Friday, December 6, 2024
HomeCryptocurrency hack$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

Published on

SIEM as a Service

Hackers stolen cryptocurrencies worth $60 million form Japanese cryptocurrency exchange firm Zaif exchange hot wallet that connected to the internet.

The stolen cryptocurrencies include Bitcoin, Monacoin and Bitcoin Cash, the attackers gained control over Zaif exchange hot wallet for two hours and transferred the funds.

Tech Bureau group who owns Zaif said that bout 2.2 billion yen ($19.6 million) of stolen coins belonged to the exchange and the rest was client money. The company also agreed to pay compensation for the users who lost the assests in the hack attack.

- Advertisement - SIEM as a Service

Withdrawls and deposits are halted as Zaif rebuilds the system, and no information on when the services to be restored.

The company signed an agreement with a Fisco Ltd to receive 5 billion yen as an investment to pay compensation and in turn Tech Bureau transferred the majority of ownership.

“Documents seen by Reuters on Thursday showed Japan’s Financial Services Agency would conduct emergency checks on cryptocurrency exchange operators’ management of customer assets, following the theft.”

This is the second attack targeting Japanese crypto exchange, starting this year Tokyo-based Cryptocurrency Exchange Coincheck Hacked and the attackers stole more than $500 Million Worth NEM cryptocurrency which is one of the Biggest hacking in the Cryptocurrency history.

Related Read

Cyber Criminals Stolen $18 Million From Bitcoin Gold Network Using Double Spend Attack

WinstarNssmMiner – A Brutal Computer Crypto-Hijacker Attack Victims over 500,000 Times in 3 days

Ubuntu Snap Store Apps Contains Hidden Cryptocurrency Miner Malware

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency Miner

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Top Five Industries Most Frequently Targeted by Phishing Attacks

Researchers analyzed phishing attacks from Q3 2023 to Q3 2024 and identified the top...

Russian BlueAlpha APT Exploits Cloudflare Tunnels to Distribute Custom Malware

BlueAlpha, a Russian state-sponsored group, is actively targeting Ukrainian individuals and organizations by using...

Russian Hackers Hijacked Pakistani Actor Servers For C2 Communication

Secret Blizzard, a Russian threat actor, has infiltrated 33 command-and-control (C2) servers belonging to...

Sophisticated Celestial Stealer Targets Browsers to Steal Login Credentials

Researchers discovered Celestial Stealer, a JavaScript-based MaaS infostealer targeting Windows systems that, evading detection...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Beware Of Malicious PyPI Packages That Inject infostealer Malware

Recent research uncovered a novel crypto-jacking attack targeting the Python Package Index (PyPI), where...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their...