##cryptotheft
🚨 2024 has been a record year for crypto theft! 💰 Over $2.2 billion stolen, with North Korea responsible for $1.34 billion! 🔍 Let's tackle this issue together! #CryptoTheft #NorthKorea #CyberSecurity www.techradar.com/pro/security...
It's been a huge year for criminals stealing cryptocurrency - and North Korea was largely to blame
Cryptocurrency was a theft target like never before in 2024
www.techradar.com
December 21, 2024 at 1:11 PM
🚨 Meet GreedyBear: a cybercriminal group using AI to transform innocent Firefox extensions into $1M crypto heists! 😱🦠 Have you checked your extensions lately? Stay informed—this is the new normal! #CryptoTheft #AI #CyberSecurity LINK
August 11, 2025 at 4:18 AM
GreedyBear cybercriminals steal over $1M in crypto using 650+ malicious tools, including weaponized browser extensions and AI-generated malware. Stay vigilant! #CyberSecurity #CryptoTheft #GreedyBear Link: thedailytechfeed.com/greedybear-c...
August 8, 2025 at 3:59 PM
Crypto-stealing apps have been discovered in the Apple App Store. The 'SparkCat' campaign uses malicious SDKs to extract cryptocurrency wallet recovery phrases via OCR technology. #Cybersecurity #CryptoTheft #AppleAppStore #SparkCat #MalwareAlert www.bleepingcomputer.com/news/mobile/...
Crypto-stealing apps found in Apple App Store for the first time
A new campaign dubbed 'SparkCat' has been uncovered, targeting the cryptocurrency wallet recovery phrases of Android and iOS users using optical character recognition (OCR) stealers.
www.bleepingcomputer.com
February 6, 2025 at 9:04 PM
Online Criminals Steal $500K Crypto Via Malicious AI Browser Extension #BlockchainDeveloper #CryptoTheft #CyberFraud
Online Criminals Steal $500K Crypto Via Malicious AI Browser Extension
 A Russian blockchain engineer lost over $500,000 worth of cryptocurrencies in a sophisticated cyberattack, highlighting the persisting and increasing threats posed by hostile open-source packages. Even seasoned users can be duped into installing malicious software by attackers using public repositories and ranking algorithms, despite the developer community's growing knowledge and caution. The incident was discovered in June 2025, when the victim, an experienced developer who had recently reinstalled his operating system and only employed essential, well-known applications, noticed his crypto assets had been drained, despite rigorous attention to cybersecurity.  The researchers linked the breach to a Visual Studio Code-compatible extension called "Solidity Language" for the Cursor AI IDE, a productivity-boosting tool for smart contract developers. The extension, which was made public via the Open VSX registry, masqueraded as a legal code highlighting tool but was actually a vehicle for remote code execution. After installation, the rogue extension ran a JavaScript file called extension.js, which linked to a malicious web site to download and run PowerShell scripts.  These scripts, in turn, installed the genuine remote management tool ScreenConnect, allowing the perpetrators to maintain remote access to the compromised PC. The attackers used this access to execute further VBScripts, which delivered additional payloads such as the Quasar open-source backdoor and a stealer module capable of syphoning credentials and wallet passphrases from browsers, email clients, and cryptocurrency wallets.  The masquerade was effective: the malicious extension appeared near the top of search results in the extension marketplace, thanks to a ranking mechanism that prioritised recency and perceived activity over plain download counts. The attackers also plagiarised descriptions from legitimate items, thus blurring the distinction between genuine and fraudulent offerings. When the bogus extension failed to deliver the promised capabilities, the user concluded it was a glitch, allowing the malware to remain undetected.  In an additional twist, after the malicious item was removed from the store, the threat actors swiftly uploaded a new clone called "solidity," employing advanced impersonation techniques. The malicious publisher's name differed by only one character: an uppercase "I" instead of a lowercase "l," a discrepancy that was nearly hard to detect due to font rendering. The bogus extension's download count was intentionally boosted to two million in a bid to outshine the real program, making the correct choice difficult for users. The effort did not end there; similar attack tactics were discovered in further malicious packages on both the Open VSX registry and npm, which targeted blockchain developers via extensions and packages with recognisable names. Each infection chain followed a well-known pattern: executing PowerShell scripts, downloading further malware, and communicating with attacker-controlled command-and-control servers. This incident highlights the ongoing threat of supply-chain attacks in the open-source ecosystem.
dlvr.it
July 20, 2025 at 3:04 PM
🚨 $91M BTC heist traced via Wasabi Wallet 💥

ZachXBT tracked 783 BTC (~$91M) stolen through social engineering and subsequently laundered via Wasabi Wallet to obscure the trail.

