<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/"
>

<channel>
	<title>Web3 security Archives - Coin Engineer</title>
	<atom:link href="https://coinengineer.net/blog/tag/web3-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://coinengineer.net/blog/tag/web3-security/</link>
	<description>Btc, Coins, Pre-Sale, DeFi, NFT</description>
	<lastBuildDate>Tue, 03 Feb 2026 11:25:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://coinengineer.net/blog/wp-content/uploads/2024/04/cropped-Coin-Engineer-Logo-Favicon-2-32x32.png</url>
	<title>Web3 security Archives - Coin Engineer</title>
	<link>https://coinengineer.net/blog/tag/web3-security/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>What Is Immunefi (IMU)?</title>
		<link>https://coinengineer.net/blog/what-is-immunefi-imu/</link>
					<comments>https://coinengineer.net/blog/what-is-immunefi-imu/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 03 Feb 2026 15:00:47 +0000</pubDate>
				<category><![CDATA[Altcoin Projects]]></category>
		<category><![CDATA[Project review]]></category>
		<category><![CDATA[crypto bug bounty]]></category>
		<category><![CDATA[Immunefi IMU]]></category>
		<category><![CDATA[IMU token]]></category>
		<category><![CDATA[Web3 security]]></category>
		<category><![CDATA[What is Immunefi]]></category>
		<category><![CDATA[What is IMU token]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=62962</guid>

					<description><![CDATA[<p>As Web3 projects scale, security becomes increasingly critical. This is where Immunefi comes in. Immunefi (IMU) is a comprehensive blockchain cybersecurity platform built for the Web3 ecosystem. It supports protocol teams across the entire security lifecycle — from development and deployment to live operations and incident response. By connecting protocols with independent security researchers, Immunefi</p>
<p>The post <a href="https://coinengineer.net/blog/what-is-immunefi-imu/">What Is Immunefi (IMU)?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="1079" data-end="1627">As Web3 projects scale, security becomes increasingly critical. This is where <strong>Immunefi</strong> comes in. Immunefi (IMU) is a comprehensive blockchain cybersecurity platform built for the Web3 ecosystem. It supports protocol teams across the entire security lifecycle — from development and deployment to live operations and incident response. By connecting protocols with independent security researchers, Immunefi provides a structured environment for identifying, validating, and remediating vulnerabilities in smart contracts and related infrastructure.</p>
<p data-start="1629" data-end="1950">The <strong>IMU token</strong> supports participation and incentives within the Immunefi ecosystem. The platform and the token are governed separately: the platform is operated by Singapore-based Immuni Software Pte. Ltd., while the IMU token is managed by the Immunefi Foundation. Simply put, Immunefi acts as a security shield for Web3.</p>
<p data-start="1629" data-end="1950"><img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-62965" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/immunefi.jpeg" alt="" width="960" height="540" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/immunefi.jpeg 960w, https://coinengineer.net/blog/wp-content/uploads/2026/02/immunefi-300x169.jpeg 300w, https://coinengineer.net/blog/wp-content/uploads/2026/02/immunefi-768x432.jpeg 768w" sizes="(max-width: 960px) 100vw, 960px" /></p>
<h3 data-start="1957" data-end="1984">Who Is Behind Immunefi?</h3>
<p data-start="1986" data-end="2152">The platform and the token serve different functions. The company delivers cybersecurity services, while the Foundation oversees token usage and ecosystem incentives.</p>
<ul data-start="2154" data-end="2230">
<li data-start="2154" data-end="2192">
<p data-start="2156" data-end="2192">Founder &amp; CEO: Mitchell Amador</p>
</li>
<li data-start="2193" data-end="2230">
<p data-start="2195" data-end="2230">Founder &amp; CTO: Chris Calamari</p>
</li>
</ul>
<p data-start="2232" data-end="2453">The Immunefi platform is developed and operated by Immuni Software Pte. Ltd., headquartered in Singapore. The IMU token is governed by the Immunefi Foundation, which coordinates token distribution and ecosystem utility.</p>
<p data-start="2232" data-end="2453"><img decoding="async" class="aligncenter size-large wp-image-62964" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-team-1024x577.png" alt="" width="1020" height="575" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-team-1024x577.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-team-300x169.png 300w, https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-team-768x433.png 768w, https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-team.png 1212w" sizes="(max-width: 1020px) 100vw, 1020px" /></p>
<h3 data-start="2460" data-end="2492">Key Stakeholders and Support</h3>
<p data-start="2494" data-end="2697">Immunefi is actively used by major L1 and L2 networks such as Ethereum Foundation, Arbitrum, Optimism, Berachain, and Scroll, as well as high-TVL DeFi protocols including Aave, GMX, Synthetix, and Yearn.</p>
<p data-start="2699" data-end="2956">The project has raised approximately $29.4–37 million to date. Tier-1 investors such as Electric Capital, Framework Ventures, and IDEO CoLab Ventures stand out on the financial side, while 16% of the total token supply is allocated to early backers.</p>
<p data-start="2958" data-end="3244">Protecting more than 650 protocols, Immunefi has also been included in Coinbase’s listing roadmap. The IMU token is accessible via integrations with KuCoin, Bybit, Gate.io, and Bitget, while potential collaborations with <a href="https://coinengineer.net/blog/what-is-world-liberty-financial-usd-usd1/">World Liberty Financial</a> have recently drawn market attention.</p>
<p data-start="2958" data-end="3244"><img decoding="async" class="aligncenter size-large wp-image-62967" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-partner-1024x154.png" alt="" width="1020" height="153" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-partner-1024x154.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-partner-300x45.png 300w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-partner-768x116.png 768w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-partner-1536x231.png 1536w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-partner.png 1541w" sizes="(max-width: 1020px) 100vw, 1020px" /></p>
<h3 data-start="3251" data-end="3268">Why Immunefi?</h3>
<p data-start="3270" data-end="3728">Traditional security models are slow and static. Immunefi promotes the idea of “continuous security.” By redirecting hackers’ financial incentives toward responsible disclosure, the platform enables projects to fix vulnerabilities before exploits occur. The IMU token maximizes trust and speed within this marketplace. Immunefi currently protects over 650 protocols, hosts 60,000 security researchers, and has distributed $125 million in rewards.</p>
<ul data-start="3730" data-end="4062">
<li data-start="3730" data-end="3826">
<p data-start="3732" data-end="3826">Crowdsourced Security: Vulnerabilities identified early by a global researcher community</p>
</li>
<li data-start="3827" data-end="3969">
<p data-start="3829" data-end="3969">Continuous Monitoring &amp; Preventive Controls: Firewalls, runtime protection, code reviews, and incident response during live operations</p>
</li>
<li data-start="3970" data-end="4062">
<p data-start="3972" data-end="4062">IMU Token: An economic layer incentivizing platform usage and ecosystem contribution</p>
</li>
</ul>
<h3 data-start="4069" data-end="4093">How the System Works</h3>
