CrediX Vanishes After $4.5M Hack Exit Scam Fears Mount

CrediX Ghosts the Web After $4.5M Hack Exit Scam, or Just Radio Silence?

CrediX Finance, once seen as a rising DeFi lending platform, is now at the center of what looks like a full-blown exit scam. The team behind the protocol has gone dark since August 4, shortly after a $4.5 million exploit rocked its ecosystem.

CrediX’s Sudden Disappearance Raises Red Flags

What started as a hack due to a compromised admin wallet quickly morphed into something sketchier. Hackers used the privileged access to mint fake tokens, drain the liquidity pools, and move funds through Sonic and Ethereum bridges all before spreading the assets across multiple wallets.

Initially, CrediX announced it struck a deal with the hacker to return funds within 48 hours in exchange for a treasury payment, and promised a full refund via airdrop. But here’s the twist: the team pulled the plug on its website, deleted its X account, and shut down its Telegram leaving users in the lurch.

Security Teams Step In

CertiK called it: this has the classic signs of an exit scam. Meanwhile, SlowMist confirmed the attacker had access to CrediX’s multisig wallet six days prior.

Stability DAO claims it has tracked two team members using KYC data and is preparing a legal report in collaboration with Euler, Trevee, Beets, and Sonic Labs. The crypto sleuthing community is now in overdrive.

YOU MIGHT ALSO LIKE: Breaking ! Ethereum Forms Bull Pennant as Daily Transactions Hit #1 Record High

Breaking ! CrediX Hacker Returns $4.5M After Deal Users to Get Airdrop Refunds

CrediX Just Pulled Off a $4.5M Comeback After Getting Hacked

On August 4, 2025, CrediX got wrecked—$4.5 million gone after a hacker grabbed admin access and drained the protocol. But plot twist: the hacker is giving the money back.

Yup, CrediX made a private deal to recover the stolen crypto. In a post on X, the platform confirmed the attacker agreed to return the full $4.5M within 24–48 hours in exchange for an undisclosed payment (yeah, they definitely paid a little ransom). Once the funds are in, CrediX promised to airdrop refunds straight to user wallets within two days. That’s a win for the community.

Here’s how it happened: the hacker got access to a high-permission admin wallet. Using it, they created a fake account with full bridge privileges—basically god mode. They minted tokens, borrowed real assets, and vanished.

The drama went down just as crypto hacks are spiking. In July 2025 alone, hackers stole $142M across 17 exploits—a 27% jump from June. Major platforms like CoinDCX, GMX, and Bybit also got hit.

It’s move to negotiate might raise some eyebrows, but at least they’re getting user funds back. Not every protocol can say that.

For now, if you’re a CrediX user—hold tight and check your wallet. Refunds are on the way.

YOU MIGHT ALSO LIKE: Bitcoin Price Prediction: BTC Coils Below $114K As $127T Liquidity Swells

Credix Hack Wipes $4.5M: Inside the DeFi Admin Breach That No One Saw Coming

Credix Hack Exposes Major Admin Lapse

DeFi just took another L. Lending protocol Credix got hit with a $4.5 million exploit—and the worst part? The hacker had been chilling with admin access for six days before striking. That’s not just a hack. That’s a full-on inside job move.

Security crew SlowMist caught the action when they noticed weird behavior in the Credix multisig. Digging deeper, they found the attacker had somehow been added as both a multisig admin and bridge controller through ACLManager—a big oof for the dev team. With that access, the attacker minted fake collateral, borrowed real assets, and drained the pool like it was a clearance sale.

Credix Hack: Tornado Funded, Ethereum Routed

On-chain sleuths at Cyvers tracked the wallet back to Tornado Cash, the crypto privacy tool that’s basically a red flag in DeFi. After the grab, most of the stolen funds got shuffled over to Ethereum, making recovery that much harder.

The Credix team has since pulled their site offline—no new deposits, no official updates, and no word on whether users will get their funds back. Not the best look, especially after they locked in a $60M credit facility last year to scale.

