<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Lazarus Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/lazarus/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/lazarus/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Wed, 30 Apr 2025 15:12:12 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Lazarus Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/lazarus/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>American Investor Falls Victim to $330M Bitcoin Heist</title>
		<link>https://coinengineer.net/blog/american-investor-falls-victim-to-330m-bitcoin-heist/</link>
					<comments>https://coinengineer.net/blog/american-investor-falls-victim-to-330m-bitcoin-heist/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Wed, 30 Apr 2025 17:30:36 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[bitcoin heist]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[Lazarus]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=41162</guid>

					<description><![CDATA[<p>A major Bitcoin heist has shaken the crypto industry, with an elderly U.S. investor losing approximately $330 million worth of BTC in a highly coordinated cyber attack. The incident now ranks among the top five largest crypto thefts in history, according to blockchain analysts. Wallet Breached via Social Engineering The attack occurred on April 28, 2025,</p>
<p>The post <a href="https://coinengineer.net/blog/american-investor-falls-victim-to-330m-bitcoin-heist/">American Investor Falls Victim to $330M Bitcoin Heist</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="67" data-end="357">A major <strong data-start="75" data-end="92"><a href="https://coinengineer.net/blog/bitcoin-rejected-at-95632-is-a-pullback-to-86600-on-the-horizon/">Bitcoin heist</a> </strong>has shaken the crypto industry, with an elderly U.S. investor losing approximately <strong data-start="176" data-end="205">$330 million worth of BTC</strong> in a highly coordinated cyber attack. The incident now ranks among the <strong data-start="277" data-end="322">top five largest crypto thefts in history</strong>, according to blockchain analysts.</p>
<h3 class="" data-start="359" data-end="401">Wallet Breached via Social Engineering</h3>
<p class="" data-start="403" data-end="681">The attack occurred on <strong data-start="426" data-end="444">April 28, 2025</strong>, when a suspicious transaction involving <strong data-start="486" data-end="499">3,520 BTC</strong> was flagged by blockchain monitoring tools. Investigators later confirmed that the funds were drained from the victim’s wallet using <strong data-start="633" data-end="680">sophisticated social engineering techniques</strong>.</p>
<p class="" data-start="683" data-end="891">Blockchain data revealed the victim had been holding more than <strong data-start="746" data-end="770">3,000 BTC since 2017</strong>, with no significant movements, indicating that the attacker likely spent months or even years preparing for the breach.</p>
<h3 class="" data-start="893" data-end="931">Funds Obscured Using Privacy Coins</h3>
<p class="" data-start="933" data-end="1212">Immediately after gaining control of the assets, the attacker began laundering the funds through over <strong data-start="1035" data-end="1069">six instant exchange platforms</strong>, quickly fragmenting the BTC using a method known as a <strong data-start="1125" data-end="1139">peel chain</strong> — where large sums are broken into smaller transfers to evade detection.</p>
<p class="" data-start="1214" data-end="1451">A significant portion of the stolen BTC was converted into <strong data-start="1273" data-end="1289">Monero (XMR)</strong>, a privacy-focused cryptocurrency known for its untraceable transactions. Following the conversion, <strong data-start="1390" data-end="1427">Monero&#8217;s price surged by over 50%</strong>, briefly reaching $339.</p>
<h3 class="" data-start="1453" data-end="1500">Over 300 Wallets and 20+ Exchanges Involved</h3>
<p class="" data-start="1502" data-end="1814">Security researchers tracking the stolen funds estimate that the laundering process involved <strong data-start="1595" data-end="1630">more than 300 different wallets</strong> and over <strong data-start="1640" data-end="1676">20 exchanges or payment services</strong>. A majority of the assets were funneled through <strong data-start="1725" data-end="1748">low-trust platforms</strong> and <strong data-start="1753" data-end="1772">mixing services</strong>, making traceability extremely difficult.</p>
<p class="" data-start="1816" data-end="2051">In some cases, portions of the BTC were even <strong data-start="1861" data-end="1884">bridged to Ethereum</strong> and moved into various DeFi platforms, further complicating the forensic trail. Exchanges have been alerted, and requests to <strong data-start="2010" data-end="2037">freeze suspect accounts</strong> are underway.</p>
