<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>exploit &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/exploit/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Sun, 01 Feb 2026 23:01:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>CrossCurve Exploit: $3M Loss &#8211; Urgent Security Alert</title>
		<link>https://cryptoupdate.io/2026/02/02/crosscurve-exploit-3m-loss-security-alert/</link>
					<comments>https://cryptoupdate.io/2026/02/02/crosscurve-exploit-3m-loss-security-alert/#respond</comments>
		
		<dc:creator><![CDATA[Thomas Bergstrom]]></dc:creator>
		<pubDate>Sun, 01 Feb 2026 23:01:17 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[CrossCurve]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[smart contracts]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2026/02/02/crosscurve-exploit-3m-loss-security-alert/</guid>

					<description><![CDATA[<p>CrossCurve Exploit has sent shockwaves through the crypto community as the protocol&#8217;s cross-chain bridge suffered a major security breach, resulting in a reported $3 million loss across multiple networks. This incident highlights the critical importance of robust security measures in decentralized finance (DeFi). Vulnerability in Smart Contracts The attack was confirmed by CrossCurve, who disclosed [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2026/02/02/crosscurve-exploit-3m-loss-security-alert/">CrossCurve Exploit: $3M Loss &#8211; Urgent Security Alert</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>CrossCurve Exploit</strong> has sent shockwaves through the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> community as the protocol&rsquo;s cross-chain bridge suffered a major security breach, resulting in a reported $3 million loss across multiple networks. This incident highlights the critical importance of robust security measures in decentralized finance (DeFi).</p>
<h2>Vulnerability in Smart Contracts</h2>
<p>The attack was confirmed by CrossCurve, who disclosed that a vulnerability in one of their smart contracts was exploited. This flaw allowed unauthorized users to spoof messages and bypass validation procedures, leading to the unauthorized unlocking of tokens.</p>
<p>Security experts from Defimon Alerts reported that the exploit affected several networks, underscoring the widespread impact of the breach. The exploit involved the manipulation of the ReceiverAxelar contract, enabling attackers to expressExecute with a spoofed cross-chain message.</p>
<h3>Community and Partner Reactions</h3>
<p>In response to the exploit, Curve Finance, a key partner of CrossCurve, advised its users to re-evaluate their positions in CrossCurve pools. They emphasized the importance of making informed decisions when engaging with third-party projects.</p>
<p>Security is paramount in the ever-evolving <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space, and incidents like this serve as a stark reminder for all stakeholders to exercise caution and diligence.</p>
<h3>Ongoing Investigation</h3>
<p>CrossCurve has urged all users to halt interactions with their platform while a thorough investigation is conducted. The community is advised to stay vigilant and await further updates from the protocol&rsquo;s team.</p>
<p>As the investigation continues, industry experts are calling for enhanced security protocols and regular audits to prevent future exploits.</p>
<p>This developing story brings to light the vulnerabilities inherent in the DeFi ecosystem, urging a collective effort towards building a safer <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> environment.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2026/02/02/crosscurve-exploit-3m-loss-security-alert/">CrossCurve Exploit: $3M Loss &#8211; Urgent Security Alert</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2026/02/02/crosscurve-exploit-3m-loss-security-alert/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Flow Blockchain&#8217;s Rollback: 5 Powerful Insights on Controversial Decision</title>
		<link>https://cryptoupdate.io/2025/12/28/flow-blockchain-rollback-decision-controversy/</link>
					<comments>https://cryptoupdate.io/2025/12/28/flow-blockchain-rollback-decision-controversy/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 28 Dec 2025 19:01:02 +0000</pubDate>
				<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Market Stability]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[deBridge]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Flow]]></category>
		<category><![CDATA[hard-fork]]></category>
		<category><![CDATA[Rollback]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/12/28/flow-blockchain-rollback-decision-controversy/</guid>

					<description><![CDATA[<p>Flow Blockchain is facing significant scrutiny following its controversial decision to rollback the network&#8217;s transaction history to address a $3.9 million exploit. This move, intended to restore the network to a state before the incident, has sparked a wave of reactions from key stakeholders, particularly due to a lack of coordination with ecosystem partners. The [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/28/flow-blockchain-rollback-decision-controversy/">Flow Blockchain&#8217;s Rollback: 5 Powerful Insights on Controversial Decision</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Flow Blockchain</strong> is facing significant scrutiny following its controversial decision to rollback the network&#8217;s transaction history to address a $3.9 million exploit. This move, intended to restore the network to a state before the incident, has sparked a wave of reactions from key stakeholders, particularly due to a lack of coordination with ecosystem partners.</p>
