Tuesday, February 11, 2025
HomeCryptocurrency hackHackers Breached ETERBASE Cryptocurrency Exchange and Stole $ 5.4 Million

Hackers Breached ETERBASE Cryptocurrency Exchange and Stole $ 5.4 Million

Published on

SIEM as a Service

Follow Us on Google News

Recently, the representatives of the ETERBASE has reported on the official Telegram channel of the portal that they have become a victim of hackers. In this incident, the hackers attacked ETERBASE and successfully stole $5.4 million on September 8.

ETERBASE already issued the addresses of the wallets to which the funds were transferred. Here, hackers have hacked six hot wallets that contain Bitcoins, Ether, ERC20 tokens, XRP, Tron, Tezos, and Algorand.

However, the representatives of ETERBASE has already informed the police about the event, and they have already initiated their investigation. According to the reports, the hefty part of the funds went to the popular exchanges, Binance, HuobiGlobal, and Hitbtc.

According to ETERBASE report,  as we have informed our customers/community yesterday, the hot wallets of the ETERBASE Exchange were compromised and assets worth approximately $ 5.4 million were stolen.

In the official Telegram channel, the representatives of ETERBASE admitted that they noticed the attack, but, unfortunately, they were not able to stop it. But, the company has already requested assistance from the other exchanges to which the funds were transferred.

But on September 9, ETERBASE reassured that it had enough capital available to cover the payouts of all users, and not only that, even they have also ensured that it had no intention to stop its operations.

Moreover, the CEO of Binance, Changpeng Zhao, has assured that he will do everything in his power to help ETERBASE to recover the funds. The cryptocurrency exchanges are often used to launder money by ransomware operators, and Binance was unable to prevent hackers from withdrawing funds through their infrastructure.

Security experts have hinted towards the Cybercriminal group CryptoCore, as this group is behind many attacks on cryptocurrency exchanges. 

This group has been operating since 2018 and has already carried out five cyberattacks, as a result of which about $200 million were stolen from online cryptocurrency exchanges in Japan, the United States, and other countries.

Due to this breach, currently, all the operations on Eterbase are suspended until September 10, but as we told earlier that the company has assured that they will continue all their operations.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates

Also Read:

Hackers Abusing Docker Hub Account to Mine Monero Cryptocurrency

Blue Mockingbird Hacker Group Attack Windows Machines at Multiple Organizations to Deploy cryptocurrency-mining Malware\

Hackers Сovertly Mining Cryptocurrency on Government Websites in India

The Biggest Cryptocurrency Hacks in History

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

SHA256 Hash Calculation from Data Chunks

The SHA256 algorithm, a cryptographic hash function, is widely used for securing data integrity...

New Report of of 1M+ Malware Samples Show Application Layer Abused for Stealthy C2

A recent analysis of over one million malware samples by Picus Security has revealed...

Seven-Year-Old Linux Kernel Bug Opens Door to Remote Code Execution

Researchers have uncovered a critical vulnerability in the Linux kernel, dating back seven years,...

Ransomware Payments Plunge 35% as More Victims Refuse to Pay

In a significant shift within the ransomware landscape, global ransom payments plummeted by 35%...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...