<h3 class="" data-start="2053" data-end="2088">No Links to Known Threat Actors</h3>
<p class="" data-start="2090" data-end="2462">Despite the scale and complexity of the operation, cybersecurity experts say the laundering techniques do <strong data-start="2196" data-end="2232">not match the typical signatures</strong> of well-known hacking collectives like <strong data-start="2272" data-end="2289">Lazarus Group</strong>. The identity of the perpetrators remains unknown, though the use of <strong data-start="2359" data-end="2410">pre-established exchange accounts and OTC desks</strong> suggests a well-orchestrated and premeditated plan.</p>
<h3 class="" data-start="2464" data-end="2510">Security Best Practices for Crypto Holders</h3>
<p class="" data-start="2512" data-end="2879">In response to the attack, security professionals are urging crypto holders — especially those managing <strong data-start="2616" data-end="2642">large Bitcoin reserves</strong> — to adopt strict protective measures. These include the use of <strong data-start="2707" data-end="2733">multisignature wallets</strong>, minimizing exposure to <strong data-start="2758" data-end="2792">internet-connected hot wallets</strong>, storing assets in <strong data-start="2812" data-end="2837">cold hardware wallets</strong>, and regularly rotating <strong data-start="2862" data-end="2878">private keys</strong>.</p>
<p class="" data-start="2881" data-end="3214">During the first quarter of 2025, cyberattacks on crypto platforms have led to losses exceeding <strong data-start="2977" data-end="2993">$1.6 billion</strong>, with a significant portion tied to previous large-scale incidents. This case serves as yet another reminder of the <strong data-start="3110" data-end="3161">critical importance of personal wallet security</strong> in the evolving threat landscape of digital finance.</p>
<hr />
<p class="" data-start="2881" data-end="3214"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <strong><a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> </strong>and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/american-investor-falls-victim-to-330m-bitcoin-heist/">American Investor Falls Victim to $330M Bitcoin Heist</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/american-investor-falls-victim-to-330m-bitcoin-heist/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit Recovers 7% Market Share After $1.4B Hack</title>
		<link>https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/</link>
					<comments>https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 10 Apr 2025 13:30:30 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[Exchange News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[rune]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[thorchain]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40016</guid>

					<description><![CDATA[<p>Bybit’s market share has bounced back to over 7%, returning to pre-hack levels, despite a broader trend of macro “de-risking” among cryptocurrency investors. The crypto industry was shaken on February 21 by the largest hack in history, as Bybit lost more than $1.4 billion in liquid-staked Ether (stETH), Mantle Staked ETH (mETH), and other digital</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/">Bybit Recovers 7% Market Share After $1.4B Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="302" data-end="471"><strong data-start="302" data-end="313">Bybit’s</strong> market share has bounced back to over <strong data-start="352" data-end="358">7%</strong>, returning to <strong data-start="373" data-end="392">pre-hack levels</strong>, despite a broader trend of macro “de-risking” among cryptocurrency investors.</p>
<p class="" data-start="473" data-end="699">The <strong data-start="477" data-end="496">crypto industry</strong> was shaken on <strong data-start="511" data-end="526">February 21</strong> by the <strong data-start="534" data-end="561">largest hack in history</strong>, as <strong data-start="566" data-end="575">Bybit</strong> lost more than <strong data-start="591" data-end="607">$1.4 billion</strong> in <strong data-start="611" data-end="642">liquid-staked Ether (stETH)</strong>, <strong data-start="644" data-end="672">Mantle Staked ETH (mETH)</strong>, and other digital assets.</p>
<p class="" data-start="701" data-end="839">According to a report by crypto analytics firm <strong data-start="748" data-end="765">Block Scholes</strong> on <strong data-start="769" data-end="780">April 9</strong>, <strong data-start="782" data-end="791">Bybit</strong> has steadily recovered its share in the market:</p>
<p class="" data-start="701" data-end="839"><span style="font-size: 14.4px;"><em>“Since this initial decline, Bybit has steadily regained market share as it works to repair sentiment and as volumes return to the exchange,”</em> the report noted.</span></p>
