start="4364" data-end="4373">Bybit</strong>, linked to North Korea’s <strong data-start="4399" data-end="4416">Lazarus Group</strong>.</p>
<hr />
<p data-start="4173" data-end="4417"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/">Loopscale Recovers $2.8M After DeFi Exploit and Bounty Talks</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/loopscale-recovers-2-8m-after-defi-exploit-and-bounty-talks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Solana&#8217;s DeFi Protocol Loopscale Halts Lending After $5.8M Hack</title>
		<link>https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/</link>
					<comments>https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 27 Apr 2025 14:00:03 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Aave]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[BONK]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[cryptocurrency theft]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[DeFi lending]]></category>
		<category><![CDATA[DeFi security]]></category>
		<category><![CDATA[JitoSOL]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Loopscale]]></category>
		<category><![CDATA[Loopscale hack]]></category>
		<category><![CDATA[Loopscale update]]></category>
		<category><![CDATA[order book model]]></category>
		<category><![CDATA[sol]]></category>
		<category><![CDATA[solana]]></category>
		<category><![CDATA[TVL]]></category>
		<category><![CDATA[USDC]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40921</guid>

					<description><![CDATA[<p>Solana-based decentralized finance (DeFi) protocol Loopscale temporarily paused its lending operations after suffering an approximately $5.8 million exploit. On April 26, a hacker siphoned around $5.7 million USDC and 1,200 SOL by executing a series of undercollateralized loans, co-founder Mary Gooneratne said. Following the attack, Loopscale announced it had re-enabled loan repayments, balance top-ups, and</p>
<p>The post <a href="https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/">Solana&#8217;s DeFi Protocol Loopscale Halts Lending After $5.8M Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="3154" data-end="3365">Solana-based decentralized finance (<strong data-start="3230" data-end="3238">DeFi</strong>) protocol <strong data-start="3249" data-end="3262">Loopscale</strong> temporarily paused its lending operations after suffering an approximately <strong data-start="3338" data-end="3354">$5.8 million</strong> exploit.</p>
<p class="" data-start="3367" data-end="3531">On April 26, a hacker siphoned around <strong data-start="3405" data-end="3426">$5.7 million USDC</strong> and <strong data-start="3431" data-end="3444">1,200 SOL</strong> by executing a series of undercollateralized loans, co-founder Mary Gooneratne said.</p>
<p class="" data-start="3533" data-end="3779">Following the attack, <strong data-start="3555" data-end="3568">Loopscale</strong> announced it had re-enabled loan repayments, balance top-ups, and loop closing. However, <em>“all other app functionalities, including Vault withdrawals, remain temporarily restricted”</em> as investigations continue.</p>
<hr />
<p data-start="3781" data-end="3947"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3781" data-end="3947">Gooneratne clarified that only the <strong data-start="3816" data-end="3824">USDC</strong> and <strong data-start="3829" data-end="3836">SOL</strong> vaults were impacted, with the losses representing about 12% of the protocol&#8217;s total value locked (<strong data-start="3936" data-end="3943">TVL</strong>).</p>
<h2 data-start="3949" data-end="4138">DeFi Sector Continues to Face Cyber Threats!</h2>
<p class="" data-start="3949" data-end="4138">The <strong data-start="4003" data-end="4016">Loopscale</strong> team emphasized that they are fully mobilized to investigate the incident, recover the stolen funds, and protect users.</p>
<p class="" data-start="4140" data-end="4441">In the first quarter of 2025, hackers stole over <strong data-start="4189" data-end="4205">$1.6 billion</strong> in cryptocurrencies from exchanges and on-chain smart contracts. Over 90% of these losses were attributed to the <strong data-start="4319" data-end="4335">$1.5 billion</strong> hack on the centralized exchange <strong data-start="4369" data-end="4378">ByBit</strong>, reportedly orchestrated by North Korea&#8217;s <strong data-start="4421" data-end="4438">Lazarus Group</strong>.</p>
<p data-start="4140" data-end="4441"><img loading="lazy" decoding="async" class="aligncenter wp-image-154293 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/loopscale.jpeg" alt="loopscale" width="1049" height="547" /></p>
<h2 data-start="4443" data-end="4654">Loopscale&#8217;s Innovative Lending Model</h2>