<p data-start="4095" data-end="4151">At its core, Immunefi operates through a value flywheel.</p>
<ul data-start="4153" data-end="4438">
<li data-start="4153" data-end="4260">
<p data-start="4155" data-end="4260">Protocols: Earn IMU credits by expanding security coverage and stake IMU to unlock premium features</p>
</li>
<li data-start="4261" data-end="4344">
<p data-start="4263" data-end="4344">Researchers: Stake IMU to boost rewards and reach higher contribution tiers</p>
</li>
<li data-start="4345" data-end="4438">
<p data-start="4347" data-end="4438">Community &amp; Users: Stake IMU to support researchers or protocols and share in rewards</p>
</li>
</ul>
<p data-start="4440" data-end="4604">This self-reinforcing flywheel works as follows: Protocols invest in security → Researchers secure protocols → Community amplifies incentives → The cycle repeats.</p>
<p data-start="4440" data-end="4604"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-62963" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-work.png" alt="" width="981" height="717" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-work.png 981w, https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-work-300x219.png 300w, https://coinengineer.net/blog/wp-content/uploads/2026/02/Immunefi-work-768x561.png 768w" sizes="auto, (max-width: 981px) 100vw, 981px" /></p>
<h3 data-start="4611" data-end="4638">How Security Is Layered</h3>
<p data-start="4640" data-end="4706">Immunefi structures security across six continuous defense layers:</p>
<ul data-start="4708" data-end="5074">
<li data-start="4708" data-end="4766">
<p data-start="4710" data-end="4766">Pre-Audit: AI-driven checks before code deployment</p>
</li>
<li data-start="4767" data-end="4828">
<p data-start="4769" data-end="4828">Audit: Crowd audits, fuzzing, and formal verification</p>
</li>
<li data-start="4829" data-end="4889">
<p data-start="4831" data-end="4889">Bug Bounties: Live vulnerability disclosure programs</p>
</li>
<li data-start="4890" data-end="4956">
<p data-start="4892" data-end="4956">Monitoring: On-chain threat detection and brand protection</p>
</li>
<li data-start="4957" data-end="5017">
<p data-start="4959" data-end="5017">Last-Mile Protection: Firewalls and multisig reviews</p>
</li>
<li data-start="5018" data-end="5074">
<p data-start="5020" data-end="5074">SecOps: Incident response and attack simulations</p>
</li>
</ul>
<p data-start="5076" data-end="5144">Security becomes an ongoing operation rather than a one-time review.</p>
<h3 data-start="5151" data-end="5165">Governance</h3>
<p data-start="5167" data-end="5406">IMU token holders have indirect participation and governance rights within the ecosystem. The Immunefi Foundation manages token distribution, rewards, and incentives, while the token economy is designed to scale alongside ecosystem growth.</p>
<p data-start="5167" data-end="5406"><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-62969" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-work.png" alt="" width="724" height="452" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-work.png 724w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-work-300x187.png 300w" sizes="auto, (max-width: 724px) 100vw, 724px" /></p>
<h3 data-start="5413" data-end="5424">Roadmap</h3>
<ul data-start="5426" data-end="5689">
<li data-start="5426" data-end="5492">
<p data-start="5428" data-end="5492">Early Phase: Smart contract audits and bug bounty programs</p>
</li>
<li data-start="5493" data-end="5583">
<p data-start="5495" data-end="5583">Mid Term: Continuous monitoring, preventive controls, and AI-driven security tools</p>
</li>
<li data-start="5584" data-end="5689">
<p data-start="5586" data-end="5689">Long Term: Expanding the security flywheel and protecting the onchain economy through Immunefi AI</p>
</li>
</ul>
<h3 data-start="5696" data-end="5717">IMU Token Utility</h3>
<p data-start="5719" data-end="5912">IMU directly addresses incentive misalignment in security. Researchers, protocols, and contributors operate along a shared incentive path, feeding high-quality threat data into the Security OS.</p>
<p data-start="5914" data-end="6108">As the system learns from each signal, AI defenses strengthen and protect more value. As risk grows, protocols allocate more IMU toward security, allowing protection to scale with onchain value.</p>
<h3 data-start="6115" data-end="6136">IMU Token Details</h3>
<ul data-start="6138" data-end="6227">
<li data-start="6138" data-end="6166">
<p data-start="6140" data-end="6166">Token Name: Immunefi</p>
</li>
<li data-start="6167" data-end="6186">
<p data-start="6169" data-end="6186">Symbol: IMU</p>
</li>
<li data-start="6187" data-end="6227">
<p data-start="6189" data-end="6227">Total Supply: 10,000,000,000 IMU</p>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-large wp-image-62968" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-vesting-1024x562.png" alt="" width="1020" height="560" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-vesting-1024x562.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-vesting-300x165.png 300w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-vesting-768x421.png 768w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-token-vesting.png 1132w" sizes="auto, (max-width: 1020px) 100vw, 1020px" /></p>
<h3 data-start="6234" data-end="6256">Token Distribution</h3>
<ul data-start="6258" data-end="6630">
<li data-start="6258" data-end="6391">
<p data-start="6260" data-end="6391">Ecosystem &amp; Community – 47.5%<br data-start="6293" data-end="6296" />Incentives, bug bounties, staking rewards, partnerships, airdrops, marketing, and liquidity</p>
</li>
<li data-start="6393" data-end="6448">
<p data-start="6395" data-end="6448">Early Backers – 16%<br data-start="6418" data-end="6421" />Vested over three years</p>
</li>
<li data-start="6450" data-end="6545">
<p data-start="6452" data-end="6545">Team &amp; Core Contributors – 26.5%<br data-start="6488" data-end="6491" />Locked for 36 months to ensure long-term alignment</p>
</li>
<li data-start="6547" data-end="6630">
<p data-start="6549" data-end="6630">Reserve – 10%<br data-start="6566" data-end="6569" />Treasury buffer for ecosystem growth and unforeseen needs</p>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter size-full wp-image-62966" src="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-allocation.png" alt="" width="918" height="634" srcset="https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-allocation.png 918w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-allocation-300x207.png 300w, https://coinengineer.net/blog/wp-content/uploads/2026/02/imu-allocation-768x530.png 768w" sizes="auto, (max-width: 918px) 100vw, 918px" /></p>
<h3 data-start="6637" data-end="6661">Ecosystem Highlights</h3>
<ul data-start="6663" data-end="6969">
<li data-start="6663" data-end="6727">
<p data-start="6665" data-end="6727">Hunt Points Program: Rewards impactful security research</p>
</li>
<li data-start="6728" data-end="6784">
<p data-start="6730" data-end="6784">Crowdsourced Security: Global researcher network</p>
</li>
<li data-start="6785" data-end="6851">
<p data-start="6787" data-end="6851">Continuous Security Ops: AI-powered monitoring and defense</p>
</li>
<li data-start="6852" data-end="6914">
<p data-start="6854" data-end="6914">Self-Reinforcing Flywheel: Compounding ecosystem value</p>
</li>
<li data-start="6915" data-end="6969">
<p data-start="6917" data-end="6969">IMU Incentives: Rewards security contributions</p>
</li>
</ul>
<h3 data-start="6976" data-end="7007">Key Achievements &amp; Features</h3>
<p data-start="7009" data-end="7025">Achievements</p>
<ul data-start="7026" data-end="7119">
<li data-start="7026" data-end="7070">
<p data-start="7028" data-end="7070">$25 billion in potential hacks prevented</p>
