steal

Infini accuses its engineer of being addicted to gambling or stealing 50 million dollars

ChainCatcher message, according to reports from Wu, monitored by Etherscan, the Infini Team sent an on-chain message to Infini Exploiter 2: 0xfc...6e49, attaching court litigation documents via a link. The specific content is as follows:The plaintiff is Chou Christian-Long, the CEO of BP SG Investment Holding Limited, a Hong Kong registered company wholly owned by Infini Labs. The first defendant is Chen Shanxuan, who works remotely in Foshan, Guangdong, and the identities of the second to fourth defendants are temporarily unconfirmed.The plaintiff, along with BP Singapore, developed a smart contract for managing company and client funds, led by the first defendant. The contract was originally set up with multi-signature permissions to strictly control any fund transfers.When the contract went live on the mainnet, the first defendant allegedly retained "super admin" privileges but falsely claimed to other team members that he had "transferred" or "removed" that privilege.In late February 2025, the plaintiff discovered that approximately 49,516,662.977 USDC worth of crypto assets had been transferred to several unknown wallet addresses (controlled by the second to fourth defendants) without multi-signature approval.Fearing that the defendants or unidentified individuals would further transfer or launder the assets, the plaintiff applied to the court for:A "restraining order" against the first defendant and related unidentified individuals to restrict their transfer or disposal of the stolen assets;An order for the defendants or those actually controlling the relevant wallets to self-disclose their identities;Issuance of various mandatory orders prohibiting the disposal of assets to the first defendant and other unknown wallet holders;A request for the other party to disclose transaction and asset information;Permission for the plaintiff to "serve extraterritorially" (i.e., serve legal documents to foreign defendants) and alternative methods of service.In the body of one affidavit, the plaintiff stated: I recently learned that the first defendant has a serious gambling habit, which may have led him to incur substantial debts. I believe this prompted him to steal the assets involved in the case to alleviate his debts. The plaintiff also submitted screenshots of relevant message records to prove that the first defendant "may be in substantial debt."According to the affidavit, the first defendant borrowed funds from various sources in a relatively short period, even allegedly contacting "underground banks" or so-called "loan sharks," leading to pressure from high interest rates and debt collection calls.Exhibit "CCL-17" mentions that he sought help from others in a chat, stating that he was burdened with "interest from several lenders" and continuously asked if he could borrow more money to get through the difficulties or requested the other party to help introduce new funding sources.Shortly before the incident, the first defendant had revealed in work groups or private conversations with colleagues/friends that his financial situation was "very tight," even expressing anxiety that "if I can't get money again, something will happen."These statements almost coincide with the timing of the unauthorized transfer of the company's crypto assets, thereby reinforcing the plaintiff's judgment regarding the first defendant's "motive": possibly taking risks due to pressure from substantial debt.According to the plaintiff's statement, the first defendant repeatedly avoided or only gave vague answers when asked about personal finances or gambling issues, being unclear about how much debt he actually had or whether he was still gambling.The affidavit states that the first defendant pretended that "there was no big problem" from the end of October until the incident occurred, but the content he discussed in chat software with others was clearly contradictory to this.

The North Korean hacker group Lazarus has implanted malware for stealing cryptocurrency in a new batch of JavaScript packages

ChainCatcher news, according to Decrypt, the Socket research team has discovered in a new attack that the North Korean hacker group Lazarus is associated with six new malicious npm packages that attempt to deploy backdoors to steal user credentials.Additionally, this malware can extract cryptocurrency data and steal sensitive information from Solana and Exodus crypto wallets. The attacks primarily target files from Google Chrome, Brave, and Firefox browsers, as well as keychain data on macOS, specifically tricking developers into inadvertently installing these malicious packages.The six discovered malicious packages include: is-buffer-validator, yoojae-validator, event-handle-package, array-empty-validator, react-event-dependency, and auth-validator. They lure developers into installation through "typosquatting" (exploiting misspelled names). The APT group has created and maintained GitHub repositories for five of these packages, disguising them as legitimate open-source projects, increasing the risk of developers using the malicious code. These packages have been downloaded over 330 times. Currently, the Socket team has requested the removal of these packages and reported the related GitHub repositories and user accounts.Lazarus is a notorious North Korean hacker group, linked to the recent $1.4 billion Bybit hack, the $41 million Stake hack, the $27 million CoinEx hack, and countless other attacks in the crypto industry.

Security Company: Hackers are using fake GitHub projects to steal cryptocurrency, advising users to carefully check third-party code behavior before downloading

ChainCatcher news, according to Cointelegraph, cybersecurity company Kaspersky recently released research showing that hackers are creating hundreds of fake projects on the GitHub platform to lure users into downloading malware that steals cryptocurrency and credentials. Kaspersky has named this malware activity "GitVenom."Kaspersky analyst Georgy Kucherin pointed out in a report on February 24 that these fake projects include Telegram bots for managing Bitcoin wallets and tools for automating Instagram account interactions. Hackers carefully design project documentation, possibly using AI tools to generate content, and artificially increase the number of project "commits" to make the projects appear to be actively developed.According to Kaspersky's investigation, these malicious projects can be traced back at least two years. Regardless of how the projects are presented, they contain malicious components, such as information-stealing tools that upload saved credentials, cryptocurrency wallet data, and browsing history through Telegram, as well as clipboard hijackers that replace cryptocurrency wallet addresses. In November 2023, a user lost 5 Bitcoins (approximately $442,000) as a result. Kaspersky advises users to carefully check the behavior of third-party code before downloading.

Binance responds to "hackers stealing coins through red envelopes": Initial suspicion is that the user's device may have had malicious plugins/software installed, and it is advised to report to the police

ChainCatcher message, Binance responded to "hackers stealing coins through red envelopes" stating: "Based on the current investigation results and the information at hand, we initially suspect that the user's device may have had malicious plugins/software installed, which led to the user's email, Google Authenticator, Binance account, and other account information being sequentially stolen by hackers. The hackers simulated the user's common device and IP environment based on this, successfully passing the verification steps during the red envelope initiation process, ultimately resulting in the theft of funds.It should be noted that when users send red envelopes for payment on the Binance platform, they need to verify their payment PIN/fingerprint or Face ID/authenticator app/email. Therefore, the reason for the theft of the user's account assets through the red envelope function is due to the aforementioned personal information being stolen. It is strongly recommended that the user report this incident to the police. The Binance security risk control team will assist in providing all the information we have and, with the user's cooperation, further investigate their device to jointly identify the final cause. We also remind all users to remain vigilant, enhance their security awareness, and ensure they use secure and clean devices. Be cautious of the security risks to accounts and devices to protect personal asset safety.
ChainCatcher Building the Web3 world with innovators