Wallet total loss money by hacked is about

$ 7,701,733,855.10

Wallet : 60 hack event(s)

  • 2021-06-05

    Hacked target: Sia

    Description of the event: Siastats tweeted that the Sia network, a decentralized storage project, has been under continuous DDoS attacks in the past two days. The targets of the attacks are network hosts and storage providers. The attacks have caused about 30% of host connections to be interrupted. Siastats stated that network functions were not affected. Only some of the host operators indicated that the Internet connection was interrupted. The affected operators can contact the Sia Foundation to mitigate the negative impact of the attack. The attack did not cause huge losses, and the network will continue to operate normally.

    Amount of loss: 0 Attack method: DDoS attacks
  • 2021-05-07

    Hacked target: Colonial Pipeline

    Description of the event: On May 7, 2021, Colonial Pipeline, the nation's largest oil and gas pipeline operator, was targeted by a ransomware attack. The ransomware attack involved national critical infrastructure, which caused global shock and widespread concern. Was blackmailed to pay 5 million U.S. dollars worth of Bitcoin. According to a number of US media reports and the US Federal Bureau of Investigation (FBI) confirmed that the dark side of the attack was confirmed to be the DarkSide ransomware group. The FBI said it is continuing to conduct further investigations with Colonial Pipeline and government partners.

    Amount of loss: $ 5,000,000 Attack method: Ransomware
  • 2021-04-16

    Hacked target: Celsius

    Description of the event: Encrypted lending service Celsius has discovered a data breach in one of its third-party service providers, which has exposed the personal information of its customers. According to the email, the hacker gained access to the "third-party email distribution system" used by Celsius. Hackers use this information to send fraudulent emails and text messages to trick them into revealing the private keys of their funds. On April 14, Celsius users started reporting a fraudulent website claiming to be the official Celsius platform. Some users also receive text messages and emails claiming to be Celsius official, can link to the website, and prompt the recipient to enter sensitive information. It is reported that Celsius' competitor BlockFi suffered a similar data breach last spring.

    Amount of loss: 0 Attack method: data leakage
  • 2021-04-05

    Hacked target: Polkatrain

    Description of the event: According to news from the SlowMist Zone, Polkatrain, the IDO platform of Polkadot, had an accident this morning. The SlowMist safety team immediately intervened in the analysis and identified specific problems. The contract in question this time is the POLT_LBP contract of the Polkatrain project. The contract has a swap function and a rebate mechanism. When users buy PLOT tokens through the swap function, they get a certain amount of rebates, and the rebates will be It is sent to the user by calling transferFrom in the _update function in the contract. Since the _update function does not set the maximum amount of rebates in a pool, nor does it determine whether the total rebates are used up when rebates, malicious arbitrageurs can continue to call the swap function to exchange tokens to get the contract. Rebate rewards. The SlowMist security team reminds DApp project parties to fully consider the business scenario and economic model of the project when designing the AMM exchange mechanism to prevent accidents.

    Amount of loss: $ 3,000,000 Attack method: Rebate arbitrage
  • 2021-04-04

    Hacked target: Force DAO

    Description of the event: The DeFi quantitative hedge fund Force DAO posted a blog stating that it was responsible for the previous attack and has implemented procedures to ensure that any such incidents are mitigated in the future. A total of 183 ETH (about 367,000 U.S. dollars) worth of FORCE tokens were exhausted and liquidated in this attack. Force DAO said there will be snapshots and new tokens. Force DAO has begun an internal reorganization and will announce a plan in the next few days to make up for the affected FORCE holders and LPs.

