Crypto M - Crypto News
2.27K subscribers
15.9K photos
194 links
Your #1 destination for the latest and most unbiased market news on Bitcoin, Ethereum, NFT, Fintech, Web3, DeFi, and Blockchain.
Download Telegram
πŸš€ Safe Team Reviews Radiant Capital Security Incident

According to Foresight News, the Safe team has reviewed the security incident mentioned in Radiant Capital's post-incident report. The review highlighted that while the Safe {Wallet} frontend functioned normally, external devices were compromised during the signing process. This allowed hackers to alter transaction data and trick signers into approving malicious transactions. The Safe team emphasized the risks associated with blind signing, where users approve transactions without fully viewing the details, particularly when using hardware wallets.

To address this issue, Safe recommends using multiple signing devices from different vendors, such as a combination of Ledger and Trezor, and connecting these devices through trusted interfaces to enhance transaction visibility and security. Additionally, Safe is exploring technologies like conditional signatures to provide more contextual information without compromising security. The team is also considering directly calculating Ledger hashes within its interface, enabling users to verify the hashes displayed on their hardware wallets and the interface.

The Safe team stressed the need for collaboration within the ecosystem to resolve the blind signing problem. They committed to working with hardware wallet providers and the community to improve transaction and message signing processes.


#SafeTeam #RadiantCapital #SecurityIncident #WalletSecurity #BlindSigning #TransactionSecurity #HardwareWallets #SecurityRecommendations #CollaborativeEffort #CryptoSecurity #ForesightNews
πŸš€ Users Urged To Enhance Account Security Amid Discounts On Security Tools

According to PANews, blockchain investigator ZachXBT has issued a warning to users to bolster their account and financial security. He highlighted ongoing discount promotions for security tools, including Yubico security keys, Proton and Tutanota email services. Proton supports Bitcoin payments, while Tutanota allows the purchase of gift cards using Monero (XMR) through its official partner, ProxyStore. Additionally, certain products from hardware wallet brands Trezor and Ledger are also on sale.

ZachXBT advises users to avoid using Gmail or SMS-based two-factor authentication (2FA) and to switch to security keys or hardware wallets for storing funds as soon as possible. He stressed the importance of purchasing security devices through official channels to prevent the risks associated with counterfeit products. ZachXBT also reminded users that many security incidents are entirely preventable with the right precautions.


#AccountSecurity #SecurityTools #CyberSecurity #Blockchain #Proton #Tutanota #Yubico #Trezor #Ledger #TwoFactorAuthentication #SecurityKeys #HardwareWallets #Monero #Bitcoin #BTC
πŸš€ Google Updates Cryptocurrency Advertising Policy for 2025

According to PANews, Google has announced an update to its financial products and services policy, which will take effect in January 2025. The update clarifies the scope and requirements for advertising cryptocurrency-related businesses and services. Starting January 15, 2025, advertisers offering cryptocurrency exchanges in the United Kingdom can promote these products and services, provided they meet specific criteria and obtain Google certification.

For cryptocurrency exchanges and software wallets in the UK, Google will permit advertisements if the advertisers are registered with the Financial Conduct Authority (FCA). Additionally, they must comply with any other local legal requirements.

Regarding hardware wallets in the UK, Google will allow advertisements for devices used to store private keys for cryptocurrencies, NFTs, or other crypto assets. However, these advertisements must not offer additional services such as buying, selling, exchanging, or trading assets. Advertisers must also adhere to any other local legal requirements.

All advertisers must obtain Google certification to run these advertisements.


#Google #Cryptocurrency #AdvertisingPolicy #FinancialServices #CryptocurrencyExchanges #UK #GoogleCertification #FCA #HardwareWallets #NFTs #CryptoAssets
πŸš€ Blockchain Security Concerns Highlighted By Cobo CEO

According to Odaily, Cobo co-founder and CEO recently addressed significant blockchain security issues on platform X. The statement follows a $1.5 billion security incident involving Bybit and several cases of Safe owner modifications. The CEO identified three major pain points in blockchain security: the vulnerability of front-end interfaces and plugins to tampering, which prevents users from verifying signature data; the lack of independence and mandatory review mechanisms in environments holding multi-signature keys; and the limited transaction parsing capabilities of hardware wallets, often resulting in blind signing.