The lesson from this Credix Hack? Weak admin controls are like leaving your vault wide open with a neon sign saying “Free Cash.” Until there’s clarity, users should revoke all approvals and avoid interacting with the protocol.

YOU MIGHT ALSO LIKE: Bitcoin Drops to $113K: Eric Trump Says “₿uy the Dip” in Bold Crypto Call

Biggest Insane Bitcoin Heist Ever: $14.5B Loot & Zero Clues – Arkham Exposes the Silent Cyber Robbery

When a Bitcoin Heist Turns into a $14.5B Mystery

A crypto mystery just got unboxed. On August 3, Arkham dropped a bomb: LuBian, a once-top mining pool in China, lost 127,426 BTC in what’s now the biggest bitcoin heist ever. That’s $3.5B back then in 2020. Now? It’s worth over $14.5B. And somehow, nobody said a word about it for nearly 4 years.

LuBian was kind of a big deal at one point powering 6% of the Bitcoin network. Then, poof December 28, 2020, 90% of its wallet got cleaned out. The next day, more BTC and USDT vanished. By New Year’s Eve, the rest was rushed to recovery wallets like a digital fire drill.

Ghost Messages to the Hacker

Here’s the twist: LuBian didn’t go public. Instead, they dropped 1,500+ on-chain messages asking the hacker to “be a white-hat” and return the coins. Even used OP_RETURN to send blockchain notes, burning over 1.4 BTC just to beg. One message from July 2024 read: “To the white-hat who is saving our asset, you can contact us.”

Still, silence.

Turns out LuBian’s tech used flawed key-generation that made it easy to brute-force. That’s hacker 101. And now, the thief’s wallet is ranked 13th largest Bitcoin holder—above some actual crypto exchanges.

This isn’t just a hack it’s a huge Bitcoin Heist and It’s a full-on cyber thriller that sat in the shadows for years—and the loot is still untouched.

YOU MIGHT ALSO LIKE: Bitcoin Drops to $113K: Eric Trump Says “₿uy the Dip” in Bold Crypto Call

WazirX Under Fire: ₹342 Crore Payment to Founder-Owned Firm Sparks New Governance Crisis

WazirX is back in the headlines—and not for a good reason.

A spicy detail in Zanmai Labs’ annual report just dropped: a massive ₹342 crore was paid to Qizil21 Software Pvt Ltd, a company owned by WazirX co-founder Nischal Shetty and his wife. That’s up from just ₹28 crore the year before. No explanation. No receipts.

warzix

And that’s not all. Another Shetty-linked company, Shibuya Labs, got ₹35.5 crore one year, then barely ₹2 crore the next. Forensic sleuths say these kinds of money swings often raise red flags—especially when the money’s moving between companies owned by the same fam. 🧾🔍

This comes on the heels of WazirX’s ₹2000 crore hack in 2023, which left thousands of users locked out. Crypto community group TooFAAN Army has been digging deep and now they’re asking the real question: Did money leave user funds before the hack ever happened?

Adding to the mess? Binance’s 2022 plot twist when CEO CZ (Changpeng Zhao) claimed they never actually bought WazirX—even though it was announced back in 2019. Why the backpedal? With these new money trails, it may not have been so random after all.

Even worse, Shetty allegedly told users that unless they agreed with his terms, funds wouldn’t be released until the Binance beef was settled. Meanwhile, ₹342 Cr quietly slid out the back door.

Now, the Enforcement Directorate is circling again, and lawyers say more summonses could hit soon. Under Section 188 of the Companies Act, these payments need to show legit business reasons—or they could trigger money laundering probes.

WazirX was once India’s crypto poster child. Now? It’s looking more like a cautionary tale. With no comments from the team and angry users still waiting for answers, everyone’s wondering: Was the real problem hackers—or something deeper inside?