    Amount of loss: 183 ETH Attack method: Token issuance
  • 2021-03-25

    Hacked target: 江西南昌

    Description of the event: On March 25, the Qingyunpu Branch of the Nanchang Public Security Bureau of Jiangxi Province held a press conference on "Detecting a Major Blockchain Bitcoin Theft". This is the first case in the province that Nanchang police successfully uncovered the use of hacker network technology to steal blockchain currency New types of cybercrime cases. It is understood that on February 26, the informant Huang discovered that his mobile phone number was reported as lost inexplicably, and then discovered that the blockchain currency with a market value of nearly 14.5 million yuan in the "Radar Net" account that was tied to the mobile phone number was transferred go. The police research and judgment found that before the incident, five Lianyungang nationals in Jiangsu drove to Nanchang, reported the loss of the victim's ID card and reissued the victim's mobile phone card. On March 8, Nanchang police arrested 4 criminal suspects and went to Guangdong on the 15th to arrest 2 criminal suspects. At present, all 6 suspects have been detained for criminal purposes, and the investigation of the funds involved in the case is in progress.

    Amount of loss: $ 2218991.51 Attack method: Theft
  • 2021-03-15

    Hacked target: TSD

    Description of the event: A cross-chain stablecoin (TSD) on ETH and BSC stated that malicious attackers used TSD DAO to mint 11.8 billion TSD tokens in their accounts and sold them all on Pancakeswap. The specific process is that True Seigniorage Dollar stated that the developer account only has 9% of the DAO, and the malicious attacker has gradually controlled 33% of the DAO with the accumulation of low prices, and then proposed an implementation plan and voted in favor. In the implementation, the attacker added code to Mint and minted 11.8 billion TSDs for himself.

    Amount of loss: 11800000000 TSD Attack method: mint tokens
  • 2021-03-14

    Hacked target: TryRoll

    Description of the event: The community token platform TryRoll was suspected of being attacked, and the tokens issued based on it were sold in a large amount on Uniswap. Among them, WHALE lost 1,362 ETH, FWB lost 797 ETH, KARMA lost 155 ETH, JULIEN lost 115 ETH, hackers made a total of 2998 ETH, and 700 ETH was deposited in the mixed currency platform Tornado.Cash. In addition, Roll announced that it has raised $500,000 in funding for creators affected by this.

    Amount of loss: 2998 ETH Attack method: Private key preset
  • 2021-03-10

    Hacked target: HSO

    Description of the event: The latest oracle project HSO on the Huobi Eco-Chain HECO carried out IDO and ran away with 30,000 HT. The website and TELEGRAM could not be opened. Huobi said that the current risk control has been carried out, the user's assets will not be lost, and the project party is urgently contacted.

    Amount of loss: 30,000 HT Attack method: Scam
  • 2021-03-05

    Hacked target: CNA

    Description of the event: CNA, one of the largest insurance companies in the United States, paid a ransom of US$40 million (approximately 257 million yuan) after being attacked by ransomware in March to regain control of its network. The company has confirmed that an organization named Phoenix is ​​the perpetrator of this attack.

    Amount of loss: $ 40,000,000 Attack method: Ransomware
  • 2021-03-01

    Hacked target: Tether

    Description of the event: Tether officially tweeted that forged documents allegedly "between Tether personnel and representatives of Deltec Bank & Trust and other institutions" are circulating online. In addition, Tether officially received a ransom request for sending 500 BTC to bc1qa9f60pved3w3w0p7snpxlnh5t4uj95vxn797a7 today. The sender stated that unless they receive Bitcoin before tomorrow, they will leak documents to the public in order to "destroy the Bitcoin ecosystem." Tether said it will not pay the ransom. And remind customers, employees, and the encryption community to stay vigilant and ensure operational safety. Tether stated that it has reported falsified communications and related ransom demands to law enforcement.

    Amount of loss: 0 Attack method: Blackmail
  • 2021-03-01

    Hacked target: SeascapeNetwork

    Description of the event: The game ecosystem platform SeascapeNetwork stated that the private key of an early investor was stolen after the token was released today, which led to hackers obtaining 18,750 CWS in the investor's wallet. According to Etherscan data verification, this address has changed all CWS to ETH, and then recharged it to the Ethereum mixing platform Tornado.Cash several times, which is close to 330 ETH, which is equivalent to USD 500,000.