<p>The <em>Flow Blockchain</em> intends to restart operations after rolling back to a checkpoint prior to the exploit, which occurred late on a Friday. However, this unilateral decision has drawn criticism, especially from cross-chain bridge operators who claim they were not consulted beforehand.</p>
<h2>Rollback Plan Faces Backlash</h2>
<p>Alex Smirnov, co-founder of deBridge, a major bridge provider for Flow Blockchain, expressed discontent on X, stating his team was not informed of the rollback in advance. &#8220;The Flow team decided on a rollback without consulting us, posing significant risk,&#8221; he noted.</p>
<p>Although the Flow team eventually reached out to deBridge after public criticism, they remained committed to the rollback strategy. Smirnov questioned the efficacy of this approach since the attacker had already transferred funds off the Flow network.</p>
<h2>Rollback vs. Hard Fork Debate</h2>
<p>Smirnov argued that the rollback would unfairly impact honest users and partners. &#8220;A rollback punishes innocent parties instead of the attacker, amplifying damage across the ecosystem,&#8221; he explained.</p>
<p>In contrast, Smirnov and LayerZero, another cross-chain protocol, advocate for a hard fork. This alternative would address the vulnerability without reversing the entire ledger, similar to BNB Chain&#8217;s past strategy.</p>
<p>&#8220;A targeted hard fork is the only viable solution for addressing such vulnerabilities,&#8221; Smirnov emphasized, highlighting that deBridge&#8217;s non-custodial design shields it from financial exposure but not from broader ecosystem risks.</p>
<h2>Coordination and Communication Concerns</h2>
<p>Smirnov highlighted a lack of communication with major exchanges trading FLOW. This gap raises uncertainty about handling deposits and withdrawals during the rollback window, potentially exposing exchanges to losses.</p>
<p>To mitigate risks, deBridge urges Flow to establish a collaborative &#8220;war room&#8221; involving bridges, asset custodians, and security groups to chart a more coordinated path forward.</p>
<p>The Flow Foundation acknowledged this coordination issue and extended the synchronization window to prevent data inconsistencies and service interruptions.</p>
<h2>Market Impact and Future Steps</h2>
<p>The exploit, confirmed by the Flow Foundation on December 27, involved a vulnerability in the execution layer, allowing the attacker to mint tokens. Following the disclosure, the FLOW token&#8217;s value plummeted over 40%, stabilizing around $0.11.</p>
<p>Exchanges like Upbit, Bithumb, and Coinone suspended transactions, and the Digital Asset Exchange Alliance issued a risk warning. The Flow Foundation promised a technical post-mortem within 72 hours, but missed an update deadline, leaving the community in suspense.</p>
<p>As the Flow Blockchain navigates this crisis, the debate between rollback and hard fork continues, with ecosystem stakeholders advocating for solutions that minimize harm and strengthen network integrity.</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/28/flow-blockchain-rollback-decision-controversy/">Flow Blockchain&#8217;s Rollback: 5 Powerful Insights on Controversial Decision</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/12/28/flow-blockchain-rollback-decision-controversy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Yearn Finance Exploit: 5 Amazing Insights into the $3 Million Tornado Cash Attack</title>
		<link>https://cryptoupdate.io/2025/12/01/yearn-finance-exploit-3-million-tornado-cash-attack/</link>
					<comments>https://cryptoupdate.io/2025/12/01/yearn-finance-exploit-3-million-tornado-cash-attack/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 30 Nov 2025 23:00:57 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[cash]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Finance]]></category>
		<category><![CDATA[Tornado]]></category>
		<category><![CDATA[Yearn]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/12/01/yearn-finance-exploit-3-million-tornado-cash-attack/</guid>

					<description><![CDATA[<p>Yearn Finance Exploit has once again captured the crypto community&#8217;s attention with a significant security breach that resulted in $3 million worth of ETH being sent to Tornado Cash. This latest incident highlights the vulnerabilities within decentralized finance platforms. The Yearn Finance exploit targeted the protocol&#8217;s Yearn Ether (yETH) product, effectively draining millions of dollars [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/01/yearn-finance-exploit-3-million-tornado-cash-attack/">Yearn Finance Exploit: 5 Amazing Insights into the $3 Million Tornado Cash Attack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Yearn Finance Exploit</strong> has once again captured the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> community&rsquo;s attention with a significant security breach that resulted in $3 million worth of ETH being sent to Tornado Cash. This latest incident highlights the vulnerabilities within decentralized finance platforms.</p>