#Blockchain #Security #Cobo #Bybit #MultiSignature #HardwareWallets #Cryptocurrency #Tampering
πŸš€ Key Security Tips For Using Multi-Signature Wallets

According to PANews, SlowMist's Cosine shared insights on the X platform regarding the use of Safe multi-signature or other multi-signature wallets. Users are advised to consider the following points:

1. Ensure that all signature steps are verifiable. If a technically proficient friend struggles to verify them, it is prudent to be skeptical.

2. When using multi-signature wallets, it is beneficial to pair them with hardware wallets. This is especially true if the hardware wallet can effectively parse complex signatures and provide alerts for any signature anomalies.

The overarching security strategy is to never rely on a single party, as there is always a risk of a single point of failure. It is best to employ multiple verification methods.


#MultiSignatureWallets #SecurityTips #CryptoSecurity #HardwareWallets #Verification #RiskManagement #BlockchainSafety
πŸš€ Crypto's Development Mirrors Early Internet Era, Says Polygon Co-Founder

According to Cointelegraph, the current state of cryptocurrency is comparable to the "America Online" (AOL) era of the internet in the late 1990s, characterized by a cumbersome user experience and limited use cases. Polygon co-founder Sandeep Nailwal highlighted this analogy, noting that the crypto industry is still in its early stages, akin to the dial-up era of the internet. Nailwal emphasized the need for advancements in several areas to enhance user experience, such as seamless fiat on- and off-ramps, key recovery solutions for custody, and the integration of hardware wallets into mobile devices.

Nailwal remarked that the crypto industry is likely in a phase similar to 1998, suggesting it could take another 10 to 15 years for cryptocurrencies to reach their full potential. During the AOL days, the internet was primarily used for email and basic web browsing, with a high barrier to entry. Today, the internet has evolved to encompass the entire economy. Nailwal believes that the current focus of crypto on financial use cases, particularly market speculation, mirrors the early internet's limited functionality. He anticipates that once financial use cases are fully developed and widely adopted, cryptocurrencies will expand into alternative sectors such as decentralized social media, gaming, and other niche areas.

Nailwal also pointed out that even the fundamental financial use case of cryptocurrencies has not been fully realized. A report from Bitcoin financial services company River, published in February 2025, revealed that only 4% of individuals worldwide own Bitcoin (BTC), the original cryptocurrency with the largest market cap. The report indicated that BTC has achieved only about 3% of its total adoption potential when considering institutions, the total addressable market, and proper portfolio allocations. This low percentage of BTC holders suggests that mass adoption of cryptocurrencies is still years away, and the industry remains in the early adopter phase of development.


#Crypto #Polygon #SandeepNailwal #Cryptocurrency #AOL #InternetEra #UserExperience #FiatOnRamp #CustodySolutions #HardwareWallets #DecentralizedSocialMedia #Gaming #FinancialUseCases #Bitcoin #MassAdoption #EarlyAdopters
πŸš€ A16z Crypto Highlights Importance of Physical Security in Digital Asset Protection

According to Odaily, a16z Crypto has released an article emphasizing the significance of physical security in safeguarding digital assets. The article notes that while many users focus on digital security measures, such as hardware wallets and multi-signature protocols, neglecting physical security can lead to severe consequences. Attackers may employ social engineering tactics to obtain sensitive information or directly threaten individuals to access private keys.

To mitigate these risks, a16z recommends a comprehensive security approach, including avoiding discussions about the amount of cryptocurrency held in public settings, storing private keys and mnemonic phrases in secure, distributed locations, and regularly updating security strategies to counter potential physical and digital threats. The firm stresses that as the value of digital assets increases, users must prioritize both physical and digital security to fully protect their holdings.


#A16z #Crypto #PhysicalSecurity #DigitalAssetProtection #SecurityStrategy #HardwareWallets #PrivateKeys #Cryptocurrency #SocialEngineering #DigitalSecurity
πŸš€ Russia Advances Digital Asset Regulation with New Seizure Legislation

According to PANews, Russia is intensifying its efforts to regulate digital assets by planning legislation to streamline the seizure process. During the 13th St. Petersburg International Legal Forum, the Russian Ministry of Justice highlighted the impact of new technologies on crime and announced that the proposed law will clarify and expedite the procedures and considerations for confiscating digital assets.