You might also like: Is the U.S. Planning to Seize Ripple’s XRP Escrow for a National Crypto Reserve?

Breaking ! Resupply Hack: $9.6M Vanishes in Minutes After Smart Contract Glitch

Resupply Hack: DeFi Glitch Leads to $9.6M Crypto Theft

Another day, another DeFi breach—infamous hack is now trending after the decentralized protocol Resupply confirmed a critical exploit in its wstUSR market. A flaw in its ResupplyPair contract let a hacker borrow massive amounts of crypto with nearly zero collateral, draining $9.6 million in minutes.

The attacker cleverly manipulated the price of a token called cvcrvUSD. This triggered a logic glitch in the smart contract, making it think the collateral was worth way more than it actually was. Using this trick, they borrowed large amounts of reUSD, swapped it into other tokens like ETH and USDC, and split the stash across multiple wallets.

Rough breakdown of stolen assets:

  • ETH: ~$2 million
  • USDC: ~$3.6 million
  • Others: Remaining amount across stablecoins and tokens

It has paused all activity in the wstUSR market to prevent further damage. Thankfully, other parts of the protocol remain untouched. The team is currently investigating and will publish a full post-mortem soon.

Quick Take:
This hack is a brutal reminder that even well-known DeFi protocols can have fatal flaws—especially when they rely on external price oracles. As the ecosystem scales, the pressure to audit, simulate, and harden these systems is growing fast. For now, Resupply users are left hoping for recovery options—or at least lessons learned.

YOU MIGHT ALSO LIKE: Texas Becomes First U.S. State to Fund a Bitcoin Reserve With $10M Allocation

Breaking ! IntelBroker Exposed: UK Hacker Charged in $25M Data Theft Case

IntelBroker Charged: U.S. Unmasks Alleged Mastermind Behind $25M Data Heist

It’s official—intelbroker has a face. U.S. prosecutors just unsealed charges against Kai West, a 25-year-old British national accused of running a global hacking empire responsible for more than $25 million in damage. West, known online as “IntelBroker,” allegedly operated BreachForums and led coordinated cyberattacks that breached sensitive company systems around the world.

Bitcoin Traces, Data Leaks & a Dark Web Empire

Between 2023 and early 2025, West reportedly posted or sold stolen data over 150 times—sometimes for profit, sometimes to boost clout through forum credits. Prosecutors say he ran BreachForums between August 2024 and January 2025, a dark web marketplace infamous for trading hacked corporate data.

Although IntelBroker has taken credit for past attacks on AMD, Cisco, and HP Enterprise, these companies aren’t specifically named in the current charges. Investigators instead tied West to a broader conspiracy to commit computer intrusion, aided by clever blockchain tracing. Despite preferring Monero for its privacy features, undercover agents were able to connect Bitcoin payments to West’s emails and crypto wallets.

West was arrested in France in February 2025 and is awaiting extradition to the U.S. If convicted, he faces up to 20 years in prison. The case, filed under U.S. v. West, 25-cr-134, is being prosecuted in New York’s Southern District. His legal counsel remains unnamed.

Quick Take:
The intelbroker bust is one of the biggest dark web takedowns since BreachForums first launched. It’s a wake-up call for data security worldwide—and a warning that even privacy coins and forums can’t guarantee anonymity forever.

YOU MIGHT ALSO LIKE: Texas Becomes First U.S. State to Fund a Bitcoin Reserve With $10M Allocation

Half of $1.4B Stolen in Bybit Hack Vanishes Through Crypto Mixers

Three months after one of the largest crypto heists in history, nearly $644 million of the $1.4 billion stolen from Bybit has vanished from traceable blockchain records, according to new data.

bybit

Blockchain analysis shows that about 49.5% of the funds remain traceable, while only 4.5% ($63 million) has been frozen by exchanges and law enforcement. The majority of the stolen funds have been processed through sophisticated cryptocurrency mixing services designed to obscure transaction trails.

