Saturday, October 12, 2024
HomeCryptocurrency hackCoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency

CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency

Published on

Malware protection

CoinDash Website has been hacked by unknown hackers during our Token Sale event which leads to $7 million worth of Ethereum was stolen in about half an hour.

Few Days Before World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised.

CoinDash held its Token Sale event, in which investors were meant to be able to find apps in development with virtual currency in return for a stake in such applications.

- Advertisement - SIEM as a Service

Hackers modified CoinDash Platform  Ethereum wallet address during the company’s ICO (Initial Coin Offering).

Wallet Address has been modified by hackers owned address which leads to C

CoinDash Comformed this Breach in their Twitter Account and the platform apologized, admitting that a “hacking attack” took place during the event by an unknown perpetrator, resulting in the loss of millions in ethereum, also known as ether (ETH).

Also Read    All that You Should Know about Bitcoins and its Exchange – A Detailed Overview

CoinDash Warned  to Investors

According to CoinDash, before the hack, it received around $6 million worth of Ethereum in the first three minutes.

“CoinDash Warned to Investors, This is an emergency message delivered to you in order to stop you from sending your money to an unauthorized ETH address. It seems like our Token Sale page was tampered and the sending address was changed. Please stop from sending your funds to any of the addresses until we say otherwise. We are currently examining the situation and will shortly send further instructions.”

Also intimate that , this breach has affected both our contributors and company, and they are investigating this attack.

To assist the investigation, the company tweeted out a form for people to fill out if they tried to purchase coins.

Also Read   Biggest Bitcoin Wallet Hack in History, Around US$5 Million Worth Bitcoin Currency Stolen

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Threat Actor ProKYC Selling Tools To Bypass Two-Factor Authentication

Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication...

Mozilla Warns Of Firefox Zero-Day Actively Exploited In Cyber Attacks

A critical use-after-free vulnerability affecting Firefox and Firefox Extended Support Release (ESR) is being...

SpyCloud Embeds Identity Analytics in Cybercrime Investigations Solution to Accelerate Insider and Supply Chain Risk Analysis & Threat Actor Attribution

IDLink, SpyCloud’s new automated digital identity correlation capability, is now core to its industry-leading...

Abusix and Red Sift Form New Partnership, Leveraging Automation to Mitigate Cyber Attacks

The agreement has marked over 600,000 fraudulent domains for takedown in just two months...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...

Log4j Vulnerability Exploited Again To Deploy Crypto-Mining Malware

Recent attacks exploit the Log4j vulnerability (Log4Shell) by sending obfuscated LDAP requests to trigger...

Hackers Abused StackExchange Platform To Deliuver Malicious Python Package

Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a...