Market Cap: $2.7768T -2.070%
Volume(24h): $183.2047B 18.680%
  • Market Cap: $2.7768T -2.070%
  • Volume(24h): $183.2047B 18.680%
  • Fear & Greed Index:
  • Market Cap: $2.7768T -2.070%
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
Top News
Cryptos
Topics
Cryptospedia
News
CryptosTopics
Videos
bitcoin
bitcoin

$79785.470194 USD

-7.56%

ethereum
ethereum

$2122.537481 USD

-9.79%

tether
tether

$0.998851 USD

-0.02%

xrp
xrp

$2.021993 USD

-9.16%

bnb
bnb

$572.731267 USD

-7.29%

solana
solana

$128.910116 USD

-8.92%

usd-coin
usd-coin

$0.999878 USD

-0.01%

dogecoin
dogecoin

$0.186129 USD

-11.09%

cardano
cardano

$0.593669 USD

-11.26%

tron
tron

$0.219233 USD

-4.14%

litecoin
litecoin

$118.062717 USD

-8.03%

chainlink
chainlink

$13.719065 USD

-11.45%

avalanche
avalanche

$20.643703 USD

-9.63%

unus-sed-leo
unus-sed-leo

$9.125602 USD

0.41%

stellar
stellar

$0.261312 USD

-10.63%

Cryptocurrency News Articles

5 Top Cryptocurrencies to Buy Today: Exploring Aureal One and DexBoss

Feb 28, 2025 at 03:20 pm

The cryptocurrency and blockchain landscape continues to evolve, with new projects emerging alongside established market leaders.

5 Top Cryptocurrencies to Buy Today: Exploring Aureal One and DexBoss

A recent report by Sygnia and Verichains has shed light on a significant cryptocurrency heist from Bybit, executed by Lazarus Group, a North Korean hacking group. Their investigation, published in the New Chain analysis, linked a malicious JavaScript code used in the breach to Lazarus Group's activities, specifically targeting Bybit's Ethereum Multisig Cold Wallet.

The heist, which occurred in November 2022 and saw cryptocurrency to the tune of $1.5 billion stolen, was initially reported by the FBI, who also confirmed the involvement of TraderTraitor group, known for hacking and draining cryptocurrency exchanges. Among the stolen cryptocurrency was a large sum of Ethereum, rapidly converted by the hackers into Bitcoin and other cryptocurrencies to obfuscate the transactions.

As reported by Blockware, the cryptocurrency exchange, Bybit, was defrauded to an enormous scale. At the time, the cryptocurrency exchange confirmed the occurrence of the incident but opted not to disclose any further details. Nonetheless, an analysis by Sygnia and Verichains identified a malicious JavaScript code used in the breach and linked it back to Lazarus Group's activities.

Their investigation, published in the New Chain analysis, uncovered a payload deployed by Lazarus Group, targeting Bybit's Ethereum Multisig Cold Wallet. This code snippet was written in JavaScript and included a function named "handleMessage," designed to intercept and process messages from the webassembly module.

The analysis further revealed that the malicious actors were able to deposit the stolen cryptocurrency into various cryptocurrency mixers in an attempt to launder the funds and mask the source of the theft. Their investigation also linked the payloads used in the Bybit attack to previously known Lazarus Group campaigns, reinforcing the group's involvement in the breach.

Disclaimer:info@kdj.com

The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!

If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.

Other articles published on Mar 01, 2025