Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      June 1, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      June 1, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      June 1, 2025

      How To Prevent WordPress SQL Injection Attacks

      June 1, 2025

      7 MagSafe accessories that I recommend every iPhone user should have

      June 1, 2025

      I replaced my Kindle with an iPad Mini as my ebook reader – 8 reasons why I don’t regret it

      June 1, 2025

      Windows 11 version 25H2: Everything you need to know about Microsoft’s next OS release

      May 31, 2025

      Elden Ring Nightreign already has a duos Seamless Co-op mod from the creator of the beloved original, and it’ll be “expanded on in the future”

      May 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Student Record Android App using SQLite

      June 1, 2025
      Recent

      Student Record Android App using SQLite

      June 1, 2025

      When Array uses less memory than Uint8Array (in V8)

      June 1, 2025

      Laravel 12 Starter Kits: Definite Guide Which to Choose

      June 1, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025
      Recent

      Photobooth is photobooth software for the Raspberry Pi and PC

      June 1, 2025

      Le notizie minori del mondo GNU/Linux e dintorni della settimana nr 22/2025

      June 1, 2025

      Rilasciata PorteuX 2.1: Novità e Approfondimenti sulla Distribuzione GNU/Linux Portatile Basata su Slackware

      June 1, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Crypto Exchange Phemex Hit By $85 Million Hack

    Crypto Exchange Phemex Hit By $85 Million Hack

    January 28, 2025

    Phemex crypto hack

    A sophisticated threat actor drained more than $85 million in cryptocurrency last week from crypto exchange Phemex, according to multiple sources.

    While initial loss estimates for the January 23 breach were $29 million, by the end of the weekend those estimates grew to just over $85 million.

    While a suspected threat actor hasn’t been named in the Phemex hack, there has been speculation that the sophisticated hack could be the work of North Korea-linked hackers, who by one estimate accounted for 61% of the $2.2 billion in crypto funds stolen last year. North Korea-linked threat actors were allegedly behind such massive attacks as the May 2024 $308 million DMM breach, among other crypto heists.

    Phemex Provides Account of Crypto Hack

    Phemex published an account of the security incident on January 26, noting that after the hot wallet attack, “”we immediately took emergency measures, temporarily suspended deposits and withdrawals, and formulated a follow-up plan.”

    Affected devices were identified and isolated, and the exchange reported the incident to third-party security firms and law enforcement.

    The Singapore-based exchange said it “has sufficient asset reserves, and user funds are always safe.” The company released a Proof of Reserves (POR) “to ensure full transparency of our financial status.”

    After security updates, “Our new system is now live and routinely monitored by our cybersecurity partner, with significant improvements in security and reliability. All operations have been gradually restored, and we ensure the absolute safety of user assets. … We will continue to optimize our system to prevent such incidents from happening in the future.”

    ‘Sophistication of Threat Actor’

    In a January 23 post on X (formerly Twitter), Phemex CEO Federico Variola said the company was restoring its systems slowly because of the “the sophistication of the threat actor.”

    “[W]e are currently carefully testing our system to reprise withdrawals as soon as possible,” Variola wrote. “Due to the sophistication of the threat actor we cannot rush this stage.”

    Taylor Monahan of crypto wallet firm MetaMask told The Block that the heist appeared to be carried out by “a group of threat actors who have done this many times before.”

    “In this case, we see a massive amount of distinct assets drained simultaneously across a multitude of chains,” Monahan was quoted as saying. “The tokens are then immediately swapped for the native asset, starting with the freezable stablecoins and then working down the list by value.”

    The attack has raised interest in “offchain transaction validation,” an emerging blockchain simulation and validation security solution from Web3 security firm Cyvers, reports Cointelegraph. The technology could prevent 99% of crypto hacks, the company claims – including last year’s $230 million WazirX hack.

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleThe Ditto MongoDB Connector: Seamlessly Sync Edge and Cloud Data
    Next Article DeepSeek Claims ‘Malicious Attacks’ After AI Breakthrough Upends NVIDIA, Broadcom

    Related Posts

    Artificial Intelligence

    Markus Buehler receives 2025 Washington Award

    June 1, 2025
    Artificial Intelligence

    LWiAI Podcast #201 – GPT 4.5, Sonnet 3.7, Grok 3, Phi 4

    June 1, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    CVE-2025-4179 – Flynax Bridge WordPress Privilege Escalation

    Common Vulnerabilities and Exposures (CVEs)

    Grok 3 AI is now free to all X users – here’s how it works

    News & Updates

    Anthropic updates Claude with new features to improve collaboration

    Development

    Laravel SpaceOCR: Parse Images and Multi-page PDFs in Laravel

    Development
    Hostinger

    Highlights

    CVE-2025-4405 – WordPress Hot Random Image Stored Cross-Site Scripting Vulnerability

    May 22, 2025

    CVE ID : CVE-2025-4405

    Published : May 22, 2025, 10:15 a.m. | 1 hour, 52 minutes ago

    Description : The Hot Random Image plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘link’ parameter in all versions up to, and including, 1.9.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

    Severity: 4.9 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Epic Games and Qualcomm are teaming up to solve one of the biggest roadblocks to gaming on Snapdragon X PCs

    March 16, 2025

    Chinese Hackers ‘Mustang Panda’ Target Vietnamese Entities in Sophisticated Cyber Espionage Campaigns

    June 11, 2024

    Patching Vulnerabilities Faster Reduces Risks & Lower Cyber Risk Index

    April 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.