    Amount of loss: $ 500,000 Attack method: Unknown
  • 2021-03-01

    Hacked target: Gab

    Description of the event: The 70 GB data of Gab, a social networking platform that supports Bitcoin, was hacked. Gab has handed over the hacked data to the reporting website Distributed Denial of Secrets. Emma Best, founder of Distributed Denial of Secrets, said that the hacked data included public posts, personal information and passwords, and private account posts and messages.

    Amount of loss: 0 Attack method: data leakage
  • 2021-02-19

    Hacked target: UL

    Description of the event: UL LLC (commonly known as Underwriters Laboratories) suffered a ransomware attack that encrypted its server and caused the server to shut down the system when it recovered. To prevent the attack from spreading further, the company shut down the system so that certain employees could not perform their work. According to sources familiar with the attack, UL decided not to pay the ransom, but to restore from backup.

    Amount of loss: 0 Attack method: Ransomware attack
  • 2021-02-15

    Hacked target: Verge

    Description of the event: The privacy coin Verge (XVG) underwent a reorganization of 560,000 blockchains after a 51% attack on Monday. Lucas Nuzzi of CoinMetrics stated that the history of token transactions over 200 days has been deleted.

    Amount of loss: 0 Attack method: 51% attack
  • 2021-01-20

    Hacked target: Firo

    Description of the event: The privacy coin project Firo stated on Twitter that it is currently under 51% attacks and it is recommended that users do not trade during this period until the network returns to normal.

    Amount of loss: 0 Attack method: 51% attack
  • 2021-01-11

    Hacked target: 美国密歇根州

    Description of the event: On January 11, the Michigan state police claimed that an anonymous person mailed death threats to Governor Gretchen Whitmer and employees of the state in an attempt to collect $2 million worth of Bitcoin. The letter said that unless the governor transfers more than $2 million in cryptocurrency to him before January 25, the state employee will die. A Michigan State Police spokesperson responded that the threat was not credible.

    Amount of loss: 0 Attack method: Blackmail
  • 2021-01-11

    Hacked target: Tor 网络

    Description of the event: The Tor network was attacked and all v3 onion addresses were inaccessible. Darknetdaily posted that this seems to be a new type of attack that will affect the entire network and cause the consensus authorization node to overload. Hugbunter, the administrator of the dark web forum Dread, said that all v3 onion addresses are currently inaccessible. The cause of the accident is unknown, but it may cause a huge attack on the entire network. Hugbunter speculated that an article he published earlier might have spawned this attack. The article advocated that competitors in the market should be prevented from launching DDoS attacks against each other.

    Amount of loss: 0 Attack method: Unknown
  • 2020-12-14

    Hacked target: OneCoin

    Description of the event: On December 14th, the Procuratorate of Cordoba, Argentina prosecuted 12 scammers involved in the OneCoin cryptocurrency Ponzi scheme and ordered their arrests last Thursday. Eight of them have been arrested. It was previously reported that the OneCoin Ponzi scheme caused relevant investors to suffer a total of US$4.4 billion in financial losses from their investment in the project from April 2014 to March 2018.

    Amount of loss: $ 4,40,000,000 Attack method: Scam
  • 2020-12-14

    Hacked target: Nexus Mutual

    Description of the event: DeFi insurance agreement Nexus Mutual stated on Twitter that the personal address of its founder Hugh Karp was attacked by a platform user, stolen 370,000 NXM and lost more than 8 million US dollars. The official said that this is a targeted attack, only the official name, Karp used a hardware wallet, the attacker obtained remote access to his computer, and modified the wallet plug-in MetaMask, deceived him to sign the transaction, the attacker Completed KYC 11 days ago, and then changed to a new address on December 3. , To transfer funds to the attacker’s own address.

