en
Feedback
CRYPTO ROAST

CRYPTO ROAST

Open in Telegram

Serving the Hottest Scams, Celeb Fails, and Trader Blunders in Crypto Cooperation - @samoeq

Show more
2025 year in numberssnowflakes fon
card fon
1 244 186
Subscribers
-49724 hours
-4 1607 days
-20 86830 days
Posts Archive
Photo unavailableShow in Telegram
๐Ÿ”ค Arrested the Wrong Ape? ๐ŸŸ In one of the most embarrassing twists in NFT crime history, U.S. law enforcement allegedly cuffed a Yuga Labs security researcher for a $1M Bored Ape heistโ€ฆ that he was investigating. ๐ŸŸ According to ZachXBT, Sam Curry โ€” ex-Yuga staffer โ€” got flagged based on an OpenSea log tied to his home IP. Problem? He was doing whitehat work, analyzing a phishing site where the real attacker had left a private key inside JavaScript. ๐ŸŸ Meanwhile, the actual scammer jacked 14 Bored Apes (then worth ~$86K each), laundered the funds through Tornado Cash, and vanished โ€” until Zach reconstructed the trail and matched it to a deleted X account. Not bad for a chain sleuth. ๐ŸŸ Now Zachโ€™s calling on cops to chase the right wallet. Heโ€™s dropped addresses, suspect details, and on-chain proof. The only thing missing? Accountability from the system that turned a whitehat into a suspect. ๐Ÿซฐ Moral of the story? In Web3, the real threats hide in the code โ€” not behind an airport boarding gate. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 285โค 156๐Ÿ‘ 46๐Ÿฅฐ 23๐Ÿ”ฅ 16๐Ÿคฏ 8๐Ÿ‘Ž 7
โญ๏ธ UPD: Germany Just Seized $38M Tied to the Bybit Hack ๐ŸŸ The Lazarus trail is heating up. German authorities just confiscated $38 million in crypto from eXch โ€” a shadowy laundering service used to wash funds from the $1.4B Bybit exploit. Thatโ€™s the third-largest crypto seizure in the countryโ€™s history. ๐ŸŸ eXch had been operating since 2014 with zero AML compliance, processing $1.9B in crypto โ€” much of it dirty. Think BTC, ETH, LTC, DASH โ€” all now sitting in government hands. The platform quietly shut down on May 1, blaming โ€œSIGINT pressureโ€ and the โ€œhostile environment.โ€ Translation? They knew the net was closing in. ๐ŸŸ ZachXBT previously flagged eXch for laundering funds from Lazarus-linked exploits, including Genesis ($243M), Multisig drains, and FixedFloat. Authorities have now seized 8 terabytes of server data โ€” this wasnโ€™t just a bust, it was a digital decapitation. ๐Ÿถ Lazarus may be state-sponsored, but their infrastructure isnโ€™t bulletproof. Every off-ramp is a vulnerability โ€” and governments are finally catching up. You can obfuscate the source, but you canโ€™t hide the flow. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 305โค 158๐Ÿ‘ 52๐Ÿ”ฅ 41๐Ÿฅฐ 6
Photo unavailableShow in Telegram
๐Ÿ”ค LockBit Hit by Karma: 60K BTC Wallets Exposed ๐ŸŸ One of the worldโ€™s most infamous ransomware gangs just got a taste of their own medicine. Hackers breached LockBitโ€™s dark web panel and leaked a database containing nearly 60,000 Bitcoin wallet addresses โ€” the same addresses tied to years of ransomware payments. And they did it with style: โ€œDonโ€™t do crime. CRIME IS BAD xoxo from Prague,โ€ the hackers wrote. ๐ŸŸ While no private keys were leaked, the dump included a goldmine of metadata โ€” from ransom negotiation chats to ransomware build details and victim targeting logs. Blockchain sleuths now have a clear trail of LockBitโ€™s laundering patterns, exposing the infrastructure that powered billions in extortion schemes. ๐ŸŸ The hack may be tied to a similar breach of the Everest ransomware group, which used the same calling card message. If itโ€™s the same vigilante crew, theyโ€™re not just taking names โ€” theyโ€™re nuking whole playbooks. ๐ŸŸ This leak doesnโ€™t just humiliate LockBit โ€” it arms law enforcement and crypto investigators with the breadcrumbs theyโ€™ve been chasing for years. Every exposed BTC address is now a lead. Every โ€œanonymousโ€ ransom is now a puzzle with fewer missing pieces. โ—๏ธ The takeaway? Even the worst criminals canโ€™t escape the transparency of blockchain. And sometimes, the biggest burn doesnโ€™t come from law enforcement โ€” it comes from your own playbook used against you. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 266โค 123๐Ÿฅฐ 34๐Ÿ‘Ž 22๐Ÿ‘ 20๐ŸŽ‰ 16๐Ÿ”ฅ 14๐Ÿ’‹ 12
