
Velocore DEX Offers Exploiter 10% White Hat Bounty after $6.8M Hack
The protocol reached out to the hacker via an on-chain message, offering a 10% white hat bounty for the return of the remaining funds by June 3, 2024, 08:00 UTC.
The protocol reached out to the hacker via an on-chain message, offering a 10% white hat bounty for the return of the remaining funds by June 3, 2024, 08:00 UTC.
The lawsuit reveals that the victim Fitzgerald deposited $180,000 into a pig butchering scheme, and has been unable to withdraw his money.
The exploit comes seven days after Gala Games, one of the prominent players in the industry, suffered a malicious security attack that led to the loss of $23 million of users’ assets.
Bitcoin developer and Ordinals supporter Udi Wertheimer warned that the incident involving GCR might be part of a broader operation targeting celebrity X accounts.
The coalition involves multiple tech sectors, cutting across social media, cryptocurrency, finance, and dating apps.
The Gala Games hacker quickly liquidated over $21 million worth of $GALA tokens to Ether resulting in notable panic selling.
The hacker carried out this act using a multi-call function, which allows multiple smart contracts to be executed in a single transaction.
The incident happened on May 14, around 10:30 pm UTC, and was detected by Web 3.0 security firm Cyvers.
The Equalizer team has provided alternative mirror sites to access the main website following today’s hack as the investigations are underway.
Despite the spread of news about NEAR’s X account getting hijacked, the blockchain protocol is yet to confirm or refute the information.
Bitfinex CTO Paolo Ardoino emphasized an important point often ignored by crypto users. Unfortunately, many users use the same email or password across many services, including crypto exchanges.
By assuming these false identities, the hackers aim to establish credibility and trust within professional circles, ultimately luring unsuspecting users into their schemes.
At least four individuals told the FBI that they had invested over $100,000 in Bitcoin, expecting cash wire transfers. One victim reported being defrauded of 50 Bitcoin.
After establishing contact with the victim on LinkedIn, the hacker group requested the applicants to “download” two coding challenges containing Trojan files.
The group began its activities in March 2023, and has since infiltrated over 250 business entities, making away as much as $42 million in ransomware proceeds.