<p>The <em>Yearn Finance exploit</em> targeted the protocol&rsquo;s Yearn Ether (yETH) product, effectively draining millions of dollars in liquid staking tokens (LSTs). Blockchain data reveals that the yETH pool was siphoned through a sophisticated exploit. This exploit allowed the attacker to mint an almost infinite number of yETH tokens, effectively emptying the pool in a single transaction.</p>
<h2>How the Yearn Finance Exploit Unfolded</h2>
<p>The attack involved deploying several new smart contracts, some of which self-destructed post-transaction. This strategic maneuver ensured the transfer of 1,000 ETH (approximately $3 million) to the mixing protocol, Tornado Cash. The complete scale of the financial loss remains uncertain, as the investigation is ongoing.</p>
<p>The event was first flagged by an X user, Togbe, who noticed unusual large transfers. Togbe highlighted that the net transfers indicated a &ldquo;yETH super mint&rdquo; exploit, allowing the attacker to drain the pool while still making a profit, despite some ETH being sacrificed during the process.</p>
<h3>Yearn Finance&rsquo;s Response to the Exploit</h3>
<p>Yearn Finance has responded by initiating an investigation into the yETH LST stableswap pool incident. They assured that Yearn Vaults, both V2 and V3, were not impacted by this breach.</p>
<p>This is not the first time Yearn Finance has faced such challenges. In 2021, a similar exploit affected its yDAI vault, resulting in an $11 million value loss, with the hacker escaping with $2.8 million. Additionally, a faulty script in December 2023 led to a 63% reduction of one of its treasury positions, though user funds remained unaffected. The protocol&rsquo;s founder, Andre Cronje, left the project in 2022.</p>
<p>As of now, The Block has been unable to reach Yearn Finance for further comments. This story is still developing, and updates are expected as more information becomes available.</p>
<p>Yearn Finance&rsquo;s <strong>exploit</strong> underscores the need for heightened security measures within the DeFi space. This incident serves as a reminder of the potential risks associated with decentralized platforms and the importance of continuous vigilance and innovation in combating such threats.</p>
<p><em>Disclaimer:</em> The Block operates independently, despite its association with Foresight Ventures, delivering timely, impactful news in the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> industry.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/12/01/yearn-finance-exploit-3-million-tornado-cash-attack/">Yearn Finance Exploit: 5 Amazing Insights into the $3 Million Tornado Cash Attack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/12/01/yearn-finance-exploit-3-million-tornado-cash-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Hyperdrive Exploit: 3 Shocking Security Breaches Uncovered</title>
		<link>https://cryptoupdate.io/2025/09/29/hyperdrive-exploit-smart-contract-breach/</link>
					<comments>https://cryptoupdate.io/2025/09/29/hyperdrive-exploit-smart-contract-breach/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 28 Sep 2025 22:01:15 +0000</pubDate>
				<category><![CDATA[Cryptocrash]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Breach]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Hyperdrive]]></category>
		<category><![CDATA[Smart Contract]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/09/29/hyperdrive-exploit-smart-contract-breach/</guid>

					<description><![CDATA[<p>Hyperdrive Exploit: Understanding the Recent Smart Contract Breach In a significant security breach, the Hyperdrive exploit led to the loss of approximately $782,000 worth of tokens following a smart contract vulnerability. This incident marks the third major security challenge for the Hyperliquid ecosystem, a popular Layer 1 network. The perpetrator targeted two critical pools within [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/09/29/hyperdrive-exploit-smart-contract-breach/">Hyperdrive Exploit: 3 Shocking Security Breaches Uncovered</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Hyperdrive Exploit: Understanding the Recent Smart Contract Breach</strong></p>
<p>In a significant security breach, the <em>Hyperdrive exploit</em> led to the loss of approximately $782,000 worth of tokens following a smart contract vulnerability. This incident marks the third major security challenge for the Hyperliquid ecosystem, a popular Layer 1 network.</p>
<p>The perpetrator targeted two critical pools within Hyperdrive: the Primary USDT0 Market and the Treasury <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>USDT</a> Market. Through these, around 673,000 USDT0 stablecoins and 110,244 thBILL were siphoned, totaling close to $782,000. The stolen assets were swiftly converted into cross-chain assets, including BNB and ETH, and were transferred off-chain.</p>
<h2>What Led to the Hyperdrive Exploit?</h2>
<p>The Hyperdrive exploit exploited a vulnerability within the smart contract. Blockchain security firm Certik identified an &ldquo;arbitrary call&rdquo; exploitation in the router, indicating a weak point in the smart contract&rsquo;s security protocols. This breach underscores the need for robust security measures in smart contract deployment.</p>
<p>Following the exploit, Hyperdrive&rsquo;s team promptly paused the protocol to mitigate further losses. An official statement on X assured users that normal operations would resume shortly, with a detailed postmortem report forthcoming.</p>
