Scan to download
BTC $77,895.38 -0.09%
ETH $2,318.15 -0.69%
BNB $626.80 -0.72%
XRP $1.41 -1.14%
SOL $85.24 -0.92%
TRX $0.3251 +0.41%
DOGE $0.0983 -0.11%
ADA $0.2473 -1.89%
BCH $450.39 -0.15%
LINK $9.31 -1.45%
HYPE $42.39 +3.04%
AAVE $96.14 +0.61%
SUI $0.9310 -1.21%
XLM $0.1676 -2.70%
ZEC $356.75 +0.64%
BTC $77,895.38 -0.09%
ETH $2,318.15 -0.69%
BNB $626.80 -0.72%
XRP $1.41 -1.14%
SOL $85.24 -0.92%
TRX $0.3251 +0.41%
DOGE $0.0983 -0.11%
ADA $0.2473 -1.89%
BCH $450.39 -0.15%
LINK $9.31 -1.45%
HYPE $42.39 +3.04%
AAVE $96.14 +0.61%
SUI $0.9310 -1.21%
XLM $0.1676 -2.70%
ZEC $356.75 +0.64%

hackers

first_img KelpDAO: Actively advancing post-incident solutions and prioritizing the protection of user interests

According to official news, KelpDAO stated that over the past few days, the team has been continuously advancing the handling of related events with the support of partners, allies, and the community. Discussions are progressing in a positive direction, and efforts are being accelerated to reach a suitable solution. The project party emphasized that it always adheres to the core principle of "user first," and subsequent measures will be gradually implemented with the aim of safeguarding the overall interests of users.In the past four days, the Kelp team has been working around the clock in collaboration with multiple parties, maintaining close communication with all relevant parties, and making substantial progress on several potential solutions. This includes measures taken by the Arbitrum Security Council to freeze the stolen funds, as well as SEAL 911 participating in the preliminary investigation to provide objective and clear analytical support for the incident.Kelp stated that the current focus of work remains on protecting user asset security and strengthening the protocol itself. This incident is not only of critical significance to the project but also has enlightening value for the entire industry. The team will continue to disclose subsequent progress through official channels and thanks the ecological partners and community for their ongoing support.Previous reports indicated that the KelpDAO hacker has essentially laundered $175 million in ETH into BTC.

The Ethereum Foundation identified about 100 "national-level hackers" infiltrators, linked to North Korea

The Ethereum Foundation recently released a summary report on the ETH Rangers security project, revealing that during a 6-month security funding program, researchers identified approximately 100 suspected state-sponsored cyber operatives, including infiltrators from North Korea, who have been active in multiple Web3 projects.The report indicates that relevant investigations were advanced through projects like the "Ketman Project," where researchers issued warnings to about 53 blockchain projects, revealing that these individuals infiltrated development teams under false identities and participated in fund flows and technical positions. Meanwhile, some related funds have been frozen, amounting to hundreds of thousands of dollars. The security team also incorporated relevant intelligence into the threat analysis system for the Lazarus Group and disclosed it at security conferences such as DEF CON, showing that state-level cyber attacks are continuously infiltrating the infrastructure of the cryptocurrency industry.In terms of overall results, the program has frozen or recovered over $5.8 million in funds, reported or documented over 785 vulnerabilities, and handled 36 security incidents, indicating that the security threats currently faced by the Ethereum ecosystem have escalated from simple vulnerability attacks to systemic risks involving state-level actors. Additionally, the report points out that North Korean hackers have also infiltrated projects through methods such as "remote IT workers," involving various attack paths such as account takeovers, freelancing platform infiltrations, and fund transfers, making them a key target for industry prevention.The Ethereum Foundation emphasizes that the security of decentralized networks requires "decentralized defense" and will continue to support security research, threat intelligence, and talent development to address the escalating state-level cyber threats.

Bitrefill disclosed that it was attacked by suspected North Korean hackers, resulting in a customer data breach, and has shut down relevant systems for isolation

Bitcoin payment service provider Bitrefill disclosed on platform X that it suffered a cyberattack on March 1, 2026, resulting in a customer data breach. The attack originated from a compromised employee's laptop and allowed the attackers to access certain databases and cryptocurrency wallets.Investigations revealed that the attack method was highly similar to past attacks on cryptocurrency companies by the North Korean DPRK Lazarus/Bluenoroff hacker group. Approximately 18,500 purchase records involved limited customer information (email, cryptocurrency payment addresses, and IP metadata), with about 1,000 records having customer name information stored in an encrypted format, but potentially accessible. Bitrefill stated that customers do not need to take special actions but are advised to be vigilant for unusual information.Bitrefill further added that it has currently shut down related systems for isolation and is collaborating with security experts, on-chain analysts, and law enforcement. Operations have nearly returned to normal. The company emphasized that it is long-term profitable and financially robust enough to absorb this loss and will continue to strengthen cybersecurity measures, including internal access controls, monitoring, and emergency response mechanisms.
app_icon
ChainCatcher Building the Web3 world with innovations.