Photo unavailableShow in Telegram
๐ŸŽธ $45K Phishing Scam Hits Tron โ€” Curve Finance Also Compromised ๐ŸŸ In 2025, itโ€™s not smart contracts getting hacked โ€” itโ€™s the people behind them. Both Tron DAO and Curve Finance have joined the growing list of major crypto projects hit by social engineering attacks on their X (Twitter) accounts. ๐ŸŸ On May 2, Tron DAOโ€™s official account posted a shady contract and began DMing users offering paid promo spots. Sounds dumb? It worked. Around $45,000 was funneled into the scam address before the team cut off access. Even after regaining control, the attacker continued messaging people as if nothing happened โ€” pushing ads from the โ€œofficialโ€ Tron account. ๐ŸŸ Tron says the breach stemmed from a malicious phishing attack targeting a team member โ€” textbook social engineering. Just days later, Curve Finance was hit too. A May 5 post from its X account promoted a fake CRV airdrop. Though quickly deleted, the attacker had already blocked users like CrediBULL Crypto who tried to raise the alarm. Curveโ€™s team confirmed the hack and said thereโ€™s no sign of client-side compromise, but theyโ€™re still unsure how access was taken. ๐ŸŸ These arenโ€™t isolated cases. Pump.fun, Kaito AI, and even a UK MP had their X accounts hijacked in recent months. The attackers? Smarter, subtler, and increasingly organized โ€” skipping the broken English and going full corporate scammer mode. ๐ŸŸ The worst part? It works. Web3 protocols might be permissionless and decentralized, but a single human error can put entire ecosystems at risk. ๐Ÿค Lesson: In crypto, your biggest vulnerability isnโ€™t the code โ€” itโ€™s your inbox. Use 2FA. Enable hardware keys. And remember: no legit promo starts with a DM and a shady smart contract. If it smells off, it probably is. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 297โค 140๐Ÿฅฐ 51๐Ÿ”ฅ 37โคโ€๐Ÿ”ฅ 16๐Ÿ‘ 11๐ŸŽ‰ 9
Photo unavailableShow in Telegram
๐Ÿ’ต From Minecraft Mods to Million-Dollar Crimes โ€” The $243M Bitcoin Heist That Turned Into a Real-Life Kidnapping ๐ŸŸ What started as a textbook case of crypto social engineering turned into a Netflix-worthy thriller โ€” complete with Lamborghinis, Discord bragging, and a brutal kidnapping. Hereโ€™s how a group of Zoomer hackers stole 4,100 BTC ($243M)โ€ฆ and how it all came crashing down. ๐ŸŸ It began with a call. A crypto investor in Washington D.C. was tricked by two scammers impersonating Google and Gemini support. Under the guise of a โ€œsecurity upgrade,โ€ they convinced him to install malware. Minutes later, his wallets were emptied. Gone: 4,100 BTC. ๐ŸŸ Enter ZachXBT. Mid-air on a flight, the blockchain sleuth got a tip and started tracing the stolen funds. He followed them across dozens of wallets, mixers, and exchanges, even getting platforms to freeze some assets. But then came the twist. ๐ŸŸ An anonymous tip dropped a screen recording into Zachโ€™s inbox. In it: a group of teens celebrating the heist on Discord, flexing millions on screen โ€” and one of them, a high school honors student, accidentally doxxing himself. Meet Vir Chetal, 18, from Danbury, CT. ๐ŸŸ Turns out, Vir wasnโ€™t just a smart kid. He was a core member of โ€œComโ€ โ€” an underground group of gamers-turned-cybercriminals that evolved from Minecraft modding to SIM swaps, wallet drains, and high-stakes theft. ๐ŸŸ Virโ€™s flexing escalated fast: school in a Corvette, then a BMW, then a Lambo. Yacht parties. Champagne. Custom fits. The usual script for a TikTok crypto flexer โ€” except it was all off stolen BTC. ๐ŸŸ Then it got dark. A week after the hack, Virโ€™s parents were kidnapped. Armed men forced them into a van in broad daylight, duct-taped and vanished. Why? The crew wanted to extort Vir for a cut of the loot. ๐ŸŸ Thankfully, alert bystanders and an off-duty FBI agent helped rescue them. Within hours, 4 of 6 suspects were in custody. Vir was arrested