Thursday, April 3, 2025
HomeComputer SecurityBittrex Cryptocurrency Exchange Delist the Bitcoin Gold After They Declined to Pay...

Bittrex Cryptocurrency Exchange Delist the Bitcoin Gold After They Declined to Pay 12,372 BTG for Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

Worlds thirteenth largest cryptocurrency exchange Bittrex has decided to delist the Bitcoin Gold(BTG) from this blockchain after they Bitcoin Gold declined to pay 12,372 BTG.

Bitcoin Gold is one the leading cryptocurrency with $374,203,766 USD market cap (50,768 BTC) and its holding rank 29.

May 19th, Malicious hackers attempting a largest double-spend attack on Bittrex and few cryptocurrency exchanges and stolen the Bitcoin Gold, using rented power from NiceHash to perform 51% attacks.

The result causes an amount of approximately $18.6 million USD worth of Bitcoin Gold was transferred to an attackers cryptocurrency exchange.

In this case, Bittrex informed to Bitcoin Gold to paying 12,372 BTG to cover the loss they incurred and later they said, “We would cover part of the loss from their own BTG reserves and requested BTG pay the remaining ~6000 BTG” If not them Bitcoin Gold would be delisted From Bittrex Exchange.

51% double-spend attack has always been a known high risk in the blockchain world, In this case, Attack is not because of any fault or flaw in the BTG blockchain or code and the Bitcoin Gold using the same code as the bitcoin code.

So Bitcoin Gold said, The Bitcoin Gold team is not responsible for security policy within private entities like Bitrex; those who earn revenue running a private business must manage the related risks and are ultimately responsible for their own security.

Also Bitcoin Gold also provides the following extensive measures to defend Bittrex.

  • gave Bittrex the attacker’s wallet address
  • advised they raise their confirmation requirements to give them adequate time to respond
  • advised them to flag and review any unusually large deposits
  • Bitcoin Gold even warned them of the onset of the actual attack which victimized them.

Bittrex was the victim of the last and largest BTG double-spend the attackers performed. The attackers deposited 12,371 BTG from the wallet we previously identified.

Even after all this performance, finally, Bittrex decided to delist the Bitcoin Gold . also Bitcoin Gold Said, All our exchange partners can rest assured we will continue to work to assist them whenever possible, and that we will continue to work towards improvements which will increase safety in the crypto space.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z...

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware...

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies...

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Threat Actors Compromise 150,000 Websites to Promote Chinese Gambling Platforms

A large-scale cyberattack has compromised approximately 150,000 legitimate websites by injecting malicious JavaScript to...

Advanced CoffeeLoader Malware Evades Security to Deliver Rhadamanthys Shellcode

Security researchers at Zscaler ThreatLabz have identified a new sophisticated malware family called CoffeeLoader,...

Clio: Real-Time Logging Tool with Locking, User Authentication, and Audit Trails

Clio is a cutting-edge, secure logging platform designed specifically for red team operations and...