</li>
<li data-start="7071" data-end="7119">
<p data-start="7073" data-end="7119">$125 million distributed in security rewards</p>
</li>
</ul>
<p data-start="7121" data-end="7137">Key Features</p>
<ul data-start="7138" data-end="7449">
<li data-start="7138" data-end="7196">
<p data-start="7140" data-end="7196">Bug bounty programs for smart contract vulnerabilities</p>
</li>
<li data-start="7197" data-end="7231">
<p data-start="7199" data-end="7231">AI-driven adaptive Security OS</p>
</li>
<li data-start="7232" data-end="7266">
<p data-start="7234" data-end="7266">Staking and reputation systems</p>
</li>
<li data-start="7267" data-end="7312">
<p data-start="7269" data-end="7312">Proactive threat detection with Magnus AI</p>
</li>
<li data-start="7313" data-end="7358">
<p data-start="7315" data-end="7358">Web3 Security Playbook for protocol teams</p>
</li>
<li data-start="7359" data-end="7402">
<p data-start="7361" data-end="7402">On-chain monitoring with Dune Analytics</p>
</li>
<li data-start="7403" data-end="7449">
<p data-start="7405" data-end="7449">Community-driven incentives and governance</p>
</li>
</ul>
<h3 data-start="7456" data-end="7467">Summary</h3>
<p data-start="7469" data-end="7702">Immunefi delivers a comprehensive cybersecurity ecosystem for Web3 protocols. The IMU token sits at its core, aligning protocols, security researchers, and the community around a shared mission: securing the onchain economy at scale.</p>
<h2 data-start="7469" data-end="7702">Official Links</h2>
<ul>
<li data-start="4883" data-end="5137"><a href="https://www.immunefi.foundation/">Website</a></li>
<li data-start="4883" data-end="5137"><a href="https://x.com/ImmunefiFdn">Twitter</a></li>
<li data-start="4883" data-end="5137"><a href="https://t.me/+_cG75v55VVo5NTQx">Telegram</a></li>
</ul>
<p></p>
<div class="coinmarketcap-currency-widget" data-currencyid="39429" data-base="USD" data-sec data-ticker="true" data-rank="true" data-marketcap="true" data-volume="true" data-statsticker="true" data-stats="USD"></div>
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/what-is-immunefi-imu/">What Is Immunefi (IMU)?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/what-is-immunefi-imu/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2026/02/what-is-immunefi.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2026/02/what-is-immunefi.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Crypto Detective ZachXBT Exposes $2M Coinbase Scam</title>
		<link>https://coinengineer.net/blog/crypto-detective-zachxbt-exposes-2m-coinbase-scam/</link>
					<comments>https://coinengineer.net/blog/crypto-detective-zachxbt-exposes-2m-coinbase-scam/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 30 Dec 2025 12:30:49 +0000</pubDate>
				<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Coinbase Scam]]></category>
		<category><![CDATA[crypto fraud]]></category>
		<category><![CDATA[Crypto Theft]]></category>
		<category><![CDATA[Haby Fraud]]></category>
		<category><![CDATA[Human Risk]]></category>
		<category><![CDATA[social engineering]]></category>
		<category><![CDATA[Web3 security]]></category>
		<category><![CDATA[zachxbt crypto]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=60607</guid>

					<description><![CDATA[<p>Crypto detective ZachXBT claims that a Canadian scammer stole over $2 million in crypto through Coinbase support impersonation scams. This coincides with a surge of social engineering incidents in 2025 and highlights the increasing prevalence of human-focused attacks in the Web3 ecosystem. Human-Targeted Fraud ZachXBT alleges on social media and Telegram that the scammer, known</p>
<p>The post <a href="https://coinengineer.net/blog/crypto-detective-zachxbt-exposes-2m-coinbase-scam/">Crypto Detective ZachXBT Exposes $2M Coinbase Scam</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="833" data-end="1125">Crypto detective <strong>ZachXBT</strong> claims that a Canadian scammer stole over $2 million in crypto through <a href="https://coinengineer.net/blog/coinbase-ceo-bitcoin-is-set-to-outperform-gold/"><strong>Coinbase</strong></a> support impersonation scams. This coincides with a surge of social engineering incidents in 2025 and highlights the increasing prevalence of human-focused <strong>attacks</strong> in the Web3 ecosystem.</p>
<h2 data-start="1127" data-end="1152">Human-Targeted Fraud</h2>
<p data-start="1154" data-end="1407">ZachXBT alleges on social media and Telegram that the scammer, known by the alias Haby (Havard), carried out operations starting in late 2024. Haby reportedly stole 21,000 XRP (approximately $44,000) and an additional $560,000 through Bitcoin wallets.</p>
<p data-start="1409" data-end="1670">Leaked group chats reveal that by February 2025, Haby was boasting a wallet balance of $237,000. Videos show the scammer actively conducting social engineering calls and sharing contact information, with his flashy lifestyle compromising operational security.</p>
<p data-start="1672" data-end="1909">ZachXBT has called on Canadian authorities to intervene. Haby’s lack of remorse toward victims and the abundance of evidence make the case relatively straightforward, though Canadian law enforcement rarely prosecutes such cyber crimes.</p>
<blockquote class="twitter-tweet" data-width="550" data-dnt="true">
<p lang="en" dir="ltr">1/ Meet Haby (Havard), a Canadian threat actor who has stolen $2M+ via Coinbase support impersonation social engineering scams in the past year blowing the funds on rare social media usernames, bottle service, &amp; gambling. <a href="https://t.co/bBqrV7GmPi">pic.twitter.com/bBqrV7GmPi</a></p>
<p>&mdash; ZachXBT (@zachxbt) <a href="https://twitter.com/zachxbt/status/2005649181097205845?ref_src=twsrc%5Etfw">December 29, 2025</a></p></blockquote>
<p></p>
<h2 data-start="1911" data-end="1938">Tracking Stolen Crypto</h2>
<p data-start="1940" data-end="2307">On December 30, 2024, Haby shared a screenshot showing 44,000 USD worth of XRP stolen from a Coinbase user. The funds were sent to the XRP address rN7ddvk4DrGHZUrBfNARJEEAbPkky9Mwcz. A few days later, Haby posted another screenshot from his Exodus wallet, exposing his Telegram and Instagram accounts. ZachXBT matched past balances to identify a second XRP address.</p>
<p data-start="2309" data-end="2729">This new address was linked to approximately $500,000 in two additional Coinbase support frauds. Investigations revealed Haby converted the stolen XRP to Bitcoin via instant transactions. Time analysis helped ZachXBT identify Haby’s Bitcoin address. The traced chain revealed multiple addresses were used, and further investigation uncovered three more Coinbase support scams, generating over $560,000 for the scammer.</p>
<h2 data-start="2731" data-end="2760">Human Psychology in Web3</h2>
<p data-start="2762" data-end="3023">The case illustrates a growing security crisis in the crypto ecosystem. Scammers now target human psychology as much as technical vulnerabilities. North Korean actors attempting over $300 million in fake meetings and Ponzi schemes in India confirm this trend.</p>
<p data-start="3025" data-end="3155">Crypto users must remain vigilant beyond technical security measures, as trust and haste remain the scammers’ most potent tools.</p>
<p data-start="3157" data-end="3282">Social engineering losses in 2025 mark new breaking points for Web3 security, emphasizing that user caution is unavoidable.</p>