The largest portion — $247.5 million in Bitcoin (966 BTC) — was funneled through Wasabi Wallet, a privacy-focused tool. Another $94.1 million was laundered through eXch, a mixing service that falsely claimed to shut down in April, but continues to operate via private back-end APIs, according to TRM Labs. The bybit hacks however keep getting out of hand.

Other privacy tools used include:

  • Tornado Cash: $2.5M in ETH
  • Railgun: $1.7M in ETH

These services obscure transactions by pooling user funds, making it nearly impossible to trace where the crypto ends up.

The attack’s origin was equally concerning. A report by Safe Wallet revealed that the North Korean hacker group TraderTraitor gained access to Bybit funds by compromising a developer’s laptop. Disguised as a stock trading simulator, a malicious Docker project led to the installation of malware, which stole AWS session tokens and bypassed multi-factor authentication.

Despite initial containment efforts, the incident reveals critical vulnerabilities in Web3 security hygiene, and highlights the ongoing challenges of crypto asset recovery once funds enter opaque mixing systems.

You might also like: AIXBT Price Eyes $0.50 After 25% Rebound and Surge in Trading Volume

Amalgam Scandal: $1M Crypto Fraud Unveiled, Founder Faces 82 Years

Amalgam Founder Exposed in $1M Crypto Scam

The founder of Amalgam just got smoked by the feds. Jeremy Jordan-Jones is now facing major legal heat after allegedly scamming investors out of over $1 million through fake crypto dreams and made-up partnerships.

Amalgam scandal

He told people Amalgam was building next-gen blockchain point-of-sale systems. Sounded legit — until prosecutors dropped the receipts. Turns out Jordan-Jones faked collabs with the Golden State Warriors, a Premier League soccer team, and even a massive restaurant chain with 500+ locations. None of it was real.

Instead of building tech, he was balling in Miami — spending investor cash on high-end hotels, fancy cars, and designer fits. One major VC, Brown Venture Group, was told the funds would get Amalgam’s token listed on an exchange. Spoiler: it didn’t.

The U.S. Attorney didn’t hold back, calling the whole thing “brazen” and warning future scammers that their time is coming. It gets worse: Jordan-Jones also allegedly used fake docs to get a business credit card, then racked up $350K before the bank pulled the plug.

Now he’s facing charges for wire fraud, securities fraud, lying to banks, and aggravated identity theft. If convicted, dude could be locked up for 82 years.

It’s another cautionary tale in crypto — when the founder’s flexing more than coding, that’s your red flag.

YOU MIGHT ALSO LIKE: Solana Soars 5.7% as Staking Market Cap Overtakes Ethereum

Crypto Fear Rises: 5 Shocking Kidnappings That Prove It’s Getting Dangerous IRL

Crypto’s IRL Danger Level Just Went — 5 Wild Kidnapping Cases You Need to Know

Crypto may live on the blockchain, but the threats are very real AF. In 2025, the execs are scrambling for private security squads as kidnappings and ransom attacks go full GTA.

crypto

France is basically on high alert. 🧨 Earlier this year, Ledger co-founder David Balland got snatched and held for ransom. He made it out alive — thanks to a police op — but things just kept spiraling.

In May, a crypto bro’s dad had a finger chopped off before cops rescued him near Paris. Not long after, Paymium CEO Pierre Noizat’s daughter and grandson were almost abducted — until a random Parisian came in extinguisher blazing and saved the day. 🧯

Even the U.S. isn’t safe. After a Vegas crypto event, a guy got kidnapped at gunpoint by three teens and dumped 70+ miles away in the Arizona desert.

French officials are now offering security briefings and telling crypto people to ditch flashy flexes. Meanwhile, its security OG Jameson Lopp says this year’s already seen 20+ in-person attacks. The blockchain’s still decentralized — but danger is centralized and getting real.

Stay safe, bag holders.

You might also like: Ripple Setback: 3 Major Blows Shaking XRP’s Future

Exit mobile version