Tuesday, March 4, 2025
HomeComputer SecurityJapanese Syndicate Wallet Hacked - Cyber Criminals Stolen $10 Million USD

Japanese Syndicate Wallet Hacked – Cyber Criminals Stolen $10 Million USD

Published on

SIEM as a Service

Follow Us on Google News

blockchain based personal shopper company Shopin released an official statement that its significant token distributor syndicate was hacked and stolen $10 million USD of a variety of tokens, including Ethereum, Level Up, Orbs, and Shopin Tokens.

Shopin world’s first decentralized shopper profile That built on the blockchain that delivers the most personal shopping experience on retailer websites, apps, and stores.

In this case, Japanese syndicate involved and gathered various Tokens by participants for Shopin’s Token Generation Event.

Also syndicate used hot MyEtherWallet storage wallet containing a large number of various tokens, including 61 million Shopin Tokens.

Later on, the attack was took place and the syndicate member’s wallet was hacked after successfully receiving the allotment of participant tokens and the Officials belive that the attack was someone who has credentialed access

The incidents were reported to Shopin and immediately guided the syndicate lead to file a police report in Japan.

Alongside, The company has enlisted one of the world’s top cryptocurrency forensic experts to help further investigate.

Eran Eyal, CEO and CoFounder of Shopin said, “We are deeply saddened by this news and send our empathy to all of the Japanese members of our Shopin community who have been affected by this stressful news.

The main reason for this hack due to syndicate lead was not storing Shopin tokens in a cold storage or hardware wallet and that it was clearly vulnerable to an attack.

Also he said,  We have taken all immediate measures to have the incident investigated, and we remain hopeful that the informed authorities will be able to trace the trail of the hack.”

Shopin request to all affected participants and the Chopin crypto community to remain patient.

Additionally, comments have been added in the wallet with stolen Shopin Tokens notifying the public and the wallet owner that the Shopin Tokens were stolen.

Also Shopin has requested the following statement the community on Telegram (@shopineverywhere) and enlisted their advice and help.

“In difficult times like these, it’s incredible to see an entire community rise up to help fellow participants enlist transparency,” said Eyal. “The community as a whole has been working together to come up with innovative solutions to a terrible problem. This is something that would not be impossible without the paradigm shift that is the blockchain.”

Also Read:

Cyber Criminals Stolen $18 Million From Bitcoin Gold Network Using Double Spend Attack

WinstarNssmMiner – A Brutal Computer Crypto-Hijacker Attack Victims over 500,000 Times in 3 days

Ubuntu Snap Store Apps Contains Hidden Cryptocurrency Miner Malware

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency Miner

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Update Alert: Google Warns of Critical Android Vulnerabilities Under Exploit

Google’s March 2025 Android Security Bulletin has unveiled two critical vulnerabilities—CVE-2024-43093 and CVE-2024-50302—currently under...

BigAnt Server 0-Day Vulnerability Lets Attackers Run Malicious Code Remotely

A critical vulnerability in BigAntSoft's enterprise chat server software has exposed ~50 internet-facing systems...

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

33.3 Million Cyber Attacks Targeted Mobile Devices in 2024 as Threats Surge

Kaspersky's latest report on mobile malware evolution in 2024 reveals a significant increase in...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

New Pass-the-Cookie Attacks Bypass MFA, Giving Hackers Full Account Access

Multi-factor authentication (MFA), long considered a cornerstone of cybersecurity defense, is facing a formidable...