Scan to download
BTC $72,367.25 +1.63%
ETH $2,226.86 +1.96%
BNB $603.94 +0.19%
XRP $1.35 +1.24%
SOL $84.24 +2.49%
TRX $0.3183 +0.19%
DOGE $0.0930 +1.61%
ADA $0.2528 +0.97%
BCH $442.12 +0.25%
LINK $9.02 +2.69%
HYPE $41.42 +6.27%
AAVE $90.69 +0.76%
SUI $0.9371 +3.09%
XLM $0.1543 +0.26%
ZEC $380.72 +22.07%
BTC $72,367.25 +1.63%
ETH $2,226.86 +1.96%
BNB $603.94 +0.19%
XRP $1.35 +1.24%
SOL $84.24 +2.49%
TRX $0.3183 +0.19%
DOGE $0.0930 +1.61%
ADA $0.2528 +0.97%
BCH $442.12 +0.25%
LINK $9.02 +2.69%
HYPE $41.42 +6.27%
AAVE $90.69 +0.76%
SUI $0.9371 +3.09%
XLM $0.1543 +0.26%
ZEC $380.72 +22.07%

hacker

Elliptic: The Drift attack incident is suspected to be carried out by a North Korean hacker organization

According to CoinDesk, blockchain analytics firm Elliptic stated that the Drift Protocol attack resulted in a loss of $285 million, with "multiple signs" pointing to the North Korean-supported DPRK hacker organization. Elliptic focused on analyzing on-chain behavior, money laundering techniques, and signals at the network level, all of which align with previous state-affiliated attacks.The Elliptic report noted: "If confirmed, this would be the 18th DPRK attack tracked by Elliptic this year, with over $300 million stolen to date." On a technical level, Elliptic described this attack as "premeditated and meticulously planned," with early test transactions and pre-positioned wallets prior to the main attack. After the execution of the attack, the funds were quickly consolidated and transferred across chains, converted into more liquid assets, forming an organized and repeatable money laundering process aimed at obscuring the source of funds while maintaining control.This incident involved over ten types of assets, with funds being transferred across chains from Solana to Ethereum and other chains, further highlighting the importance of cross-chain tracing capabilities. Drift Protocol is the largest decentralized perpetual contract trading platform on the Solana blockchain, and its token has dropped over 40% to approximately $0.06 since the hack.

Bitrefill disclosed that it was attacked by suspected North Korean hackers, resulting in a customer data breach, and has shut down relevant systems for isolation

Bitcoin payment service provider Bitrefill disclosed on platform X that it suffered a cyberattack on March 1, 2026, resulting in a customer data breach. The attack originated from a compromised employee's laptop and allowed the attackers to access certain databases and cryptocurrency wallets.Investigations revealed that the attack method was highly similar to past attacks on cryptocurrency companies by the North Korean DPRK Lazarus/Bluenoroff hacker group. Approximately 18,500 purchase records involved limited customer information (email, cryptocurrency payment addresses, and IP metadata), with about 1,000 records having customer name information stored in an encrypted format, but potentially accessible. Bitrefill stated that customers do not need to take special actions but are advised to be vigilant for unusual information.Bitrefill further added that it has currently shut down related systems for isolation and is collaborating with security experts, on-chain analysts, and law enforcement. Operations have nearly returned to normal. The company emphasized that it is long-term profitable and financially robust enough to absorb this loss and will continue to strengthen cybersecurity measures, including internal access controls, monitoring, and emergency response mechanisms.

A certain hacker group in China has internal conflicts and claims to have stolen approximately 7 million dollars worth of cryptocurrency assets

According to market news, a hacker group in China has experienced internal strife due to disputes over the distribution of stolen goods. Members publicly revealed that they had stolen approximately $7 million in cryptocurrency assets through supply chain attacks, targeting platforms such as the cryptocurrency wallet Trust Wallet.According to the leaked information, the group operated under the name of the cybersecurity company Wuhan Anshun Technology, publicly engaging in activities such as vulnerability discovery, network offense and defense, and security services, while internally actually involved in activities related to the theft of cryptocurrency assets and other gray market operations. Team members claimed they obtained mnemonic phrases in bulk and scanned multi-chain assets, including Ethereum, BNB Chain, Arbitrum, etc., through supply chain vulnerabilities in the Electron client, plugin reverse engineering, and automation tools.The whistleblower stated that the team had developed automated tools to scan mnemonic phrase assets in bulk and used remote control programs to steal wallet data, subsequently transferring and splitting the funds. The related attacks reportedly involved 37 types of tokens across multiple blockchain networks. The trigger for the exposure of this incident was an internal dispute over the distribution of stolen goods.The whistleblower claimed to have had conflicts with the team leader over unfair profit distribution and publicly presented relevant evidence after the promised severance compensation was not fulfilled, planning to turn themselves in to law enforcement. Currently, the related accusations have not been officially confirmed, and the details of the incident are still under further investigation. Industry insiders pointed out that this incident once again highlights the security risks of cryptocurrency wallet supply chains and plugins, as well as the trend of targeted attacks against high-value users.
app_icon
ChainCatcher Building the Web3 world with innovations.