<p data-start="3157" data-end="3282"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow">Telegram, </a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow">YouTube</a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener">Twitter</a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/crypto-detective-zachxbt-exposes-2m-coinbase-scam/">Crypto Detective ZachXBT Exposes $2M Coinbase Scam</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/crypto-detective-zachxbt-exposes-2m-coinbase-scam/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/scam_ce.jpg' width='58' height='33' /></media:content>	</item>
		<item>
		<title>What is AgentLISA (LISA) ?</title>
		<link>https://coinengineer.net/blog/what-is-agentlisa-lisa/</link>
					<comments>https://coinengineer.net/blog/what-is-agentlisa-lisa/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Wed, 17 Dec 2025 11:58:51 +0000</pubDate>
				<category><![CDATA[Altcoin Projects]]></category>
		<category><![CDATA[Project review]]></category>
		<category><![CDATA[AgentLISA]]></category>
		<category><![CDATA[AI agent platform]]></category>
		<category><![CDATA[LISA ecosystem]]></category>
		<category><![CDATA[LISA token]]></category>
		<category><![CDATA[smart contract audit]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=59680</guid>

					<description><![CDATA[<p>AgentLISA is the world’s first Agentic Security Operating System (ASOS) for Web3 and blockchain ecosystems. Its full name, LLM-based Intelligent Security Analyzer (LISA), uses AI agents to analyze smart contracts, perform in-depth code reviews, and provide security recommendations. The platform addresses a critical issue: over 200,000 smart contracts are deployed monthly, but 80% remain unaudited.</p>
<p>The post <a href="https://coinengineer.net/blog/what-is-agentlisa-lisa/">What is AgentLISA (LISA) ?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="199" data-end="483"><strong>AgentLISA</strong> is the world’s first Agentic Security Operating System (ASOS) for <strong>Web3</strong> and blockchain ecosystems. Its full name, LLM-based Intelligent Security Analyzer (LISA), uses AI agents to analyze smart contracts, perform in-depth code reviews, and provide security recommendations.</p>
<p data-start="485" data-end="865">The platform addresses a critical issue: over 200,000 smart contracts are deployed monthly, but 80% remain unaudited. Traditional audits are slow and expensive, whereas LISA delivers real-time, fast, and affordable security. To date, it has scanned over 200,000 contracts, achieved 90%+ detection rate, safeguarded billions in assets, and prevented millions in potential losses.</p>
<p data-start="867" data-end="908">Slogan: &#8220;Connect. Share. Secure. Earn.&#8221;</p>
<p data-start="867" data-end="908"><img loading="lazy" decoding="async" class="aligncenter wp-image-59686 size-large" src="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-1024x341.png" alt="" width="1020" height="340" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-1024x341.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-300x100.png 300w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-768x256.png 768w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa.png 1500w" sizes="auto, (max-width: 1020px) 100vw, 1020px" /></p>
<h2 data-start="910" data-end="929">Team and Founders</h2>
<p data-start="931" data-end="1040">AgentLISA’s technical team includes senior security engineers and researchers from Meta, Aptos, and CertiK.</p>
<p data-start="1042" data-end="1056">Key advisor:</p>
<ul data-start="1057" data-end="1102">
<li data-start="1057" data-end="1102">
<p data-start="1059" data-end="1102">Brad Moon, blockchain security researcher</p>
</li>
</ul>
<h2>Investors and Strategic Partnerships</h2>
<p data-start="1104" data-end="1318">The project prioritizes technical output and academic collaboration, including partnerships with Nanyang Technological University (NTU), and is active in South Korea and Asia with events and developer engagement.</p>
<p data-start="40" data-end="141">The project secured a significant $12 million investment in November 2025. Key backers include:</p>
<p data-start="143" data-end="348">Investors: Redpoint Ventures, UoB Venture Management, Signum Capital, NGC Ventures, Hash Global, LongHash Ventures, M23 Capital, Kryptos, Fellows Fund, ByteTrade Lab, Summer Ventures, and Woori Ventures.</p>
<p data-start="350" data-end="375">Strategic Partnerships:</p>
<ul data-start="377" data-end="727" data-is-last-node="" data-is-only-node="">
<li data-start="377" data-end="444">
<p data-start="379" data-end="444">x402 Protocol: Security integration for autonomous payments</p>
</li>
<li data-start="445" data-end="499">
<p data-start="447" data-end="499">Questflow: Security for AI agent orchestration</p>
</li>
<li data-start="500" data-end="572">
<p data-start="502" data-end="572">SurgeOnSui: Pre-audit support for Sui network launchpad projects</p>
</li>
<li data-start="573" data-end="727" data-is-last-node="">
<p data-start="575" data-end="727" data-is-last-node="">Ecosystem Support: Collaboration with major chains including BNB Chain, Sui, and Aptos, as well as protocol-level partnerships with CertiK and Taiko</p>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-59683 " src="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-partner-1024x576.jpg" alt="" width="811" height="456" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-partner-1024x576.jpg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-partner-300x169.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-partner-768x432.jpg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-partner-1536x864.jpg 1536w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-partner-2048x1152.jpg 2048w" sizes="auto, (max-width: 811px) 100vw, 811px" /></p>
<h2 data-start="1932" data-end="1949">Project Concept</h2>
<p data-start="1951" data-end="2159">AgentLISA analyzes complex smart contracts using a multi-layered architecture with a Tree-of-Thought mechanism, combining rule-based pre-scans with LLM-powered symbolic execution and logical validation.</p>
<p data-start="2161" data-end="2200">Future Features (Roadmap Highlights):</p>
<ul data-start="2201" data-end="2328">
<li data-start="2201" data-end="2238">
<p data-start="2203" data-end="2238">Auto-Repair (automatic bug fixes)</p>
</li>
<li data-start="2239" data-end="2276">
<p data-start="2241" data-end="2276">Proof-of-Concept (PoC) generation</p>
</li>
<li data-start="2277" data-end="2328">
<p data-start="2279" data-end="2328">Advanced LLM models for smart contract auditing</p>
</li>
</ul>
<h2 data-start="2330" data-end="2344">How It Works</h2>
<p data-start="2346" data-end="2409">AgentLISA executes code analysis as a multi-layered pipeline:</p>
<ul data-start="2410" data-end="2794">
<li data-start="2410" data-end="2500">
<p data-start="2412" data-end="2500">Code Analysis Pipeline: Contracts undergo both rule-based and logic-based analysis</p>
</li>
<li data-start="2501" data-end="2593">
<p data-start="2503" data-end="2593">Filtering Module: Redundant data removed via semantic slicing and rule-based filters</p>
</li>
<li data-start="2594" data-end="2691">
<p data-start="2596" data-end="2691">Tree-of-Thought Validation: LLM-powered symbolic execution ensures genuine risk detection</p>
</li>
<li data-start="2692" data-end="2794">
<p data-start="2694" data-end="2794">Comprehensive Database: Continuously updated security taxonomy and logic rules feed the system</p>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-59685 " src="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-work-1024x578.jpg" alt="" width="812" height="458" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-work-1024x578.jpg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-work-300x169.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-work-768x433.jpg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-work-1536x867.jpg 1536w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-work.jpg 1914w" sizes="auto, (max-width: 812px) 100vw, 812px" /></p>
