Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Delhi Police Crack Down on WazirX Crypto Heist, Arrest Bengal Man for ₹2,000 Crore Theft

    Delhi Police Crack Down on WazirX Crypto Heist, Arrest Bengal Man for ₹2,000 Crore Theft

    November 15, 2024

    WazirX cyberattack

    Delhi Police have arrested a key suspect, SK Masud Alam, a resident of East Midnapore in West Bengal for a massive WazirX cyberattack. Alam is accused of being involved in the WazirX crypto heist, a high-profile cyberattack that saw the theft of over ₹2,000 crore (approximately $230 million) worth of digital assets.  

    The WazirX cyberattack, which occurred on July 18, 2023, targeted WazirX’s hot wallet, and investigators believe the cybercriminals also attempted to breach the platform’s more secure cold wallet. WazirX, a popular cryptocurrency exchange in India, allows users to trade a range of digital currencies, including Bitcoin, Ethereum, and its native token WRX. 

     The platform has become a major player in the Indian crypto market since its launch in 2018, and the breach has raised concerns about the security of cryptocurrency exchanges globally. 

    How the WazirX Cyberattack Unfolded 

    According to the Delhi Police’s investigation, Alam allegedly created a WazirX account under the false identity of “Souvik Mondal.” He then sold the account to another individual, M Hasan, via Telegram. Hasan, using this compromised account, is believed to have gained access to the WazirX platform and initiated the cyberattack, which resulted in the theft of the digital assets, reported IndiaToday. 

    The stolen assets were primarily stored in WazirX’s hot wallet, an online storage wallet that is more vulnerable to cyberattacks due to its constant connectivity. Following this breach, the cybercriminals attempted to access WazirX’s cold wallet—an offline storage solution that provides additional security against hacking attempts. Fortunately, the attack on the cold wallet was unsuccessful. However, the breach of the hot wallet led to the loss of nearly 45% of WazirX’s assets at the time. 

    The Role of Liminal Custody in the Crypto Heist 

    One of the most puzzling aspects of the investigation involves Liminal Custody, a digital asset custody solutions firm that was responsible for securing WazirX’s wallets. Despite multiple notices from the Delhi Police, Liminal Custody allegedly failed to provide critical information required for the investigation. This has raised serious concerns about the company’s security practices and its role in the cyberattack on WazirX. 

    The chargesheet filed by the Delhi Police highlights Liminal’s lack of cooperation, which has hindered efforts to fully trace the cybercriminals behind the WazirX crypto heist. As the investigation continues, authorities have stated that they will address Liminal’s involvement in a supplementary chargesheet. The investigation into the crypto heist on WazirX is still ongoing, with the police working to uncover the full scope of the breach and identify other potential individuals involved in the operation. 

    Seizures and Investigations 

    In their investigation, Delhi Police have seized three laptops from WazirX, which were used by authorized signatories for approving transactions through multi-sig wallets. Multi-sig wallets require multiple keys for transaction approval, which adds an extra layer of security to crypto exchanges. The seized laptops are expected to provide crucial data that could help trace the stolen funds and further uncover the individuals responsible for the attack. 

    WazirX has reportedly fully cooperated with the investigation, providing authorities with essential data such as KYC (Know Your Customer) details, transaction logs, and other relevant information to track the movement of the stolen funds. Despite the scale of the attack and the difficulties posed by the lack of cooperation from Liminal Custody, the police are determined to bring the criminals behind the WazirX cyberattack to justice. 

    The Aftermath of the WazirX Cyberattack 

    The WazirX crypto heist has exposed several vulnerabilities in the way cryptocurrency exchanges manage and secure user assets. While WazirX’s swift cooperation with authorities has been noted, the breach has raised broader concerns about the security protocols employed by digital asset exchanges. In particular, the role of third-party custody firms like Liminal Custody is under scrutiny, as their failure to comply with police requests has made it harder for investigators to get to the bottom of the incident. 

    The attack has not only affected WazirX but has also sent a warning signal to the broader cryptocurrency industry. Experts have called for stricter security measures and greater transparency in the management of digital asset exchanges. As the investigation into the WazirX cyberattack continues, the focus is now on uncovering the full extent of the heist and identifying any other potential suspects. 

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous Article5 BCDR Oversights That Leave You Exposed to Ransomware
    Next Article TikTok Pixel Privacy Nightmare: A New Case Study

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Hostinger

    Continue Reading

    Simple ReFlow: Improved Techniques for Fast Flow Models

    Machine Learning

    15+ Free Branding Identity Templates for InDesign

    Development

    Five Families Back? Ransomware Group Claims Attacks on UAE Entities

    Development

    Scientists accelerate the search for Parkinson’s treatments using AI

    Artificial Intelligence

    Highlights

    Development

    TensorOpera AI Releases Fox-1: A Series of Small Language Models (SLMs) that Includes Fox-1-1.6B and Fox-1-1.6B-Instruct-v0.1

    November 12, 2024

    Recent advancements in large language models (LLMs) have demonstrated significant capabilities in a wide range…

    Overcoming Gradient Inversion Challenges in Federated Learning: The DAGER Algorithm for Exact Text Reconstruction

    May 28, 2024

    Music AI Sandbox, now with new features and broader access

    April 24, 2025

    CVE-2025-4455 – Patch My PC Home Updater DLL Search Path Manipulation Vulnerability

    May 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.