<p class="" data-start="1004" data-end="1201"><strong data-start="1004" data-end="1015">Bybit’s</strong> proportional market share climbed from a <strong data-start="1057" data-end="1080">post-hack low of 4%</strong> to approximately <strong data-start="1098" data-end="1104">7%</strong>, signaling a strong and stable recovery in both <strong data-start="1153" data-end="1176">spot trading volume</strong> and <strong data-start="1181" data-end="1200">market activity</strong>.</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<p class="" data-start="1334" data-end="1503">The report also emphasizes that the decline in volume was not solely due to the hack but was part of a <strong data-start="1437" data-end="1478">larger macroeconomic de-risking trend</strong> that began even earlier.</p>
<p data-start="1334" data-end="1503"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-153182 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/bybit.webp" alt="bybit" width="741" height="629" /></p>
<h2 data-start="1510" data-end="1558">$1.4 Billion Laundered Through THORChain</h2>
<p class="" data-start="1560" data-end="1737">The <strong data-start="1564" data-end="1581">Bybit hackers</strong> took <strong data-start="1587" data-end="1598">10 days</strong> to launder the stolen funds through the <strong data-start="1639" data-end="1687">decentralized cross-chain protocol THORChain</strong>, as reported.</p>
<p class="" data-start="1800" data-end="1903">Despite these efforts, <strong data-start="1823" data-end="1830">89%</strong> of the hacked amount remains <strong data-start="1860" data-end="1873">traceable</strong> via <strong data-start="1878" data-end="1902">blockchain analytics</strong>.</p>
<h2 data-start="1910" data-end="1955">North Korea’s Lazarus Group Suspected</h2>
<p class="" data-start="1957" data-end="2140">Blockchain security firms such as <strong data-start="1991" data-end="2014">Arkham Intelligence</strong> have linked the attack to <strong data-start="2041" data-end="2072">North Korea’s Lazarus Group</strong>, citing ongoing fund movement patterns designed to obscure origins.</p>
<p class="" data-start="2142" data-end="2313">According to <strong data-start="2155" data-end="2170">Chainalysis</strong>, <strong data-start="2172" data-end="2203">North Korean cyber activity</strong> declined sharply after <strong data-start="2227" data-end="2243">July 1, 2024</strong>, even though the first half of the year saw a surge in such exploits.</p>
<p class="" data-start="2410" data-end="2477"><strong data-start="2410" data-end="2426">Eric Jardine</strong>, Chainalysis’ Cybercrime Research Lead, commented:</p>
<p class="" data-start="2410" data-end="2477"><em><span style="font-size: 14.4px;">“The slowdown began after the Russia–North Korea summit, which likely shifted DPRK resources toward military involvement in Ukraine. We speculated in our report that this could also include cyber resources. Fast forward to early February—and you have the </span>Bybit hack<span style="font-size: 14.4px;">.”</span></em></p>
<p data-start="2410" data-end="2477"><img decoding="async" class="aligncenter wp-image-153181 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/04/bybit.png" alt="bybit" width="1003" height="650" /></p>
<h2 data-start="2759" data-end="2824">Industry Analysts Raise Alarm on Exchange Vulnerabilities</h2>
<p class="" data-start="2826" data-end="2958">The <strong data-start="2830" data-end="2846">Bybit breach</strong> highlights the <strong data-start="2862" data-end="2912">ongoing vulnerability of centralized exchanges</strong>, even those with <strong data-start="2930" data-end="2957">high security standards</strong>.</p>
<p class="" data-start="2960" data-end="3164"><strong data-start="2960" data-end="2974">Meir Dolev</strong>, CTO of <strong data-start="2983" data-end="2993">Cyvers</strong>, compared the exploit to other recent attacks such as the <strong data-start="3052" data-end="3080">$230 million WazirX hack</strong> and the <strong data-start="3089" data-end="3125">$58 million Radiant Capital hack</strong>, underlining recurring attack vectors.</p>
<hr />
<p data-start="2960" data-end="3164"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/">Bybit Recovers 7% Market Share After $1.4B Hack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-recovers-7-market-share-after-1-4b-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/03/bybit_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/03/bybit_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Bybit CEO: 20 Percent of Stolen Fund Lost</title>
		<link>https://coinengineer.net/blog/bybit-ceo-20-percent-of-stolen-fund-lost/</link>