<h3>Response and Recovery Plans</h3>
<p>Hyperdrive&rsquo;s team stated, &ldquo;We have identified the root cause and corrected the issue.&rdquo; The team is also developing a compensatory plan for affected users, although specific details remain undisclosed. As of the latest reports, Hyperdrive holds around $21 million in value locked on its platform, according to DefiLlama.</p>
<p>This incident adds to a series of security challenges that have beset the Hyperliquid network since its inception in November 2024. Earlier incidents involved significant financial losses due to whale manipulations, including a $12 million loss from the Solana-based memecoin JELLYJELLY incident in March.</p>
<h2>Implications of the Hyperdrive Exploit</h2>
<p>The Hyperdrive exploit raises critical questions about the security frameworks of decentralized financial platforms. As the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space evolves, the importance of ensuring robust, secure smart contracts becomes even more paramount to prevent future breaches.</p>
<p>Such incidents also highlight the necessity for immediate response strategies to address vulnerabilities swiftly and minimize damage. The Hyperdrive team&rsquo;s quick action to pause operations reflects a proactive approach in crisis management.</p>
<p>As the investigation continues, the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> community awaits further details on how Hyperdrive plans to bolster its security and prevent similar incidents in the future.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/09/29/hyperdrive-exploit-smart-contract-breach/">Hyperdrive Exploit: 3 Shocking Security Breaches Uncovered</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/09/29/hyperdrive-exploit-smart-contract-breach/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Apple Vulnerability: 5 Ultimate Secrets to Secure Your Crypto Devices</title>
		<link>https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/</link>
					<comments>https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Fri, 22 Aug 2025 13:01:23 +0000</pubDate>
				<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Market Stability]]></category>
		<category><![CDATA[Apple]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerability]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/</guid>

					<description><![CDATA[<p>Apple vulnerability poses significant threats to cryptocurrency users, as the tech giant urges an immediate update of devices to patch a zero-click exploit. This critical flaw allows attackers to compromise iPhones, iPads, and Macs, posing heightened risks for those managing crypto assets. In a recent advisory, Apple disclosed that the image processing vulnerability has been [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/">Apple Vulnerability: 5 Ultimate Secrets to Secure Your Crypto Devices</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Apple vulnerability</strong> poses significant threats to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> users, as the tech giant urges an immediate update of devices to patch a <em>zero-click exploit</em>. This critical flaw allows attackers to compromise iPhones, iPads, and Macs, posing heightened risks for those managing <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> assets.</p>
<p>In a recent advisory, Apple disclosed that the image processing vulnerability has been addressed in updates for macOS Sonoma 14.7.8, macOS Ventura 13.7.8, iPadOS 17.7.10, macOS Sequoia 15.6.1, iOS 18.6.2, and iPadOS 18.6.2. The tech company acknowledged that this vulnerability may have been exploited in sophisticated attacks against selected individuals.</p>
<h2>Understanding the Zero-Click Exploit</h2>
<p>Cybersecurity experts highlight the <strong>zero-click exploit</strong> as particularly dangerous for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> users. This vulnerability can be exploited without any user interaction, making it an attractive target for attackers aiming to access crypto-integrated systems. Such access could lead to financial losses through irreversible transactions.</p>
<p>Juliano Rizzo, CEO at cybersecurity firm Coinspect, explained that an attachment delivered via iMessage could be processed automatically, leading to a device compromise. Attackers could then access wallet data, posing a direct threat to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> holders.</p>
<h3>Apple Vulnerability Details</h3>
<p>The <strong>Apple vulnerability</strong> affects the Image I/O framework, crucial for reading and writing image file formats. Improper implementation allows attackers to write to out-of-bounds memory areas, potentially executing malicious code on targeted devices.</p>
<p>This vulnerability compromises device security by allowing unauthorized memory access. With device memory holding all active programs, attackers can alter these programs, executing their malicious instructions.</p>
<h3>Advice for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> Holders</h3>
<p>For high-value targets using vulnerable devices for key storage, Rizzo advises migrating to new wallet keys if there are signs of compromise or targeting. He emphasizes securing primary accounts like email and cloud services to prevent further exploitation.</p>