<h2 data-start="2796" data-end="2826">Governance and Token Details</h2>
<p data-start="2828" data-end="2936">AgentLISA incentivizes community participation via the “Road to Genesis” campaign and a points system.</p>
<p data-start="2938" data-end="2958">Token Information:</p>
<ul data-start="2959" data-end="3155">
<li data-start="2959" data-end="2976">
<p data-start="2961" data-end="2976">Symbol: $LISA</p>
</li>
<li data-start="2977" data-end="2997">
<p data-start="2979" data-end="2997">Launch: Upcoming</p>
</li>
<li data-start="2998" data-end="3042">
<p data-start="3000" data-end="3042">Contract Address: Not publicly disclosed</p>
</li>
<li data-start="3043" data-end="3079">
<p data-start="3045" data-end="3079">Total Supply: 1,000,000,000 LISA</p>
</li>
<li data-start="3080" data-end="3114">
<p data-start="3082" data-end="3114">Max Supply: 1,000,000,000 LISA</p>
</li>
<li data-start="3115" data-end="3155">
<p data-start="3117" data-end="3155">Circulating Supply: 216,220,000 LISA</p>
</li>
</ul>
<h2 data-start="3157" data-end="3175">Token Use Cases</h2>
<ul data-start="3176" data-end="3302">
<li data-start="3176" data-end="3206">
<p data-start="3178" data-end="3206">Discounts on platform fees</p>
</li>
<li data-start="3207" data-end="3247">
<p data-start="3209" data-end="3247">Access to advanced analytics reports</p>
</li>
<li data-start="3248" data-end="3267">
<p data-start="3250" data-end="3267">Staking rewards</p>
</li>
<li data-start="3268" data-end="3302">
<p data-start="3270" data-end="3302">Future governance voting (DAO)</p>
</li>
</ul>
<h2 data-start="3304" data-end="3344">Roadmap and Future Vision (2025–2027+)</h2>
<ul data-start="3346" data-end="3835">
<li data-start="3346" data-end="3459">
<p data-start="3348" data-end="3459">2025 Q4 – Public Launch: Multi-chain support, Solidity &amp; Rust contract analysis, $LISA TGE, exchange listings</p>
</li>
<li data-start="3460" data-end="3549">
<p data-start="3462" data-end="3549">December 18, 2025 – Binance Alpha will be the first platform to list AgentLISA (LISA)</p>
</li>
<li data-start="3550" data-end="3629">
<p data-start="3552" data-end="3629">2026 Q1 – Developer Experience: Hybrid audit workflows with automatic fixes</p>
</li>
<li data-start="3630" data-end="3719">
<p data-start="3632" data-end="3719">2026 Q2 – Proactive Security: Real-time on-chain monitoring for suspicious activities</p>
</li>
<li data-start="3720" data-end="3835">
<p data-start="3722" data-end="3835">2026+ – Autonomous Infrastructure: Formal verification integration to establish default Web3 security standards</p>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-59684 " src="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-roadmap-1024x606.jpg" alt="" width="732" height="433" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-roadmap-1024x606.jpg 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-roadmap-300x177.jpg 300w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-roadmap-768x454.jpg 768w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-roadmap.jpg 1314w" sizes="auto, (max-width: 732px) 100vw, 732px" /></p>
<h2 data-start="3837" data-end="3861">Features and Ecosystem</h2>
<ul data-start="3863" data-end="4203">
<li data-start="3863" data-end="3946">
<p data-start="3865" data-end="3946">Speed and Accuracy: 99% faster than traditional audits, 90%+ detection rate</p>
</li>
<li data-start="3947" data-end="4035">
<p data-start="3949" data-end="4035">PaymentShield: Extra security for autonomous payments (honeypot &amp; OFAC scanning)</p>
</li>
<li data-start="4036" data-end="4135">
<p data-start="4038" data-end="4135">LISA-Bench: Over 10,000 test cases in the largest open-source blockchain security benchmark</p>
</li>
<li data-start="4136" data-end="4203">
<p data-start="4138" data-end="4203">Accessibility: 5 free scans initially, then ~$0.80 per scan</p>
</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-59682 " src="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-features-1024x571.png" alt="" width="779" height="434" srcset="https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-features-1024x571.png 1024w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-features-300x167.png 300w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-features-768x428.png 768w, https://coinengineer.net/blog/wp-content/uploads/2025/12/lisa-features.png 1536w" sizes="auto, (max-width: 779px) 100vw, 779px" /></p>
<h2 data-start="4205" data-end="4228">Ecosystem Highlights</h2>
<ul data-start="4229" data-end="4509">
<li data-start="4229" data-end="4292">
<p data-start="4231" data-end="4292">Developers: Free/credit-based scans and BNB Chain discounts</p>
</li>
<li data-start="4293" data-end="4348">
<p data-start="4295" data-end="4348">AI Agents: Automated scanning and payments via x402</p>
</li>
<li data-start="4349" data-end="4419">
<p data-start="4351" data-end="4419">Community: Public scans, rewards for contributions, events in Asia</p>
</li>
<li data-start="4420" data-end="4463">
<p data-start="4422" data-end="4463">Integrations: DappBay, Questflow, Surge</p>
</li>
<li data-start="4464" data-end="4509">
<p data-start="4466" data-end="4509">Benchmarking: LISA-Bench open source data</p>
</li>
</ul>
<h2>Official Links</h2>
<ul>
<li><a href="https://agentlisa.ai/">Website</a></li>
<li><a href="https://x.com/AgentLISA_ai">Twitter</a></li>
<li><a href="https://t.me/AgentLISA_AI">Telegram</a></li>
</ul>
<p><em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/what-is-agentlisa-lisa/">What is AgentLISA (LISA) ?</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/what-is-agentlisa-lisa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/12/what-is-lisa.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/12/what-is-lisa.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>SUI Invests $10 Million in Security After Cetus Hack </title>
		<link>https://coinengineer.net/blog/sui-10m-security-investment-after-cetus-hack/</link>
					<comments>https://coinengineer.net/blog/sui-10m-security-investment-after-cetus-hack/#respond</comments>
		
		<dc:creator><![CDATA[Yeliz Akmaca]]></dc:creator>
		<pubDate>Tue, 27 May 2025 09:50:21 +0000</pubDate>
				<category><![CDATA[Altcoin Projects]]></category>
		<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[bug bounty]]></category>
		<category><![CDATA[Cetus Protocol]]></category>
		<category><![CDATA[DeFi breach]]></category>
		<category><![CDATA[DEX hack]]></category>
		<category><![CDATA[formal verification]]></category>
		<category><![CDATA[Move language]]></category>
		<category><![CDATA[SlowMist]]></category>
		<category><![CDATA[smart contract audit]]></category>
		<category><![CDATA[smart contract bug]]></category>
		<category><![CDATA[sui]]></category>
		<category><![CDATA[sui network]]></category>
		<category><![CDATA[Verichains]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=43201</guid>

					<description><![CDATA[<p>As you may know, attackers targeted Cetus Protocol, the largest decentralized exchange (DEX) and liquidity provider on the Sui network, last week. In this attack, they seized $223 million worth of crypto assets. The network acted swiftly to freeze $162 million. The Cetus team offered a $6 million bounty to recover the remaining $60 million. </p>
