Scan to download
BTC $75,576.78 +1.13%
ETH $2,351.19 +0.45%
BNB $632.51 +1.85%
XRP $1.45 +2.12%
SOL $88.22 +3.45%
TRX $0.3240 -1.01%
DOGE $0.0985 +2.00%
ADA $0.2572 +3.61%
BCH $449.80 +2.20%
LINK $9.50 +2.02%
HYPE $43.68 -2.39%
AAVE $117.23 +10.07%
SUI $0.9991 +2.92%
XLM $0.1694 +5.40%
ZEC $333.11 -3.24%
BTC $75,576.78 +1.13%
ETH $2,351.19 +0.45%
BNB $632.51 +1.85%
XRP $1.45 +2.12%
SOL $88.22 +3.45%
TRX $0.3240 -1.01%
DOGE $0.0985 +2.00%
ADA $0.2572 +3.61%
BCH $449.80 +2.20%
LINK $9.50 +2.02%
HYPE $43.68 -2.39%
AAVE $117.23 +10.07%
SUI $0.9991 +2.92%
XLM $0.1694 +5.40%
ZEC $333.11 -3.24%

shu

Bitrefill disclosed that it was attacked by suspected North Korean hackers, resulting in a customer data breach, and has shut down relevant systems for isolation

Bitcoin payment service provider Bitrefill disclosed on platform X that it suffered a cyberattack on March 1, 2026, resulting in a customer data breach. The attack originated from a compromised employee's laptop and allowed the attackers to access certain databases and cryptocurrency wallets.Investigations revealed that the attack method was highly similar to past attacks on cryptocurrency companies by the North Korean DPRK Lazarus/Bluenoroff hacker group. Approximately 18,500 purchase records involved limited customer information (email, cryptocurrency payment addresses, and IP metadata), with about 1,000 records having customer name information stored in an encrypted format, but potentially accessible. Bitrefill stated that customers do not need to take special actions but are advised to be vigilant for unusual information.Bitrefill further added that it has currently shut down related systems for isolation and is collaborating with security experts, on-chain analysts, and law enforcement. Operations have nearly returned to normal. The company emphasized that it is long-term profitable and financially robust enough to absorb this loss and will continue to strengthen cybersecurity measures, including internal access controls, monitoring, and emergency response mechanisms.

OKX Star: The Wuhan Anshun Technology attack incident is not due to a security vulnerability in the OKX Web3 wallet

OKX founder and CEO Star responded to the "hacker attack incident involving a plugin vulnerability by the Wuhan Anshun Technology team" by stating, "The OKX Wallet security team has completed its investigation, and describing the original text as 'OKX wallet vulnerability' is inaccurate. Two points need clarification:This incident is not a security vulnerability of the OKX Web3 wallet. The attack method involved hackers controlling user devices through Trojan software, then stealing locally stored encrypted files and passwords by tampering with webpage JS code to implant hooks or by monitoring keyboard inputs.The OKX Web3 wallet is a 100% self-custody wallet. Private keys and passwords exist only on the user's own device, and OKX cannot access or control user assets. However, if the user's device has already been compromised by hackers, then no wallet—including MetaMask—can guarantee security. It's like a thief has already been able to operate your computer and see all your keyboard inputs.Users are advised to avoid installing software or plugins from unknown sources, regularly check device security, and properly protect their mnemonic phrases and private keys."It is reported that the Wuhan Anshun Technology team controlled a large number of user terminals to steal mnemonic phrases and remotely transfer digital assets, with the amount involved reaching 7 million dollars.
app_icon
ChainCatcher Building the Web3 world with innovations.