#ZachXBT #Bitcoin #CryptoTheft #WasabiWallet #SocialEngineering
ZachXBT Traces $91M Bitcoin Theft Through Wasabi Wallet and Mixers - Crypto Economy
Blockchain investigator ZachXBT has traced the flow of 783 BTC, worth $91 million, that was taken in a social engineering scam.
crypto-economy.com
August 22, 2025 at 12:20 PM
North Korea-linked Hackers Stole Over $2 Billion in Crypto So Far in 2025: Report - Finance Magnates #NorthKorea #CyberSecurity #CryptoTheft #Blockchain #Hacking
North Korea-linked Hackers Stole Over $2 Billion in Crypto So Far in 2025: Report - Finance Magnates
North Korea-linked Hackers Stole Over $2 Billion in Crypto So Far in 2025: Report  Finance Magnates http://dlvr.it/TNXY1j
dlvr.it
October 7, 2025 at 9:34 PM
The U.S. just hit North Korea’s cybercrime empire with sweeping sanctions.
Banks. Fake IT workers. Billions in stolen crypto. 💸
Stay protected—build smarter defenses with #Technijian.
#NorthKorea #CryptoTheft #Sanctions #CyberCrime #GlobalSecurity #AIinCybersecurity #DigitalProtection #Ransomware
November 5, 2025 at 4:57 PM
Crypto Vanishes: North Korea’s $2B Heist, Discord Breach Exposes Millions #CryptoTheft #DataBreach #DiscordBreach
Crypto Vanishes: North Korea’s $2B Heist, Discord Breach Exposes Millions
 North Korean hackers have stolen over $2 billion in cryptocurrency in 2025, while a Discord breach exposed sensitive user data, including government IDs of approximately 70,000 individuals. These incidents highlight the growing sophistication of cyber threats targeting both financial assets and personal information. Cybercrime surge North Korean state-sponsored hacking groups, such as the Lazarus Group, have significantly increased their cryptocurrency thefts, amassing more than $2 billion in 2025 alone, marking a record for these cybercriminals. The funds are believed to support North Korea’s nuclear weapons and missile development programs.The regime’s hacking activities now contribute approximately 13% to its estimated $15.17 billion GDP.  The largest single theft occurred in February 2025, when hackers stole $1.4 billion from the crypto exchange ByBit, with other attacks targeting platforms like WOO X and Seedify resulting in millions more in losses. North Korean hackers are increasingly focusing on wealthy individual cryptocurrency holders, who often lack the robust security measures of institutional investors, making them vulnerable targets.  Discord ID breach and data exposure Discord confirmed a breach in which hackers accessed the government-issued identification documents of around 70,000 users who had uploaded them for age verification disputes. The attackers infiltrated a third-party customer service provider, 5CA, to gain access to this sensitive data.  The stolen information, including selfies holding IDs, email addresses, and partial phone numbers, is being shared in Telegram groups, raising serious privacy concerns about digital age verification systems. This incident underscores the risks associated with centralized storage of personal identification documents. New tactics: EtherHiding on blockchains In a significant evolution of cyber-espionage tactics, a North Korean threat actor tracked as UNC5342 has been observed using a technique called “EtherHiding” since February 2025. This method involves embedding malicious code within smart contracts on public blockchains like Ethereum or BNB Smart Chain, using the decentralized ledger as a resilient command-and-control server.  This approach, part of a campaign named “Contagious Interview,” uses social engineering—posing as recruiters on LinkedIn—to lure victims into executing malware that downloads further payloads via blockchain transactions. The decentralized nature of blockchains makes EtherHiding highly resistant to takedown efforts, presenting a new challenge for cybersecurity defenses.
dlvr.it
October 18, 2025 at 2:13 PM
Crypto Hacks Soar to $1.2 Billion in 2024: Because Who Needs Customer Service When You Can Just Steal From Your Customers?
https://cointelegraph.com/news/crypto-hacks-surpass-1-2-billion-finance-redefined
#bankruptcyhearing #cryptotheft #cryptocurrencyhacks
September 5, 2024 at 4:48 PM
That trusted Discord link could now lead to stolen crypto and full system compromise. #CyberSecurity #DiscordHack #CryptoTheft
Discord Links Hijacked to Spread Crypto-Stealing Malware
A new Discord invite link hijacking campaign uses clever tricks and trusted platforms to steal crypto wallets and personal data. Learn how it works—and how to avoid it.
geekoo.news
June 14, 2025 at 11:07 AM
Hackers exploit AI development tools, stealing $500K in crypto. Developers, stay vigilant! #CyberSecurity #AI #CryptoTheft #SupplyChainAttack Link: thedailytechfeed.com/hackers-expl...
July 11, 2025 at 3:56 PM
🚨 Breaking: North Korea's crypto crime spree hits record levels in 2024! 💻🔓

Hackers stole $1.34B in virtual funds - that's 61% of global crypto theft. These funds fuel nuclear programs, bypassing sanctions. The digital world is under siege. 🌐💥