<p>&ldquo;While <em>patching</em> is critical, immediate account lockdown should not be delayed,&rdquo; Rizzo notes. He also mentions that system logs, though difficult to interpret, could theoretically reveal anomalies. However, Apple and similar vendors are best positioned to detect exploitation and inform victims directly.</p>
<p><a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> users must stay vigilant and implement security measures to protect their assets from such vulnerabilities. Regular updates and awareness of potential threats are crucial in maintaining the security of digital currencies.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/">Apple Vulnerability: 5 Ultimate Secrets to Secure Your Crypto Devices</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/08/22/apple-vulnerability-zero-click-exploit-secure-crypto/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Positive Twist: Cryptocurrency Bandit Hands Back Stolen $42 Million GMX Assets</title>
		<link>https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/</link>
					<comments>https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 06:00:47 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[bounty]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ETH]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[GMX]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[white-hat]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/</guid>

					<description><![CDATA[<p>In a turn of events that has brought relief to the crypto sector, the individual behind the GMX exploit has accepted the platform&#8217;s bounty, returning over $40 million in pilfered assets from the project. Last Friday, the recent GMX V1 exploit culminated in a positive resolution after the person behind the incident transformed into a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/">Positive Twist: Cryptocurrency Bandit Hands Back Stolen $42 Million GMX Assets</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a turn of events that has brought relief to the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> sector, the individual behind the GMX exploit has accepted the platform&rsquo;s bounty, returning over $40 million in pilfered assets from the project.</p>
<p>Last Friday, the recent GMX V1 exploit culminated in a positive resolution after the person behind the incident transformed into a white-hat hacker. The perpetual and spot <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange GMX suffered a loss of over $40 million on Wednesday due to an attacker exploiting a loophole in the protocol&rsquo;s inaugural version on Arbitrum.</p>
<p>A number of online publications reported that a flaw in GMX V1&rsquo;s vault contract permitted the attacker to tamper with the GLP token price via the system&rsquo;s computations. As explained by blockchain security company SlowMist, the attack originated from a design deficiency in GMX v1, which allowed short position operations to instantaneously modify the global short average prices (globalShortAveragePrices). This directly influenced the calculation of Assets Under Management (AUM), thereby enabling manipulation of GLP token pricing.</p>
<p>Through a reentrancy attack, the hacker successfully established substantial short positions to manipulate the global average prices, artificially boosting GLP prices within a single transaction and profiting through redemption operations. Consequently, approximately $42 million worth of assets, including Legacy Frax <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Dollar</a> (FRAX), wrapped <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>bitcoin</a> (WBTC), wrapped ETH (WETH), and other tokens, were moved from the GLP pool to an anonymous wallet.</p>
<p>The perpetual <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange suspended GMX V1&rsquo;s trading and GLP&rsquo;s minting and redeeming on both Arbitrum and Avalanche to avert another assault and safeguard users&rsquo; resources. They assured that the exploit was confined to GMX&rsquo;s V1 and its GLP pool. GMX V2, its markets, liquidity pools, and the GMX token were unaffected and remained secure.</p>
<p>Post the incident, GMX offered a $5 million white-hat bounty to the attacker on-chain and on X, acknowledging their evident skills. The GMX team explained that returning the assets within the next 48 hours and accepting the bounty would enable the hacker to &ldquo;spend the funds freely&rdquo; rather than risking accessing them. They also promised not to initiate any legal action and to assist the exploiter in providing proof of source for the funds whenever necessary.</p>
<p>The exploiter responded positively in an on-chain message, accepting the reward and initiating the return process. Lookonchain reported that they initially returned $10.49 million worth of FRAX on Friday morning. Subsequently, another $32 million worth of assets were converted into 11,700 ETH, now valued at $35 million following the surge in the altcoin&rsquo;s price to $2,990.</p>
<p>Later, the hacker returned 10,000 ETH, worth $30 million, retaining only 1,700 ETH, valued at $5.2 million, as the bounty. GMX confirmed that the funds had been securely returned and thanked the white-hat hacker for their actions, adding a positive spin to the incident. They also notified users that &ldquo;contributors are working on a proposed distribution plan for presentation to the GMX DAO and will share more information shortly.&rdquo;</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/">Positive Twist: Cryptocurrency Bandit Hands Back Stolen $42 Million GMX Assets</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Binance Smart Chain Faces $2M Crypto Exploit: CertiK Monitors Attack</title>
