Thursday, March 28, 2024

Largest Crypto-Mining Market Hacked – Hackers may be Stolen $68M

Bitcoin recent rise happened as fast as possible, and it crosses the $14,000 landmark for the first time in history.In the meantime a largest Crypto-Mining Marketplace NiceHash announced that it suffered a security breach.

NiceHash
Source: Coindesk

NiceHash started in 2014, and it serves as the marketplace for miners, it has multiple coins to mine beginning from Litecoin to bitcoin. All you need to do is a signup for an account and add the mining pool.

On Wednesday a hacker compromised Nicehash marketplace payment system and an unknown amount of Bitcoins stolen from the wallets.NiceHash not yet disclosed any amount that stolen.

According to their company statement, there has been a security breach involving NiceHash website. Importantly, our payment system was compromised, and the contents of the NiceHash Bitcoin wallet have been stolen.

Nowadays Cryptocurrencies Malware’s evolving with much more capabilities, with this security breach the nature of the incident was not identified “We are currently investigating the nature of the incident and, as a result, we are stopping all operations for the next 24 hours.” the company statement reads.

But according to coindesk reports a wallet circulated NiceHash users shows 4,736.42BTC which worths 68,169,547.78 USD has been stolen, if the address belongs to NiceHash, then it could be the significant set back for the company.

Hackread indicated that the amount of BTC address is increasing gradually while writing we observed it is 68,169,547.78 USD according to the last update 2017-12-07 10:27:59.
NiceHash

Still, the nature of the incident was not yet identified, and users are advised to change their password

We are fully committed to restoring the NiceHash service with the highest security measures at the earliest opportunity.We are truly sorry for any inconvenience that this may have caused and are committing every resource towards solving this issue as soon as possible, the company said.

Some of Very Recent Cryptocurrency Breaches

1. CoinDash Suffered a Hacking Attack And Stolen $7 Million Worth Ethereum Cryptocurrency
2. World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised
3. Cryptocurrency wallets Hacked by “CryptoShuffler” Trojan & Stole $140,000 From Many Wallet ID
4. Over 1.65 Million Users Infected By Cryptocurrency Malware Miners In 2017

Website

Latest articles

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting...

Wireshark 4.2.4 Released: What’s New!

Wireshark stands as the undisputed leader, offering unparalleled tools for troubleshooting, analysis, development, and...

Zoom Unveils AI-Powered All-In-One AI Work Workplace

Zoom has taken a monumental leap forward by introducing Zoom Workplace, an all-encompassing AI-powered...

iPhone Users Beware! Darcula Phishing Service Attacking Via iMessage

Phishing allows hackers to exploit human vulnerabilities and trick users into revealing sensitive information...

2 Chrome Zero-Days Exploited at Pwn2Own 2024: Patch Now

Google has announced a crucial update to its Chrome browser, addressing several vulnerabilities, including...

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and...
Guru baran
Guru baranhttps://gbhackers.com
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Mitigating Vulnerability Types & 0-day Threats

Mitigating Vulnerability & 0-day Threats

Alert Fatigue that helps no one as security teams need to triage 100s of vulnerabilities.

  • The problem of vulnerability fatigue today
  • Difference between CVSS-specific vulnerability vs risk-based vulnerability
  • Evaluating vulnerabilities based on the business impact/risk
  • Automation to reduce alert fatigue and enhance security posture significantly

Related Articles