Monday, March 4, 2024

Largest Crypto-Mining Market Hacked – Hackers may be Stolen $68M

Bitcoin recent rise happened as fast as possible, and it crosses the $14,000 landmark for the first time in history.In the meantime a largest Crypto-Mining Marketplace NiceHash announced that it suffered a security breach.

NiceHash
Source: Coindesk

NiceHash started in 2014, and it serves as the marketplace for miners, it has multiple coins to mine beginning from Litecoin to bitcoin. All you need to do is a signup for an account and add the mining pool.

On Wednesday a hacker compromised Nicehash marketplace payment system and an unknown amount of Bitcoins stolen from the wallets.NiceHash not yet disclosed any amount that stolen.

According to their company statement, there has been a security breach involving NiceHash website. Importantly, our payment system was compromised, and the contents of the NiceHash Bitcoin wallet have been stolen.

Nowadays Cryptocurrencies Malware’s evolving with much more capabilities, with this security breach the nature of the incident was not identified “We are currently investigating the nature of the incident and, as a result, we are stopping all operations for the next 24 hours.” the company statement reads.

But according to coindesk reports a wallet circulated NiceHash users shows 4,736.42BTC which worths 68,169,547.78 USD has been stolen, if the address belongs to NiceHash, then it could be the significant set back for the company.

Hackread indicated that the amount of BTC address is increasing gradually while writing we observed it is 68,169,547.78 USD according to the last update 2017-12-07 10:27:59.
NiceHash

Still, the nature of the incident was not yet identified, and users are advised to change their password

We are fully committed to restoring the NiceHash service with the highest security measures at the earliest opportunity.We are truly sorry for any inconvenience that this may have caused and are committing every resource towards solving this issue as soon as possible, the company said.

Some of Very Recent Cryptocurrency Breaches

1. CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency
2. World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised
3. Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID
4. Over 1.65 Million Users Infected By Cryptocurrency Malware Miners In 2017

Website

Latest articles

US Court Orders NSO Group to Handover Code for Spyware, Pegasus to WhatsApp

Meta, the company that owns WhatsApp, filed a lawsuit against NSO Group in 2019....

New SSO-Based Phishing Attack Trick Users into Sharing Login Credentials  

Threat actors employ phishing scams to trick individuals into giving away important details like...

U.S. Charged Iranian Hacker, Rewards up to $10 Million

The United States Department of Justice (DoJ) has charged an Iranian national, Alireza Shafie...

Huge Surge in Ransomware-as-a-Service Attacks targeting Middle East & Africa

The Middle East and Africa (MEA) region has witnessed a surge in ransomware-as-a-service (RaaS)...

New Silver SAML Attack Let Attackers Forge Any SAML Response To Entra ID

SolarWinds cyberattack was one of the largest attacks of the century in which attackers...

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles