<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:media="http://search.yahoo.com/mrss/" >

<channel>
	<title>hacker &#8211; Crypto Market Insights: Dive In with CryptoUpdate.io</title>
	<atom:link href="https://cryptoupdate.io/tag/hacker/feed/" rel="self" type="application/rss+xml" />
	<link>https://cryptoupdate.io</link>
	<description>Latest cryptocurrency news, market updates and analysis</description>
	<lastBuildDate>Sat, 12 Jul 2025 16:00:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Bitcoin Heist Unmasked: Teen Hacker Steals $243M and Unwittingly Reveals Identity</title>
		<link>https://cryptoupdate.io/2025/07/12/bitcoin-heist-unmasked-teen-hacker-steals-243m-and-unwittingly-reveals-identity/</link>
					<comments>https://cryptoupdate.io/2025/07/12/bitcoin-heist-unmasked-teen-hacker-steals-243m-and-unwittingly-reveals-identity/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 16:00:39 +0000</pubDate>
				<category><![CDATA[Bitcoin News]]></category>
		<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Bitcoin]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Investigation]]></category>
		<category><![CDATA[Livestream]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Social-Engineering]]></category>
		<category><![CDATA[Theft]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/07/12/bitcoin-heist-unmasked-teen-hacker-steals-243m-and-unwittingly-reveals-identity/</guid>

					<description><![CDATA[<p>Cointelegraph brings to light the shocking case of a 19-year-old hacker who stole $243 million in Bitcoin and accidentally revealed his identity during a livestream. This sensational incident offers a rare glimpse into the underworld of crypto scams, particularly social engineering attacks, which involve tricking victims to voluntarily hand over their confidential crypto wallet details. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/12/bitcoin-heist-unmasked-teen-hacker-steals-243m-and-unwittingly-reveals-identity/">Bitcoin Heist Unmasked: Teen Hacker Steals $243M and Unwittingly Reveals Identity</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Cointelegraph</em> brings to light the shocking case of a 19-year-old hacker who stole $243 million in <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> and accidentally revealed his identity during a livestream. This sensational incident offers a rare glimpse into the underworld of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> scams, particularly social engineering attacks, which involve tricking victims to voluntarily hand over their confidential <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallet details.</p>
<p>In August 2024, a single victim&rsquo;s account lost approximately 4,100 BTC worth $243 million in an overnight heist. The culprits were three gamers-turned-hackers, who employed sophisticated social engineering tactics to commit the theft. The youngest among them, 19-year-old Veer Chetal, became notorious for his audacious acts.</p>
<p>The trio, including Chetal, Malone Lam, and Jeandiel Serrano, orchestrated a well-planned attack. They deceived the victim with fake calls from Google and Gemini support teams, convinced the victim to change their 2-factor authentication (2FA), and then transferred the funds to a compromised wallet. Moreover, they tricked the victim into sharing their screen via AnyDesk, revealing their <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a> private key.</p>
<p>Despite executing their plan successfully, their sloppy mistakes led to their downfall. <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> investigator ZachXBT, who had been following the case closely, discovered a recording of the hackers&rsquo; live reactions as they received the stolen <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Bitcoin</a>. Chetal further incriminated himself by accidentally leaking his name during the livestream and purchasing luxury items with the stolen funds.</p>
<p>Following the investigation, all three culprits were arrested. However, Chetal&rsquo;s saga didn&rsquo;t end there. After agreeing to cooperate with the authorities and pleading guilty, he was involved in yet another scam while out on bail, stealing an additional $2 million.</p>
<p>This case serves as a stark reminder of the need for vigilance in the digital age, especially as young, tech-savvy individuals are drawn into the world of high-stakes digital crime. Awareness, open conversations, and firm boundaries around financial access are crucial to curb such illicit activities.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/12/bitcoin-heist-unmasked-teen-hacker-steals-243m-and-unwittingly-reveals-identity/">Bitcoin Heist Unmasked: Teen Hacker Steals $243M and Unwittingly Reveals Identity</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/07/12/bitcoin-heist-unmasked-teen-hacker-steals-243m-and-unwittingly-reveals-identity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Positive Twist: Cryptocurrency Bandit Hands Back Stolen $42 Million GMX Assets</title>
		<link>https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/</link>
					<comments>https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sat, 12 Jul 2025 06:00:47 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[bounty]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[ETH]]></category>
		<category><![CDATA[exploit]]></category>
		<category><![CDATA[GMX]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[white-hat]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/</guid>

