Hackers Steal $100m From Japanese Cryptocurrency Exchange

Leading Japanese crypto currency exchange Liquid has been hit by hackers, with almost $100m (£73m) estimated to have been stolen, making this the second known major crypto currency theft in August 2021. 

The company announced that some of its digital currency wallets have been compromised."We are sorry to announce that #LiquidGlobal warm wallets were compromised, we are moving assets into the cold wallet," the company said on Twitter. 

The theft comes just a few days after one of the biggest ever crypto currency thefts  in which hackers stole over  $600m in crypto currencies and tokens 

The anonymous hacker, dubbed ‘Mr White Hat’ by the Poly Network team managed to steal $614 million in digital coins.  That hack is considered the largest known theft of crypto currency to date and there seems to be little the Poly Network team can do except request the hacker to return the stolen coins peacefully. After returning a portion of the funds, the hacker is now refusing to cooperate further with the Poly Network.

So-called 'warm' or 'hot' digital wallets are usually based online and designed to allow users to access their crypto currencies more easily, while 'cold' wallets are offline and harder to access and therefore usually more secure. 

Blockchain analytics firm Elliptic said its analysis showed that around $97m in crypto currencies had been taken, with Bitcoin and Ethereum tokens amongst the haul.

Liquid has said that it was tracing the movement of the stolen crypto currencies and working with other exchanges to freeze and recover the assets.

Liquid operates in over 100 countries and serves millions of customers around the world and is is one of the world's top 20 biggest crypto currency exchanges by daily trading volumes. Liquid is not the only Japanese crypto currency platform to be hit by a major theft. In 2014, Tokyo-based exchange MtGox was taken down when almost half a billion dollars of bitcoin was taken.

Business Insider:      FBCNews:   DigitFYI:     LatestLY:       Dhaka Tribune:       Zee5:       BBC

You Might Also Read:

Standing On The Cryptocurrency Frontier:

 

« Urgent Action By Microsoft To Protect Cloud Users
China Has A 3-Year Plan For Cyber Security »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Riverbed Technology

Riverbed Technology

The Riverbed Network and Application Performance Platform enables organizations to visualize, optimize, accelerate and remediate the performance of any network for any application.

Paessler

Paessler

Paessler is a leading worldwide provider of network monitoring software.

Security Stronghold

Security Stronghold

Security Stronghold is focused on protecting computers from malicious programs like viruses, Trojans, spyware, adware, trackware, keyloggers and other kinds of online threats.

VNT Software

VNT Software

VNT's vision is to change the way complex IT problems are resolved by predicting business disruptions before they occur.

Empiric

Empiric

Empiric is a multi-award winning technology and transformation recruitment agency specialising in data, digital, cloud and security.

LOGbinder

LOGbinder

LOGbinder eliminates blind spots in security intelligence for endpoints and applications.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Mindaro Insurance

Mindaro Insurance

Mindaro is adding the crucial piece of the cyber security puzzle that protects your organization from the financial ramifications of cyber attacks.

Red Goat Cyber Security

Red Goat Cyber Security

Red Goat Cyber Security have created excellent, informative and interactive Social Engineering Awareness training which is suitable for all levels of staff.

CyberX9

CyberX9

CyberX9 helps you protect against a wide range of cyber attacks whether you are a business or a high-net worth individual under risk.

Emerge Digital

Emerge Digital

Emerge Digital is a technology and digital innovation business and Managed Services Provider providing solutions to SMEs.

Fulcrum IT Partners

Fulcrum IT Partners

Fulcrum IT Partners is the parent company of an expanding portfolio of established IT solution companies around the world with proven expertise in cyber security, cloud, and managed services.

Leaf IT

Leaf IT

Leaf IT are a pioneering cloud-first MSP, dedicated to helping businesses in the UK and Ireland. We focus on delivering tangible results for our clients through IT transformation.

IT Solutions Consulting

IT Solutions Consulting

IT Solutions is a full-service IT partner providing managed services and other information technology solutions nationwide.

BioID

BioID

BioID are a German company offering deepfake detection, liveness detection, facial authentication & identity verification as a Service. 

Forensic IT

Forensic IT

Forensic IT is a specialised cyber security firm with expertise in Digital Forensics and Incident Response (DFIR).