Thursday, January 30, 2025
HomeCryptocurrency hackLargest Crypto-Mining Market Hacked - Hackers may be Stolen $68M

Largest Crypto-Mining Market Hacked – Hackers may be Stolen $68M

Published on

SIEM as a Service

Follow Us on Google News

Bitcoin recent rise happened as fast as possible, and it crosses the $14,000 landmark for the first time in history.In the meantime a largest Crypto-Mining Marketplace NiceHash announced that it suffered a security breach.

NiceHash
Source: Coindesk

NiceHash started in 2014, and it serves as the marketplace for miners, it has multiple coins to mine beginning from Litecoin to bitcoin. All you need to do is a signup for an account and add the mining pool.

On Wednesday a hacker compromised Nicehash marketplace payment system and an unknown amount of Bitcoins stolen from the wallets.NiceHash not yet disclosed any amount that stolen.

According to their company statement, there has been a security breach involving NiceHash website. Importantly, our payment system was compromised, and the contents of the NiceHash Bitcoin wallet have been stolen.

Nowadays Cryptocurrencies Malware’s evolving with much more capabilities, with this security breach the nature of the incident was not identified “We are currently investigating the nature of the incident and, as a result, we are stopping all operations for the next 24 hours.” the company statement reads.

But according to coindesk reports a wallet circulated NiceHash users shows 4,736.42BTC which worths 68,169,547.78 USD has been stolen, if the address belongs to NiceHash, then it could be the significant set back for the company.

Hackread indicated that the amount of BTC address is increasing gradually while writing we observed it is 68,169,547.78 USD according to the last update 2017-12-07 10:27:59.
NiceHash

Still, the nature of the incident was not yet identified, and users are advised to change their password

We are fully committed to restoring the NiceHash service with the highest security measures at the earliest opportunity.We are truly sorry for any inconvenience that this may have caused and are committing every resource towards solving this issue as soon as possible, the company said.

Some of Very Recent Cryptocurrency Breaches

1. CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency
2. World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised
3. Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID
4. Over 1.65 Million Users Infected By Cryptocurrency Malware Miners In 2017

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploiting DNS Poisoning to Compromise Active Directory Environments

A groundbreaking technique for Kerberos relaying over HTTP, leveraging multicast poisoning, has been recently...

New Android Malware Exploiting Wedding Invitations to Steal Victims WhatsApp Messages

Since mid-2024, cybersecurity researchers have been monitoring a sophisticated Android malware campaign dubbed "Tria...

500 Million Proton VPN & Pass Users at Risk Due to Memory Protection Vulnerability

Proton, the globally recognized provider of privacy-focused services such as Proton VPN and Proton...

Arcus Media Ransomware Strikes: Files Locked, Backups Erased, and Remote Access Disabled

The cybersecurity landscape faces increasing challenges as Arcus Media ransomware emerges as a highly...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Malicious Solana Packages Attacking Devs Abusing Slack And ImgBB For Data Theft

Malicious packages "solanacore," "solana login," and "walletcore-gen" on npmjs target Solana developers with Windows...

PHP Servers Vulnerability Exploited To Inject PacketCrypt Cryptocurrency Miner

Researchers observed a URL attempts to exploit a server-side vulnerability by executing multiple commands...

The Defender vs. The Attacker Game

The researcher proposes a game-theoretic approach to analyze the interaction between the model defender...