    Amount of loss: 370,000 NXM Attack method: modified the wallet plug-in MetaMask
  • 2020-12-08

    Hacked target: 富士康

    Description of the event: Foxconn was attacked by ransomware, which temporarily caused problems in its production facilities in Mexico and resulted in the theft of data. It is reported that the ransomware attack occurred on Thanksgiving weekend and the hacker was a DoppelPaymer group. The target of the attack was the Foxconn factory in Juarez, Chihuahua. About 1,200 servers were infected. 100GB of unencrypted files were stolen. The ransomware attack also caused 20TB to 30TB of backup data to be deleted. It is reported that the DoppelPaymer group demanded a ransom of 1804.0955 Bitcoin (approximately 220 million yuan) in exchange for an encryption key and promise not to publish the stolen data. Foxconn did not pay, and at least part of the data has been published on the dark web. In response, Foxconn responded that its factories in the Americas have indeed been attacked by cyber ransomware recently. At present, its internal information security team has completed software and operating system security updates, and at the same time improved the level of information security protection. At the same time, the affected factories are restoring the network, which has little impact on the group's overall operations.

    Amount of loss: 0 Attack method: Ransomware
  • 2020-11-09

    Hacked target: ElectrumSV

    Description of the event: On November 9th, a user named "aaron67" posted about his BSV theft experience, saying that please stop using the multisig accumulator multi-signature solution implemented by ElectrumSV immediately. The locking script of this scheme had serious bugs, so that 600 BSV was stolen on November 6th. After the incident, the user had contacted Roger Taylor, the author of ElectrumSV, for the first time, and the serious bug was subsequently confirmed. At the same time, the Note.SV developers stated that they had done an analysis for the first time to find the source of the bug, and notified the wallet author and community users.

    Amount of loss: 600 BSV Attack method: Unknown
  • 2020-11-06

    Hacked target: Ledger

    Description of the event: Phishing and scams targeting Ledger wallet owners are increasing, and one of the scam websites obtained more than 1,150,000 XRP from victims. This scam uses phishing emails to direct users to a fake Ledger website. On this fake website, the victim was tricked into downloading malware that pretended to be a security update, resulting in the theft of all Ledger wallet balances. According to the fraud identification website xrplorer operated by the community, the XRP obtained from the scam was sent to Bittrex through 5 deposits, but the exchange “cannot freeze XRP in time”.

    Amount of loss: 1,150,000 XRP Attack method: Scam
  • 2020-10-30

    Hacked target: EtherCrash

    Description of the event: Recently, AlonGal, the chief technology officer of the cybercrime intelligence company HudsonRock, tweeted that on October 27, the EtherCrash cold wallet that claimed to be "the most mature and largest gambling game in Ethereum" was stolen, with a loss of about 2.5 million U.S. dollars. for. It is reported that EtherCrash has issued a notice on Discord in which it mentioned that the EtherCrash cold wallet was stolen and there were two large withdrawals. EtherCrash stated that it will compensate users for their property losses, but it will take some time because the losses are more serious.

    Amount of loss: $ 2,500,000 Attack method: Cold wallet was stolen
  • 2020-10-12

    Hacked target: Electrum

    Description of the event: An investigation by ZDNet revealed that hackers stole $22 million from users of Bitcoin wallet Electrum by enticing users to install fake software updates. And this technique was highest in 2018. Since this attack was first discovered two years ago, the Electrum team has taken some measures to prevent this attack. But this attack still applies to users who use older versions of the application.

    Amount of loss: $ 22,000,000 Attack method: Fake software updates
  • 2020-10-05

    Hacked target: Coindaq.io

    Description of the event: A user named Kazuo Kusunose posted on Google forums that he had lost $15,000 due to an encryption scam discovered in Google ads. Allegedly, the suspicious website named Coindaq.io tried to use the digital renminbi that China is studying, claiming that users can deposit funds on the platform to participate in the sale of digital renminbi. The victim expressed the hope that Google can investigate the matter and establish a webpage targeted at the alleged fraud.

    Amount of loss: $ 15,000 Attack method: Scam
  • 2020-09-08

    Hacked target: Banco Estado

    Description of the event: Banco Estado Bank, one of the three largest banks in Chile, had to shut down its nationwide business on the 7th due to a cyber attack by REvil ransomware.

