BTCC / BTCC Square / Cryptopolitan /
Crypto user loses $27 million to hackers in a malware attack

Crypto user loses $27 million to hackers in a malware attack

Published:
2025-12-05 22:55:23
5
3

Crypto user loses $27 million to hackers in a malware attack

Malware Strikes: $27 Million Vanish in Crypto Heist

Another day, another headline—this time, a single user watches a fortune evaporate. The attack vector? Malware. The take? A cool $27 million. It's the digital equivalent of a bank vault cracking open because someone clicked the wrong link.

The Anatomy of a Takeover

Forget sophisticated blockchain exploits. This was old-school digital pickpocketing, just with a crypto twist. Malware slipped past defenses, likely through a poisoned download or a clever phishing email. Once inside, it didn't need to break encryption—it just needed to wait for the user to enter their keys. Then, it swept the wallets clean. The process is brutally simple and devastatingly effective.

Security Isn't a Feature—It's the Foundation

The incident screams a familiar warning: your crypto is only as safe as your weakest device. Hardware wallets, multi-signature setups, air-gapped machines—they're not accessories for the paranoid. They're the bare minimum for anyone holding serious value. This wasn't a protocol failure; it was a personal security failure, magnified by the irreversible nature of blockchain transactions.

A Cynical Footnote for Finance

In traditional finance, losing $27 million might trigger an investigation, insurance claims, and maybe even a government bailout. In crypto? It's a costly lesson in self-custody, a tweetstorm, and then the market moves on—barely blinking before chasing the next shiny token. The decentralized dream comes with the ultimate responsibility: be your own bank, and pray you're smarter than every hacker with a keyboard.

Crypto holder loses funds to malware attack

The blockchain security expert was able to trace some of the biggest transactions and surmised that the exploit was the result of scammers poisoning Babur’s computer after he clicked a malicious website link, which triggered an automatic download of an executable file.

Of course, this wasn’t a typical phishing email. It was more insidious and likely disguised, but once executed, the malware scanned for critical crypto-related information, used keyloggers to glean passwords and private keys. After that, it automated the transfer of the data to the hacker.

According to popular claims, such poisoning scams are currently mostly effective on computers on which private keys and sensitive data are stored, rather than iPhones. But since the investigation is still ongoing, everything remains speculation at this point.

The founder, who goes by @evilcosuser on X, claims that real poisoning attacks are not as complex or advanced, reassuring everyone that there is no need to panic.

Upbit hack headlined exploits in November

The attack on Babur is one of the most recent attacks on the cryptocurrency industry. Last month on the 27th, South Korean cryptocurrency exchange Upbit reportedly had $30 million worth of assets stolen from its Solana wallet due to a security weakness, which led to the theft of Official Trump, USD Coin, BONK, and other tokens. And as in Babur’s case, the weakness enabled private key inference.

All digital asset transactions were halted following the incident, which many suspect may have been conducted by the North Korean hacking collective Lazarus Group.

“This breach is a direct result of Upbit’s inadequate security management, and there is no room for excuses. Upbit, which prioritizes member protection, promises that no damage will occur to member assets,” said Dunamu CEO Oh Kyung-seok, who reassured users that the private key vulnerability has since been fixed.

Upbit intends to leverage its assets to convert customer losses due to the breach and has already commenced an extensive security system review and wallet system restructuring that has seen the exchange tear down its entire deposit address system and rebuild from scratch.

According to the exchange, the purge is part of a broader hardening of its wallet infrastructure after the hack revealed lingering vulnerabilities. Now, all users — across every asset and every network — are required to generate new addresses before depositing again.

The company said the decision was meant to eliminate any compromised keys or undiscovered vulnerabilities that remain in circulation. South Korea’s Financial Supervisory Service (FSS) is monitoring the process as part of its ongoing inspection.

Get $50 free to trade crypto when you sign up to Bybit now

|Square

Get the BTCC app to start your crypto journey

Get started today Scan to join our 100M+ users

All articles reposted on this platform are sourced from public networks and are intended solely for the purpose of disseminating industry information. They do not represent any official stance of BTCC. All intellectual property rights belong to their original authors. If you believe any content infringes upon your rights or is suspected of copyright violation, please contact us at [email protected]. We will address the matter promptly and in accordance with applicable laws.BTCC makes no explicit or implied warranties regarding the accuracy, timeliness, or completeness of the republished information and assumes no direct or indirect liability for any consequences arising from reliance on such content. All materials are provided for industry research reference only and shall not be construed as investment, legal, or business advice. BTCC bears no legal responsibility for any actions taken based on the content provided herein.