Multiple reports have revealed that an individual lost approximately $27 million in crypto assets across multiple blockchain networks in an attack that employed the use of sophisticated malware that automated the compromise of private keys, targeting wallets and backups.  According to an X post from the founder of the SlowMist Blockchain security firm, the user […]Multiple reports have revealed that an individual lost approximately $27 million in crypto assets across multiple blockchain networks in an attack that employed the use of sophisticated malware that automated the compromise of private keys, targeting wallets and backups.  According to an X post from the founder of the SlowMist Blockchain security firm, the user […]

Crypto user loses $27 million to hackers in a malware attack

2025/12/06 06:55

Multiple reports have revealed that an individual lost approximately $27 million in crypto assets across multiple blockchain networks in an attack that employed the use of sophisticated malware that automated the compromise of private keys, targeting wallets and backups. 

According to an X post from the founder of the SlowMist Blockchain security firm, the user who was exploited was named “Babur,” and they had their wallets drained of about $27 million in total.

Crypto holder loses funds to malware attack

The blockchain security expert was able to trace some of the biggest transactions and surmised that the exploit was the result of scammers poisoning Babur’s computer after he clicked a malicious website link, which triggered an automatic download of an executable file.

Of course, this wasn’t a typical phishing email. It was more insidious and likely disguised, but once executed, the malware scanned for critical crypto-related information, used keyloggers to glean passwords and private keys. After that, it automated the transfer of the data to the hacker.

According to popular claims, such poisoning scams are currently mostly effective on computers on which private keys and sensitive data are stored, rather than iPhones. But since the investigation is still ongoing, everything remains speculation at this point.

The founder, who goes by @evilcosuser on X, claims that real poisoning attacks are not as complex or advanced, reassuring everyone that there is no need to panic.

Upbit hack headlined exploits in November

The attack on Babur is one of the most recent attacks on the cryptocurrency industry. Last month on the 27th, South Korean cryptocurrency exchange Upbit reportedly had $30 million worth of assets stolen from its Solana wallet due to a security weakness, which led to the theft of Official Trump, USD Coin, BONK, and other tokens. And as in Babur’s case, the weakness enabled private key inference.

All digital asset transactions were halted following the incident, which many suspect may have been conducted by the North Korean hacking collective Lazarus Group.

“This breach is a direct result of Upbit’s inadequate security management, and there is no room for excuses. Upbit, which prioritizes member protection, promises that no damage will occur to member assets,” said Dunamu CEO Oh Kyung-seok, who reassured users that the private key vulnerability has since been fixed.

Upbit intends to leverage its assets to convert customer losses due to the breach and has already commenced an extensive security system review and wallet system restructuring that has seen the exchange tear down its entire deposit address system and rebuild from scratch.

According to the exchange, the purge is part of a broader hardening of its wallet infrastructure after the hack revealed lingering vulnerabilities. Now, all users — across every asset and every network — are required to generate new addresses before depositing again.

The company said the decision was meant to eliminate any compromised keys or undiscovered vulnerabilities that remain in circulation. South Korea’s Financial Supervisory Service (FSS) is monitoring the process as part of its ongoing inspection.

Sharpen your strategy with mentorship + daily ideas - 30 days free access to our trading program

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access

Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access

The post Maryland Man Sentenced for Allegedly Aiding North Korea’s US Company Infiltration and Sensitive Data Access appeared on BitcoinEthereumNews.com. North Korea’s IT workers infiltrated US companies through a Maryland man’s scheme, earning over $970,000 while enabling access to sensitive government systems. This operation supported the regime’s cyber activities, including crypto hacks that stole $2 billion in 2025, funding nuclear programs. Minh Phuong Ngoc Vong sentenced to 15 months in prison for aiding North Korean infiltration. He used fake credentials to secure jobs at 13 US firms, passing work to overseas conspirators. North Korea stole $2 billion in crypto in 2025 via hacks, totaling over $6 billion recently, per blockchain analytics firm Elliptic. Discover how North Korea’s IT infiltration and crypto hacking schemes threaten US security. Learn the details of the Maryland case and regime’s $6B theft. Stay informed on cybersecurity risks today. What is North Korea’s IT Infiltration Scheme in US Companies? North Korea’s IT infiltration scheme involves covertly placing regime-affiliated workers into US companies using fake identities to generate revenue and access sensitive systems. In a recent Maryland case, Minh Phuong Ngoc Vong was sentenced to 15 months in prison and three years of supervised release for facilitating this for three years across 13 companies. The operation netted over $970,000, much of which funded North Korea’s weapons programs through software work performed by overseas actors, including those in China near the border. How Does North Korea Use Crypto Hacking to Fund Its Programs? North Korea employs sophisticated cyber groups to target cryptocurrency exchanges and wallets, stealing digital assets that convert to fiat for regime funding. According to blockchain analytics firm Elliptic, these groups pilfered approximately $2 billion in cryptocurrencies in 2025 alone, contributing to a total exceeding $6 billion in recent years from hacks on platforms like Bybit and Upbit. This influx directly supports nuclear and missile development, as confirmed by US intelligence assessments. Experts note the regime’s…
Share
BitcoinEthereumNews2025/12/06 09:12