{"id":29498,"date":"2025-01-14T14:57:37","date_gmt":"2025-01-14T19:57:37","guid":{"rendered":"https:\/\/freshsites.download\/crytonews\/hackers-stole-1-7-billion-in-crypto-how-shorts\/"},"modified":"2025-01-14T14:57:37","modified_gmt":"2025-01-14T19:57:37","slug":"hackers-stole-1-7-billion-in-crypto-how-shorts","status":"publish","type":"post","link":"http:\/\/freshsites.download\/crytonews\/hackers-stole-1-7-billion-in-crypto-how-shorts\/","title":{"rendered":"Hackers stole $1.7 billion in crypto. How? #shorts"},"content":{"rendered":"<p><iframe loading=\"lazy\"  width=\"580\" height=\"385\" src=\"https:\/\/www.youtube.com\/embed\/66hsPYd7KWY?modestbranding=1\" frameborder=\"0\" allowfullscreen><\/iframe><br \/>\n<br \/><center>In July this year, hackers stole 308 million dollars from the Japanese crypto exchange DMM Bitcoin. A few weeks later, 230 million dollars was stolen from India&#8217;s WazirX crypto exchange.<\/p>\n<p>Analysts at Chainalysis estimate that hackers stole $1.7 billion from cryptocurrency exchanges in 2023. Crypto exchanges are a tidbit target for cybercriminals. How do they hack into them?<\/p>\n<p>Most often, theft is accomplished by exploiting vulnerabilities in smart contracts. A smart contract is a computer algorithm that automatically executes the terms of a contract.<\/p>\n<p>Users draft them themselves and sometimes make mistakes. Attackers take advantage of it. Sometimes the theft occurs when hackers gain access to corporate networks that use crypto services.<\/p>\n<p>SIM swap is another method of cryptocurrency theft.<\/p>\n<p>In this case, the SIM hijacker uses social engineering to convince the mobile operator to port the victim&#8217;s phone number to their SIM card.<\/p>\n<p>In February 2024, criminals who stole $400 million in this way were arrested in the United States.<\/p>\n<p>Be aware of\u00a0 the attackers&#8217; methods.<\/p>\n<p>#sumsub #crypto #cryptoexchanges #socialengineering #shorts<\/p>\n<p>Sumsub \u2014 empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.<\/p>\n<p>More about us: <\/p>\n<p><\/center><br \/>\n<br \/>\nIn July this year, hackers stole 308 million dollars from the Japanese crypto exchange DMM Bitcoin. A few weeks later, 230 million dollars was stolen from India&#8217;s WazirX crypto exchange.<\/p>\n<p>Analysts at Chainalysis estimate that hackers stole $1.7 billion from cryptocurrency exchanges in 2023. Crypto exchanges are a tidbit target for cybercriminals. How do they hack into them?<\/p>\n<p>Most often, theft is accomplished by exploiting vulnerabilities in smart contracts. A smart contract is a computer algorithm that automatically executes the terms of a contract.<\/p>\n<p>Users draft them themselves and sometimes make mistakes. Attackers take advantage of it. Sometimes the theft occurs when hackers gain access to corporate networks that use crypto services.<\/p>\n<p>SIM swap is another method of cryptocurrency theft.<\/p>\n<p>In this case, the SIM hijacker uses social engineering to convince the mobile operator to port the victim&#8217;s phone number to their SIM card.<\/p>\n<p>In February 2024, criminals who stole $400 million in this way were arrested in the United States.<\/p>\n<p>Be aware of\u00a0 the attackers&#8217; methods.<\/p>\n<p>#sumsub #crypto #cryptoexchanges #socialengineering #shorts<\/p>\n<p>Sumsub \u2014 empowering compliance and anti-fraud teams to fight money laundering, terrorist financing, and online fraud.<\/p>\n<p>More about us: <\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>In July this year, hackers stole 308 million dollars from the Japanese crypto exchange DMM Bitcoin. A few weeks later, 230 million dollars was stolen from India&#8217;s WazirX crypto exchange. Analysts at Chainalysis estimate that <a class=\"mh-excerpt-more\" href=\"http:\/\/freshsites.download\/crytonews\/hackers-stole-1-7-billion-in-crypto-how-shorts\/\" title=\"Hackers stole $1.7 billion in crypto. How? #shorts\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":29499,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[7],"tags":[],"_links":{"self":[{"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/posts\/29498"}],"collection":[{"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/comments?post=29498"}],"version-history":[{"count":0,"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/posts\/29498\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/media\/29499"}],"wp:attachment":[{"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/media?parent=29498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/categories?post=29498"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/freshsites.download\/crytonews\/wp-json\/wp\/v2\/tags?post=29498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}