		<link>https://cryptoupdate.io/2025/06/25/binance-smart-chain-faces-2m-crypto-exploit-certik-monitors-attack/</link>
					<comments>https://cryptoupdate.io/2025/06/25/binance-smart-chain-faces-2m-crypto-exploit-certik-monitors-attack/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Wed, 25 Jun 2025 07:01:01 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[Binance]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[certik]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[Smart_Contract]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/25/binance-smart-chain-faces-2m-crypto-exploit-certik-monitors-attack/</guid>

					<description><![CDATA[<p>The increasing instances of phishing, wallet hacking, and security violations are causing distress in the cryptocurrency sector. Blockchain security company, CertiK, recently disclosed that roughly $140.1 million was lost to cryptocurrency exploits, hacks, and scams in May alone, with about $162 million in assets being frozen. Phishing incidents notably contributed to around $8.5 million of [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/25/binance-smart-chain-faces-2m-crypto-exploit-certik-monitors-attack/">Binance Smart Chain Faces $2M Crypto Exploit: CertiK Monitors Attack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The increasing instances of phishing, wallet hacking, and security violations are causing distress in the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> sector. Blockchain security company, CertiK, recently disclosed that roughly $140.1 million was lost to <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> exploits, hacks, and scams in May alone, with about $162 million in assets being frozen. Phishing incidents notably contributed to around $8.5 million of the total losses.</p>
<p>CertiK has detected a significant exploit on Binance Smart Chain (BSC), where a perpetrator siphoned nearly $2 million by misusing a smart contract function known as printMoney(). <em>Exploiter Manipulates Authorized Contract to Loot Funds</em> <a href="https://twitter.com/CertiKAlert/status/1937725507916923050" rel="nofollow noopener" target="_blank">Twitter Link</a> A recognized attacker carried out the exploit from address 0xd5c6f3&hellip;122c. This person repeatedly activated the printMoney() function on their authorized attack contract. The unauthorized intrusion originated from a compromised victim contract associated with address 0xb5cb0, which had unknowingly authorized the malicious contract approximately eight hours before the attack.</p>
<p>CertiK suspects the victim contract deployer&rsquo;s private key was either phished or compromised in some other way, leading to the unauthorized approval transaction. This allowed the attacker to fully transfer the victim&rsquo;s tokens. <em>Hacker Transforms Funds and Possesses Nearly $2M</em> <a href="https://twitter.com/CertiKAlert/status/1937728529283842077" rel="nofollow noopener" target="_blank">Twitter Link</a> Once the attacker had access, they quickly transformed the stolen derivative tokens into BNB and stablecoins. Currently, the exploiter holds about $1.96 million worth of assets at their address.</p>
<p>The <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> community is urged to remain vigilant as several major <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> hacks have been reported this year. Coinbase lost $400 million, Cetus on the Sui network was hit for $220 million, and other platforms like Phemex and UPCX have also suffered significant losses. These incidents demonstrate the high risk involved in the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> space if not properly managed. According to CertiK, trusting unverified smart contracts or having weak security for private keys are among the biggest blunders. In a recent BSC hack, these were the exact issues that led to the theft of millions. </p>
<p>CertiK is actively monitoring the hacker&rsquo;s wallet and is on the lookout for suspicious activity. They&rsquo;ve also reminded users and developers to consistently verify contract approvals, use thoroughly audited code, and avoid rushing transactions. CertiK&rsquo;s advice is straightforward &ndash; be cautious, stay vigilant, and don&rsquo;t rush decisions.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/25/binance-smart-chain-faces-2m-crypto-exploit-certik-monitors-attack/">Binance Smart Chain Faces $2M Crypto Exploit: CertiK Monitors Attack</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/25/binance-smart-chain-faces-2m-crypto-exploit-certik-monitors-attack/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Nobitex Crypto Exchange in Iran Suffers Alleged $73M Exploit: Insights from ZachXBT</title>
		<link>https://cryptoupdate.io/2025/06/18/nobitex-crypto-exchange-in-iran-suffers-alleged-73m-exploit-insights-from-zachxbt/</link>
					<comments>https://cryptoupdate.io/2025/06/18/nobitex-crypto-exchange-in-iran-suffers-alleged-73m-exploit-insights-from-zachxbt/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Wed, 18 Jun 2025 09:00:48 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Ethereum]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[exchange]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Hack]]></category>
