On November 11th, BeosinAlert tweeted that hackers on the Poloniex exchange were still engaged in ongoing theft. According to the latest data, the hacker has exchanged the stolen tokens for over $30 million on ETH and over $20 million on TRX
On November 11th, BeosinAlert tweeted that hackers on the Poloniex exchange were still engaged in ongoing theft. According to the latest data, the hacker has exchanged the stolen tokens for over $30 million on ETH and over $20 million on TRX. These funds have been transferred to multiple addresses, causing high market attention.
Since the Poloniex exchange was hacked earlier this year, this issue has been troubling the well-known cryptocurrency exchange. Although Poloniex took a series of measures afterwards to protect user assets, hackers were still able to exploit loopholes in the exchange to steal tokens.
This hacker attack incident once again reminds us that cryptocurrency exchanges need to strengthen their own security measures when facing complex technical challenges and malicious attacks. At the same time, users also need to be vigilant and protect their assets.
Ethereum and Wave Field are the two giants in the cryptocurrency market, and their value is constantly increasing, but they have also become the main targets of hacker attacks. This incident has had a negative impact on the reputation and user trust of these two platforms.
Poloniex hackers exchanged the stolen tokens on Ethereum and Wave Field, indicating that these tokens may have come from some well-known projects. This has raised doubts about the security of these projects and also reminded investors to be more cautious when choosing cryptocurrency projects.
With the continuous development of the cryptocurrency market, hacker attacks are also gradually increasing. This not only puts forward higher requirements for the exchange and project parties, but also requires the entire community to work together to strengthen security measures and improve the security and credibility of cryptocurrencies# Digital currency#
Disclaimer: The content of this article is sourced from the internet. The copyright of the text, images, and other materials belongs to the original author. The platform reprints the materials for the purpose of conveying more information. The content of the article is for reference and learning only, and should not be used for commercial purposes. If it infringes on your legitimate rights and interests, please contact us promptly and we will handle it as soon as possible! We respect copyright and are committed to protecting it. Thank you for sharing.(Email:[email protected])