Thursday, January 30, 2025
HomeCryptocurrency hackCoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency

CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency

Published on

SIEM as a Service

Follow Us on Google News

CoinDash Website has been hacked by unknown hackers during our Token Sale event which leads to $7 million worth of Ethereum was stolen in about half an hour.

Few Days Before World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised.

CoinDash held its Token Sale event, in which investors were meant to be able to find apps in development with virtual currency in return for a stake in such applications.

Hackers modified CoinDash Platform  Ethereum wallet address during the company’s ICO (Initial Coin Offering).

Wallet Address has been modified by hackers owned address which leads to C

CoinDash Comformed this Breach in their Twitter Account and the platform apologized, admitting that a “hacking attack” took place during the event by an unknown perpetrator, resulting in the loss of millions in ethereum, also known as ether (ETH).

Also Read    All that You Should Know about Bitcoins and its Exchange – A Detailed Overview

CoinDash Warned  to Investors

According to CoinDash, before the hack, it received around $6 million worth of Ethereum in the first three minutes.

“CoinDash Warned to Investors, This is an emergency message delivered to you in order to stop you from sending your money to an unauthorized ETH address. It seems like our Token Sale page was tampered and the sending address was changed. Please stop from sending your funds to any of the addresses until we say otherwise. We are currently examining the situation and will shortly send further instructions.”

Also intimate that , this breach has affected both our contributors and company, and they are investigating this attack.

To assist the investigation, the company tweeted out a form for people to fill out if they tried to purchase coins.

Also Read   Biggest Bitcoin Wallet Hack in History, Around US$5 Million Worth Bitcoin Currency Stolen

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...