Monday, March 17, 2025
HomeComputer SecurityJapanese Syndicate Wallet Hacked - Cyber Criminals Stolen $10 Million USD

Japanese Syndicate Wallet Hacked – Cyber Criminals Stolen $10 Million USD

Published on

SIEM as a Service

Follow Us on Google News

blockchain based personal shopper company Shopin released an official statement that its significant token distributor syndicate was hacked and stolen $10 million USD of a variety of tokens, including Ethereum, Level Up, Orbs, and Shopin Tokens.

Shopin world’s first decentralized shopper profile That built on the blockchain that delivers the most personal shopping experience on retailer websites, apps, and stores.

In this case, Japanese syndicate involved and gathered various Tokens by participants for Shopin’s Token Generation Event.

Also syndicate used hot MyEtherWallet storage wallet containing a large number of various tokens, including 61 million Shopin Tokens.

Later on, the attack was took place and the syndicate member’s wallet was hacked after successfully receiving the allotment of participant tokens and the Officials belive that the attack was someone who has credentialed access

The incidents were reported to Shopin and immediately guided the syndicate lead to file a police report in Japan.

Alongside, The company has enlisted one of the world’s top cryptocurrency forensic experts to help further investigate.

Eran Eyal, CEO and CoFounder of Shopin said, “We are deeply saddened by this news and send our empathy to all of the Japanese members of our Shopin community who have been affected by this stressful news.

The main reason for this hack due to syndicate lead was not storing Shopin tokens in a cold storage or hardware wallet and that it was clearly vulnerable to an attack.

Also he said,  We have taken all immediate measures to have the incident investigated, and we remain hopeful that the informed authorities will be able to trace the trail of the hack.”

Shopin request to all affected participants and the Chopin crypto community to remain patient.

Additionally, comments have been added in the wallet with stolen Shopin Tokens notifying the public and the wallet owner that the Shopin Tokens were stolen.

Also Shopin has requested the following statement the community on Telegram (@shopineverywhere) and enlisted their advice and help.

“In difficult times like these, it’s incredible to see an entire community rise up to help fellow participants enlist transparency,” said Eyal. “The community as a whole has been working together to come up with innovative solutions to a terrible problem. This is something that would not be impossible without the paradigm shift that is the blockchain.”

Also Read:

Cyber Criminals Stolen $18 Million From Bitcoin Gold Network Using Double Spend Attack

WinstarNssmMiner – A Brutal Computer Crypto-Hijacker Attack Victims over 500,000 Times in 3 days

Ubuntu Snap Store Apps Contains Hidden Cryptocurrency Miner Malware

Android Gamers Beware of Fake Fortnite Game that Contains Spyware and Cryptocurrency Miner

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hackers Exploit Tomcat Vulnerability to Hijack Apache Servers

A recent and significant cybersecurity threat has emerged involving a critical vulnerability in Apache...

Apple Introduces RCS End-to-End Encryption for iPhone Messages

Apple has announced the integration of end-to-end encryption (E2EE) for Rich Communication Services (RCS)...

Adobe Acrobat Vulnerabilities Enable Remote Code Execution

A recent disclosure by Cisco Talos' Vulnerability Discovery & Research team highlighted several vulnerability...

Hackers Use CSS Tricks to Bypass Spam Filters and Monitor Users

Cybersecurity experts have uncovered how hackers use Cascading Style Sheets (CSS) to deceive spam...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Ongoing Cyber Attack Mimic Booking.com to Spread Password-Stealing Malware

Microsoft Threat Intelligence has identified an ongoing phishing campaign that began in December 2024,...

Hackers Exploit Advanced MFA Bypass Techniques to Compromise User Accounts

In recent years, phishing has remained the most prevalent form of cyberattack, with approximately...

Jaguar Land Rover Allegedly Hacked – 700 Internal Documents Including Source Code Leaked

A threat actor known as "Rey" has come forward on a prominent dark web...