September 13

Crypto Cyber Attacks: Exchanges are not exempt – Hacker stole $97 Million from “Liquid”

Cryptocurrency and crypto-assets rose to popularity in the financial world during the pandemic.

With this massive welcome of crypto investments in 2020, hackers launched more ventures to target various crypto companies. In August 2021, $97 million in crypto assets were stolen by a hacker from the Japan-based cryptocurrency exchange Liquid.

Crypto Cyber Attacks – Liquid

The recent data breach was announced on Twitter last August 19.

The breach froze any deposit and withdrawal activities from Liquid. Due to the incident, the company announced that they are moving the assets into a cold wallet.

Liquid Global Official - Hackers stole $97 Million

Liquid is not the only crypto company targeted by hackers

The attack took place only a few days after Poly Network lost $612 million to a hacker heist. As per Liquid’s Twitter announcement, they will keep their investors updated with the developments of their investigation on the recent data breach. They are currently tracking the movements of the stolen assets. They are also working with other exchanges to freeze these movements to ultimately recover the funds.

Elliptic, which is the blockchain analytics firm aiding Liquid in tracking the stolen assets, detected that nearly $100 million tokens were stolen. Elliptic reported that at least $45 million in Ethereum assets were converted to Ether with the assistance of decentralised exchanges like SushiSwap and Uniswap to prevent freezing the assets.

Where to track Liquid’s Data Breach Updates

Liquid’s blog post detailed the incident that occurred. In this article, it was confirmed that the initial unauthorised access was detected early on Thursday, around 7:50 AM SGT. Liquid’s team said they are conducting thorough scans and tests and expect to restore all their services within this week. Liquid informed their investors to standby for further announcements regarding the developments of their activities regarding the breach on Twitter.

If you have any crypto assets with Liquid, here are the recent information where the hackers transferred the funds:

  • TRON: TSpcue3bDfZNTP1CutrRrDxRPeEvWhuXbp;
  • Ethereum/Energy Web Token: 0x5578840aae68682a9779623fa9e8714802b59946;
  • Bitcoin: 1Fx1bhbCwp5LU2gHxfRNiSHi1QSHwZLf7q;
  • Ripple: rfapBqj7rUkGju7oHTwBwhEyXgwkEM4yby.

CRINTEL helps SMEs deal with the dangers of the Dark Web

CRINTEL – Cyber Risk Intelligence is a Private Intelligence Agency (PIA) that specialises in Cyber Threat and Risk Intelligence originating from the Dark Web. 

We work as a co-managed solution to support and provide your internal team and external IT cybersecurity advisors with 24/7 live monitoring of the dark web.

Our Threat Intelligence Units (TIUs) monitor your business domain, email addresses and key suppliers – looking for exposed credentials that we can find about your business and suppliers – that are up for sale on the dark web. 

Our enterprise-level cyber intelligence systems, used by Fortune 500 companies, are supported by human operatives and collect live dynamic data that is scanned or sourced from live dark web forums leveraging multiple sources in real-time 24/7, 365 days per year.

Dark Web Monitoring

Are your business credentials up for sale on the dark web? Get started with Crintel FREE today! Request a complimentary Cyber Intelligence Report here.

Follow CRINTEL on LinkedIn, Facebook, Instagram, and Twitter for the latest news and updates on cyber threats, cybercriminal activities, and tips that aid in protecting SMEs from the dangers they pose.

NOTE: As this article is sourced from one or more third parties we cannot guarantee the information is correct and suggest if you are relying on this information, for whatever reason, then you should first do your own research. Click here to learn more about how CRINTEL can help your business.


Tags

Crypto, Cyber Threat Intelligence, Cyber Threats


You may also like

{"email":"Email address invalid","url":"Website address invalid","required":"Required field missing"}
>