Tuesday, April 8, 2025
HomecryptocurrencyCyber Criminals Stolen $18 Million From Bitcoin Gold Network Using Double Spend...

Cyber Criminals Stolen $18 Million From Bitcoin Gold Network Using Double Spend Attack

Published on

SIEM as a Service

Follow Us on Google News

Hackers have stolen around $18 Million worth of BTG (Bitcoin Gold) from Bitcoin Gold Network using a new attack method called “Double Spend”.

Attackers using  “51% attacks”  which means An attacker that controls more than 50% of the network’s computing power and they take over more than 50 % of hashpower.

Double spend attack is a type of an attempt where attack using the same coin twice and send the same coin into different Exchange wallet at the same time.

- Advertisement - Google News

This method allows attackers to control the blockchain transactions, and they have an ability to exclude and modify the ordering of transactions.

Exchange Wallet is Primary Target

This attack is largely targeted to the Bitcoin Gold Exchange wallet and there is no risk for the individual users or the fund that existing in the wallet.

But the main risk is for who involved with a larger amount of payment accept directly from the attacker.

According to bitcoingold, The cost of mounting an ongoing attack is high. Because the cost is high, the attacker can only profit if they can quickly get something of high value from a fake deposit. A party like an Exchange may accept large deposits automatically, allow the user to trade into a different coin quickly, and then withdraw automatically. This is why they are targeting Exchanges.

This is not the first time that attackers using this  Double Spend method to compromise the cryptocurrency wallet but already another targeted Exchanges reported that they strongly believe this attacker attempted to hit them with a double-spend of BTC in the past.

A Double-Spend to Bitcoin Gold

An Attempt to spend same BTG coin twice in two different exchange wallet that attackers owned and send the coin both wallet in exactly same time.

Blockchain maintains the queue to resolve this type of transactions are added to blocks. so once 2 same transactions added into the blocks, Exchange wallet choose the first traction is valid and the transaction that came second will be declined.

Also, an order of the block will be cleared if the transactions were sent at the exact same time Along these lines, the coins must be sent to one place – either to the Exchange or to the private wallet.

So far, Attackers Earned  $18 Million

BTG address of this attacker earned around $18 Million so far that is exchanged in this wallet GTNjvCGssb2rbLnDV1xxsHmunQdvXnY2Ft.

  • Funds: GTNjvCGssb2rbLnDV1xxsHmunQdvXnY2Ft
  • Receive mined coins: GXXjRkdquAkyHeJ6ReW3v4FY3QbgPfugTx

Until now, some Exchanges were operating with less than five confirmations required. We have been urging higher limits to prevent such an attack and urging manual review of large deposits of BTG before clearing the funds for trading. bitcoin gold said.

The Bitcoin Gold team advised crypto exchanges to increase the number of confirmations required for a deposit to clear.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

WhatsApp for Windows Flaw Allowed Remote Code Execution via File Attachments

A critical vulnerability identified as CVE-2025-30401 was recently disclosed, highlighting a major security flaw in WhatsApp...

PoC Exploit Reveals SSH Key Exposure via Yelp Vulnerability on Ubuntu

Security researchers have uncovered a critical vulnerability (CVE-2025-3155) in Ubuntu's default help browser Yelp...

Threat Actors Exploit Toll Payment Services in Widespread Hacking Campaign

In a sophisticated cybercrime operation, the Smishing Triad, a China-based group, has been identified...

Everest Ransomware Gang’s Leak Site Hacked and Defaced

TechCrunch has uncovered a concerning development in consumer-grade spyware: a stealthy Android monitoring app...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

20-Year-Old Scattered Spider Hacker Pleads Guilty in Major Ransomware Case

A 20-year-old Noah Urban, a resident of Palm Coast, Florida, pleaded guilty to a...

Malicious Python Packages Target Popular Cryptocurrency Library to Steal Sensitive Data

In a recent development, the ReversingLabs research team has uncovered a sophisticated software supply...

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...