Cointime

Download App
iOS & Android

CoinEx Attacker Cross-Chained 113 Eth to Ethereum and Then Transferred It to the Exchange

  • Wechat scan to share

According to PeckShield monitoring, the attacker of CoinEx transferred 113 ETH across chains to Ethereum and then transferred them to exchanges, including FixedFloat and Binance.

Comments

All Comments

Recommended for you

  • Cyvers: Mask Network founder suspected of being stolen, losing nearly $4 million

    Cyvers Alerts officials stated that suspicious transactions related to Suji Yan, the founder of the decentralized social protocol Mask Network, were monitored. A suspicious address received nearly $4 million in digital assets, the stolen assets were immediately exchanged for ETH, and transferred to six different addresses.
  • Bybit hackers have laundered 71,000 ETH in the past 24 hours, and have laundered a total of 206,000 ETH

    According to on-chain analyst Yu Jin's monitoring, in the past 24 hours, the Bybit hacker continued to wash away 71,000 ETH (170 million US dollars). From the afternoon of the 22nd until now, 4 and a half days, 499,000 ETH stolen has been washed away 206,000 ETH. An average of 45,000 ETH per day. Now there are still 292,000 ETH (685 million US dollars) left in the hacker's address.
  • Ministry of Public Security: Telecom fraud groups are using blockchain, virtual currency and AI technology to upgrade their criminal methods

     Beijing Business Daily reported that at a press conference held by the Ministry of Public Security on January 10, it was announced that as of the end of 2024, more than 53,000 Chinese criminal suspects involved in telecommunications fraud in Myanmar's northern region have been arrested, and the "Four Major Families" criminal groups in Myanmar's northern region have been successfully destroyed. The Ministry of Public Security pointed out that although the crackdown has achieved significant results, the crime situation is still severe. Fraudulent groups are constantly upgrading their criminal tools using new technologies such as blockchain, virtual currency, and AI intelligence. These groups are well-organized and engage in illegal activities such as cross-border cooperation in app development, traffic diversion and promotion, and money laundering. Fraudsters tailor their scripts to target victims of different ages, professions, and educational backgrounds, and the victims are widespread. Although the telecommunications fraud park near the Chinese border in Myanmar's northern region has been cleared, there are still many fraudulent dens operating overseas under the guise of "technology parks" and "development zones".
  • Hong Kong police cracked down on a scam group that used deepfake technology to trick others into investing in virtual currency, involving about 34 million yuan

    Hong Kong police recently busted a virtual currency fraud group that used deepfake technology to lure others into investing through social media platforms, involving about 34 million yuan. Hong Kong police's commercial crime department arrested 31 people between the ages of 20 and 34 last week in two office buildings in Kowloon Bay, some of whom claimed to be students or unemployed, involved in the same fraud group, and seized their pre-set "scripts".
  • Solv Protocol's official X account was stolen and published false information, please beware of the risks

    according to SlowMist's monitoring, the official X account of Solv Protocol has been hacked and false information has been released. Please stay vigilant and beware of risks.
  • Scam Sniffer: Superchain Eco official X account was stolen and released phishing links, please be aware of the risks

    according to Scam Sniffer, the X account of Superchain Eco (@SuperchainEco) has been hacked and a phishing link has been released. Users should be vigilant of the risks.
  • SlowMist Chief Information Security Officer: In the past two months, North Korean hacker groups have continued to impersonate Hack VC and others to conduct conference fraud

    23pds, the chief information security officer of SlowMist, tweeted that North Korean hacker groups have been continuously impersonating organizations or individuals such as Hack VC and SevenX Ventures for conference fraud in the past two months. Please be aware of the risks.
  • Crypto hackers are using fake job postings to trick victims into downloading malware to steal crypto assets

    security researcher Taylor Monahan (also known as Tay) revealed that crypto hackers have found a clever new way to trick victims into downloading malicious software that allows hackers to access their computers and empty their wallets, or cause other major losses. He said that hackers first impersonate a recruiting officer from a well-known encryption company, offering targets salaries ranging from $200,000 to $350,000. However, this method is not about enticing targets to open a PDF containing malicious software, or to download video calling software disguised as malicious software, but to instruct victims to fix microphone and video access issues, "If you follow their instructions, you're screwed."
  • Cyvers Alerts: Cryptocurrency scams steal $3.6 billion in 2024

    According to Cyvers Alerts system monitoring, the "Ponzi scheme" scam in the cryptocurrency field stole $3.6 billion in 2024, with most of it happening on Ethereum. These scams are cunning, using trust to lure victims into false cryptocurrency investments and then making their funds disappear. With a 40% increase in online threats this year, it is clear that the cryptocurrency field needs stronger defenses and more acute awareness to fight back.
  • ETH falls below $2,600

    Golden Finance reported that the market shows ETH has fallen below $2,600 and is currently trading at $2,597.2, with a 24-hour decline of 1.75%. The market is fluctuating greatly, so please be prepared for risk control.