Deputy Minister of Justice Vadim Fedorov stated that the legislation will categorize digital assets as seizable property. Given the unique characteristics of certain digital currencies, the proposal includes special requirements, such as the confiscation of physical devices like hardware wallets that store keys for wallets used in criminal activities. Additionally, the law would require courts to issue transaction bans. Fedorov also mentioned that experts will be involved in the process to ensure the safe seizure of digital currencies and address victim compensation claims. However, he acknowledged the challenges posed by the decentralized nature of digital assets, which makes them attractive to criminals and difficult to physically seize. The measures primarily target local threats posed by cryptocurrency-related criminal activities.


#Russia #DigitalAssets #Regulation #SeizureLegislation #Cryptocurrency #CriminalActivities #MinistryOfJustice #StPetersburgForum #HardwareWallets #VictimCompensation #Decentralization
πŸš€ Rabby Wallet Ends Support for Firefox Plugin Due to Compatibility Issues

According to Foresight News, Rabby Wallet has announced it will cease maintaining its plugin wallet for Firefox. The decision stems from Firefox's lack of comprehensive support for hardware wallets like Ledger, which has negatively impacted user experience. Additionally, the relatively small user base on Firefox has made maintenance costs disproportionately high compared to other platforms. Rabby Wallet recommends users switch to Chrome or Brave for continued use of the Rabby plugin.

#RabbyWallet #Firefox #Plugin #CompatibilityIssues #HardwareWallets #UserExperience #Chrome #Brave
πŸš€ North Korean Hackers Target Individual Investors in Recent Cyber Attack

According to PANews, the North Korean hacker group Lazarus has shifted its focus to individual investors, stealing over $5.2 million through malware on May 24. The stolen funds were taken from various wallet types, including exchange wallets, multi-signature wallets, and external accounts. Blockchain analyst ZackXBT tracked the hackers, discovering that approximately 1,000 ETH had been moved through the mixer Tornado Cash.

Security experts advise individual investors to take protective measures such as using hardware wallets for large assets, enabling two-factor authentication, regularly updating software patches, being cautious of suspicious links, and routinely checking transaction records. This attack signifies a strategic shift by the group from targeting institutions to focusing on individual investors.


#NorthKorea #Hackers #Lazarus #CyberAttack #Investors #Malware #Security #Blockchain #ETH #TornadoCash #HardwareWallets #TwoFactorAuthentication #CyberSecurity #ProtectiveMeasures
πŸš€ Security Breach Leads to $6.5 Million Cryptocurrency Theft

According to PANews, a significant security breach has resulted in the theft of approximately $6.5 million in cryptocurrency. The incident was highlighted by 23pds, the Chief Information Security Officer at SlowMist Technology, who reported on the X platform that a user fell victim to a scam involving a tampered 'cold wallet' purchased through Douyin. The private key was compromised at the moment of generation, and the funds were subsequently transferred via the 'Huiwang' platform.

23pds emphasized the importance of purchasing cold wallets through official and legitimate channels, warning that online offers of 'brand new, unopened' or 'special discount' cold wallets are often fraudulent, with a 99% likelihood of being tampered with.

In response, Yuxian noted that the incident involved a scam related to hardware wallets, specifically targeting Ledger hardware wallets. Such scams have consistently ensnared certain large investors, leading to substantial financial losses.


#SecurityBreach #CryptocurrencyTheft #ColdWallet #Scam #HardwareWallets #Ledger #CyberSecurity #Fraud #FinancialLosses #PANews
πŸš€ Massive Social Engineering Attack Results in Theft of 783 Bitcoins Worth $91.4 Million

On August 19, 2025, a sophisticated social engineering attack led to the theft of 783 Bitcoins, valued at approximately $91.4 million, according to blockchain intelligence firm BlockBeats and on-chain analyst ZachXBT.How the Attack UnfoldedThe attackers impersonated customer service representatives from popular trading platforms and hardware wallet providers. Using these deceptive tactics, they gained access to the victim’s funds, which were then gradually moved and dispersed across multiple wallets. Notably, the stolen Bitcoins were deposited multiple times into Wasabi Wallet, a privacy-focused Bitcoin mixing service, complicating traceability.This high-profile theft eerily coincided with the first anniversary of the $243 million Genesis creditors hack, highlighting ongoing vulnerabilities in crypto security.Key DetailsDate of Attack: August 19, 2025Amount Stolen: 783 BTC (~$91.4 million)Attack Method: Social engineering via impersonation of customer supportFunds Movement: Gradual dispersal and multiple deposits to Wasabi WalletTransaction Hash: da598f2a941ee3c249a3c11e5e171e186a08900012f6aad26e6d11b8e8816457What This Means for Crypto UsersThis incident serves as a stark reminder of the critical importance of vigilance against social engineering attacks. Even experienced users can fall victim to sophisticated scams that exploit trust and impersonation.Tips to Protect Your Crypto Assets:Always verify customer support contacts through official channels.Avoid sharing private keys or sensitive information.Use hardware wallets and enable multi-factor authentication.Be cautious of unsolicited messages or calls claiming to be support staff.

#SocialEngineering #BitcoinTheft #CryptocurrencySecurity #Blockchain #CryptoScams #Vigilance #Cybersecurity #WasabiWallet #HardwareWallets #MultiFactorAuthentication #BTC
πŸš€ Malicious Code Injection Detected in Popular npm Packages

According to PANews, renowned developer qix has fallen victim to a phishing attack, resulting in the injection of malicious code into several npm packages. The affected packages include chalk, strip-ansi, and color-convert. The attack method involved hooking wallet functions, altering ETH/SOL transaction recipient addresses, and replacing addresses in network responses. Users are advised to verify recipient and amount details on wallet interfaces, check for address changes after pasting, review recent transactions, and prioritize using hardware wallets for high-value operations.

#MaliciousCodeInjection #NpmPackages #Chalk #StripAnsi #ColorConvert #PhishingAttack #WalletSecurity #ETH #SOL #HardwareWallets
πŸš€ Ledger CTO Addresses Recent NPM Attack and Supply Chain Threats

According to BlockBeats, Ledger's Chief Technology Officer Charles Guillemet has provided an update on the recent NPM attack, stating that fortunately, the attack was unsuccessful with minimal victims. The attack began with phishing emails disguised as npm support domains, aiming to steal user credentials and allow attackers to publish malicious software package updates. The injected code targeted network encryption activities, infiltrating chains like Ethereum and Solana, hijacking transactions, and replacing wallet addresses directly in network responses. An error by the attackers led to a CI/CD pipeline crash, enabling early detection and limiting the impact.

Guillemet emphasized that this incident serves as a clear reminder of the risks associated with storing funds in software wallets or exchanges, where a single code execution could result in significant losses. Supply chain attacks remain a potent method for spreading malware, with an increasing number of targeted attacks being observed.

Hardware wallets are specifically designed to counter such threats. Features like "clear signing" allow users to accurately verify transaction details, while "transaction checks" can flag suspicious activities before issues arise. Although the immediate danger may have passed, the threat persists, and maintaining security is crucial.

Earlier today, BlockBeats reported a large-scale supply chain attack involving the compromise of a well-known developer's NPM account. The affected package has been downloaded over a billion times, posing a potential risk to the entire JavaScript ecosystem.


#Ledger #NPM #NPMAttack #SupplyChainAttack #Phishing #Ethereum #Solana #HardwareWallets #ClearSigning #TransactionChecks #JavaScript #JavaScriptEcosystem #CryptoSecurity #BlockBeats #LedgerSecurity
πŸš€ Security Vulnerability Found in Mediatek Smartphone Chip

According to ChainCatcher, Ledger's Donjon research team has demonstrated that electromagnetic fault injection (EMFI) can completely compromise a commonly used Mediatek smartphone chip, which is found in many Android phone models. This issue requires attackers to have physical access to the device, highlighting the risks faced by users storing private keys on smartphones.

Ledger stated that its team examined the Mediatek Dimensity 7300 (MT6878) chip produced by TSMC. Researchers used EMFI tools to disrupt the chip's boot ROM, successfully bypassing core security checks and gaining full control of the chip, allowing arbitrary code execution at the highest privilege level (EL3). Ledger emphasized that this discovery does not affect Ledger hardware wallets.

Ledger disclosed this vulnerability to Mediatek in May. Mediatek responded by stating that EMFI attacks are beyond the security scope of the MT6878 chip, which is designed for consumer products rather than financial or hardware security module applications. Mediatek also noted that devices with higher security requirements, such as encrypted hardware wallets, should include specialized defense measures.

The report comes at a time when physical attacks targeting cryptocurrency users are on the rise globally.