    Amount of loss: 0 Attack method: REvil ransomware
  • 2020-09-07

    Hacked target: 阿根廷国家移民局

    Description of the event: It is said that hackers used the encrypted virus NetWalker to enter the database and steal information from federal agencies. The dark web payment page linked in the ransomware description shows that the hacker initially paid $2 million worth of bitcoin to unlock the file. Within a week, this number had increased to 355 BTC, which is approximately $3.62 million.The Argentine government refused to pay the ransom.

    Amount of loss: - Attack method: used the encrypted virus NetWalker to enter the database
  • 2020-09-07

    Hacked target: TSEM

    Description of the event: Hackers carried out ransomware attacks against Tower Semiconductor Ltd (TSEM), a maker of wireless chips and camera sensors listed on the Israeli Nasdaq, and demanded hundreds of thousands of dollars in bitcoin ransoms. For safety reasons, TSEM shut down some running servers and suspended production in some factories.

    Amount of loss: 0 Attack method: Unknown
  • 2020-08-30

    Hacked target: Electrum

    Description of the event: GitHub user "1400 BitcoinStolen" said that a huge amount of his Bitcoin money had disappeared in the hack. This user uses a bitcoin purse Electrum, the user has no security update the software, so when he transfers the currency, it prompts to update and fix potential problems, but when he according to tip operation, the software takes advantage of a vulnerability to connect the hacker server, 1400 bitcoins (worth $16 million) is placed into the hacker's wallet.

    Amount of loss: $ 16,000,000 Attack method: Unknown
  • 2020-08-30

    Hacked target: Ledger

    Description of the event: Encrypted wallet provider Ledger recently experienced database leaks and wallet vulnerabilities, putting users' bitcoins at risk. The chief technology officer of Ledger stated that in terms of database leakage, the attacker accessed part of our e-commerce and marketing database through a third-party misconfigured API key on our website, allowing unauthorized access to our customers’ contact information and Order data. Ledger fixed this issue on the same day and disabled the API key.

    Amount of loss: 0 Attack method: Incorrectly configured API keys on the Ledger website through a third party
  • 2020-08-14

    Hacked target: Ledger

    Description of the event: A cryptocurrency trader tweeted that a hacker hacked into his Ledger crypto wallet and stole more than 100,000 ERC-20 tokens. In addition, the trader stated that his account is in a safe state.

    Amount of loss: 100,000 ERC-20 tokens Attack method: Unknown
  • 2020-08-07

    Hacked target: 国内云服务器

    Description of the event: Tencent Security Threat Intelligence Center has detected a large number of attacks originating from overseas IP and some domestic IP against domestic cloud server tenants. The attacker blasted into the server through SSH (port 22), and then executed malicious commands to download the Muhstik botnet Trojan. The botnet will control the compromised server to perform SSH lateral movement, download the Monero mining Trojan, and accept remote commands to launch DDoS attacks.

    Amount of loss: 0 Attack method: blasted into the server through SSH (port 22)
  • 2020-08-05

    Hacked target: YouTube

    Description of the event: According to a tweet published by Jon Prosser on August 5, its YouTube channel with 262,000 subscribers was hacked, the channel name was changed to "NASA [news]", and a live broadcast about SpaceX CEO Elon Ma Skr gave false news of Bitcoin. In about two hours, the illegal profit was $4,000.

    Amount of loss: $ 4,000 Attack method: Unknown
  • 2020-08-01

    Hacked target: CWT

    Description of the event: CWT, the fifth largest travel company in the United States, agreed to pay $4.5 million worth of bitcoin to hackers who hijacked its computer systems.

    Amount of loss: $ 4,500,000 Attack method: Unknown
  • 2020-07-25

    Hacked target: Ledger

    Description of the event: On July 25, 2020, there was unauthorized access to Ledger's database, resulting in data leakage. The leaked data includes e-commerce and marketing data, but payment information and encrypted assets are safe. Ledger’s announcement claimed that the API Key was used to achieve unauthorized access to the database. Currently, the API Key has become invalid.