		<category><![CDATA[Iran]]></category>
		<category><![CDATA[Nobitex]]></category>
		<category><![CDATA[ZachXBT]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/18/nobitex-crypto-exchange-in-iran-suffers-alleged-73m-exploit-insights-from-zachxbt/</guid>

					<description><![CDATA[<p>ZachXBT, a respected onchain investigator, reports that the Iranian cryptocurrency exchange Nobitex has seemingly been targeted for a whopping $73 million in digital assets. The exploit was first disclosed on a June 18 Telegram post. It is alleged that the attackers drained at least $73 million from assets within the Tron network and Ethereum Virtual [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/18/nobitex-crypto-exchange-in-iran-suffers-alleged-73m-exploit-insights-from-zachxbt/">Nobitex Crypto Exchange in Iran Suffers Alleged $73M Exploit: Insights from ZachXBT</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>ZachXBT, a respected onchain investigator, reports that the Iranian <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> exchange Nobitex has seemingly been targeted for a whopping $73 million in digital assets. The exploit was first disclosed on a June 18 Telegram post.</em></p>
<p>It is alleged that the attackers drained at least $73 million from assets within the Tron network and Ethereum Virtual Machine (EVM)-compatible blockchains. However, only a segment of this amount has been confirmed as lost so far.</p>
<p>ZachXBT identified the attackers&rsquo; use of a &ldquo;vanity address&rdquo; to breach the protocol, leading to &ldquo;suspicious outflows&rdquo; from numerous wallets linked to Nobitex. A vanity address is a public wallet address that features a specific sequence of characters chosen by the user.</p>
<p>The first theft of $49 million was reportedly conducted through the address &ldquo;TKFuckiRGCTerroristsNoBiTEXy2r7mNX.&rdquo; The second address employed was &ldquo;0xffFFfFFffFFffFfFffFFfFfFfFFFFfFfFFFFDead,&rdquo; as per Tronscan.</p>
<p>The security breach contributes to the rising tally of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> industry hacks in 2025. As reported by blockchain security firm CertiK, digital assets worth more than $2.1 billion have been stolen in this year alone. Hackers have now diversified their strategies from exploiting blockchain infrastructure to capitalizing on human weaknesses, says Ronghui Gu, co-founder of CertiK.</p>
<p>Gu explained during the Chain Reaction daily X spaces show on June 2, &ldquo;The majority of this $2.1 billion was caused by wallet compromises, key mismanagement and operational issues.&rdquo;</p>
<p>In schemes like address poisoning, hackers don&rsquo;t need to employ any technical hacking techniques. Rather, they manipulate victims into transferring assets to fraudulent wallet addresses.</p>
<p>This is an ongoing story and will be updated as more details become available.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/18/nobitex-crypto-exchange-in-iran-suffers-alleged-73m-exploit-insights-from-zachxbt/">Nobitex Crypto Exchange in Iran Suffers Alleged $73M Exploit: Insights from ZachXBT</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/18/nobitex-crypto-exchange-in-iran-suffers-alleged-73m-exploit-insights-from-zachxbt/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Alex Lab Pledges Full Reimbursement to Users Following $8.3M Crypto Breach, Token Plummets 45%</title>
		<link>https://cryptoupdate.io/2025/06/07/alex-lab-pledges-full-reimbursement-to-users-following-8-3m-crypto-breach-token-plummets-45/</link>
					<comments>https://cryptoupdate.io/2025/06/07/alex-lab-pledges-full-reimbursement-to-users-following-8-3m-crypto-breach-token-plummets-45/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sat, 07 Jun 2025 18:00:55 +0000</pubDate>
				<category><![CDATA[Bitcoin News]]></category>
		<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Alex Lab]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Reimbursement]]></category>
		<category><![CDATA[Stacks]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/06/07/alex-lab-pledges-full-reimbursement-to-users-following-8-3m-crypto-breach-token-plummets-45/</guid>

					<description><![CDATA[<p>Bitcoin DeFi protocol Alex Lab, also known as ALEX Lab, recently underwent its second significant attack in two years. This time, an anonymous attacker took advantage of a glitch in the protocol&#8217;s coding logic, resulting in the loss of $8.3 million in different cryptocurrencies from the protocol. The aftermath of the attack saw the Alex [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/07/alex-lab-pledges-full-reimbursement-to-users-following-8-3m-crypto-breach-token-plummets-45/">Alex Lab Pledges Full Reimbursement to Users Following $8.3M Crypto Breach, Token Plummets 45%</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> DeFi protocol Alex Lab, also known as ALEX Lab, recently underwent its second significant attack in two years. This time, an anonymous attacker took advantage of a glitch in the protocol&rsquo;s coding logic, resulting in the loss of $8.3 million in different cryptocurrencies from the protocol. The aftermath of the attack saw the Alex Lab&rsquo;s native token, $ALEX, plummet by 45% within 24 hours, according to CoinGecko.</p>