<p>The post <a href="https://coinengineer.net/blog/sui-10m-security-investment-after-cetus-hack/">SUI Invests $10 Million in Security After Cetus Hack </a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span data-c>As you may know, attackers targeted <a href="https://coinengineer.net/blog/sui-price-plunges-after-cetus-hack-all-eyes-on-key-support/"><strong>Cetus Protocol</strong></a>, the largest <strong>decentralized exchange (DEX)</strong> and liquidity provider on the <strong>Sui network</strong>, last week. In this attack, they seized <strong>$223 million</strong> worth of crypto assets. The network acted swiftly to freeze $162 million. <strong>The Cetus</strong> team offered a $6 million bounty to recover the remaining $60 million.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c><strong>The Cetus incident</strong>, which has made waves in the blockchain world recently, was linked by many to a security vulnerability in the<strong> Sui or Move platforms</strong>. However, according to statements by developers and security experts, these claims are inaccurate. The incident actually occurred due to an error in Cetus&#8217;s own math library. They assert that the issue was not caused by a direct vulnerability in the <strong>Sui network or the Move programming.</strong> A miscalculation in <strong>Cetus’s mathematical operations</strong> led to incorrect results and unexpected consequences. Therefore, it is considered a problem specific to the Cetus project.</span><span data-ccp-props="{}"> </span></p>
<p><span data-c>According to the published report, the network was designed specifically to support the development of more secure smart contracts. The team expressed that it was deeply disappointed to witness such a major incident on a single <strong>dApp</strong>. They also emphasized that incidents like this are part of the growth process that every <strong>major blockchain</strong> faces over time. Even the best system designs or programming languages cannot fully prevent human error.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>SUI $10 Million Security Investment</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>Sui has taken</strong> a significant step to strengthen ecosystem security. It will elaborate on its existing security measures. Additionally, it has allocated $10 million toward audits, bug bounty programs, formal verification, and other security initiatives. <strong>Sui is committed to spending</strong> an additional $10 million on security efforts. The team is working closely with the developer community to refine its security plans.</span><span data-ccp-props="{}"> </span></p>
<h2><span data-c>SUI Technical Details</span><span data-ccp-props="{}"> </span></h2>
<p><span data-c><strong>According to security firm SlowMist’s analysis</strong>, the &#8220;checked_shlw&#8221; function in Cetus’s smart contract failed to perform overflow checks correctly. This flaw allowed attackers to over-mint liquidity with a single token. <strong>Research by Verichains</strong> indicated that similar mathematical errors might exist in other projects within the <strong>Sui</strong> ecosystem. However, those projects have started correcting the related issues.</span><span data-ccp-props="{}"> </span></p>
<p><span data-ccp-props="{}"> <em class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Telegram, </strong></a><a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">YouTube</strong></a>, and <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)"><strong class="darkmysite_style_txt_border darkmysite_processed" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">Twitter</strong></a> channels for the latest <a class="darkmysite_style_txt_border darkmysite_style_link darkmysite_processed" title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7" data-darkmysite_alpha_bg="rgba(0, 0, 0, 0)">news</a> and updates.</em></span></p>
<p>The post <a href="https://coinengineer.net/blog/sui-10m-security-investment-after-cetus-hack/">SUI Invests $10 Million in Security After Cetus Hack </a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/sui-10m-security-investment-after-cetus-hack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-27T005704.037.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/taslak-ce-2025-05-27T005704.037.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Mobius Token Smart Contracts Exploited on BNB Chain</title>
		<link>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/</link>
					<comments>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Sun, 11 May 2025 12:00:33 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[blockchain security]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[BTC theft]]></category>
		<category><![CDATA[crypto attack]]></category>
		<category><![CDATA[Crypto Exploit]]></category>
		<category><![CDATA[crypto forensics]]></category>
		<category><![CDATA[crypto hack]]></category>
		<category><![CDATA[crypto investing]]></category>
		<category><![CDATA[cyvers]]></category>
		<category><![CDATA[digital asset theft]]></category>
		<category><![CDATA[MBU]]></category>
		<category><![CDATA[Mobius Token]]></category>
		<category><![CDATA[PeckShield]]></category>
		<category><![CDATA[smart contract hack]]></category>
		<category><![CDATA[smart contract vulnerability]]></category>
		<category><![CDATA[stablecoin]]></category>
		<category><![CDATA[usdt]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=42119</guid>

					<description><![CDATA[<p>According to blockchain security firm Cyvers Alerts, Mobius Token (MBU) smart contracts on the BNB Chain were exploited in a critical attack on May 11, resulting in the theft of 28.5 million MBU tokens, worth over $2.15 million. Millions Lost Within Minutes The attacker deployed a smart contract from address 0xb32a53… at 07:31 UTC and</p>
<p>The post <a href="https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/">Mobius Token Smart Contracts Exploited on BNB Chain</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2622" data-end="2870">According to blockchain security firm Cyvers Alerts, <strong data-start="2675" data-end="2697">Mobius Token (MBU)</strong> smart contracts on the <strong data-start="2721" data-end="2734">BNB Chain</strong> were exploited in a <strong data-start="2755" data-end="2774">critical attack</strong> on May 11, resulting in the theft of <strong data-start="2812" data-end="2832">28.5 million MBU</strong> tokens, worth over <strong data-start="2852" data-end="2869">$2.15 million</strong>.</p>
<h2 data-start="2872" data-end="2908">Millions Lost Within Minutes</h2>
<p class="" data-start="2909" data-end="3172">The attacker deployed a smart contract from address 0xb32a53… at 07:31 UTC and launched the exploit two minutes later from contract 0x631adf…, draining funds from wallet 0xb5252f… The stolen tokens were quickly converted into <strong data-start="3135" data-end="3143">USDT</strong>, totaling <strong data-start="3154" data-end="3171">$2,152,219.99</strong>.</p>
<hr />
<p data-start="3174" data-end="3450"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p class="" data-start="3174" data-end="3450">Cyvers classified the exploit as &#8220;critical,&#8221; citing <strong data-start="3226" data-end="3259">abnormal transaction patterns</strong> and <strong data-start="3264" data-end="3292">suspicious contract code</strong>. As of publication, the attacker’s wallet remains active and has not moved the stolen assets. No official statement has been issued by the Mobius Token team.</p>
<p class="" data-start="3452" data-end="3591">Cyvers noted their system had flagged the malicious contract <strong data-start="3513" data-end="3534">two minutes prior</strong> to the exploit, but it was too late to prevent the loss.</p>
<p data-start="3452" data-end="3591"><img loading="lazy" decoding="async" class="aligncenter wp-image-155590 " src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/05/mobius.png" alt="mobius" width="701" height="494" /></p>
<h2 data-start="3593" data-end="3630">Crypto Exploits Surge in 2025</h2>