					<description><![CDATA[<p>In a turn of events that has brought relief to the crypto sector, the individual behind the GMX exploit has accepted the platform&#8217;s bounty, returning over $40 million in pilfered assets from the project. Last Friday, the recent GMX V1 exploit culminated in a positive resolution after the person behind the incident transformed into a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/">Positive Twist: Cryptocurrency Bandit Hands Back Stolen $42 Million GMX Assets</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In a turn of events that has brought relief to the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> sector, the individual behind the GMX exploit has accepted the platform&rsquo;s bounty, returning over $40 million in pilfered assets from the project.</p>
<p>Last Friday, the recent GMX V1 exploit culminated in a positive resolution after the person behind the incident transformed into a white-hat hacker. The perpetual and spot <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange GMX suffered a loss of over $40 million on Wednesday due to an attacker exploiting a loophole in the protocol&rsquo;s inaugural version on Arbitrum.</p>
<p>A number of online publications reported that a flaw in GMX V1&rsquo;s vault contract permitted the attacker to tamper with the GLP token price via the system&rsquo;s computations. As explained by blockchain security company SlowMist, the attack originated from a design deficiency in GMX v1, which allowed short position operations to instantaneously modify the global short average prices (globalShortAveragePrices). This directly influenced the calculation of Assets Under Management (AUM), thereby enabling manipulation of GLP token pricing.</p>
<p>Through a reentrancy attack, the hacker successfully established substantial short positions to manipulate the global average prices, artificially boosting GLP prices within a single transaction and profiting through redemption operations. Consequently, approximately $42 million worth of assets, including Legacy Frax <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Dollar</a> (FRAX), wrapped <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>bitcoin</a> (WBTC), wrapped ETH (WETH), and other tokens, were moved from the GLP pool to an anonymous wallet.</p>
<p>The perpetual <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> exchange suspended GMX V1&rsquo;s trading and GLP&rsquo;s minting and redeeming on both Arbitrum and Avalanche to avert another assault and safeguard users&rsquo; resources. They assured that the exploit was confined to GMX&rsquo;s V1 and its GLP pool. GMX V2, its markets, liquidity pools, and the GMX token were unaffected and remained secure.</p>
<p>Post the incident, GMX offered a $5 million white-hat bounty to the attacker on-chain and on X, acknowledging their evident skills. The GMX team explained that returning the assets within the next 48 hours and accepting the bounty would enable the hacker to &ldquo;spend the funds freely&rdquo; rather than risking accessing them. They also promised not to initiate any legal action and to assist the exploiter in providing proof of source for the funds whenever necessary.</p>
<p>The exploiter responded positively in an on-chain message, accepting the reward and initiating the return process. Lookonchain reported that they initially returned $10.49 million worth of FRAX on Friday morning. Subsequently, another $32 million worth of assets were converted into 11,700 ETH, now valued at $35 million following the surge in the altcoin&rsquo;s price to $2,990.</p>
<p>Later, the hacker returned 10,000 ETH, worth $30 million, retaining only 1,700 ETH, valued at $5.2 million, as the bounty. GMX confirmed that the funds had been securely returned and thanked the white-hat hacker for their actions, adding a positive spin to the incident. They also notified users that &ldquo;contributors are working on a proposed distribution plan for presentation to the GMX DAO and will share more information shortly.&rdquo;</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/">Positive Twist: Cryptocurrency Bandit Hands Back Stolen $42 Million GMX Assets</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/07/12/positive-twist-cryptocurrency-bandit-hands-back-stolen-42-million-gmx-assets/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Ledger Reinstates Security on Discord Following Attempted Seed Phrase Theft by Hacker Bot</title>
		<link>https://cryptoupdate.io/2025/05/12/ledger-reinstates-security-on-discord-following-attempted-seed-phrase-theft-by-hacker-bot/</link>
					<comments>https://cryptoupdate.io/2025/05/12/ledger-reinstates-security-on-discord-following-attempted-seed-phrase-theft-by-hacker-bot/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Mon, 12 May 2025 02:00:44 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Cryptocurrency Regulations]]></category>
		<category><![CDATA[Discord]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Ledger]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[Security Breach]]></category>
		<category><![CDATA[Seed Phrases]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/05/12/ledger-reinstates-security-on-discord-following-attempted-seed-phrase-theft-by-hacker-bot/</guid>