					<comments>https://coinengineer.net/blog/bybit-ceo-20-percent-of-stolen-fund-lost/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Tue, 04 Mar 2025 09:00:54 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[ByBit]]></category>
		<category><![CDATA[eth]]></category>
		<category><![CDATA[ethereum]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[Lazarus]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37730</guid>

					<description><![CDATA[<p>Bybit CEO Ben Zhou confirmed that $280 million of the $1.4 billion stolen from the exchange has been completely lost and that these funds have been laundered. However, the remaining $1.07 billion is still traceable. Authorities are working to freeze and recover the stolen assets. 500,000 ETH Traced and Funds Frozen In a March 4</p>
<p>The post <a href="https://coinengineer.net/blog/bybit-ceo-20-percent-of-stolen-fund-lost/">Bybit CEO: 20 Percent of Stolen Fund Lost</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-end="397" data-start="73">Bybit CEO Ben Zhou confirmed <strong data-end="192" data-start="113">that $280 million of the $1.4 billion</strong> stolen from the exchange <strong data-end="192" data-start="113">has been completely lost</strong> and that these funds have been laundered. However, the remaining <strong data-end="267" data-start="244">$1.07 billion</strong> is still traceable. Authorities are working to freeze and recover the stolen assets.</p>
<h3 data-end="455" data-start="404"><strong data-end="455" data-start="408">500,000 ETH Traced and Funds Frozen</strong></h3>
<p data-end="641" data-start="456">In a March 4 statement, Zhou provided an update <strong data-end="618" data-start="491">on the movement of 500,000 ETH stolen in February&#8217;s attack and the cybercriminals&#8217; efforts to cover their tracks</strong>.</p>
<blockquote>
<p data-end="796" data-start="643"><strong data-end="793" data-start="644">The total funds stolen totaled $1.4 billion, about 500,000 ETH. 77% of these funds are still traceable, 20% have disappeared, and 3% have been frozen.</strong></p>
</blockquote>
<p data-end="796" data-start="643"><img decoding="async" class="aligncenter size-full wp-image-150096" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/Screenshot_4.png" alt="" width="587" height="557" /></p>
<p data-end="1056" data-start="798">Zhou&#8217;s <strong data-end="821" data-start="807">&#8220;disappeared</strong> &#8221; means that <strong data-end="938" data-start="831">the hackers laundered the funds, used obfuscation services and transferred them to platforms that concealed transactions</strong>. <strong data-end="1011" data-start="967">North Korea-linked hacker groups</strong> in particular are known to use these methods frequently.</p>
<p data-end="1151" data-start="1058">So far, <strong data-end="1151" data-start="1087">42 million dollars (3% of the stolen funds) have been frozen.</strong></p>
<h3 data-end="1213" data-start="1158"><strong data-end="1213" data-start="1162">Hackers Transfer Funds in Pieces</strong></h3>
<p data-end="1474" data-start="1214">The hackers <strong data-end="1308" data-start="1234">sold</strong> the stolen <strong data-end="1308" data-start="1234">417,348 ETH (about $1 billion), converted it into Bitcoin</strong> and <strong data-end="1345" data-start="1312">distributed it to 6,954 different wallets</strong>. On average, each wallet holds <strong data-end="1387" data-start="1375">1.71 BTC</strong>. This fragmentation makes it difficult to track and recover assets.</p>
<p data-end="1731" data-start="1476">Zhou emphasized <strong data-end="1533" data-start="1482">that the next one to two weeks are critical</strong>. Additional funds must be frozen during this period, otherwise hackers <strong data-end="1721" data-start="1625">will be able to cash out the funds via crypto exchanges, OTC platforms and P2P transactions</strong>.</p>
<h3 data-end="1802" data-start="1738"><strong data-end="1802" data-start="1742">Bybit Hackers Try to Retain Stolen Funds</strong></h3>
<p data-end="2007" data-start="1803">Hackers particularly preferred decentralized exchanges such as <strong data-end="1869" data-start="1856">THORChain</strong> to use the stolen funds. In addition, platforms such as <strong data-end="1954" data-start="1928">ExCH and OKX Web3 Proxy</strong> were also used to move funds.</p>
<p data-end="2127" data-start="2009">Zhou stated <strong data-end="2115" data-start="2015">that $65 million worth of ETH can be recovered, but the support of the OKX Wallet team is required</strong>.</p>
<p data-end="2309" data-start="2129">On the other hand, <strong data-end="2204" data-start="2141">11 white hat hackers were awarded a total of $2.1 million</strong>. These rewards were distributed to security researchers who helped freeze the stolen funds.</p>
