Thursday, March 28, 2024

$60 Million Worth Cryptocurrencies Stolen Hackers From Japanese Cryptocurrency Exchange

Hackers stolen cryptocurrencies worth $60 million form Japanese cryptocurrency exchange firm Zaif exchange hot wallet that connected to the internet.

The stolen cryptocurrencies include Bitcoin, Monacoin and Bitcoin Cash, the attackers gained control over Zaif exchange hot wallet for two hours and transferred the funds.

Tech Bureau group who owns Zaif said that bout 2.2 billion yen ($19.6 million) of stolen coins belonged to the exchange and the rest was client money. The company also agreed to pay compensation for the users who lost the assests in the hack attack.

Withdrawls and deposits are halted as Zaif rebuilds the system, and no information on when the services to be restored.

The company signed an agreement with a Fisco Ltd to receive 5 billion yen as an investment to pay compensation and in turn Tech Bureau transferred the majority of ownership.

“Documents seen by Reuters on Thursday showed Japan’s Financial Services Agency would conduct emergency checks on cryptocurrency exchange operators’ management of customer assets, following the theft.”

This is the second attack targeting Japanese crypto exchange, starting this year Tokyo-based Cryptocurrency Exchange Coincheck Hacked and the attackers stole more than $500 Million Worth NEM cryptocurrency which is one of the Biggest hacking in the Cryptocurrency history.

Related Read

Cyber Criminals Stolen $18 Million From Bitcoin Gold Network Using Double Spend Attack

WinstarNssmMiner – A Brutal Computer Crypto-Hijacker Attack Victims over 500,000 Times in 3 days

Ubuntu Snap Store Apps Contains Hidden Cryptocurrency Miner Malware

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency Miner

Website

Latest articles

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...

Hackers Actively Exploiting Ray AI Framework Flaw to Hack Thousands of Servers

A critical vulnerability in Ray, an open-source AI framework that is widely utilized across...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles