Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      The Value-Driven AI Roadmap

      September 9, 2025

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025

      Is Lenovo’s refreshed LOQ tower enough to compete? New OLED monitors raise the stakes at IFA 2025

      September 10, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025
      Recent

      External Forces Reshaping Financial Services in 2025 and Beyond

      September 10, 2025

      Why It’s Time to Move from SharePoint On-Premises to SharePoint Online

      September 10, 2025

      Apple’s Big Move: The Future of Mobile

      September 10, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025
      Recent

      Lenovo Legion Go 2 specs unveiled: The handheld gaming device to watch this October

      September 10, 2025

      As Windows 10 support ends, users weigh costly extended security program against upgrading to Windows 11

      September 10, 2025

      Lenovo’s Legion Glasses 2 update could change handheld gaming

      September 10, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»After $44M Cyberattack, CoinDCX Seeks Help Through Bounty Program

    After $44M Cyberattack, CoinDCX Seeks Help Through Bounty Program

    July 23, 2025

    CoinDCX Cyberattack

    India’s cryptocurrency exchange, CoinDCX, after confirming a cyberattack that resulted in a loss of approximately $44 million from its internal operational account, has now launched the CoinDCX Recovery Bounty Program. The initiative aims not only to recover the stolen funds but also to identify and ensure legal action against the individuals responsible for the CoinDCX cyberattack.

    The cyberattack on CoinDCX, which occurred on July 19, 2025, specifically targeted an internal operational account used for liquidity provisioning on a partner exchange. According to CoinDCX, no customer funds were compromised during the incident. All user assets remain secure in cold wallets with multi-layered custody and offline security controls.

    CoinDCX Recovery Bounty Program Launched

    In an official statement, CoinDCX said the Recovery Bounty Program is an effort to unite the Web3 ecosystem against cyber threats. “Cybercrime is an attack on trust. And when one of us is targeted, all of us feel it,” the company said, adding that the attack was not just about stolen assets, but about the principles of “freedom, transparency and trust” that Web3 aims to uphold.

    “We are not doing this to chase what was lost –we’re doing this to protect what still can be saved: our collective trust,” the company emphasized. “This bounty is not a cry for help – it’s a stand for the future. If this can happen to us, it can happen to anyone.”

    The CoinDCX Recovery Bounty Program bounty program offers up to 25% of any recovered funds, with the maximum potential reward pool reaching $11 million, depending on full recovery. The reward will be given to individuals or teams who can provide actionable intelligence that leads not just to fund recovery, but also to the identification and legal prosecution of the attackers.

    Recovery Program Details

    The CoinDCX Recovery Bounty Program is open to ethical hackers, white-hat researchers, and cybersecurity professionals committed to enhancing digital asset safety. Key details include:

    • Reward: Up to 25% of all successfully recovered funds
    • Maximum Pool: $11 million if full recovery is achieved
    • Objective: Obtain actionable intelligence that leads to fund recovery, identification, and legal resolution

    Those interested in contributing can reach out via bountyprogram@coindcx.com. CoinDCX has stated that every credible lead will be evaluated fairly and transparently.

    CoinDCX Cyberattack: What Happened?

    CoinDCX revealed that the cyberattack involved a server breach that compromised an internal account used only for operational purposes. As soon as the breach was detected, the affected systems were isolated, and the attack was contained. The company also reassured users that its wallet infrastructure was not affected in CoinDCX cyberattack, as the design separates customer assets from operational accounts.

    The financial impact was absorbed entirely through CoinDCX’s treasury reserves, which the company claims were maintained precisely for handling such incidents.

    “We want to be upfront – the loss was from our own treasury, and we’ve already absorbed it through our reserves. CoinDCX remains financially strong and fully operational,” the statement read.

    Strengthening Security and Oversight

    Even though no customer assets were touched, CoinDCX has initiated a comprehensive review of its infrastructure. “We’ve gone deeper – tightening security and redesigning parts of our infrastructure to ensure this never happens again,” the company noted.

    The firm has informed India’s national cybersecurity agency CERT-In and is actively working with two globally reputed cybersecurity firms to conduct in-depth forensic investigations. CoinDCX also stated it would make public the investigation findings to help the larger crypto community understand the nature of the attack and improve their own defenses.

    The company is also collaborating with blockchain forensics firms and partners to trace the attacker’s movements across digital wallets and exchanges. All regulatory obligations are reportedly being fulfilled, and CoinDCX has committed to full cooperation with authorities throughout the investigation and recovery process.

    Operational Continuity

    Despite the CoinDCX cyberattack, Company’s trading platform remains fully functional. Users can continue to perform trades, deposit INR, and make withdrawals without interruption.

    INR withdrawals below ₹5 lakhs are being processed within five hours, while amounts above ₹5 lakhs are being cleared within 72 hours.

    The company reassured users that it maintains a segregated reserve system specifically designed to handle unexpected losses without affecting customer operations.

    Conclusion

    While CoinDCX has been applauded for its transparency and quick response, the breach highlights the persistent and evolving nature of cyber risks in the crypto space.

    The exchange’s candid admission that “this could happen to anyone” signals a call for collective resilience and reform. It is believed that more firms will begin investing in proactive cybersecurity frameworks, better internal controls, and faster incident response strategies following this breach.

    “This is not just about CoinDCX, it’s about protecting the integrity of the wider Crypto ecosystem,” the company stressed. “We’re leveraging every available legal, technical, and investigative channel to ensure accountability and reinforce security across the board.”

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleHongkong Post Cyberattack Exposes User Data in EC-Ship Breach
    Next Article CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks

    Related Posts

    Development

    How AI is Redefining Traditional GCC Cost Models for Peak Efficiency

    September 10, 2025
    Development

    How to Automate API Documentation Updates with GitHub Actions and OpenAPI Specifications

    September 10, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    This comfy mesh office chair I’ve been testing costs less than $400 — but there’s a worthy alternative that’s far more affordable

    News & Updates

    Apple Patches Safari Vulnerability Also Exploited as Zero-Day in Google Chrome

    Development

    CVE-2025-5349 – Citrix NetScaler ADC Unauthenticated Remote Code Execution Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Microsoft confirms Windows 11 August 2025 Update issues, rolls out emergency fix

    Operating Systems

    Highlights

    Tech & Work

    From Line To Layout: How Past Experiences Shape Your Design Career

    August 13, 2025

    Design career origin stories often sound clean and linear: a degree in Fine Arts, a…

    How to Thrive as a Global Business Professional in 2025

    May 30, 2025

    Emblem – generate project avatars

    August 15, 2025

    CVE-2023-44755 – Sacco Management System SQL Injection

    April 22, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.