					<description><![CDATA[<p>Hardware wallet manufacturer Ledger, has reestablished secure operations on its Discord server following an incident where a hacker attempted to extract seed phrases by exploiting a compromised moderator account. This incident occurred on May 11th, with the attacker utilizing the breached account to disseminate scam links, tricking users into unveiling their seed phrases on a [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/12/ledger-reinstates-security-on-discord-following-attempted-seed-phrase-theft-by-hacker-bot/">Ledger Reinstates Security on Discord Following Attempted Seed Phrase Theft by Hacker Bot</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hardware wallet manufacturer Ledger, has reestablished secure operations on its Discord server following an incident where a hacker attempted to extract seed phrases by exploiting a compromised moderator account. This incident occurred on May 11th, with the attacker utilizing the breached account to disseminate scam links, tricking users into unveiling their seed phrases on a third-party site. </p>
<p>&#8220;A moderator under contract had their account hacked, which enabled a malicious bot to post scam links in one of our channels,&#8221; Ledger associate, Quintin Boatwright, shared on the Ledger Discord server. &#8220;The issue was swiftly addressed: the breached account was deleted, the bot was eliminated, the website was reported, and all requisite permissions were scrutinized and safeguarded.&#8221;</p>
<p>Some members of Ledger&#8217;s Discord channel reported that the attacker, exploiting moderator privileges, banned and silenced them when they tried to report the breach. This may have delayed Ledger&#8217;s response. However, Boatwright reassured that this security breach was a singular occurrence and that Ledger has implemented additional measures to fortify its Discord server security.</p>
<p>Using the compromised Ledger community manager account, the hacker informed Ledger Discord members of a recently discovered flaw in the company&#8217;s security systems. He then strongly encouraged all users to validate their recovery phrases using a fraudulent link. Screenshots of this activity were shared on X. Ledger users were instructed to connect their wallets and follow the instructions provided on-screen. The impact of this security breach remains unclear.</p>
<p>In a related event last month, scammers sent physical letters to Ledger hardware wallet owners, requesting them to authenticate their private seed phrases in an attempt to gain access and drain the wallets. These letters, bearing the Ledger logo, business address, and a reference number, were intended to appear legitimate and instructed users to scan a QR code and input their wallet&#8217;s recovery phrase.</p>
<p>Following a data leak in July 2020, where a hacker breached Ledger&#8217;s database exposing the personal information of over 270,000 customers, there were speculations that the scammers might be targeting the affected Ledger customers. The leaked data included names, phone numbers, and residential addresses. The subsequent year, several Ledger users reported receiving tampered Ledger devices in the mail that were designed to install malware upon usage.</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/12/ledger-reinstates-security-on-discord-following-attempted-seed-phrase-theft-by-hacker-bot/">Ledger Reinstates Security on Discord Following Attempted Seed Phrase Theft by Hacker Bot</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/05/12/ledger-reinstates-security-on-discord-following-attempted-seed-phrase-theft-by-hacker-bot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Crypto Wallet Provider Ledger Recovers Discord Server from Hacker&#8217;s Control</title>
		<link>https://cryptoupdate.io/2025/05/11/crypto-wallet-provider-ledger-recovers-discord-server-from-hackers-control/</link>
					<comments>https://cryptoupdate.io/2025/05/11/crypto-wallet-provider-ledger-recovers-discord-server-from-hackers-control/#respond</comments>
		
		<dc:creator><![CDATA[Archire Tectre]]></dc:creator>
		<pubDate>Sun, 11 May 2025 15:00:44 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Crime]]></category>
		<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Market Stability]]></category>
		<category><![CDATA[Compromised]]></category>
		<category><![CDATA[crypto]]></category>
		<category><![CDATA[Discord]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[Ledger]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[wallet]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/2025/05/11/crypto-wallet-provider-ledger-recovers-discord-server-from-hackers-control/</guid>