<p data-end="2309" data-start="2129"><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </strong></a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/bybit-ceo-20-percent-of-stolen-fund-lost/">Bybit CEO: 20 Percent of Stolen Fund Lost</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/bybit-ceo-20-percent-of-stolen-fund-lost/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/03/kripto_ce-1-4.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/03/kripto_ce-1-4.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Infini Suffers $50 Million Attack</title>
		<link>https://coinengineer.net/blog/infini-suffers-50-million-attack/</link>
					<comments>https://coinengineer.net/blog/infini-suffers-50-million-attack/#respond</comments>
		
		<dc:creator><![CDATA[Emre Yumlu]]></dc:creator>
		<pubDate>Mon, 24 Feb 2025 12:00:48 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[50 million USDC]]></category>
		<category><![CDATA[Christian Li]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[infini]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[security firm Cyvers]]></category>
		<category><![CDATA[Stablecoin payment firm Infini]]></category>
		<category><![CDATA[tornado cash]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=37200</guid>

					<description><![CDATA[<p>A developer who retained their privileges after project delivery is suspected of stealing 50 million USDC from the Infini crypto payment firm. Infini Lost $50 Million in Exploit Stablecoin payment firm Infini is facing allegations of losing $50 million due to an exploit carried out by a developer who retained admin rights after project delivery.</p>
<p>The post <a href="https://coinengineer.net/blog/infini-suffers-50-million-attack/">Infini Suffers $50 Million Attack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A developer who retained their privileges after project delivery is suspected of stealing<strong> 50 million USDC</strong> from the <a href="https://coinengineer.net/blog/hk-asia-continues-bitcoin-purchases/"><strong>Infini</strong> </a>crypto payment firm.</p>
<h2 data-start="0" data-end="38">Infini Lost $50 Million in Exploit</h2>
<p data-start="40" data-end="209"><strong>Stablecoin payment firm Infini</strong> is facing allegations of losing $50 million due to an exploit carried out by a developer who retained admin rights after project delivery.</p>
<p data-start="211" data-end="392">According to <strong>security firm Cyvers</strong>, the perpetrator, who worked on the Infini project for contract development, allegedly kept their admin privileges after the project was completed.</p>
<p data-start="394" data-end="605">The attacker funded the wallet used in the exploit with 1 Ether from the <strong>Tornado Cash</strong> crypto mixer. They then transferred $49.52 million worth of USD Coin from Infini through a contract created in November 2024.</p>
<p data-start="607" data-end="791">The USD Coin was immediately swapped for Dai, a stablecoin with no freeze function. The funds were then converted to 17,696 ETH and moved to a secondary address at the time of writing.</p>
<p data-start="793" data-end="1027">Infini did not halt withdrawals, and founder<strong> Christian Li</strong> stated in an X post that full compensation would be provided in a worst-case scenario. Li also mentioned that the platform had observed $500,000 in withdrawals since the theft.</p>
<p data-start="1029" data-end="1188">In a now-deleted tweet, Infini team member &#8220;Christine&#8221; claimed that the engineer responsible for the theft had been identified and reported to the authorities.</p>
<h2 data-start="1190" data-end="1244">Infini Exploit Follows the Largest Hack in History</h2>
<p data-start="1246" data-end="1410">The attack on <strong>Infini</strong> follows a record-breaking hack on cryptocurrency exchange Bybit on February 21, where $1.4 billion worth of Ether and related tokens were lost.</p>
<p data-start="1412" data-end="1585">The large-scale attack sparked fears of potential insolvency. However, <strong>Bybit</strong> chose to keep withdrawals open and pledged to cover the loss if the funds couldn&#8217;t be recovered.</p>
<p data-start="1587" data-end="1767">Bybit relied on loans from rival exchanges and partners to meet the immediate liquidity demands of customer withdrawals, which totaled over $5 billion, according to DefiLlama data.</p>
<p data-start="1769" data-end="1863">On February 24, Bybit CEO Ben Zhou announced that the exchange had fully closed its Ether gap.</p>
<p data-start="1865" data-end="2128" data-is-last-node="" data-is-only-node="">Onchain detective<strong> ZachXBT</strong> identified North Korea’s state-sponsored hacking group <strong>Lazarus</strong> as the prime suspect in the attack on Bybit. ZachXBT linked the Bybit hacker’s wallet to an attack on Phemex in January and to a BingX attack, both attributed to North Korea.</p>
<hr />