<p>Following the exploit, the Stacks-based protocol announced its plans to fully reimburse the affected users using its treasury funds. Users will receive individual notifications but must file the claim form before June 10 to retrieve their funds.</p>
<p>The protocol explained, &ldquo;The attacker managed to bypass checks and drain funds from liquidity pools by exploiting a glitch in the self-listing function&rsquo;s verification logic that refers to a failed transaction. This issue is a result of an inherent on-chain limitation, particularly the difficulty in reliably detecting failed transactions on Stacks.&rdquo;</p>
<p>Alex Lab had a previous exploit in May 2024, which resulted in a loss of around $4.3 million. That attack occurred due to compromised private keys from a phishing attack, a method often used by the Lazarus Group hackers, sponsored by North Korea&rsquo;s state, whom the protocol accused of the hack.</p>
<p>In response to the previous attack, the protocol convinced centralized exchanges to freeze some stolen funds and compensated the affected users using the protocol&rsquo;s revenue. This compensation followed a vote from the protocol&rsquo;s governance DAO. However, not all exchanges have returned the funds, as per a recent update. &ldquo;So far, 8 out of 15 CEXs have returned the funds, and we are in discussions with the remaining 7 exchanges. We anticipate more recoveries in Q2,&rdquo; stated Alex Protocol.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/06/07/alex-lab-pledges-full-reimbursement-to-users-following-8-3m-crypto-breach-token-plummets-45/">Alex Lab Pledges Full Reimbursement to Users Following $8.3M Crypto Breach, Token Plummets 45%</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/06/07/alex-lab-pledges-full-reimbursement-to-users-following-8-3m-crypto-breach-token-plummets-45/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>BNB Chain&#8217;s Mobius Token Smart Contracts Suffered a $2.1M Exploit</title>
		<link>https://cryptoupdate.io/2025/05/11/bnb-chains-mobius-token-smart-contracts-suffered-a-2-1m-exploit/</link>
					<comments>https://cryptoupdate.io/2025/05/11/bnb-chains-mobius-token-smart-contracts-suffered-a-2-1m-exploit/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 11 May 2025 11:00:37 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[BNB Chain]]></category>
		<category><![CDATA[Cyvers Alerts]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[Mobius Token]]></category>
		<category><![CDATA[smart contracts]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/05/11/bnb-chains-mobius-token-smart-contracts-suffered-a-2-1m-exploit/</guid>

					<description><![CDATA[<p>Security firm Cyvers Alerts reported a significant breach in the BNB Chain involving Mobius Token&#8217;s ($MBU) smart contracts. Hackers drained more than $2.15 million from the contracts in a well-targeted exploit on the early hours of May 11. The attacker initiated the exploit at 07:33:56 UTC and carried out the nefarious act from the address [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/11/bnb-chains-mobius-token-smart-contracts-suffered-a-2-1m-exploit/">BNB Chain&#8217;s Mobius Token Smart Contracts Suffered a $2.1M Exploit</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Security firm Cyvers Alerts reported a significant breach in the BNB Chain involving Mobius Token&rsquo;s ($MBU) smart contracts. Hackers drained more than $2.15 million from the contracts in a well-targeted exploit on the early hours of May 11.</p>
<p>The attacker initiated the exploit at 07:33:56 UTC and carried out the nefarious act from the address 0xb32a53&hellip; The contract was deployed just two minutes earlier at 07:31:38 UTC. The victim wallet identified as 0xb5252f&hellip; witnessed its funds being drained at an alarming rate.</p>
<p>The perpetrator used the contract 0x631adf&hellip; to execute a series of malicious transactions, draining a whopping 28.5 million MBU tokens. These tokens were then swiftly converted into stablecoins, resulting in a net loss of $2,152,219.99 for the victim. Cyvers confirmed these details to Cointelegraph.</p>
<p>Cyvers labeled the exploit as &ldquo;critical&rdquo; due to the suspicious contract code and abnormal transaction patterns used by the attacker. As of publication, the attacker&rsquo;s wallet remains active, and the stolen funds have yet to be returned. Mobius Token&rsquo;s team has not issued an official statement regarding the incident.</p>
<p>On a related note, PeckShield, a blockchain security firm, reported a staggering loss of nearly $360 million in digital assets due to hacks in April 2025. The firm tracked 18 hacking incidents, marking a 990% increase from the previous month. Notably, the largest portion of these losses was from an unauthorized <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> transfer involving a suspicious transfer of $330 million in BTC. This was later confirmed to be a social engineering attack targeting an elderly individual in the United States.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/11/bnb-chains-mobius-token-smart-contracts-suffered-a-2-1m-exploit/">BNB Chain&#8217;s Mobius Token Smart Contracts Suffered a $2.1M Exploit</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/05/11/bnb-chains-mobius-token-smart-contracts-suffered-a-2-1m-exploit/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
