Tuesday, November 12, 2024
HomeCryptocurrency hackSouth Korean Crypto Exchange Coinrail Hacked and Attackers Steal $40M in Tokens

South Korean Crypto Exchange Coinrail Hacked and Attackers Steal $40M in Tokens

Published on

Malware protection

Coinrail Hacked, attackers have stolen more than $40 million in ICO tokens and altcoins from the company servers.

The South Korean crypto exchange Coinrail ranks among top 100 exchanges according to coinmarketcap and handles less than $2.5 million in volume every day.

After cyber intrusion was noticed the company web portal was in maintenance mode and conrail confirms “some coins Pundi X, NPXS were stolen by the hackers”.

- Advertisement - SIEM as a Service

Coinrail said that “Two-thirds of the coins confirmed to have been leaked are covered by freezing / recalling through consultation with each coach and related exchanges. The remaining one-third of coins are being investigated with investigators, relevant exchanges, and coin developers.”

Hackers had stolen the tokens that issued on initial coin offerings of Fundus X (NPXS), Aston (ATX), and Enper (NPER).

“All assets of CoinRail, which have not been leaked, are moved to a cold wallet and are kept safe, and transactions and withdrawals will resume after stabilizing the service. We will update the announcement when possible.”

Coinrail has not confirmed the total value of stolen cryptocurrency, according to wallet address spotted by TechCrunch more than $40 million worth of cryptocurrency stolen.

The hackers stole $19.5 million worth of NPXS tokens, $13.8 million from Aston X, $5.8 million for Dent and $1.1 million from Tron.

Japanese Syndicate Wallet Hacked on June 6th and hackers have stolen $10 Million USD which includes a variety of tokens, including Ethereum, Level Up, Orbs, and Shopin Tokens.

Amid to the crypto exchange attack, the bitcoin value declined to 5.1 percent, Ethereum, and Ripple falls by 6.2 percentage.

The company says “cooperates with the investigating agency as much as possible to protect your assets as much as possible and to hackers as a criminal measure in order to minimize and recover the damage.”

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

10 Best DNS Management Tools – 2025

Best DNS Management Tools play a crucial role in efficiently managing domain names and...

Sweet Security Announces Availability of its Cloud Native Detection & Response Platform on the AWS Marketplace

Customers can now easily integrate Sweet’s runtime detection and response platform into their AWS...

Researchers Detailed Credential Abuse Cycle

Cybercriminals exploit leaked credentials, obtained through various means, to compromise systems and data, enabling...

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

New Android Malware SpyAgent Taking Screenshots Of User’s Devices

SpyAgent, a newly discovered Android malware, leverages OCR technology to extract cryptocurrency recovery phrases...

North Korean Hackers Employing New Tactic To Acruire Remote Jobs

North Korean threat actors behind the Contagious Interview and WageMole campaigns have refined their...

Critical Atlassian Vulnerability Exploited To Connect Servers In Mining Networks

Hackers usually shift their attention towards Atlassian due to flaws in its software, especially...