					<description><![CDATA[<p>Hardware crypto wallet producer, Ledger, successfully reclaimed its Discord server on Sunday. This followed an incident where a hacker temporarily seized control of the community through a compromised moderator account. The attacker reportedly tricked users into providing their seed phrases on an external site and suppressed users who tried to warn others about the scam, [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/11/crypto-wallet-provider-ledger-recovers-discord-server-from-hackers-control/">Crypto Wallet Provider Ledger Recovers Discord Server from Hacker&#8217;s Control</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Hardware <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> wallet producer, Ledger, successfully reclaimed its Discord server on Sunday. This followed an incident where a hacker temporarily seized control of the community through a compromised moderator account. The attacker reportedly tricked users into providing their seed phrases on an external site and suppressed users who tried to warn others about the scam, as per findings from X.</p>
<p>&ldquo;A malicious bot infiltrated our server through one of our contracted moderator&rsquo;s compromised account and posted scam links in one channel,&rdquo; Quintin Boatwright, a Ledger team member, explained on the company&rsquo;s server. &ldquo;We promptly addressed the issue by removing the compromised account, deleting the bot, reporting the website, and fortifying all relevant permissions.&rdquo;</p>
<p>Apart from this, Ledger customers recently experienced another scam where they received physical letters instructing them to &ldquo;verify&rdquo; their devices by inputting their seed phrases on a particular site. These letters even had Ledger&rsquo;s official logo, and the information seems to have been sourced from Ledger&rsquo;s database breach in 2020.</p>
<p>&ldquo;We&rsquo;ve implemented additional measures to strengthen our Discord security,&rdquo; Boatwright further stated. &ldquo;Avoid entering your recovery phrase or linking your wallet through a Discord link.&rdquo;</p>
<p>The scam site was reportedly deactivated as of Sunday morning.</p>
<p><em>Disclaimer: The Block is a self-governing media platform providing news, research, and data. Foresight Ventures, a majority investor of The Block as of November 2023, also invests in other crypto-oriented companies. <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Crypto</a> exchange Bitget is an anchor LP for Foresight Ventures. The Block retains its independence to provide objective, timely, and impactful information about the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> industry. Here are our current financial disclosures. This article is purely informational and not meant to serve as legal, tax, investment, financial, or other advice. </em></p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2025/05/11/crypto-wallet-provider-ledger-recovers-discord-server-from-hackers-control/">Crypto Wallet Provider Ledger Recovers Discord Server from Hacker&#8217;s Control</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2025/05/11/crypto-wallet-provider-ledger-recovers-discord-server-from-hackers-control/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Avraham Eisenberg Is Imprisoned</title>
		<link>https://cryptoupdate.io/2022/12/28/avraham-eisenberg-is-imprisoned/</link>
					<comments>https://cryptoupdate.io/2022/12/28/avraham-eisenberg-is-imprisoned/#respond</comments>
		
		<dc:creator><![CDATA[Sophia N.]]></dc:creator>
		<pubDate>Wed, 28 Dec 2022 10:39:54 +0000</pubDate>
				<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[Avraham Eisenberg]]></category>
		<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[cryptohack]]></category>
		<category><![CDATA[DeFi]]></category>
		<category><![CDATA[DeFi protocol]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[mango]]></category>
		<category><![CDATA[Mango Market]]></category>
		<category><![CDATA[MNGO]]></category>
		<category><![CDATA[puerto rico]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/?p=6498</guid>

					<description><![CDATA[<p>Avraham Eisenberg, who confessed emptying the decentralized finance (DeFi) protocol Mango Markets with his very successful trading method,&#160;has been detained by U.S. authorities. A document states that he was taken into custody on Monday in Puerto Rico. Exploiter of the Mango Markets Is Caught At about the middle of October, Eisenberg had compromised&#160;the DeFi protocol. [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2022/12/28/avraham-eisenberg-is-imprisoned/">Avraham Eisenberg Is Imprisoned</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Avraham Eisenberg, who confessed emptying the decentralized finance (DeFi) protocol Mango Markets with his very successful trading method,&nbsp;has been detained by U.S. authorities. A document states that he was taken into custody on Monday in Puerto Rico.</p>



<h2 class="wp-block-heading">Exploiter of the Mango Markets Is Caught</h2>



<p>At about the middle of October, Eisenberg had compromised&nbsp;the DeFi protocol. Through the use of two identities, he artificially inflated the price of Mango&rsquo;s <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> token MNGO by 1,300 percent in just an hour by selling several perpetual contracts from one account to the other. He then borrowed $110 million in more cryptocurrencies from Mango Markets using the token as security, and promptly withdrew the money. To put it another way, he effectively stole all the <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> stored on the DeFi network.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Eisenberg engaged in a scheme involving the intentional and artificial manipulation of the price of perpetual futures contracts on a <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> exchange called Mango Markets, and other manipulative and deceptive devices and contrivances,</p>
<cite>according to a deposition signed by an FBI Special Agent named Brandon Racz.</cite></blockquote>



