🌕 Gate Square · Creator Incentive Program Day 8 Topic– #XRP ETF Goes Live# !
Share trending topic posts, and split $5,000 in prizes! 🎁
👉 Check details & join: https://www.gate.com/campaigns/1953
💝 New users: Post for the first time and complete the interaction tasks to share $600 newcomer pool!
🔥 Day 8 Hot Topic: XRP ETF Goes Live
REX-Osprey XRP ETF (XRPR) to Launch This Week! XRPR will be the first spot ETF tracking the performance of the world’s third-largest cryptocurrency, XRP, launched by REX-Osprey (also the team behind SSK). According to Bloomberg Senior ETF Analyst Eric Balchunas,
Deep-Fake Zoom Call Leads to $1.35 Million Crypto Heist
In a chilling example of advanced cybercrime, the founder of THORChain and Vultisig, known as @jpthor, has reportedly lost $1.35 million in a sophisticated crypto hack involving a deep-fake Zoom call. The incident was exposed by Ledger's Chief Technology Officer, Charles Guillemet, who highlighted the hack as a critical warning for the entire cryptocurrency community. The attack began when a scammer, after compromising a friend's Telegram account, sent a malicious Zoom link for what appeared to be a genuine conference call.
The Mechanics of the Attack
The Zoom call itself was a deep-fake, an AI-generated imitation. The scammer's primary objective was to steal the victim's private keys, which were unfortunately stored in his iCloud Keychain. This gave the hackers a direct path to an old Metamask software wallet holding the crypto. The CTO of Ledger emphasized a crucial point about the hack: the victim did not need to sign any malicious transaction. The malware simply stole the private keys, demonstrating the extreme vulnerability of storing significant digital assets in software wallets. Guillemet's message to the crypto world was stark and clear: storing assets on a software wallet is a matter of "when, not if, you will be drained."
A Critical Security Reminder
The incident serves as a stark reminder of the evolving threats in the digital asset space. The use of deep-fake technology and the targeting of personal digital storage systems like iCloud Keychain represents a new level of sophistication for cybercriminals, possibly from groups in North Korea. Experts are reiterating the paramount importance of using hardware wallets, which keep private keys offline and physically separate from internet-connected devices, to protect digital assets from such advanced threats.