Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Designing Better UX For Left-Handed People

      July 25, 2025

      This week in AI dev tools: Gemini 2.5 Flash-Lite, GitLab Duo Agent Platform beta, and more (July 25, 2025)

      July 25, 2025

      Tenable updates Vulnerability Priority Rating scoring method to flag fewer vulnerabilities as critical

      July 24, 2025

      Google adds updated workspace templates in Firebase Studio that leverage new Agent mode

      July 24, 2025

      I ran with the Apple Watch and Samsung Watch 8 – here’s the better AI coach

      July 26, 2025

      8 smart home gadgets that instantly upgraded my house (and why they work)

      July 26, 2025

      I tested Panasonic’s new affordable LED TV model – here’s my brutally honest buying advice

      July 26, 2025

      OpenAI teases imminent GPT-5 launch. Here’s what to expect

      July 26, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      NativePHP Is Entering Its Next Phase

      July 26, 2025
      Recent

      NativePHP Is Entering Its Next Phase

      July 26, 2025

      Medical Card Generator Android App Project Using SQLite

      July 26, 2025

      The details of TC39’s last meeting

      July 26, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Elden Ring Nightreign’s Patch 1.02 update next week is adding a feature we’ve all been waiting for since launch — and another I’ve been begging for, too

      July 26, 2025
      Recent

      Elden Ring Nightreign’s Patch 1.02 update next week is adding a feature we’ve all been waiting for since launch — and another I’ve been begging for, too

      July 26, 2025

      The next time you look at Microsoft Copilot, it may look back — but who asked for this?

      July 26, 2025

      5 Open Source Apps You Can use for Seamless File Transfer Between Linux and Android

      July 26, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»After $44M Cyberattack, CoinDCX Seeks Help Through Bounty Program

    After $44M Cyberattack, CoinDCX Seeks Help Through Bounty Program

    July 23, 2025

    CoinDCX Cyberattack

    India’s cryptocurrency exchange, CoinDCX, after confirming a cyberattack that resulted in a loss of approximately $44 million from its internal operational account, has now launched the CoinDCX Recovery Bounty Program. The initiative aims not only to recover the stolen funds but also to identify and ensure legal action against the individuals responsible for the CoinDCX cyberattack.

    The cyberattack on CoinDCX, which occurred on July 19, 2025, specifically targeted an internal operational account used for liquidity provisioning on a partner exchange. According to CoinDCX, no customer funds were compromised during the incident. All user assets remain secure in cold wallets with multi-layered custody and offline security controls.

    CoinDCX Recovery Bounty Program Launched

    In an official statement, CoinDCX said the Recovery Bounty Program is an effort to unite the Web3 ecosystem against cyber threats. “Cybercrime is an attack on trust. And when one of us is targeted, all of us feel it,” the company said, adding that the attack was not just about stolen assets, but about the principles of “freedom, transparency and trust” that Web3 aims to uphold.

    “We are not doing this to chase what was lost –we’re doing this to protect what still can be saved: our collective trust,” the company emphasized. “This bounty is not a cry for help – it’s a stand for the future. If this can happen to us, it can happen to anyone.”

    The CoinDCX Recovery Bounty Program bounty program offers up to 25% of any recovered funds, with the maximum potential reward pool reaching $11 million, depending on full recovery. The reward will be given to individuals or teams who can provide actionable intelligence that leads not just to fund recovery, but also to the identification and legal prosecution of the attackers.

    Recovery Program Details

    The CoinDCX Recovery Bounty Program is open to ethical hackers, white-hat researchers, and cybersecurity professionals committed to enhancing digital asset safety. Key details include:

    • Reward: Up to 25% of all successfully recovered funds
    • Maximum Pool: $11 million if full recovery is achieved
    • Objective: Obtain actionable intelligence that leads to fund recovery, identification, and legal resolution

    Those interested in contributing can reach out via bountyprogram@coindcx.com. CoinDCX has stated that every credible lead will be evaluated fairly and transparently.

    CoinDCX Cyberattack: What Happened?

    CoinDCX revealed that the cyberattack involved a server breach that compromised an internal account used only for operational purposes. As soon as the breach was detected, the affected systems were isolated, and the attack was contained. The company also reassured users that its wallet infrastructure was not affected in CoinDCX cyberattack, as the design separates customer assets from operational accounts.

    The financial impact was absorbed entirely through CoinDCX’s treasury reserves, which the company claims were maintained precisely for handling such incidents.

    “We want to be upfront – the loss was from our own treasury, and we’ve already absorbed it through our reserves. CoinDCX remains financially strong and fully operational,” the statement read.

    Strengthening Security and Oversight

    Even though no customer assets were touched, CoinDCX has initiated a comprehensive review of its infrastructure. “We’ve gone deeper – tightening security and redesigning parts of our infrastructure to ensure this never happens again,” the company noted.

    The firm has informed India’s national cybersecurity agency CERT-In and is actively working with two globally reputed cybersecurity firms to conduct in-depth forensic investigations. CoinDCX also stated it would make public the investigation findings to help the larger crypto community understand the nature of the attack and improve their own defenses.

    The company is also collaborating with blockchain forensics firms and partners to trace the attacker’s movements across digital wallets and exchanges. All regulatory obligations are reportedly being fulfilled, and CoinDCX has committed to full cooperation with authorities throughout the investigation and recovery process.

    Operational Continuity

    Despite the CoinDCX cyberattack, Company’s trading platform remains fully functional. Users can continue to perform trades, deposit INR, and make withdrawals without interruption.

    INR withdrawals below ₹5 lakhs are being processed within five hours, while amounts above ₹5 lakhs are being cleared within 72 hours.

    The company reassured users that it maintains a segregated reserve system specifically designed to handle unexpected losses without affecting customer operations.

    Conclusion

    While CoinDCX has been applauded for its transparency and quick response, the breach highlights the persistent and evolving nature of cyber risks in the crypto space.

    The exchange’s candid admission that “this could happen to anyone” signals a call for collective resilience and reform. It is believed that more firms will begin investing in proactive cybersecurity frameworks, better internal controls, and faster incident response strategies following this breach.

    “This is not just about CoinDCX, it’s about protecting the integrity of the wider Crypto ecosystem,” the company stressed. “We’re leveraging every available legal, technical, and investigative channel to ensure accountability and reinforce security across the board.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHongkong Post Cyberattack Exposes User Data in EC-Ship Breach
    Next Article CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

    Related Posts

    Development

    NativePHP Is Entering Its Next Phase

    July 26, 2025
    Artificial Intelligence

    Scaling Up Reinforcement Learning for Traffic Smoothing: A 100-AV Highway Deployment

    July 26, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Linux has over 6% of the desktop market? Yes, you read that right – here’s how

    News & Updates

    Taking the “training wheels” off clean energy

    Artificial Intelligence

    Website Design Services in Bangalore from Bookspotz Led by Digital Marketing Legend Srinidhi Ranganathan

    Artificial Intelligence

    Kritieke beveiligingslekken in forumsoftware vBulletin actief misbruikt

    Security

    Highlights

    Development

    Understanding Vulnerabilities and Exploits for Ethical Hackers

    April 4, 2025

    Understanding vulnerabilities and exploits is crucial for anyone interested in cybersecurity. Let’s learn what they…

    Drop into Verdansk with the hottest new accessories from the Corsair and Call of Duty crossover’s new Warzone line

    April 14, 2025

    Editing client-side encrypted MS Word file now works in Google Docs

    May 21, 2025

    CVE-2025-30328 – Animate Out-of-Bounds Write Arbitrary Code Execution Vulnerability

    May 13, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.