<h2 class="wp-block-heading">Agreement Reached with Mango Markets</h2>



<p>Also, after a week of manipulation, he finally acknowledged to being involved in draining the DeFi protocol. Nonetheless, he justified his behavior by saying it was legitimate.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>I believe all of our actions were legal open market actions, using the protocol as designed, even if the development team did not fully anticipate all the consequences of setting parameters the way they are.</p>
<cite>Tweet from Avraham Eisenberg (@avi eisen) dated October 15, 2022.</cite></blockquote>



<p>He went so far as to say that because of his activities, Mango Markets went bankrupt and clients lost access to their money. Later on, he reached an agreement with Mango Markets in which he would pay back $67 million to the DAO that oversaw the protocol.</p>



<p>The protocol creators will not &ldquo;pursue any criminal investigations or freezing of money after the tokens are returned back,&rdquo; according to a message issued to the Mango Markets community following the settlement.</p>



<p>As of right now, Eisenberg is being accused of commodities fraud and commodities manipulation. If he&rsquo;s found guilty, he might go to jail and have to pay a fine. It&rsquo;s also the very first time law enforcement in the United States has taken legal action against someone for breaking a <a href="https://cryptoupdate.io/2022/08/09/will-defi-accelerate-the-inclusion-of-financials/">DeFi protocol</a>.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2022/12/28/avraham-eisenberg-is-imprisoned/">Avraham Eisenberg Is Imprisoned</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2022/12/28/avraham-eisenberg-is-imprisoned/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Lazarus, North Korean Hackers, Attacks Japanese Crypto Firms</title>
		<link>https://cryptoupdate.io/2022/10/18/lazarus-north-korean-hackers-attacks-japanese-crypto-firms/</link>
					<comments>https://cryptoupdate.io/2022/10/18/lazarus-north-korean-hackers-attacks-japanese-crypto-firms/#comments</comments>
		
		<dc:creator><![CDATA[Sophia N.]]></dc:creator>
		<pubDate>Tue, 18 Oct 2022 08:46:17 +0000</pubDate>
				<category><![CDATA[Cryptocurrency News]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Crypto News]]></category>
		<category><![CDATA[cryptocurrency]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[horizon]]></category>
		<category><![CDATA[Japan]]></category>
		<category><![CDATA[lazarus]]></category>
		<category><![CDATA[north korea]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[ronin]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/?p=6180</guid>

					<description><![CDATA[<p>A joint statement from the local police and the Financial Services Agency of Japan says that the well-known North Korean hacker group Lazarus is behind an attack on multiple Japanese cryptocurrency funds that used phishing and other forms of social engineering. According to a story published by Japan News, some businesses have had hackers get [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2022/10/18/lazarus-north-korean-hackers-attacks-japanese-crypto-firms/">Lazarus, North Korean Hackers, Attacks Japanese Crypto Firms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A joint statement from the local police and the Financial Services Agency of Japan says that the well-known <a href="https://cryptoupdate.io/2022/02/10/north-korea-fires-crypto-bomb-at-us-calls-it-king-of-theft%EF%BF%BC/">North Korean</a> hacker group Lazarus is behind an attack on multiple Japanese <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> funds that used phishing and other forms of social engineering. According to a story published by Japan News, some businesses have had hackers get into their internal systems, resulting in the theft of cryptocurrencies.<br><br>Phishing is a kind of hacking that includes sending a link loaded with malware to a victim. If the victim clicks on the link, a virus will be placed on the machine that is being targeted. It is said that Lazarus has been spreading these connections through email and social media, among other online channels.</p>



<p>The Lazarus Group is suspected of being the organization that was behind the Ronin Bridge scam. In March, a hacker gained access to the Ronin sidechain, which is connected to the main Ethereum blockchain but allows the developers of the play-to-earn game Axie Infinity, Sky Mavis, to support faster and cheaper transactions. As a result of the hack, 173,600 ETH and 25.5 million USDC were stolen, which had a market value of $625 million at the time. It is one of the most significant breaches in the history of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a>. In June, blockchain analytics company Elliptic discovered that the 100 million dollar Horizon Bridge attack could be traced back to Lazarus.</p>



