Sunday, April 27, 2025
HomeBitcoinTwo Hacker Groups Stolen $1 Billion by Compromising the Crypto Exchanges

Two Hacker Groups Stolen $1 Billion by Compromising the Crypto Exchanges

Published on

SIEM as a Service

Follow Us on Google News

New report States that only Two hacker groups are responsible for the majority of cryptocurrency hacking attacks and stolen nearly $1 Billion so far in 2018.

Crypto exchange is now one of the most frequently targeting attack platform and the cybercriminals stealing millions of dollars in cryptocurrency.

New Crypto crime report reveals that there only two biggest hacking groups involved past cryptocurrency related attacks that target centralized cryptocurrency exchanges, peer-to-peer exchanges etc.

- Advertisement - Google News

In this case sophisticated hackers targeting cryptocurrencies for different reasons also they launch very powerful attacks that we ever imagine in order to obtain their goals.

Two hacker groups having different nature of goals, the First group is a giant group with non-monetary goals. and the other group is smaller and less organized to focus on complete monetary benefits.

Report says, On average, the incidents that the researchers traced from the two hacking groups involved $90 million per incident. 

These Two professional hacker groups, Together, these two groups are responsible for stealing around $1 billion to date, at least 60% of all publicly reported hacks. And given the potential rewards, there’s no question hacking will continue; it is the most lucrative of all crypto crimes.”
Chainalysis said.

Stolen Funds Moving Process

Hackers are using a complex array of wallets and exchanges in order to move their stolen funds before that cybercriminals don’t move their funds for first 40 days to observe and waiting until interest in the theft has died down.

Once they feel the time would be safe to transfer then they start their fund transferring process and they are using some conversion service in order to make sure the funds are cahsed within 112 days. Also, the are using Sophisticated techniques to evade detection between the hack and their exit.

Until now, exchanges and law enforcement have had limited ability to track hacked funds. Furthermore, exchanges are regularly processing the stolen funds, allowing the hackers to convert the funds to traditional currencies or other cryptocurrencies. chainalysis said.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...

Compliance And Governance: What Every CISO Needs To Know About Data Protection Regulations

The cybersecurity landscape has changed dramatically in recent years, largely due to the introduction...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Two Systemic Jailbreaks Uncovered, Exposing Widespread Vulnerabilities in Generative AI Models

Two significant security vulnerabilities in generative AI systems have been discovered, allowing attackers to...

New AI-Generated ‘TikDocs’ Exploits Trust in the Medical Profession to Drive Sales

AI-generated medical scams across TikTok and Instagram, where deepfake avatars pose as healthcare professionals...

Gamers Beware! New Attack Targets Gamers to Deploy AgeoStealer Malware

The cybersecurity landscape faces an escalating crisis as AgeoStealer joins the ranks of advanced...