<p class="" data-start="4443" data-end="4654"><strong data-start="4486" data-end="4499">Loopscale</strong> officially launched on April 10 after a six-month closed beta. The platform aims to boost capital efficiency by directly matching lenders and borrowers.</p>
<p class="" data-start="4656" data-end="4781">Unlike traditional DeFi platforms like <strong data-start="4695" data-end="4703">Aave</strong>, <strong data-start="4705" data-end="4718">Loopscale</strong> operates on an order book model rather than liquidity pools.</p>
<p class="" data-start="4783" data-end="5031">Its main <strong data-start="4792" data-end="4800">USDC</strong> and <strong data-start="4805" data-end="4812">SOL</strong> vaults currently offer annual percentage rates (<strong data-start="4861" data-end="4869">APRs</strong>) exceeding 5% and 10%, respectively. It also supports lending markets for tokens such as <strong data-start="4959" data-end="4970">JitoSOL</strong>, <strong data-start="4972" data-end="4980">BONK</strong>, and looping strategies for over 40 token pairs.</p>
<p class="" data-start="5033" data-end="5178"><strong data-start="5033" data-end="5046">Loopscale</strong> holds approximately <strong data-start="5067" data-end="5082">$40 million</strong> in total value locked and has attracted over 7,000 lenders, according to researcher OurNetwork.</p>
<hr />
<p data-start="5033" data-end="5178"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/">Solana&#8217;s DeFi Protocol Loopscale Halts Lending After $5.8M Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/solanas-defi-protocol-loopscale-halts-lending-after-5-8m-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/04/loopscale-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target Crypto Devs!</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Fri, 25 Apr 2025 09:00:24 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI deception]]></category>
		<category><![CDATA[Angeloper]]></category>
		<category><![CDATA[BlockNovas]]></category>
		<category><![CDATA[crypto developers]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[crypto wallet]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[fake companies]]></category>
		<category><![CDATA[FBI]]></category>
		<category><![CDATA[hacker threat]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[metamask]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[SoftGlide]]></category>
		<category><![CDATA[Web3 threats]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40808</guid>

					<description><![CDATA[<p>A subgroup of Lazarus, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to infect developers with malware. According to Silent Push, these shell companies—BlockNovas, Angeloper Agency, and SoftGlide—are part of a campaign to lure developers through fraudulent job interviews. You Might Be Interested In: Elon Musk</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2705" data-end="3075">A <strong data-start="2707" data-end="2730">subgroup of Lazarus</strong>, the North Korean state-linked hacker collective, has been exposed for setting up three fake crypto consulting firms to <strong data-start="2851" data-end="2885">infect developers with malware</strong>. According to <strong data-start="2900" data-end="2915">Silent Push</strong>, these shell companies—<strong data-start="2939" data-end="2953">BlockNovas</strong>, <strong data-start="2955" data-end="2975">Angeloper Agency</strong>, and <strong data-start="2981" data-end="2994">SoftGlide</strong>—are part of a campaign to lure developers through <strong data-start="3045" data-end="3074">fraudulent job interviews</strong>.</p>
<hr />
<p data-start="3077" data-end="3333"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3077" data-end="3333">Two of these companies are even <strong data-start="3109" data-end="3143">legally registered in the U.S.</strong>, adding a layer of legitimacy. During the interview, applicants receive a fake error message while trying to record a video, leading them to copy-paste a fix that actually installs malware.</p>
<h2 data-start="3335" data-end="3390">Malware Targets Wallet Keys and Clipboard Data</h2>
<p class="" data-start="3391" data-end="3692">The campaign utilizes three malware strains: <strong data-start="3436" data-end="3450">BeaverTail</strong>, <strong data-start="3452" data-end="3471">InvisibleFerret</strong>, and <strong data-start="3477" data-end="3493">Otter Cookie</strong>. While <strong data-start="3501" data-end="3515">BeaverTail</strong> is designed for initial compromise and further payload delivery, <strong data-start="3581" data-end="3597">Otter Cookie</strong> and <strong data-start="3602" data-end="3621">InvisibleFerret</strong> focus on extracting <strong data-start="3642" data-end="3664">crypto wallet keys</strong> and <strong data-start="3669" data-end="3691">clipboard contents</strong>.</p>
<p class="" data-start="3694" data-end="4003">Silent Push also discovered that hackers are using <strong data-start="3745" data-end="3768">AI-generated images</strong> and <strong data-start="3773" data-end="3795">stolen real photos</strong> to create fake employee profiles for the companies, boosting credibility. Analyst <strong data-start="3878" data-end="3894">Zach Edwards</strong> noted that some images were subtly altered using AI tools to resemble the original person but appear unique.</p>
<p class="" data-start="4005" data-end="4273">The campaign has been active <strong data-start="4034" data-end="4048">since 2024</strong>, and <strong data-start="4054" data-end="4081">at least two developers</strong> were directly affected—one of whom had their <strong data-start="4127" data-end="4158">MetaMask wallet compromised</strong>. The <strong data-start="4164" data-end="4171">FBI</strong> has since shut down <strong data-start="4192" data-end="4206">BlockNovas</strong>, but <strong data-start="4212" data-end="4225">SoftGlide</strong> and other parts of the operation remain online.</p>
<p data-start="4005" data-end="4273"><img loading="lazy" decoding="async" class="aligncenter wp-image-154152 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/kuzey-kore.jpg" alt="Kuzey Kore" width="899" height="387" /></p>
<hr />
<p data-start="4005" data-end="4273"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/">North Korean Hackers Target Crypto Devs!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Big Bet from ZachXBT on Whale in Hyperliquid!</title>
		<link>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/</link>
					<comments>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Tue, 18 Mar 2025 14:00:07 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin short]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[Chainlink short]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[Crypto Investigation]]></category>
		<category><![CDATA[crypto market]]></category>
		<category><![CDATA[crypto whale]]></category>
		<category><![CDATA[cybercriminal]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[decentralized finance]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[Ethereum short]]></category>
		<category><![CDATA[GMX]]></category>
		<category><![CDATA[Hyperliquid]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[leverage trading]]></category>
		<category><![CDATA[Leveraged Trading]]></category>
		<category><![CDATA[Lookonchain]]></category>
		<category><![CDATA[stolen funds]]></category>
		<category><![CDATA[ZachXBT]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38634</guid>

					<description><![CDATA[<p>The famous on-chain investigator has exposed the much-discussed Hyperliquid whale. Allegedly, the whale has made $9 million in profits using stolen funds. A major development has shaken the crypto investment world. Well-known on-chain investigator ZachXBT has claimed that the so-called &#8220;Hyperliquid whale,&#8221; who trades with 50x leverage on the Hyperliquid exchange, is in fact a</p>
<p>The post <a href="https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/">Big Bet from ZachXBT on Whale in Hyperliquid!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="203" data-end="365">The famous on-chain investigator has exposed the much-discussed Hyperliquid whale. Allegedly, the whale has made $9 million in profits using stolen funds.</p>
<p data-start="367" data-end="640">A major development has shaken the crypto investment world. Well-known on-chain investigator <strong data-start="460" data-end="471">ZachXBT</strong> has claimed that the so-called &#8220;Hyperliquid whale,&#8221; who trades with 50x leverage on the Hyperliquid exchange, is in fact <strong data-start="593" data-end="639">a cybercriminal gambling with stolen funds</strong>.</p>
<p data-start="642" data-end="1043">This whale managed to survive liquidation attempts by crypto investors and secured an impressive <strong data-start="739" data-end="753">$9 million</strong> in net profit. <strong data-start="769" data-end="780">ZachXBT</strong> emphasized that this whale <strong data-start="808" data-end="869">has no connection to the North Korea-backed Lazarus Group</strong>. Earlier this year, in February 2025, ZachXBT had linked the <strong data-start="931" data-end="958">$1.5 billion Bybit hack</strong> to that hacker collective. Now, he has followed the trail to this Hyperliquid whale.</p>
<h2 data-start="1050" data-end="1121">&#8220;Crypto Twitter Is Speculating, But the Truth Is More Sinister&#8221;</h2>
<p data-start="1123" data-end="1309">ZachXBT made the following statement on X (Twitter):</p>
<p data-start="1123" data-end="1309"><em>“It’s funny watching CT speculate on the ‘Hyperliquid whale’ when in reality it’s just a cybercriminal gambling with stolen funds.”</em></p>