    Amount of loss: 0 Attack method: Unknown
  • 2020-07-16

    Hacked target: Twitter

    Description of the event: In the early hours of this morning, many celebrity politicians and some companies' Twitter accounts were attacked by hackers, and these Twitter accounts all published relevant digital currency phishing scam information. However, the phishing information was deleted a few minutes after it was posted. As of now, the scammers have received 12.86 bitcoins in total.

    Amount of loss: 12.86 BTC Attack method: Scam
  • 2020-07-11

    Hacked target: Bitcoin Gold

    Description of the event: The team that developed Bitcoin Gold (BTG), a bifurcated project, has announced a 51% attack. According to the official disclosure, THE BTG network has been hit by 51% attacks lasting nearly 10 days. However, on July 2, the BTG team had issued an attack alert to the mine pool and the exchange and issued version 0.17.2, which included checkpoints at 640,650 blocks. The BTG team reminds all BTG Core nodes to upgrade to version 0.17.2.

    Amount of loss: 0 Attack method: 51% attack
  • 2020-07-10

    Hacked target: BitClub

    Description of the event: According to the announcement issued by the Federal Prosecutor's Office of New Jersey, the programmer Silviu Catalin Balaci admitted to participating in the establishment of the cryptocurrency mining organization BitClub Network, engaging in telecommunications fraud and selling unregistered securities. Balaci confirmed that during the five-year period of implementation of the plan, BitClub defrauded investors of at least $722 million in Bitcoins.

    Amount of loss: $ 722,000,000 Attack method: Ponzi
  • 2020-06-19

    Hacked target: Wirecard

    Description of the event: About $2.13 billion worth of cash is missing from one of Wirecard's trust accounts, and the crypto debit card provider cannot as yet account for the money. In a statement, the crypto debit card provider blamed "spurious" cash balances provided by a third party with the aim of deceiving the auditor, which discovered the scandal during a routine audit. Wirecard said it is investigating the matter in close cooperation with the auditor. The amount missing equals 25% of the funds on the company's balance sheet.

    Amount of loss: $ 2,130,000,000 Attack method: Unknown
  • 2020-03-25

    Hacked target: Ledger

    Description of the event: Attacker creates malicious Ledger Chrome extensions and tricks users into downloading malicious Ledger Chrome extensions through Google search ad serving and other methods to steal users' cryptocurrency. So far, it is known that at least 1.4 million XRP are stolen.

    Amount of loss: 1.4M XRP Attack method: Phishing
  • 2020-03-05

    Hacked target: Trident Crypto Fund

    Description of the event: Malta-Based Trident Crypto Fund Compromised; Data of 266,000 Users Leaked.

    Amount of loss: - Attack method: Unknown
  • 2020-02-22

    Hacked target: Josh Jones

    Description of the event: Josh Jones, founder of Bitcoin Builder and Mt.Gox's second largest creditor, has had $45 million worth of digital currency stolen.

    Amount of loss: $45,000,000 Attack method: Sim card is hacked
  • 2020-02-12

    Hacked target: IOTA

    Description of the event: IOTA has shut down its entire network this week after hackers exploited a vulnerability in the official IOTA wallet app to steal user funds.Estimated loss of 850000 MIOTA (valued at us $2.3 million).

    Amount of loss: 8,550,000 MIOTA Attack method: Unknown
  • 2020-01-19

    Hacked target: Electrum

    Description of the event: Electrum suffers from "Update Phishing" theft. (The "Update Phishing" attack continues, and the older version (less than 3.3.4) is still under threat.)

    Amount of loss: 2000 BTC Attack method: Phishing
  • 2019-11-20

    Hacked target: GateHub

    Description of the event: Gatehub Crypto Wallet Data Breach Compromises Passwords of 1.4M Users.

    Amount of loss: - Attack method: Unknown
  • 2019-10-11

    Hacked target: Safuwallet

    Description of the event: Safuwallet, It has stolen already lots of funds by injecting malicious code.

    Amount of loss: - Attack method: Unknown
  • 2019-10-08

    Hacked target: WOTOKEN

    Description of the event: WOTOKEN, involved in a cryptocurrency pyramid selling case involving more than 7.7 billion yuan, has opened court and completed the trail in public and at Binhai County People's Court in Yancheng City, in which six major defendants were tried separately for organizing and leading pyramid selling activity; covering up and concealing income; harboring.