#CyberSecurity #CryptoTheft
December 20, 2024 at 5:49 PM
GreedyBear's sophisticated campaign steals over $1M in crypto using fake browser extensions, malware, and scam sites. Stay vigilant! #CyberSecurity #CryptoTheft #GreedyBear Link: thedailytechfeed.com/greedybears-...
August 8, 2025 at 3:38 PM
OKX becomes the latest victim of crypto theft as SMS notification security fails; OKX is investigating the crypto theft and has contacted the affected users. The number of crypto larceny incidents has increased as hackers have utilized innovative methods to siphon off… #Crypto #cryptotheft #OKX
OKX Becomes Latest Victim of Crypto Theft
OKX becomes the latest victim of crypto theft as SMS notification security fails; OKX is investigating the crypto theft and has contacted the affected users. The number of crypto larceny incidents has increased as hackers have utilized innovative methods…
protechbro.com
June 10, 2024 at 7:13 AM
SUMMARY:
A global infostealer malware campaign is specifically targeting cryptocurrency users and gamers, aiming to steal sensitive information and digital assets.

#malware #cryptotheft #gamingscams #cybersecuritynews
Global infostealer malware operation targets crypto users, gamers
A massive infostealer malware operation encompassing thirty campaigns targeting a broad spectrum of demographics and system platforms has been uncovered, attributed to a cybercriminal group named "Marko...
www.bleepingcomputer.com
September 21, 2024 at 6:06 PM
$21 Million Stolen in Hyperliquid Private Key Breach: Experts Warn of Rising Crypto Wallet Hacks #BlockchainSecurity #CryptoTheft #cryptowallethack
$21 Million Stolen in Hyperliquid Private Key Breach: Experts Warn of Rising Crypto Wallet Hacks
  Hyperliquid user, identified by the wallet address 0x0cdC…E955, has reportedly lost $21 million in cryptocurrency after hackers gained access to their private key. According to blockchain security firm PeckShield, the attackers swiftly transferred the compromised funds to the Ethereum network, as confirmed through on-chain tracking. The stolen crypto included approximately 17.75 million DAI tokens and 3.11 million MSYRUPUSDP tokens. PeckShield also shared visual data mapping out the wallet addresses connected to the heist. “A victim 0x0cdC…E955 lost ~$21M worth of cryptos due to a private key leak. The hacker has bridged the stolen funds… including 17.75M & 3.11M,” — PeckShieldAlert (@PeckShieldAlert) Blockchain records indicate that the stolen tokens were strategically transferred and redistributed across multiple wallets, mirroring tactics seen in earlier high-profile crypto thefts. An unusual detail in the case is the timing of certain trading activities. Just as PeckShield’s alert went public, data showed that a Hyperliquid account closed a $16 million HYPE long position, followed by the liquidation of 100,000 HYPE tokens worth about $4.4 million. Researchers analyzing transactions on Hypurrscan suggested that this trading account might have belonged to the same compromised user. Their findings indicate that the liquidated assets were later converted into USDC and DAI, with transfers spanning both the Ethereum and Arbitrum networks—aligning closely with the hacker’s movements identified by PeckShield. The breach wasn’t limited to Hyperliquid balances. Investigations revealed an additional $3.1 million was siphoned from the Plasma Syrup Vault liquidity pool, with the tokens quickly routed to a newly created wallet. Prominent X (formerly Twitter) user Luke Cannon suggested that the total damage could be higher, estimating another $300,000 stolen from linked wallet addresses. Recurring Attacks Raise Security Concerns Another Hyperliquid user, @TradeThreads (BRVX), reported losing $700,000 in HYPE tokens last month under similar circumstances. “Lost 700k in hype in a similar incident last month. Not sure how they hacked. No malware, no discord chats, no TG calls, no email download,” — BRVX (@TradeThreads) He speculated that Windows malware might have been the cause, as he had not accessed his wallets for a week and had recently switched to a new MacBook where the wallet wasn’t even set up. Unlike exchange or smart contract vulnerabilities, this breach resulted from a private key leak, which grants attackers full access to wallet credentials. Such leaks often stem from phishing attacks, malware, or insecure key storage practices. Cybersecurity experts continue to emphasize the importance of cold wallets or multi-signature setups for protecting high-value crypto assets. Recently, Blockstream issued a security alert warning Jade hardware wallet owners of a phishing campaign spreading through fake firmware update emails. Growing Pattern of Private Key Exploits Private key-related hacks are becoming alarmingly common. Just weeks ago, North Korean hackers reportedly stole $1.2 million from Seedify’s DAO launchpad, causing its token SFUND to drop by 99%. Similarly, a Venus Protocol user on BNB Chain lost $27 million to a key breach in September. According to CertiK’s annual security report, over $2.36 billion was lost across 760 on-chain security incidents last year, with $1.05 billion directly linked to private key compromises—making up 39% of all attacks. The report explains that phishing remains a preferred method among hackers because it exploits human error rather than technological weaknesses. Since blockchain transactions are irreversible, even a single mistake can result in irreversible losses. The Ethereum network continues to witness the most attacks, followed by Binance Smart Chain (BSC)—but experts warn that Hyperliquid is now becoming a new target for cybercriminals due to its decentralized infrastructure.
dlvr.it
October 19, 2025 at 6:02 PM