Scan to download
BTC $66,284.99 -0.64%
ETH $1,996.35 +0.12%
BNB $612.00 +0.12%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $477.29 +3.64%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.8824 -1.34%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $66,284.99 -0.64%
ETH $1,996.35 +0.12%
BNB $612.00 +0.12%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $477.29 +3.64%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.8824 -1.34%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

hacker

Bitrefill disclosed that it was attacked by suspected North Korean hackers, resulting in a customer data breach, and has shut down relevant systems for isolation

Bitcoin payment service provider Bitrefill disclosed on platform X that it suffered a cyberattack on March 1, 2026, resulting in a customer data breach. The attack originated from a compromised employee's laptop and allowed the attackers to access certain databases and cryptocurrency wallets.Investigations revealed that the attack method was highly similar to past attacks on cryptocurrency companies by the North Korean DPRK Lazarus/Bluenoroff hacker group. Approximately 18,500 purchase records involved limited customer information (email, cryptocurrency payment addresses, and IP metadata), with about 1,000 records having customer name information stored in an encrypted format, but potentially accessible. Bitrefill stated that customers do not need to take special actions but are advised to be vigilant for unusual information.Bitrefill further added that it has currently shut down related systems for isolation and is collaborating with security experts, on-chain analysts, and law enforcement. Operations have nearly returned to normal. The company emphasized that it is long-term profitable and financially robust enough to absorb this loss and will continue to strengthen cybersecurity measures, including internal access controls, monitoring, and emergency response mechanisms.

A certain hacker group in China has internal conflicts and claims to have stolen approximately 7 million dollars worth of cryptocurrency assets

According to market news, a hacker group in China has experienced internal strife due to disputes over the distribution of stolen goods. Members publicly revealed that they had stolen approximately $7 million in cryptocurrency assets through supply chain attacks, targeting platforms such as the cryptocurrency wallet Trust Wallet.According to the leaked information, the group operated under the name of the cybersecurity company Wuhan Anshun Technology, publicly engaging in activities such as vulnerability discovery, network offense and defense, and security services, while internally actually involved in activities related to the theft of cryptocurrency assets and other gray market operations. Team members claimed they obtained mnemonic phrases in bulk and scanned multi-chain assets, including Ethereum, BNB Chain, Arbitrum, etc., through supply chain vulnerabilities in the Electron client, plugin reverse engineering, and automation tools.The whistleblower stated that the team had developed automated tools to scan mnemonic phrase assets in bulk and used remote control programs to steal wallet data, subsequently transferring and splitting the funds. The related attacks reportedly involved 37 types of tokens across multiple blockchain networks. The trigger for the exposure of this incident was an internal dispute over the distribution of stolen goods.The whistleblower claimed to have had conflicts with the team leader over unfair profit distribution and publicly presented relevant evidence after the promised severance compensation was not fulfilled, planning to turn themselves in to law enforcement. Currently, the related accusations have not been officially confirmed, and the details of the incident are still under further investigation. Industry insiders pointed out that this incident once again highlights the security risks of cryptocurrency wallet supply chains and plugins, as well as the trend of targeted attacks against high-value users.

ClickFix attack escalates, hackers impersonate VCs and hijack browser extensions to steal crypto assets

The cybersecurity agency Moonlock Lab reports that crypto hackers have recently upgraded their "ClickFix" attack method, beginning to impersonate venture capital firms to contact target users through social platforms and lure them into executing malicious code to steal crypto assets.Attackers disguise themselves as fake venture capital firms such as SolidBit, MegaBit, and Lumax Capital, sending collaboration invitations via LinkedIn and guiding victims to fake Zoom or Google Meet meeting links. The pages embed a fake Cloudflare "I am not a robot" verification button, which, when clicked, copies malicious commands to the clipboard and tricks users into pasting and executing them in the terminal, thus completing the attack. Researchers point out that this method circumvents traditional security mechanisms by "making victims execute commands themselves."Meanwhile, hackers are also hijacking browser extensions to carry out attacks. John Tuckner, founder of cybersecurity company Annex Security, revealed that the Chrome extension QuickLens, after changing ownership on February 1, released a new version containing malicious scripts two weeks later, triggering ClickFix attacks and stealing user data. The extension had about 7,000 users and has since been removed from the store. Reports indicate that the hijacked extension scans crypto wallet data and mnemonic phrases, and scrapes Gmail content, YouTube channel data, and web login or payment information.

Hackers impersonate VC and hijack the QuickLens plugin, using ClickFix technology to steal cryptocurrency assets

According to Cointelegraph, hackers are using the "ClickFix" attack method to steal cryptocurrencies, with the latest two attacks involving impersonating venture capital firms and hijacking browser extensions.Cybersecurity company Moonlock Lab reports that scammers impersonate fake VCs such as SolidBit, MegaBit, and Lumax Capital, contacting users via LinkedIn to offer collaboration opportunities, then directing them to click on fake Zoom and Google Meet links. After clicking the link, users are led to a page with a forged Cloudflare "I'm not a robot" verification box; clicking this box copies malicious commands to the clipboard and prompts users to open a terminal to paste the so-called verification code, thus executing the attack.Moonlock Lab points out that this method turns victims into execution mechanisms, bypassing defenses in the security industry. Meanwhile, hackers are also spreading malware by hijacking the Chrome extension QuickLens. This extension allows users to run Google Lens searches directly in the browser, and after ownership was transferred, the new version contains malicious scripts that can initiate ClickFix attacks and steal information.The extension has about 7,000 users, and once hijacked, it searches for cryptocurrency wallet data and recovery phrases to steal funds, as well as scraping Gmail inbox content, YouTube channel data, and login credentials or payment information entered in web forms. The extension has been removed from the Chrome Web Store. The ClickFix technique has been popular among hackers since last year, forcing victims to manually execute malicious payloads, affecting thousands of businesses and multiple industries worldwide.
app_icon
ChainCatcher Building the Web3 world with innovations.