Monday, November 25, 2024
HomeCryptocurrency hackLargest Crypto-Mining Market Hacked - Hackers may be Stolen $68M

Largest Crypto-Mining Market Hacked – Hackers may be Stolen $68M

Published on

Bitcoin recent rise happened as fast as possible, and it crosses the $14,000 landmark for the first time in history.In the meantime a largest Crypto-Mining Marketplace NiceHash announced that it suffered a security breach.

NiceHash
Source: Coindesk

NiceHash started in 2014, and it serves as the marketplace for miners, it has multiple coins to mine beginning from Litecoin to bitcoin. All you need to do is a signup for an account and add the mining pool.

On Wednesday a hacker compromised Nicehash marketplace payment system and an unknown amount of Bitcoins stolen from the wallets.NiceHash not yet disclosed any amount that stolen.

According to their company statement, there has been a security breach involving NiceHash website. Importantly, our payment system was compromised, and the contents of the NiceHash Bitcoin wallet have been stolen.
- Advertisement - SIEM as a Service

Nowadays Cryptocurrencies Malware’s evolving with much more capabilities, with this security breach the nature of the incident was not identified “We are currently investigating the nature of the incident and, as a result, we are stopping all operations for the next 24 hours.” the company statement reads.

But according to coindesk reports a wallet circulated NiceHash users shows 4,736.42BTC which worths 68,169,547.78 USD has been stolen, if the address belongs to NiceHash, then it could be the significant set back for the company.

Hackread indicated that the amount of BTC address is increasing gradually while writing we observed it is 68,169,547.78 USD according to the last update 2017-12-07 10:27:59.
NiceHash

Still, the nature of the incident was not yet identified, and users are advised to change their password

We are fully committed to restoring the NiceHash service with the highest security measures at the earliest opportunity.We are truly sorry for any inconvenience that this may have caused and are committing every resource towards solving this issue as soon as possible, the company said.

Some of Very Recent Cryptocurrency Breaches

1. CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency
2. World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised
3. Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID
4. Over 1.65 Million Users Infected By Cryptocurrency Malware Miners In 2017

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to...

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities,...

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and...

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip,...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their...

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...