Monday, February 17, 2025
HomeComputer SecurityBittrex Cryptocurrency Exchange Delist the Bitcoin Gold After They Declined to Pay...

Bittrex Cryptocurrency Exchange Delist the Bitcoin Gold After They Declined to Pay 12,372 BTG for Cyber Attack

Published on

SIEM as a Service

Follow Us on Google News

Worlds thirteenth largest cryptocurrency exchange Bittrex has decided to delist the Bitcoin Gold(BTG) from this blockchain after they Bitcoin Gold declined to pay 12,372 BTG.

Bitcoin Gold is one the leading cryptocurrency with $374,203,766 USD market cap (50,768 BTC) and its holding rank 29.

May 19th, Malicious hackers attempting a largest double-spend attack on Bittrex and few cryptocurrency exchanges and stolen the Bitcoin Gold, using rented power from NiceHash to perform 51% attacks.

The result causes an amount of approximately $18.6 million USD worth of Bitcoin Gold was transferred to an attackers cryptocurrency exchange.

In this case, Bittrex informed to Bitcoin Gold to paying 12,372 BTG to cover the loss they incurred and later they said, “We would cover part of the loss from their own BTG reserves and requested BTG pay the remaining ~6000 BTG” If not them Bitcoin Gold would be delisted From Bittrex Exchange.

51% double-spend attack has always been a known high risk in the blockchain world, In this case, Attack is not because of any fault or flaw in the BTG blockchain or code and the Bitcoin Gold using the same code as the bitcoin code.

So Bitcoin Gold said, The Bitcoin Gold team is not responsible for security policy within private entities like Bitrex; those who earn revenue running a private business must manage the related risks and are ultimately responsible for their own security.

Also Bitcoin Gold also provides the following extensive measures to defend Bittrex.

  • gave Bittrex the attacker’s wallet address
  • advised they raise their confirmation requirements to give them adequate time to respond
  • advised them to flag and review any unusually large deposits
  • Bitcoin Gold even warned them of the onset of the actual attack which victimized them.

Bittrex was the victim of the last and largest BTG double-spend the attackers performed. The attackers deposited 12,371 BTG from the wallet we previously identified.

Even after all this performance, finally, Bittrex decided to delist the Bitcoin Gold . also Bitcoin Gold Said, All our exchange partners can rest assured we will continue to work to assist them whenever possible, and that we will continue to work towards improvements which will increase safety in the crypto space.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Android’s New Security Feature Prevents Sensitive Setting Changes During Calls

Phone scams are becoming more sophisticated with advancements in AI-driven speech tools, making it...

Hackers Exploit Microsoft Teams Invites to Gain Unauthorized Access

The Microsoft Threat Intelligence Center (MSTIC) has uncovered an ongoing and sophisticated phishing campaign...

Meta’s Bug Bounty Initiative Pays $2.3 Million to Security Researchers in 2024

Meta's commitment to cybersecurity took center stage in 2024 as the tech giant awarded...

Google Chrome Introduces AI to Block Malicious Websites and Downloads

Google has taken a significant step in enhancing internet safety by integrating artificial intelligence...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

New FUD Malware Targets MacOS, Evading Antivirus and Security Tools

A new strain of Fully Undetectable (FUD) macOS malware, dubbed "Tiny FUD," has emerged,...

Canadian National Charged with Stealing $65 Million in Crypto

A Canadian man has been charged with exploiting decentralized finance (DeFi) protocols to steal...

CryptoDNA: AI-Powered Cryptojacking Defense Against DDoS Threats in Healthcare IoT

The integration of Internet of Things (IoT) and Internet of Medical (IoM) devices has...