CrediX Vanishes After $4.5M Hack Exit Scam Fears Mount

CrediX Ghosts the Web After $4.5M Hack Exit Scam, or Just Radio Silence?

CrediX Finance, once seen as a rising DeFi lending platform, is now at the center of what looks like a full-blown exit scam. The team behind the protocol has gone dark since August 4, shortly after a $4.5 million exploit rocked its ecosystem.

CrediX’s Sudden Disappearance Raises Red Flags

What started as a hack due to a compromised admin wallet quickly morphed into something sketchier. Hackers used the privileged access to mint fake tokens, drain the liquidity pools, and move funds through Sonic and Ethereum bridges all before spreading the assets across multiple wallets.

Initially, CrediX announced it struck a deal with the hacker to return funds within 48 hours in exchange for a treasury payment, and promised a full refund via airdrop. But here’s the twist: the team pulled the plug on its website, deleted its X account, and shut down its Telegram leaving users in the lurch.

Security Teams Step In

CertiK called it: this has the classic signs of an exit scam. Meanwhile, SlowMist confirmed the attacker had access to CrediX’s multisig wallet six days prior.

Stability DAO claims it has tracked two team members using KYC data and is preparing a legal report in collaboration with Euler, Trevee, Beets, and Sonic Labs. The crypto sleuthing community is now in overdrive.

YOU MIGHT ALSO LIKE: Breaking ! Ethereum Forms Bull Pennant as Daily Transactions Hit #1 Record High

Credix Hack Wipes $4.5M: Inside the DeFi Admin Breach That No One Saw Coming

Credix Hack Exposes Major Admin Lapse

DeFi just took another L. Lending protocol Credix got hit with a $4.5 million exploit—and the worst part? The hacker had been chilling with admin access for six days before striking. That’s not just a hack. That’s a full-on inside job move.

Security crew SlowMist caught the action when they noticed weird behavior in the Credix multisig. Digging deeper, they found the attacker had somehow been added as both a multisig admin and bridge controller through ACLManager—a big oof for the dev team. With that access, the attacker minted fake collateral, borrowed real assets, and drained the pool like it was a clearance sale.

Credix Hack: Tornado Funded, Ethereum Routed

On-chain sleuths at Cyvers tracked the wallet back to Tornado Cash, the crypto privacy tool that’s basically a red flag in DeFi. After the grab, most of the stolen funds got shuffled over to Ethereum, making recovery that much harder.

The Credix team has since pulled their site offline—no new deposits, no official updates, and no word on whether users will get their funds back. Not the best look, especially after they locked in a $60M credit facility last year to scale.

The lesson from this Credix Hack? Weak admin controls are like leaving your vault wide open with a neon sign saying “Free Cash.” Until there’s clarity, users should revoke all approvals and avoid interacting with the protocol.

YOU MIGHT ALSO LIKE: Bitcoin Drops to $113K: Eric Trump Says “₿uy the Dip” in Bold Crypto Call

Biggest Insane Bitcoin Heist Ever: $14.5B Loot & Zero Clues – Arkham Exposes the Silent Cyber Robbery

When a Bitcoin Heist Turns into a $14.5B Mystery

A crypto mystery just got unboxed. On August 3, Arkham dropped a bomb: LuBian, a once-top mining pool in China, lost 127,426 BTC in what’s now the biggest bitcoin heist ever. That’s $3.5B back then in 2020. Now? It’s worth over $14.5B. And somehow, nobody said a word about it for nearly 4 years.

LuBian was kind of a big deal at one point powering 6% of the Bitcoin network. Then, poof December 28, 2020, 90% of its wallet got cleaned out. The next day, more BTC and USDT vanished. By New Year’s Eve, the rest was rushed to recovery wallets like a digital fire drill.

Ghost Messages to the Hacker

Here’s the twist: LuBian didn’t go public. Instead, they dropped 1,500+ on-chain messages asking the hacker to “be a white-hat” and return the coins. Even used OP_RETURN to send blockchain notes, burning over 1.4 BTC just to beg. One message from July 2024 read: “To the white-hat who is saving our asset, you can contact us.”

Still, silence.

Turns out LuBian’s tech used flawed key-generation that made it easy to brute-force. That’s hacker 101. And now, the thief’s wallet is ranked 13th largest Bitcoin holder—above some actual crypto exchanges.

This isn’t just a hack it’s a huge Bitcoin Heist and It’s a full-on cyber thriller that sat in the shadows for years—and the loot is still untouched.