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </strong></a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for </em><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/infini-suffers-50-million-attack/">Infini Suffers $50 Million Attack</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/infini-suffers-50-million-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/hack_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Lazarus Group Targets DeFi via Fake Fenbushi Capital Profile on LinkedIn, Says SlowMist</title>
		<link>https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/</link>
					<comments>https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/#respond</comments>
		
		<dc:creator><![CDATA[Tanju Akbıyık]]></dc:creator>
		<pubDate>Mon, 29 Apr 2024 14:15:39 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[defi hack]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[lazarus hack]]></category>
		<category><![CDATA[SlowMist]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=19134</guid>

					<description><![CDATA[<p>SlowMist, a security firm, expressed concern about North Korean Lazarus Group posing as a managing member of Fenbushi Capital, a Chinese blockchain asset management company, on LinkedIn. The group is known for impersonating investors to target prominent DeFi projects. According to SlowMist&#8217;s chief information security officer, a hacker from Lazarus Group created a fake LinkedIn</p>
<p>The post <a href="https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/">Lazarus Group Targets DeFi via Fake Fenbushi Capital Profile on LinkedIn, Says SlowMist</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>SlowMist</strong>, a security firm, expressed concern about North Korean <strong>Lazarus</strong> <strong>Group</strong> posing as a managing member of Fenbushi Capital, a Chinese blockchain asset management company, on LinkedIn. The group is known for impersonating investors to target prominent DeFi projects.</p>
<p>According to SlowMist&#8217;s chief information security officer, a hacker from Lazarus Group created a <a href="https://coinengineer.net/blog/doj-rejects-tornado-cash-developers-bid-to-dismiss-indictment/">fake</a> LinkedIn profile under the name &#8220;Nevil Bolson&#8221; claiming to be the co-founder of Fenbushi Capital. It was determined that the profile picture used by the fraudster belonged to the real Fenbushi Capital partner Remington Ong.</p>
<p>It has been confirmed that the <a href="https://coinengineer.net/blog/millions-in-crypto-stuck-or-forgotten-in-bridge-contracts-arkham-reveals/">fake</a> LinkedIn page remains active and the fraudster is soliciting discussions from software developers. Lazarus Group often conducts private conversations on LinkedIn pretending to be an investor and then tries to schedule meetings with its targets.</p>
<p>SlowMist warns that Lazarus Group&#8217;s strategy involves gaining the victim&#8217;s trust before adding malicious links disguised as meeting invitations or event pages that, when clicked, will lead to phishing attacks.</p>
<p>By comparing IP addresses and observing similarities in attack methods, the security firm determined that &#8220;Nevil Bolson&#8221; was part of the Lazarus Group.</p>
<p>As reported by the UN Security Council, North Korea&#8217;s state-sponsored crypto hacker groups allegedly generate significant revenue for the country, a large portion of which is allocated to the development of weapons of mass destruction.</p>
<p>According to Chainalytics, approximately $1.7 billion worth of funds have been stolen from the cryptocurrency space through 231 hacks.</p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> channels for the latest news and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/">Lazarus Group Targets DeFi via Fake Fenbushi Capital Profile on LinkedIn, Says SlowMist</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/lazarus-group-targets-defi-via-fake-fenbushi-capital-profile-on-linkedin-says-slowmist/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/02/PlayDapp-Hack.jpeg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/02/PlayDapp-Hack.jpeg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Atomic Wallet Offers $1 Million Reward for Bug Reports</title>
		<link>https://coinengineer.net/blog/atomic-wallet-offers-1-million-reward-for-bug-reports/</link>
					<comments>https://coinengineer.net/blog/atomic-wallet-offers-1-million-reward-for-bug-reports/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 21 Dec 2023 07:42:14 +0000</pubDate>
				<category><![CDATA[News]]></category>
		<category><![CDATA[atomic wallet]]></category>
		<category><![CDATA[Decentralized wallet]]></category>
		<category><![CDATA[Lazarus]]></category>
		<category><![CDATA[non custodial wallet]]></category>
		<guid isPermaLink="false">https://coinengineer.io/blog/?p=8533</guid>