<p data-start="1311" data-end="1452">Responding to a follower&#8217;s question regarding potential ties to the Lazarus Group, ZachXBT replied:</p>
<p data-start="1311" data-end="1452"><em>“No, there’s no connection to Lazarus.”</em></p>
<p data-start="1454" data-end="1627">Some users asked ZachXBT to reveal the whale’s identity. However, he responded by saying:</p>
<p data-start="1454" data-end="1627"><em>“We’ll see, it’s just not enjoyable posting investigations on X/Twitter anymore.”</em></p>
<p data-start="1454" data-end="1627"><img loading="lazy" decoding="async" class="aligncenter wp-image-151335 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/zachxbt.png" alt="zachxbt" width="882" height="822" /></p>
<h2 data-start="1634" data-end="1680">Failed Attempts to Liquidate the Whale</h2>
<p data-start="1682" data-end="1912">For weeks, the crypto market has speculated about <strong data-start="1732" data-end="1794">who the Hyperliquid whale is and how they could be stopped</strong>. The whale had opened <strong data-start="1817" data-end="1884">40x and 50x short positions on Bitcoin (BTC) and Ethereum (ETH)</strong>, drawing massive attention.</p>
<hr />
<p data-start="1914" data-end="2287"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1914" data-end="2287">The whale notably opened a <strong data-start="1941" data-end="1979">$450 million short position on BTC</strong>, which triggered a major reaction across the market. Traders attempted to counter this by aggressively buying up BTC, trying to force a liquidation. However, they ultimately failed. According to <strong data-start="2175" data-end="2190">Lookonchain</strong>, the whale deposited an additional <strong data-start="2226" data-end="2245">$5 million USDC</strong> to increase margin and avoid liquidation.</p>
<p data-start="2289" data-end="2441">Aside from BTC and ETH, the whale also opened a <strong data-start="2337" data-end="2387">$31 million short position on Chainlink (LINK)</strong> with 10x leverage and placed short orders on <strong data-start="2433" data-end="2440">GMX</strong>.</p>
<h2 data-start="2448" data-end="2530">A Major Threat in the Crypto Market: Stolen Funds and High-Leverage Trades</h2>
<p data-start="2532" data-end="2831">ZachXBT’s comments have reignited concerns about <strong data-start="2581" data-end="2668">stolen funds re-entering circulation through decentralized finance (DeFi) protocols</strong>. The situation also highlights how <strong data-start="2704" data-end="2781">cybercriminals exploit high-leverage trading to gamble with illicit funds</strong>, posing a significant risk to the overall market.</p>
<p data-start="2833" data-end="3040">While the true identity of this whale remains undisclosed, the broader question for the crypto ecosystem is how to address these <strong data-start="2962" data-end="3039">high-risk scenarios and prevent bad actors from destabilizing the markets</strong>.</p>
<hr />
<p data-start="2833" data-end="3040"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/">Big Bet from ZachXBT on Whale in Hyperliquid!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/big-bet-from-zachxbt-on-whale-in-hyperliquid/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/11/ZachXBT.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/11/ZachXBT.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Kaito AI and Founder Yu Hu’s X Accounts Hacked!</title>
		<link>https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/</link>
					<comments>https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 16 Mar 2025 10:00:32 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[Canada scam]]></category>
		<category><![CDATA[CanCap scam]]></category>
		<category><![CDATA[crypto market]]></category>
		<category><![CDATA[crypto scam]]></category>
		<category><![CDATA[crypto security]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber crime]]></category>
		<category><![CDATA[DeFi Warhol]]></category>
		<category><![CDATA[investor safety]]></category>
		<category><![CDATA[Jupiter DAO]]></category>
		<category><![CDATA[Justin Trudeau]]></category>
		<category><![CDATA[kaito ai]]></category>
		<category><![CDATA[Kaito token]]></category>
		<category><![CDATA[Lazarus group]]></category>
		<category><![CDATA[Pump.fun]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[social media hack]]></category>
		<category><![CDATA[X platform]]></category>
		<category><![CDATA[Yu Hu]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38526</guid>

					<description><![CDATA[<p>Crypto-focused artificial intelligence platform Kaito AI and its founder Yu Hu became victims of a cyberattack on the social media platform X on March 15. In several now-deleted posts, hackers falsely claimed that Kaito wallets had been compromised and warned users that their funds were no longer safe. However, the Kaito AI team quickly regained</p>
