Gate News: On March 18, cryptocurrency e-commerce and gift card company Bitrefill disclosed that on March 1, they experienced a cyberattack suspected to be carried out by the North Korea-backed hacking group Lazarus Group. The attack originated from a compromised employee laptop, with hackers stealing some hot wallet funds and making suspicious purchases from their vendors. The attackers also infiltrated Bitrefill’s broader infrastructure, including parts of their databases and certain cryptocurrency wallets, resulting in approximately 18,500 purchase records being accessed. Limited customer information such as email addresses, crypto payment addresses, and IP addresses was exposed. About 1,000 records containing encrypted customer names are at risk of exposure, and the company has contacted the affected individuals. Bitrefill stated that most purchases do not require KYC, and KYC-related data is only held by external providers; the company has no backups of this data. Investigations revealed that the attackers did not extract the entire database but performed limited queries to identify targets for theft, including cryptocurrency and gift card inventories. The company is covering any operational losses and is working with security teams such as zeroShadow and SEAL911. Currently, payment, inventory, and account functions have largely been restored, and sales have returned to normal.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
Scallop Protocol on Sui Hit by Flash Loan Attack, $142K Drained via Oracle Manipulation
Gate News message, April 26 — Scallop Protocol, a lending platform on the Sui blockchain, suffered a flash loan exploit targeting a deprecated side contract linked to its sSUI rewards pool, resulting in a loss of approximately $142,000 (150,000 SUI). The attack exploited oracle price feed
GateNews3h ago
22-Year-Old Sentenced to 70 Months for $263 Million Crypto Theft Money Laundering
California resident Evan Tangeman, 22, was sentenced on Friday to 70 months in federal prison for his role laundering proceeds from a multi-state cryptocurrency theft ring that stole approximately $263 million in digital assets from victims, according to the U.S. Department of Justice. U.S.
CryptoFrontier4h ago
Litecoin Suffers Deep Chain Reorganization After MWEB Privacy Layer Zero-Day Exploit
Gate News message, April 26 — Litecoin underwent a deep chain reorganization on Saturday afternoon after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, according
GateNews5h ago
Address Linked to Avi Eisenberg Shows New On-Chain Activity, Raising Security Concerns
Gate News message, April 26 — Blockchain analytics platform Arkham has identified renewed on-chain activity from an address believed to be connected to Avi Eisenberg, the attacker who profited approximately $110 million from the 2022 Mango Markets exploit. Eisenberg was previously sentenced to
GateNews7h ago
Sui DeFi lending protocol Scallop is hacked, with a vulnerability in the old contract leading to 150k SUI stolen
Scallop was attacked on the Sui chain, and the side contract involved led to the sSUI rewards pool being exploited. Approximately 150k SUI were stolen. The core contract is secure, and deposits and withdrawals have been restored. The official statement applies only to the deprecated rewards contract; users’ funds were not affected. Former NEAR developer Vadim said the vulnerability originated from an outdated V2 package from 17 months ago, where not initializing last_index caused rewards to accumulate starting in 2023. The fix requires adding a version field to the shared object and strengthening version checks to prevent risks caused by outdated packages.
ChainNewsAbmedia7h ago
Scallop Discovers sSUI Reward Pool Vulnerability, Suffers 150K SUI Loss but Pledges Full Reimbursement
Gate News message, April 26 — Scallop, a lending protocol in the Sui ecosystem, announced the discovery of a vulnerability in an auxiliary contract associated with its sSUI reward pool, resulting in a loss of approximately 150,000 SUI. The affected contract has been frozen, and Scallop confirmed
GateNews12h ago