Hacker

The blockchain gaming platform WEMIX suffered a hacker attack at the end of February, resulting in a loss of approximately 6.22 million dollars

ChainCatcher news, the blockchain gaming platform WEMIX under the South Korean listed gaming company Wemade disclosed a hacking incident on March 4, stating: "On February 28, 2025, approximately 8,654,860 WEMIX tokens were anomalously extracted due to a malicious external attack on Play Bridge Vault." WEMIX stated that it has taken immediate action to prevent further damage and is cooperating with law enforcement to track down the attackers. On March 13, the WEMIX Foundation executed 20 million WEMIX tokens to mitigate market impact.In addition, according to a report by Yonhap News Agency today, the loss caused by the hacking incident on February 28 amounted to approximately 9 billion won (about 6.22 million USD). The WEMIX Foundation emphasized in response to external accusations of delayed announcements that it "never had any intention or attempt to conceal the hacking incident." A representative of the WEMIX Foundation stated, "After discovering the hacking incident on February 28, we immediately shut down the affected servers and began a detailed analysis. On the same day, we submitted a complaint against the unidentified attackers to the Cyber Investigation Division of the Seoul Police Agency, and the National Investigation Agency is currently investigating. Since the method of intrusion has not yet been determined, hastily releasing an announcement could expose us to further attack risks, which is why we did not issue an immediate announcement. As most of the stolen assets have already been sold off, the market impact has already occurred, and it is difficult to ensure there are no further risks. If we had announced immediately, it could have triggered market panic."

The North Korean hacker group Lazarus has implanted malware for stealing cryptocurrency in a new batch of JavaScript packages

ChainCatcher news, according to Decrypt, the Socket research team has discovered in a new attack that the North Korean hacker group Lazarus is associated with six new malicious npm packages that attempt to deploy backdoors to steal user credentials.Additionally, this malware can extract cryptocurrency data and steal sensitive information from Solana and Exodus crypto wallets. The attacks primarily target files from Google Chrome, Brave, and Firefox browsers, as well as keychain data on macOS, specifically tricking developers into inadvertently installing these malicious packages.The six discovered malicious packages include: is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator. They lure developers into installation through "typosquatting" (exploiting misspelled names). The APT group has created and maintained GitHub repositories for five of these packages, disguising them as legitimate open-source projects, increasing the risk of developers using the malicious code. These packages have been downloaded over 330 times. Currently, the Socket team has requested the removal of these packages and reported the related GitHub repositories and user accounts.Lazarus is a notorious North Korean hacker group, linked to the recent $1.4 billion Bybit hack, the $41 million Stake hack, the $27 million CoinEx hack, and countless other attacks in the crypto industry.
ChainCatcher Building the Web3 world with innovators