Hackers Steal $100m From Japanese Cryptocurrency Exchange

Leading Japanese crypto currency exchange Liquid has been hit by hackers, with almost $100m (£73m) estimated to have been stolen, making this the second known major crypto currency theft in August 2021. 

The company announced that some of its digital currency wallets have been compromised."We are sorry to announce that #LiquidGlobal warm wallets were compromised, we are moving assets into the cold wallet," the company said on Twitter. 

The theft comes just a few days after one of the biggest ever crypto currency thefts  in which hackers stole over  $600m in crypto currencies and tokens 

The anonymous hacker, dubbed ‘Mr White Hat’ by the Poly Network team managed to steal $614 million in digital coins.  That hack is considered the largest known theft of crypto currency to date and there seems to be little the Poly Network team can do except request the hacker to return the stolen coins peacefully. After returning a portion of the funds, the hacker is now refusing to cooperate further with the Poly Network.

So-called 'warm' or 'hot' digital wallets are usually based online and designed to allow users to access their crypto currencies more easily, while 'cold' wallets are offline and harder to access and therefore usually more secure. 

Blockchain analytics firm Elliptic said its analysis showed that around $97m in crypto currencies had been taken, with Bitcoin and Ethereum tokens amongst the haul.

Liquid has said that it was tracing the movement of the stolen crypto currencies and working with other exchanges to freeze and recover the assets.

Liquid operates in over 100 countries and serves millions of customers around the world and is is one of the world's top 20 biggest crypto currency exchanges by daily trading volumes. Liquid is not the only Japanese crypto currency platform to be hit by a major theft. In 2014, Tokyo-based exchange MtGox was taken down when almost half a billion dollars of bitcoin was taken.

Business Insider:      FBCNews:   DigitFYI:     LatestLY:       Dhaka Tribune:       Zee5:       BBC

You Might Also Read:

Standing On The Cryptocurrency Frontier:

 

« Urgent Action By Microsoft To Protect Cloud Users
China Has A 3-Year Plan For Cyber Security »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Group-IB

Group-IB

Group-IB is a leading provider of solutions dedicated to detecting and preventing cyberattacks, identifying online fraud, investigating high-tech crimes, and protecting intellectual property.

HackerOne

HackerOne

HackerOne was started by hackers and security leaders who are driven by a passion to make the internet safer.

Nimbusec

Nimbusec

Nimbusec scans your website around the clock and informs immediately if it has been hacked or manipulated

Silent Breach

Silent Breach

Silent Breach specializes in network security and digital asset protection. Services include Pentesting, Security Assessments, Incident Detection & Response, Governance Risk & Compliance.

Beta Systems Software

Beta Systems Software

Beta Systems automate IT-based business processes, control access rights, monitor processes, secure the network and optimize the infrastructure management of corporate IT.

GlobalPlatform

GlobalPlatform

GlobalPlatform’s specifications are highly regarded as the international standard for enabling digital services and devices to be trusted and securely managed throughout their lifecycle.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Cyber Security Academy (CSA)

Cyber Security Academy (CSA)

The CSA aims to educate professionals who wish to contribute to strengthening the digital defensibility of states, organisations and individual citizens.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Squad

Squad

Squad provides leading expertise to ensure protection against the most complex cyber threats. Combining the best practices of DevOps and Cybersecurity, we are committed to create a secured cyber space

Talion

Talion

Talion aim to reduce the complexity involved in securing your organisation and to give security teams unrivalled visibility into their security operations, so they can make optimal decisions, fast.

PhishFirewall

PhishFirewall

PhishFirewall is an advanced AI-driven CyberSecurity Awareness Education, Threat Emulation, and Human Security Analytics Platform.

ZX Security

ZX Security

ZX Security is a New Zealand owned and operated cyber security consultancy.

Mother Technologies

Mother Technologies

From Datacentre to Desktop, Mother Technologies has been delivering IT Support, Telecoms, Cybersecurity and Connectivity services to businesses across Scotland and beyond since 2002.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.

Kaavalan

Kaavalan

Kaavalan was founded with a mission and a vision to protect you against cyber threats in the connected world.