<p class="" data-start="3631" data-end="3899">This incident follows a wave of crypto hacks reported in <strong data-start="3688" data-end="3702">April 2025</strong>, when <strong data-start="3709" data-end="3723">PeckShield</strong> identified over <strong data-start="3740" data-end="3756">$360 million</strong> in digital asset losses from 18 attacks — a <strong data-start="3801" data-end="3818">990% increase</strong> from March. The largest was a <strong data-start="3849" data-end="3869">$330 million BTC</strong> theft via social engineering.</p>
<p class="" data-start="3901" data-end="4097">As the crypto space grows, so do the threats. This attack highlights the importance of not only decentralization but <strong data-start="4018" data-end="4052">robust smart contract security</strong> in protecting investors and protocols alike.</p>
<hr />
<p data-start="3901" data-end="4097"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/">Mobius Token Smart Contracts Exploited on BNB Chain</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/mobius-token-smart-contracts-exploited-on-bnb-chain/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/05/mobius-2.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/05/mobius-2.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>North Korean Hackers Target Crypto Devs with Fake Job Offers</title>
		<link>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/</link>
					<comments>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Thu, 17 Apr 2025 15:00:40 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[API theft]]></category>
		<category><![CDATA[crypto dev hack]]></category>
		<category><![CDATA[developer safety]]></category>
		<category><![CDATA[fake job offers]]></category>
		<category><![CDATA[GitHub attacks]]></category>
		<category><![CDATA[LinkedIn scam]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[North Korea]]></category>
		<category><![CDATA[Slow Pisces]]></category>
		<category><![CDATA[TraderTraitor]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=40403</guid>

					<description><![CDATA[<p>North Korean hacking groups are luring crypto developers with fake job offers and coding tests laced with malware, according to cybersecurity experts. Malware Hidden in &#8220;Coding Assignments&#8221; Hackers from the group Slow Pisces (aka Jade Sleet / TraderTraitor) approach developers on LinkedIn, offering dream gigs in DeFi or blockchain security. Once trust is built, they</p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p class="" data-start="2409" data-end="2571"><strong data-start="2409" data-end="2440">North Korean hacking groups</strong> are luring <strong data-start="2452" data-end="2473">crypto developers</strong> with <strong data-start="2479" data-end="2515">fake job offers and coding tests</strong> laced with malware, according to cybersecurity experts.</p>
<h2 data-start="2573" data-end="2619">Malware Hidden in &#8220;Coding Assignments&#8221;</h2>
<p class="" data-start="2621" data-end="2972">Hackers from the group <strong data-start="2644" data-end="2692">Slow Pisces (aka Jade Sleet / TraderTraitor)</strong> approach developers on LinkedIn, offering dream gigs in <strong data-start="2749" data-end="2757">DeFi</strong> or <strong data-start="2761" data-end="2784">blockchain security</strong>. Once trust is built, they send malware-infected coding challenges hosted on GitHub. When opened, these files steal <strong data-start="2901" data-end="2913">SSH keys</strong>, <strong data-start="2915" data-end="2943">cloud access credentials</strong>, and <strong data-start="2949" data-end="2971">crypto wallet data</strong>.</p>
<hr />
<h4 data-start="1444" data-end="1471"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></h4>
<hr />
<h2 data-start="2974" data-end="3017">Using Freelance Platforms to Spread</h2>
<p class="" data-start="3019" data-end="3159">According to <strong data-start="3032" data-end="3042">Hacken</strong> and <strong data-start="3047" data-end="3057">Cyvers</strong>, platforms like <strong data-start="3074" data-end="3084">Upwork</strong> and <strong data-start="3089" data-end="3099">Fiverr</strong> are also being used by attackers posing as hiring managers.</p>
<p data-start="3019" data-end="3159"><em><span style="font-size: 14.4px;">“They create </span>credible profiles and fake resumes</em><span style="font-size: 14.4px;"><em> just to infiltrate Web3 firms via targeted developers,”</em> says </span>Hayato Shigekawa<span style="font-size: 14.4px;"> of </span>Chainalysis<span style="font-size: 14.4px;">.</span></p>
<h2 data-start="3318" data-end="3348">Security Tips for Devs</h2>
<ul>
<li data-start="3352" data-end="3420">Always use <strong data-start="3363" data-end="3396">virtual machines or sandboxes</strong> to test external code</li>
<li data-start="3423" data-end="3468"><strong data-start="3423" data-end="3444">Verify job offers</strong> via official channels</li>
<li data-start="3471" data-end="3510">Never store secrets in <strong data-start="3494" data-end="3508">plain text</strong></li>
<li data-start="3513" data-end="3579">Be wary of <strong data-start="3524" data-end="3547">unverified packages</strong> and unsolicited opportunities</li>
<li data-start="3582" data-end="3643">Implement <strong data-start="3592" data-end="3615">endpoint protection</strong> and <strong data-start="3620" data-end="3643">operational hygiene</strong></li>
</ul>
<p><em><span style="font-size: 14.4px;">“If it looks </span>too good to be true</em><span style="font-size: 14.4px;"><em>, it probably is,”</em> warns </span><strong style="font-size: 14.4px;" data-start="3708" data-end="3723">Luis Lubeck</strong><span style="font-size: 14.4px;"> of Hacken.</span></p>
<hr />
<p><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="noreferrer noopener nofollow"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="noreferrer noopener nofollow"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/">North Korean Hackers Target Crypto Devs with Fake Job Offers</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/north-korean-hackers-target-crypto-devs-with-fake-job-offers/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2024/12/Hacker-Earns-500000-After-Taking-Over-15-X-Accounts.png' width='58' height='33' /></media:content>	</item>
		<item>
		<title>Four.Meme Restarted Operation After Attacks!</title>
		<link>https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/</link>
					<comments>https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/#respond</comments>
		
		<dc:creator><![CDATA[Yigit Taha OZTURK]]></dc:creator>
		<pubDate>Wed, 19 Mar 2025 08:30:28 +0000</pubDate>
				<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[EN]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[AI scams]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[Bybit hack]]></category>
		<category><![CDATA[CertiK analysis]]></category>
		<category><![CDATA[Chainalysis report]]></category>
		<category><![CDATA[crypto investor protection]]></category>
		<category><![CDATA[cybercrime syndicates]]></category>
		<category><![CDATA[Decentralized Exchange]]></category>
		<category><![CDATA[digital asset loss]]></category>
		<category><![CDATA[ExVul report]]></category>
		<category><![CDATA[February crypto hacks]]></category>
		<category><![CDATA[FixedFloat Exchange]]></category>
		<category><![CDATA[Four.meme]]></category>
		<category><![CDATA[liquidity manipulation]]></category>
		<category><![CDATA[sandwich attack]]></category>
		<category><![CDATA[SBL token]]></category>
		<category><![CDATA[security vulnerability]]></category>
		<category><![CDATA[stablecoin laundering]]></category>
		<category><![CDATA[Web3 security]]></category>
		<guid isPermaLink="false">https://coinengineer.net/blog/?p=38675</guid>

