Wednesday, March 26, 2025
HomeCryptocurrency hackWorld's Fourth Largest Cryptocurrency "Bithumb" Hacked and Many Number of User Accounts...

World’s Fourth Largest Cryptocurrency “Bithumb” Hacked and Many Number of User Accounts Compromised

Published on

SIEM as a Service

Follow Us on Google News

Worlds Fourth Largest Cryptocurrency called  “Bithumb ”  hacked by unknown hackers and stolen around  31,800 Bithumb users account details which are 3% of the platform’s entire userbase.

Many Bithumb users data such as an e-mail address, mobile phone numbers and other Personal information has been leaked by this breach.

Few Weeks before Biggest Bitcoin Wallet Hack leads toUS$5 Million Worth Bitcoin Currency Stolen.

Bithumb does not use OTP because the exchange uses it all over the world … Busy people do not know how much they hacked.

The Company revealed that some unknown hacker hacked the personal computer of a Bithumb employee and stolen the details of over 31,800 Bithumb users .

Bithumb said. “The main server containing the transaction information is not safe,” Bithumb said the hacking was not related to the internal network, and that the Korean won and virtual currency deposits were safely stored. However, some victims are arguing that “the actual bitcoin has escaped.”

According to the investigation, voice phishing is one of the most common cases of spill damage at present.

Also Read Most Valuable Cryptocurrencies Other Than Bitcoins that You should know

Vishing Scam Attack

Secondary Attacks intimated that many Bithumb users were targetting through Social Engineering attack called Vishing (Mobile Voice call Fraud)  and other methods such as such as bogus manager impersonation, email phishing etc.

A phishing  scammer (VISHING) who pretended to be a Bithumb employee called the victim and said, “The Bithumb online account is trying to hack from abroad.” “You have to change your one-time password (OTP) number, so please tell me your current password”

Few users have even reported about losing as high as 10 million won ($8700) worth of cryptocurrency.and this infromation revealed by local media and Bithumb has never conformed about the exact amount of amount of stolen funds.

“As soon as a number of damages are confirmed, we will reimburse the entire amount of damages,” said Bithumb in an official statement.

Also Read   All that You Should Know about Bitcoins and its Exchange

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

APT Hackers Exploit Google Chrome Zero-Day in Operation ForumTroll to Bypass Sandbox Protections

In mid-March 2025, Kaspersky researchers uncovered a sophisticated APT attack, dubbed Operation ForumTroll, which...

New Sophisticated Linux Backdoor Targets OT Systems via 0-Day RCE Exploit

Researchers at QiAnXin XLab have uncovered a sophisticated Linux-based backdoor dubbed OrpaCrab, specifically targeting...

New Chrome Installer Fails on Windows 10 & 11 With “This app can’t run on your PC” Error

A recent snag in Google's Chrome distribution process has left Windows users unable to...

North Korean Kimsuky Hackers Deploy New Tactics and Malicious Scripts in Recent Attacks

Security researchers have uncovered a new attack campaign by the North Korean state-sponsored APT...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Crypto Platform OKX Suspends Tool Abused by North Korean Hackers

Cryptocurrency platform OKX has announced the temporary suspension of its Decentralized Exchange (DEX) aggregator...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Stablecoin Bank Hit by Cyberattack, Loses $49.5M to Hackers

The cryptocurrency sector faced one of its most significant security breaches this year as...