<p>The Japanese National Police Agency did not identify any of the firms that were hacked or the sums that were taken, but it did identify the hacking gang. It&rsquo;s something that the agency doesn&rsquo;t usually tell the public before making an arrest because it could lead to another attack.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2022/10/18/lazarus-north-korean-hackers-attacks-japanese-crypto-firms/">Lazarus, North Korean Hackers, Attacks Japanese Crypto Firms</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2022/10/18/lazarus-north-korean-hackers-attacks-japanese-crypto-firms/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Binance CEO warns Cryptocurrency exchange for huge scams!</title>
		<link>https://cryptoupdate.io/2022/02/07/binance-ceo-warns-cryptocurrency-exchange-for-huge-scams/</link>
					<comments>https://cryptoupdate.io/2022/02/07/binance-ceo-warns-cryptocurrency-exchange-for-huge-scams/#respond</comments>
		
		<dc:creator><![CDATA[Chavy S.]]></dc:creator>
		<pubDate>Mon, 07 Feb 2022 11:58:00 +0000</pubDate>
				<category><![CDATA[Cryptocurrency Trading]]></category>
		<category><![CDATA[Binance CEO]]></category>
		<category><![CDATA[Changpeng Zhao]]></category>
		<category><![CDATA[financial]]></category>
		<category><![CDATA[hacker]]></category>
		<guid isPermaLink="false">https://cryptoupdate.io/?p=3545</guid>

					<description><![CDATA[<p>The scam for cryptocurrency consists of sending the users the text message through the link to cancel the withdrawals. Thereby the leading users for fake website that is designed to harvest the login credentials. Changpeng Zhao, the Binance CEO warned about &#8220;huge phishing scam through SMS&#8221; targeting entire cryptocurrency exchange. Zhao also mentioned in the [&#8230;]</p>
<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2022/02/07/binance-ceo-warns-cryptocurrency-exchange-for-huge-scams/">Binance CEO warns Cryptocurrency exchange for huge scams!</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The scam for <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> consists of sending the users the text message through the link to cancel the withdrawals. Thereby the leading users for fake website that is designed to harvest the login credentials. Changpeng Zhao, the Binance CEO warned about &ldquo;huge phishing scam through SMS&rdquo; targeting entire <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> exchange. Zhao also mentioned in the tweet, &ldquo;There is huge phishing scam that is done through SMS with the link for canceling the withdrawals. It also leads to the phishing website for harvesting the credential. &nbsp;It is even very important that you should never click on the links from SMS!&rdquo;</p>



<h2 class="wp-block-heading" id="h-cryptocurrency-scams"><a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>Cryptocurrency</a> Scams!</h2>



<p>The SMS Phishing scam is basically when the hackers send the text messages. These are well design to steal any kind of the personal details or any kind of the financial information. This is irrespective of even pretending to be the much reputable site, and also getting you to simply download the malware in your mobile phone through such SMS.</p>



<p>As per the shared screenshot by CEO, this scam consists of sending the users a text message. It is through the link for simply canceling the withdrawals. Thereby leading users to any such kind of the malicious website which are well engineer to harvest login credentials. For this time, it is much unclear about the number of the Binance customers that had fallen the victim for such kind of the scam.</p>



<p>The Scams as well as heist are quite common occurrence in entire <a href="https://cryptoupdate.io/2022/02/03/aussie-billionaire-sues-facebook-over-crypto-scams-with-ags-consent%ef%bf%bc/">crypto world</a>. The <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>crypto</a> analytics mentioned illicit address that hold more than $10 billion worth of the cryptocurrencies, with mainly this held through wallets of <a class="lar-automated-link" href="https://accounts.binance.com/register?ref=42224911" rel="nofollow noopener" target="_blank" 4536>cryptocurrency</a> theft. On the other hand, the Customers that are getting defraud in it and different kind of the ways stays to be the common feature of entire <a href="https://news.bitcoin.com/indian-crypto-industry-tax-clarity-union-budget-2022-23/" rel="nofollow noopener" target="_blank">crypto industry</a> on key exchanges.</p>

<p>The post <a rel="nofollow" href="https://cryptoupdate.io/2022/02/07/binance-ceo-warns-cryptocurrency-exchange-for-huge-scams/">Binance CEO warns Cryptocurrency exchange for huge scams!</a> appeared first on <a rel="nofollow" href="https://cryptoupdate.io">Crypto Market Insights: Dive In with CryptoUpdate.io</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://cryptoupdate.io/2022/02/07/binance-ceo-warns-cryptocurrency-exchange-for-huge-scams/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