<p>The post <a href="https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/">Kaito AI and Founder Yu Hu’s X Accounts Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="232" data-end="398">Crypto-focused artificial intelligence platform <strong data-start="280" data-end="292">Kaito AI</strong> and its founder <strong data-start="309" data-end="318">Yu Hu</strong> became victims of a cyberattack on the social media platform <strong data-start="380" data-end="385">X</strong> on March 15.</p>
<p data-start="400" data-end="700">In several now-deleted posts, hackers falsely claimed that <strong data-start="459" data-end="468">Kaito</strong> wallets had been compromised and warned users that their funds were no longer safe. However, the <strong data-start="566" data-end="578">Kaito AI</strong> team quickly regained control of the accounts and reassured users that Kaito token wallets were unaffected by the breach.</p>
<h2 data-start="702" data-end="734">KAITO Token Price Drops!</h2>
<p data-start="736" data-end="980">According to <strong data-start="749" data-end="764">DeFi Warhol</strong>, the attackers opened short positions on KAITO tokens before spreading the false information. The goal was to trigger panic selling and cause a price crash, allowing the hackers to profit from their short positions.</p>
<hr />
<p data-start="982" data-end="1056"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="982" data-end="1056">The <strong data-start="986" data-end="998">Kaito AI</strong> team addressed the incident with the following statement:</p>
<p data-start="982" data-end="1056"><em><span style="font-size: 14.4px;">“Despite having high-standard security measures in place, we were still compromised. It seems to be similar to other recent X account hacks.”</span></em></p>
<figure id="attachment_38527" aria-describedby="caption-attachment-38527" style="width: 1835px" class="wp-caption aligncenter"><img loading="lazy" decoding="async" class="wp-image-38527 size-full" src="https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI.png" alt="Kaito AI" width="1835" height="1018" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI.png 1835w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-300x166.png 300w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-1024x568.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-768x426.png 768w, https://coinengineer.net/blog/wp-content/uploads/2025/03/Kaito-AI-1536x852.png 1536w" sizes="auto, (max-width: 1835px) 100vw, 1835px" /><figcaption id="caption-attachment-38527" class="wp-caption-text"><em>KAITO/USDT 15-minute chart.</em></figcaption></figure>
<h2 data-start="1203" data-end="1255">Rising Cyber Threats in the Crypto Industry!</h2>
<p data-start="1257" data-end="1502">This incident adds to a growing list of social media hacks, social engineering scams, and cybersecurity concerns within the crypto space. In recent weeks, the <strong data-start="1416" data-end="1428">Pump.fun</strong> and <strong data-start="1433" data-end="1448">Jupiter DAO</strong> accounts were also compromised using similar tactics.</p>
<p data-start="1504" data-end="1849">Additionally, Canada’s Alberta Securities Commission issued a warning about the <strong data-start="1584" data-end="1594">CanCap</strong> scam, where malicious actors used fake news and fabricated endorsements from Canadian politicians to promote fraudulent crypto investments. The scammers exploited concerns over a potential trade war between Canada and the United States to lure investors.</p>
<h2 data-start="1851" data-end="1887">Lazarus Group Strikes Again!</h2>
<p data-start="1889" data-end="2260">State-sponsored hacker group <strong data-start="1918" data-end="1929">Lazarus</strong> has also launched a new scam. They pose as venture capitalists in Zoom meetings and claim to experience audio-visual issues. Victims are then redirected to malicious chatrooms where they are instructed to download a &#8220;patch.&#8221; This software is designed to steal private crypto keys and other sensitive data from the victim&#8217;s device.</p>
<p data-start="1889" data-end="2260"><img loading="lazy" decoding="async" class="aligncenter wp-image-151176 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/kaito-ai.webp" alt="Kaito AI" width="1000" height="548" /></p>
<hr />
<p data-start="1889" data-end="2260"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/">Kaito AI and Founder Yu Hu’s X Accounts Hacked!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/kaito-ai-and-founder-yu-hus-x-accounts-hacked/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/coinbase_ce-33.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/coinbase_ce-33.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