YOU MIGHT ALSO LIKE: Bitcoin Drops to $113K: Eric Trump Says “₿uy the Dip” in Bold Crypto Call

Breaking ! IntelBroker Exposed: UK Hacker Charged in $25M Data Theft Case

IntelBroker Charged: U.S. Unmasks Alleged Mastermind Behind $25M Data Heist

It’s official—intelbroker has a face. U.S. prosecutors just unsealed charges against Kai West, a 25-year-old British national accused of running a global hacking empire responsible for more than $25 million in damage. West, known online as “IntelBroker,” allegedly operated BreachForums and led coordinated cyberattacks that breached sensitive company systems around the world.

Bitcoin Traces, Data Leaks & a Dark Web Empire

Between 2023 and early 2025, West reportedly posted or sold stolen data over 150 times—sometimes for profit, sometimes to boost clout through forum credits. Prosecutors say he ran BreachForums between August 2024 and January 2025, a dark web marketplace infamous for trading hacked corporate data.

Although IntelBroker has taken credit for past attacks on AMD, Cisco, and HP Enterprise, these companies aren’t specifically named in the current charges. Investigators instead tied West to a broader conspiracy to commit computer intrusion, aided by clever blockchain tracing. Despite preferring Monero for its privacy features, undercover agents were able to connect Bitcoin payments to West’s emails and crypto wallets.

West was arrested in France in February 2025 and is awaiting extradition to the U.S. If convicted, he faces up to 20 years in prison. The case, filed under U.S. v. West, 25-cr-134, is being prosecuted in New York’s Southern District. His legal counsel remains unnamed.

Quick Take:
The intelbroker bust is one of the biggest dark web takedowns since BreachForums first launched. It’s a wake-up call for data security worldwide—and a warning that even privacy coins and forums can’t guarantee anonymity forever.

YOU MIGHT ALSO LIKE: Texas Becomes First U.S. State to Fund a Bitcoin Reserve With $10M Allocation

Amalgam Scandal: $1M Crypto Fraud Unveiled, Founder Faces 82 Years

Amalgam Founder Exposed in $1M Crypto Scam

The founder of Amalgam just got smoked by the feds. Jeremy Jordan-Jones is now facing major legal heat after allegedly scamming investors out of over $1 million through fake crypto dreams and made-up partnerships.

Amalgam scandal

He told people Amalgam was building next-gen blockchain point-of-sale systems. Sounded legit — until prosecutors dropped the receipts. Turns out Jordan-Jones faked collabs with the Golden State Warriors, a Premier League soccer team, and even a massive restaurant chain with 500+ locations. None of it was real.

Instead of building tech, he was balling in Miami — spending investor cash on high-end hotels, fancy cars, and designer fits. One major VC, Brown Venture Group, was told the funds would get Amalgam’s token listed on an exchange. Spoiler: it didn’t.

The U.S. Attorney didn’t hold back, calling the whole thing “brazen” and warning future scammers that their time is coming. It gets worse: Jordan-Jones also allegedly used fake docs to get a business credit card, then racked up $350K before the bank pulled the plug.

Now he’s facing charges for wire fraud, securities fraud, lying to banks, and aggravated identity theft. If convicted, dude could be locked up for 82 years.

It’s another cautionary tale in crypto — when the founder’s flexing more than coding, that’s your red flag.

YOU MIGHT ALSO LIKE: Solana Soars 5.7% as Staking Market Cap Overtakes Ethereum

Californian Man Sentenced to 7 Years for Crypto Money Laundering

Summary: John Khuu, a California resident, has been sentenced to 87 months in prison for laundering money through Bitcoin and selling fake drugs on the dark web. His arrest was part of Operation Crypto Runner.

A California man, John Khuu, has been sentenced to seven years and three months in prison for running a cryptocurrency-based money laundering scheme and selling counterfeit drugs. According to the U.S. Department of Justice, Khuu used Bitcoin to facilitate illegal transactions on the dark web.

YOU MIGHT ALSO LIKE: Hyperliquid DEX Hits $1T Volume, Rolls Out Major Risk Management Upgrade

Authorities in Texas presented evidence that Khuu illegally imported fake MDMA from Germany and sold it to U.S. customers through dark web marketplaces. He received payments in Bitcoin, which he later converted into U.S. dollars. He was also indicted separately in the Northern District of California for unlawfully importing a Schedule I controlled substance.

His arrest was part of **Operation Crypto Runner**, an initiative targeting high-level criminal organizations involved in illegal crypto activities. Khuu had faced multiple legal charges before his sentencing. The Eastern District of Texas charged him with money laundering on May 18, 2022, while the Northern District of California charged him with drug importation on August 17, 2022.

YOU MIGHT ALSO LIKE: $WOLF Token Crashes! Hayden Davis’ New Crypto Sparks Rug Pull Allegations

Authorities finally arrested him on August 19, 2022, at a residence in Garden Grove, California.

Exit mobile version