    Amount of loss: $ 1,109,800,000 Attack method: Ponzi
  • 2019-07-11

    Hacked target: My Dash Wallet

    Description of the event: My Dash Wallet has been embedded with a malicious script, the malicious script will upload the user's DASH currency account balance, keystore, private key, seed and other key information to https://api.dashcoinanalytics.com/stats.php.

    Amount of loss: - Attack method: Malicious Script
  • 2019-07-10

    Hacked target: Trezor

    Description of the event: An attacker with a stolen device can extract the seed from the device. It takes less than 5 minutes and the necessary materials cost around 100$. This vulnerability affects Trezor One, Trezor T, Keepkey and all other Trezor clones. Unfortunately, this vulnerability cannot be patched.

    Amount of loss: - Attack method: Extracting Seed
  • 2019-06-30

    Hacked target: 波场超级社区

    Description of the event: At 1:00 am on June 30, the App of Torrent super community was shut down. All of the wallet assets were moved out two weeks ago, and investors are currently unable to cash out.

    Amount of loss: - Attack method: Unknown
  • 2019-06-29

    Hacked target: PlusToken

    Description of the event: PlusToken crashes, so at present, the PlusToken wallet can only be transferred, and cannot be withdrawn.

    Amount of loss: 2,900,000,000 Attack method: Unknown
  • 2019-06-12

    Hacked target: MGC

    Description of the event: MGC wallet is exposed to carry user assets disappear, users' digital assets are aggregated to 0x4f9cxx, 0x2b29xx beginning two addresses in a short time.

    Amount of loss: - Attack method: Unknown
  • 2019-06-11

    Hacked target: TokenStore

    Description of the event: The TokenStore wallet was exposed as a "runaway", which swept away billions of investors' money, involving BTC, XRP, ETH and other mainstream currencies.

    Amount of loss: 1,000,000,000 CNY Attack method: Project disappears with user assets
  • 2019-06-01

    Hacked target: GateHub

    Description of the event: The attacker controls some of the GateHub database account API permissions, but the user's private key is secure. GateHub officials have identified 103 wallets that were compromised and a total of 18,473 accounts that may have been affected, including 5,045 with active balances.

    Amount of loss: 23,200,000 XRP Attack method: API permissions are controlled
  • 2018-11-27

    Hacked target: BitPay Copay

    Description of the event: The third-party JavaScript library used by the application was modified to load malicious code.

    Amount of loss: - Attack method: Third-party JavaScript library has been modified
  • 2018-08-31

    Hacked target: Bitfi

    Description of the event: McAfee offered a reward, anyone who breaks their hardware wallet can get the balance in the wallet. The wallet was breached one month after the offered of the reward.

    Amount of loss: - Attack method: Unknown
  • 2018-04-25

    Hacked target: MyEtherWallet

    Description of the event: After logging in to the website for 10s, the user's wallet is emptied, the hacker hijacks the DNS server, and the user logs in to MyEtherWallet to force a redirect to the malicious website. The user was forced to redirect to a malicious website when logging in to MyEtherWallet.

    Amount of loss: ~13,000,000 USD Attack method: DNS hijacking
  • 2018-02-19

    Hacked target: Blockchain.info

    Description of the event: A hacking organization in Ukraine has stolen cryptocurrencies worth more than $50 million from the Blockchain.info by purchasing keyword advertisements related to cryptocurrencies in the Google search engine and masquerading as malicious websites of legitimate websites.

    Amount of loss: 50,000,000 USD Attack method: Phishing
  • 2018-01-13

    Hacked target: BlackWallet

    Description of the event: The creator of BlackWallet announced on Reddit an infrastructure compromise resulting in in a hacked website that attacked users who entered private keys into it. The attacker then changed the dns settings to those of its fraudulent website (which was a copy of blackwallet).

    Amount of loss: - Attack method: DNS hijacking