					<description><![CDATA[<p>Atomic Wallet (Decentralized wallet) has launched a $1 million bug bounty program to enhance security and incentivize white hat hackers to find software vulnerabilities. The program comes in the wake of a June 2023 hack that saw $100 million stolen from the platform. The company aims to strengthen the platform&#8217;s security by rewarding white hat</p>
<p>The post <a href="https://coinengineer.net/blog/atomic-wallet-offers-1-million-reward-for-bug-reports/">Atomic Wallet Offers $1 Million Reward for Bug Reports</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="cdk-visually-hidden cdk-focus-trap-anchor" aria-hidden="true">Atomic Wallet (<a href="https://coinengineer.net/blog/custodial-and-non-custodial-wallets/" target="_blank" rel="noopener">Decentralized wallet)</a> has launched a $1 million bug bounty program to enhance security and incentivize white hat hackers to find software vulnerabilities. The program comes in the wake of a June 2023 hack that saw $100 million stolen from the platform.</div>
<div class="response-container-content ng-tns-c570419263-14">
<div class="response-content ng-trigger ng-trigger-responsePopulation ng-tns-c570419263-14 ng-animate-disabled">
<div class="markdown markdown-main-panel" dir="ltr">
<p data-sourcepos="5:1-5:319">The company aims to strengthen the platform&#8217;s security by rewarding white hat hackers who identify and report security vulnerabilities. The program offers a range of rewards, from $500 for reporting low-risk issues to $10,000 for finding high-risk vulnerabilities and $100,000 for discovering serious security breaches.</p>
<p data-sourcepos="7:1-7:270">However, despite this significant development, the blog post did not mention the June hack attack. While there have been strong allegations that the attack was carried out by the North Korean hacker group Lazarus, the details of the attack are still under investigation.</p>
<p data-sourcepos="7:1-7:270"><img loading="lazy" decoding="async" class="size-full wp-image-8535 aligncenter" src="https://coinengineer.net/blog/wp-content/uploads/2023/12/Atomic-Wallet-1.jpg" alt="Atomic Wallet 1" width="799" height="449" srcset="https://coinengineer.net/blog/wp-content/uploads/2023/12/Atomic-Wallet-1.jpg 799w, https://coinengineer.net/blog/wp-content/uploads/2023/12/Atomic-Wallet-1-300x169.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2023/12/Atomic-Wallet-1-768x432.jpg 768w" sizes="auto, (max-width: 799px) 100vw, 799px" /></p>
<p data-sourcepos="9:1-9:337">Atomic Wallet is facing a class-action lawsuit following the previous hack attack. The plaintiffs allege that the company knew about the vulnerabilities but failed to take adequate precautions, while the company is seeking to dismiss the lawsuit by highlighting its limited liability terms of service and non-custodial wallet operations.</p>
<h2 data-sourcepos="11:1-11:77"><span style="font-size: 85%;">Here are some of the key details of the Atomic Wallet bug bounty program:</span></h2>
<ul data-sourcepos="13:1-18:0">
<li data-sourcepos="13:1-13:140">The <span class="citation-0 citation-end-0">program is open to anyone with the skills and determination to help Atomic Wallet strengthen its security infrastructure.</span></li>
<li data-sourcepos="14:1-14:63">Rewards are based on the severity of the vulnerability found.</li>
<li data-sourcepos="15:1-15:33">Low-risk issues are worth $500.</li>
<li data-sourcepos="16:1-16:46">High-risk vulnerabilities are worth $10,000.</li>
<li data-sourcepos="17:1-18:0">Serious security breaches are worth $100,000.</li>
</ul>
<p data-sourcepos="19:1-19:230">Atomic Wallet is hoping that the bug bounty program will help to identify and fix any security vulnerabilities that may exist on the platform. The company is also committed to providing a safe and secure environment for its users.</p>
<hr />
<p><em>Also, in the comment section, you can freely share your comments and opinions about the topic. Additionally, don’t forget to follow us on <strong><a href="https://t.me/coinengineernews" target="_blank" rel="noopener">Telegram</a></strong>, <strong><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noopener">YouTube</a></strong>, and <a href="https://twitter.com/coinengineers"><strong>Twitter</strong></a> for the latest news and updates.</em></p>
</div>
</div>
</div>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>The post <a href="https://coinengineer.net/blog/atomic-wallet-offers-1-million-reward-for-bug-reports/">Atomic Wallet Offers $1 Million Reward for Bug Reports</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/atomic-wallet-offers-1-million-reward-for-bug-reports/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2023/12/Atomic-Wallet.webp' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2023/12/Atomic-Wallet.webp' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
