Hackers Steal $100m From Japanese Cryptocurrency Exchange

Leading Japanese crypto currency exchange Liquid has been hit by hackers, with almost $100m (£73m) estimated to have been stolen, making this the second known major crypto currency theft in August 2021. 

The company announced that some of its digital currency wallets have been compromised."We are sorry to announce that #LiquidGlobal warm wallets were compromised, we are moving assets into the cold wallet," the company said on Twitter. 

The theft comes just a few days after one of the biggest ever crypto currency thefts  in which hackers stole over  $600m in crypto currencies and tokens 

The anonymous hacker, dubbed ‘Mr White Hat’ by the Poly Network team managed to steal $614 million in digital coins.  That hack is considered the largest known theft of crypto currency to date and there seems to be little the Poly Network team can do except request the hacker to return the stolen coins peacefully. After returning a portion of the funds, the hacker is now refusing to cooperate further with the Poly Network.

So-called 'warm' or 'hot' digital wallets are usually based online and designed to allow users to access their crypto currencies more easily, while 'cold' wallets are offline and harder to access and therefore usually more secure. 

Blockchain analytics firm Elliptic said its analysis showed that around $97m in crypto currencies had been taken, with Bitcoin and Ethereum tokens amongst the haul.

Liquid has said that it was tracing the movement of the stolen crypto currencies and working with other exchanges to freeze and recover the assets.

Liquid operates in over 100 countries and serves millions of customers around the world and is is one of the world's top 20 biggest crypto currency exchanges by daily trading volumes. Liquid is not the only Japanese crypto currency platform to be hit by a major theft. In 2014, Tokyo-based exchange MtGox was taken down when almost half a billion dollars of bitcoin was taken.

Business Insider:      FBCNews:   DigitFYI:     LatestLY:       Dhaka Tribune:       Zee5:       BBC

You Might Also Read:

Standing On The Cryptocurrency Frontier:

 

« Urgent Action By Microsoft To Protect Cloud Users
China Has A 3-Year Plan For Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

FT Cyber Resilience Summit: Europe

FT Cyber Resilience Summit: Europe

27 November 2024 | In-Person & Digital | 22 Bishopsgate, London. Business leaders, Innovators & Experts address evolving cybersecurity risks.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Clearpath Solutions Group

Clearpath Solutions Group

Clearpath Solutions Group expertise covers virtualization and data storage technologies, networking, security and cloud computing.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Cybersecurity Innovation Hub

Cybersecurity Innovation Hub

The main objective of the Hub is to bring cybersecurity and other advanced technologies closer to companies and as a result help to increase their performance as Industry 4.0.

Moxa

Moxa

Moxa is a leading provider of industrial networking, computing, and automation solutions for enabling the Industrial Internet of Things.

Asset Guardian Solutions (AGSL)

Asset Guardian Solutions (AGSL)

Asset Guardian are dedicated to protecting the integrity of process control systems software that is used to control operations and production processes.

Cloudsine

Cloudsine

Cloudsine (formerly Banff Cyber Technologies) is a cloud technology company specializing in cloud adoption, security and innovation.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.

Intrinium

Intrinium

Intrinium is an Information Technology and Security Solutions company, providing comprehensive consulting and managed services to businesses of all sizes.

CY4GATE

CY4GATE

CY4GATE was conceived to design, develop and produce technologies and products that are able to meet the most stringent and modern requirements of Cyber Intelligence & Cyber Security.

Kordia

Kordia

Kordia is a leading provider of mission-critical technology solutions throughout Australasia. We have the most comprehensive cyber security offering in New Zealand.

Alkira

Alkira

Alkira has reinvented networking for the cloud era by delivering the network cloud, the first global unified network infrastructure with on-demand hybrid and multi-cloud connectivity.

LBMC

LBMC

LBMC is a professional services solutions provider in accounting and finance, human resources, technology, risk and information security, and wealth advisory services.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Siometrix

Siometrix

Siometrix addresses digital identity fraud. It steals your attacker's time and prevents many prevalent attack vectors.