					<description><![CDATA[<p>The BNB Chain-based memecoin launch platform Four.Meme has resumed its operations after suffering a sandwich attack that exploited around $120,000 in funds. Security Issue Resolved, Operations Restarted! In an X post dated March 18, Four.Meme announced that its launch function is back online after addressing a security vulnerability. Earlier, it had suspended the function, stating</p>
<p>The post <a href="https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/">Four.Meme Restarted Operation After Attacks!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p data-start="280" data-end="448">The <strong data-start="284" data-end="297">BNB Chain</strong>-based memecoin launch platform <strong data-start="329" data-end="342">Four.Meme</strong> has resumed its operations after suffering a sandwich attack that exploited around <strong data-start="426" data-end="438">$120,000</strong> in funds.</p>
<h2 data-start="455" data-end="505">Security Issue Resolved, Operations Restarted!</h2>
<p data-start="507" data-end="731">In an <strong data-start="513" data-end="518">X</strong> post dated <strong data-start="530" data-end="542">March 18</strong>, <strong data-start="544" data-end="557">Four.Meme</strong> announced that its launch function is back online after addressing a security vulnerability. Earlier, it had suspended the function, stating the platform was &#8220;under attack.&#8221;</p>
<p data-start="507" data-end="731"><em><span style="font-size: 14.4px;">&#8220;The launch function has now been resumed after a thorough security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is underway.&#8221;</span></em></p>
<p data-start="735" data-end="950">— <strong data-start="932" data-end="945">Four.Meme</strong> Team</p>
<p data-start="735" data-end="950"><img loading="lazy" decoding="async" class="aligncenter wp-image-151397 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/Four.Meme_.png" alt="Four.Meme" width="539" height="555" /></p>
<h2 data-start="957" data-end="1000">$120,000 Sandwich Attack Confirmed!</h2>
<p data-start="1002" data-end="1181">Web3 security firm <strong data-start="1021" data-end="1030">ExVul</strong> reported in a <strong data-start="1045" data-end="1057">March 18</strong> <strong data-start="1058" data-end="1063">X</strong> post that the exploit was a market manipulation tactic known as a sandwich attack, netting the attacker <strong data-start="1168" data-end="1180">$120,000</strong>.</p>
<hr />
<p data-start="1183" data-end="1429"><strong><em>You Might Be Interested In: <a href="https://coinengineer.net/blog/elon-musk-talks-about-the-name-of-a-new-memecoin/">Elon Musk Talks About the Name of a New Memecoin!</a></em></strong></p>
<hr />
<p data-start="1183" data-end="1429">According to <strong data-start="1196" data-end="1205">ExVul</strong>, the attacker &#8220;pre-calculated the address for creating the liquidity pool’s trading pair&#8221; and used one of the platform’s functions to purchase tokens. This allowed them to bypass <strong data-start="1385" data-end="1398">Four.Meme</strong>’s token transfer restrictions.</p>
<p data-start="1183" data-end="1429"><em><span style="font-size: 14.4px;">&#8220;Subsequently, the hacker lay in wait for </span><strong style="font-size: 14.4px;" data-start="1475" data-end="1488">Four.Meme</strong><span style="font-size: 14.4px;"> to add liquidity to the transaction, ultimately siphoning off the funds.&#8221;</span></em></p>
<p data-start="1433" data-end="1578">— <strong data-start="1569" data-end="1578">ExVul</strong></p>
<h2 data-start="1585" data-end="1653">CertiK Also Confirms: The Attacker Escaped with 192 BNB!</h2>
<p data-start="1655" data-end="1908">Blockchain security firm <strong data-start="1680" data-end="1690">CertiK</strong> confirmed similar details, stating that the attacker transferred an imbalanced amount of unlaunched tokens to pair addresses before the liquidity pair was created. They then manipulated the price at launch for profit.</p>
<p data-start="1910" data-end="2135">For example, in the case of the <strong data-start="1942" data-end="1955">SBL Token</strong>, the attacker sent a small amount of <strong data-start="1993" data-end="2006">SBL Token</strong> to the pre-calculated pair address, then made a <strong data-start="2055" data-end="2067">21.1 BNB</strong> profit by sandwiching the liquidity addition transaction at launch.</p>
<p data-start="2137" data-end="2330">In total, the attacker walked away with approximately <strong data-start="2191" data-end="2202">192 BNB</strong> (worth about <strong data-start="2216" data-end="2228">$120,000</strong>), which they later sent to the decentralized crypto exchange <strong data-start="2290" data-end="2304">FixedFloat</strong>, according to <strong data-start="2319" data-end="2329">CertiK</strong>.</p>
<p data-start="2137" data-end="2330"><img loading="lazy" decoding="async" class="aligncenter wp-image-151396 size-full" src="https://coinmuhendisi.com/blog/wp-content/uploads/2025/03/four.meme_.jpeg" alt="Four.Meme" width="1020" height="672" /></p>
<h2 data-start="2337" data-end="2395">Four.Meme Hit by Its Second Exploit in Two Months!</h2>
<p data-start="2397" data-end="2601">This attack marks the second time in two months that the <strong data-start="2454" data-end="2467">Four.Meme</strong> platform has been exploited. The previous attack on <strong data-start="2520" data-end="2535">February 11</strong> resulted in a loss of about <strong data-start="2564" data-end="2576">$183,000</strong> worth of digital assets.</p>
<p data-start="2603" data-end="2796">In the wider crypto industry, <strong data-start="2633" data-end="2645">February</strong> saw <strong data-start="2650" data-end="2667">$1.53 billion</strong> in losses due to scams, exploits, and hacks, with the <strong data-start="2722" data-end="2738">$1.4 billion</strong> <strong data-start="2739" data-end="2748">Bybit</strong> hack accounting for the majority of the losses.</p>
<p data-start="2798" data-end="3089">Blockchain analytics firm <strong data-start="2824" data-end="2839">Chainalysis</strong> reported a total of <strong data-start="2860" data-end="2875">$51 billion</strong> in illicit transaction volume over the past year. This increase is attributed to a professionalized era of crypto crime dominated by AI-powered scams, stablecoin laundering, and efficient cybercriminal syndicates.</p>
<hr />
<p data-start="2798" data-end="3089"><em>You can also freely share your thoughts and comments about the topic in the comment section. Additionally, don’t forget to follow us on our <a href="https://t.me/coinengineernews" target="_blank" rel="nofollow noopener"><strong>Telegram, </strong></a><a href="https://www.youtube.com/@CoinEngineer" target="_blank" rel="nofollow noopener"><strong>YouTube</strong></a>, and <a href="https://twitter.com/coinengineers" target="_blank" rel="nofollow noopener"><strong>Twitter</strong></a> channels for the latest <a title="News" href="https://coinengineer.net/blog/news/" data-internallinksmanager029f6b8e52c="7">news</a> and updates.</em></p>
<p>The post <a href="https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/">Four.Meme Restarted Operation After Attacks!</a> appeared first on <a href="https://coinengineer.net/blog">Coin Engineer</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://coinengineer.net/blog/four-meme-restarted-operation-after-attacks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<media:content url='https://coinengineer.net/blog/wp-content/uploads/2025/02/four.meme_ce.png' type='image/webp' medium='image' width='1920' height='1080'><media:title type='plain'> <![CDATA[USA]]></media:title><media:thumbnail url='https://coinengineer.net/blog/wp-content/uploads/2025/02/four.meme_ce.png' width='58' height='33' /></media:content>	</item>
	</channel>
</rss>