#SecurityVulnerability #Mediatek #SmartphoneChip #EMFI #ElectromagneticFaultInjection #MT6878 #AndroidSecurity #PhysicalAccess #PrivateKeys #Ledger #DonjonResearch #CodeExecution #ChipSecurity #MediatekResponse #HardwareWallets #CryptocurrencySecurity #PhysicalAttacks #TechVulnerability
πŸš€ Bitcoin Holders Urged to Enhance Security Amid Market Volatility

Bitcoin holders are being encouraged to reduce screen time and consider offline custody options such as hardware wallets and cold storage. According to NS3.AI, this advice comes amid significant market volatility, which has led to nearly $874 million in liquidations. Additionally, ETF flows have shown outflows from Bitcoin and inflows into Ethereum.

The increase in crypto thefts and violent attacks on holders is prompting investors to enhance their security measures. As a result, custody is becoming a crucial operational decision for many in the crypto space.


#Bitcoin #Security #CryptoVolatility #HardwareWallets #ColdStorage #CryptoThefts #Ethereum #ETF #CryptoInvestors #Custody #BTC #ETH
πŸš€ Ledger Faces Data Breaches and Product Issues Amid IPO Plans

French security company Ledger has experienced several data breaches, compromising customer private information and leading to targeted thefts and substantial financial losses. According to NS3.AI, Ledger's hardware wallets, such as the Nano X, have encountered notable product issues, including battery malfunctions. Despite these setbacks, the firm is moving forward with plans for an initial public offering (IPO) in the United States, aiming to enhance its profitability.

#Ledger #DataBreaches #Security #PrivateInformation #HardwareWallets #NanoX #ProductIssues #BatteryMalfunctions #IPO #FinancialLosses #Profitability
πŸš€ Ledger Plans $4 Billion IPO on NYSE in 2026

Ledger, a prominent manufacturer of cryptocurrency hardware wallets, is reportedly preparing for a $4 billion initial public offering (IPO) on the New York Stock Exchange in 2026. According to NS3.AI, this strategic move reflects the company's confidence in the rising demand for secure crypto storage solutions. Ledger's decision to pursue an IPO aims to leverage the growing interest from both institutional and retail sectors in cryptocurrency custody. The company is positioning itself to capitalize on the expanding market for secure digital asset management.

#Ledger #cryptocurrency #hardwarewallets #IPO #NYSE #crypto #digitalassets #securestorage #crypto custody #institutional #retail #2026
πŸš€ Phishing Campaign Targets Trezor and Ledger Users with Fake Letters

A sophisticated phishing campaign is targeting users of hardware wallets Trezor and Ledger through physical mail, including fake letters adorned with holograms and forged signatures. According to NS3.AI, attackers are leveraging leaked personal data from previous breaches to enhance credibility and persuade victims to scan malicious QR codes designed to steal digital assets. Security experts caution that this approach heightens psychological pressure on users and advise them to verify all communications and refrain from sharing wallet backups.

#Phishing #Trezor #Ledger #HardwareWallets #Security #Malware #Cybersecurity #DataBreach #FakeLetters #QRCode #DigitalAssets #SecurityExperts
πŸš€ Understanding Crypto Asset Custody: Key Insights for Investors

The U.S. Securities and Exchange Commission (SEC) posted on X, providing essential information for investors interested in crypto wallets and the storage of digital assets. The bulletin outlines the fundamental aspects of crypto asset custody, emphasizing the importance of secure storage solutions for safeguarding investments. It highlights the various types of wallets available, including hardware, software, and paper wallets, each offering different levels of security and accessibility.

Investors are encouraged to thoroughly research and understand the features and risks associated with each type of wallet before making a decision. The bulletin also stresses the significance of private keys, which are crucial for accessing and managing crypto assets. Losing or compromising these keys can result in the permanent loss of assets.

Additionally, the SEC advises investors to remain vigilant against potential scams and fraudulent schemes in the crypto space. It recommends using reputable service providers and staying informed about regulatory developments that may impact the security and legality of crypto asset custody.

Overall, the bulletin serves as a valuable resource for investors seeking to navigate the complexities of crypto asset storage and management, ensuring they make informed decisions to protect their investments.


#CryptoAssetCustody #Investors #CryptoWallets #DigitalAssets #HardwareWallets #SoftwareWallets #PaperWallets #PrivateKeys #CryptoSecurity #Scams #FraudulentSchemes #ReputableServiceProviders #RegulatoryDevelopments #SecureStorage #CryptoInvesting