Thursday, January 30, 2025
HomeCryptocurrency hackKICKICO Hacked - Hackers Stolen $ 7.7 Million Worth Tokens

KICKICO Hacked – Hackers Stolen $ 7.7 Million Worth Tokens

Published on

SIEM as a Service

Follow Us on Google News

KICKICO Hacked, hackers gained access to the KICK smart contact token of the KICKICO platform and stolen 70,000,000 KICK which is equivalent to $ 7.7 million.

KICKICO is an initial coin offering (ICO) project that launched with the Ethereum blockchain protocol. KICKICO ranks 133 according to coinmarketcap and handles $0.113662 USD every day.

The company learned the hack attack after several victim complaints loss of tokens that worth 800 thousand dollars in their wallets.

According to KICKICO blog posts, the “the control over the smart contract has been fully restored and the company asked users to update victims about the stolen tokens.

https://twitter.com/KICKICOplatform/status/1022620269813424129

KICKICO Hacked

Hacker gained access to the private key of KickCoin smart contract owner account and destroyed tokens at approximately 40 accounts and recreated them at other 40 accounts with the corresponding amount.

The stolen tokens were not permanently destroyed, they were just replicated in another account. KICKICO guarantees all the tokens will be restored to the account holders.

“Thanks to the rapid response of our community and our coordinated teamwork, we were able to regain control over the tokens and prevent further possible losses by replacing the compromised private key with the private key of the cold storage.”

On July 10, Bancor Suffers Security Breach, hackers compromised the wallet that used to update the smart contacts and used to withdraw the Etherum that worth $12.5 million and $1 million worth Pundi X from the BNT.

From nowhere cyber attacks against crypto exchange evolving in rapid phase, within last 60 days more than five crypto exchange updates have been targeted.

Also Read

Singaporean Crypto-jacking Attack Leads to Add more Crypto-Security Concerns

Bancor Suffers Security Breach – Hackers Stolen $23.5 Million Worth Cryptocurrency

Bithump Hacked – Hackers Steal $31 Million Worth Cryptocurrency

South Korean Crypto Exchange Coinrail Hacked and Attackers Steal $40M in Tokens

Japanese Syndicate Wallet Hacked – Cyber Criminals Stolen $10 Million USD

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...