shortly after. His alleged partner, Singaporean hacker Malone Lam (aka โ€œGrievousโ€), was caught weeks later in Miami, flaunting money in clubs. ๐ŸŸ By March 2025, five kidnappers had pleaded guilty. Dozens of wallets were traced. Some funds recovered. And Vir, the teen who couldnโ€™t stop flexing, now faces federal charges. ๐Ÿ“Œ Whatโ€™s the takeaway? Crypto isnโ€™t just a financial revolution โ€” itโ€™s now deeply entangled with real-world violence. As coins get harder to trace, the people behind them become the targets. The digital world and the physical world arenโ€™t just touching โ€” theyโ€™re colliding. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 296โค 119๐Ÿ”ฅ 44๐Ÿฅฐ 24๐Ÿ‘Ž 13๐Ÿ‘ 11๐ŸŽ‰ 7๐Ÿ™ 7
Photo unavailableShow in Telegram
โ˜ ๏ธ Paris: Crypto Blood Money ๐ŸŸ In broad daylight on a Paris street, the father of a crypto millionaire was kidnapped. The attackers demanded โ‚ฌ5โ€“7 million in ransom and severed one of his fingers to send a message. This isnโ€™t fiction โ€” itโ€™s the latest in a rising wave of brutal extortions targeting crypto-affluent families. ๐ŸŸ The victim was forced into a delivery van by four masked men while a fifth waited behind the wheel. French police later arrested all five โ€” all in their 20s. According to prosecutors, the manโ€™s son made his fortune in crypto marketing, and the family had received prior threats. ๐ŸŸ No ransom was paid. A Saturday night police raid freed the victim before the attackers could cash in. The wife confirmed the threats were ongoing before this attack โ€” and the trauma is now painfully real. ๐ŸŸ This isnโ€™t isolated. Ledgerโ€™s co-founder was similarly mutilated. A Canadian crypto user was tortured because his X posts made people think he held millions โ€” he had $100K. ๐Ÿซด In crypto, wealth is freedom โ€” and a bullseye. As fortunes grow on-chain, so do the risks offline. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 275โค 117๐Ÿฅฐ 42๐Ÿ”ฅ 32๐Ÿ‘ 14๐Ÿ‘Ž 8๐ŸŽ‰ 6
Photo unavailableShow in Telegram
๐Ÿ…ฐ๏ธ โ€œSecureโ€ setup, instant regret: $XMR gone in minutes after Tails boot ๐ŸŸ Picture this: youโ€™re on Tails โ€” the privacy-first Linux OS booted from a USB stick, routed through Tor, and beloved by digital minimalists and paranoid geniuses alike. You feel like Mr. Robot. You update Feather Wallet, fire it up, transfer Monero from Krakenโ€ฆ and five minutes later โ€” poof, itโ€™s gone. ๐ŸŸ Thatโ€™s exactly what happened to one Redditor this week. He followed all the โ€œrightโ€ steps โ€” OSPEC checked, latest wallet version installed, funds received overnight. But when he rebooted Tails and opened Feather Wallet again, his Monero was already gone. ๐ŸŸ Turns out, the seed phrase โ€” the master key to the wallet โ€” was saved in a plain .txt file. On the same Tails session. Like putting a vault on your door and taping the key to it. Sure, Tails is ephemeral and Tor is cool, but no amount of anonymity can fix bad opsec hygiene. ๐ŸŸ The attacker likely waited, lurking silently โ€” perhaps through an infected USB, malicious node, or backdoored wallet binary. And once the coins hit the address, they were gone. No noise, no warning. Just a silent exfiltration into the Monero void. ๐ŸŸ What makes this especially cruel is the illusion of safety. Tails feels like Fort Knox, but for many users, itโ€™s more like flying a fighter jet with no training โ€” and thinking autopilot will save you from crashing. โœˆ๏ธ Privacy tools donโ€™t forgive mistakes. Saving your seed phrase as a text file, even on a โ€œsecureโ€ system, is like locking your door and tweeting your spare key location. Tails, Monero, Feather โ€” theyโ€™re powerful. But they wonโ€™t save you from yourself. โžก๏ธCRYPTO ROAST
Show all...
โค 200๐Ÿ‘ 163๐Ÿ”ฅ 44๐Ÿฅฐ 26๐Ÿ‘Ž 11๐ŸŽ‰ 6๐Ÿ‘ 1๐Ÿ‘€ 1
Photo unavailableShow in Telegram
๐ŸคŽ Phantom-style scam steals 2000 SOL from Redditor โ€” but heโ€™s fighting back ๐ŸŸ A Reddit user just dropped one of the most detailed first-hand accounts of getting absolutely wrecked by a fake Phantom wallet email โ€” and itโ€™s a masterclass in modern phishing. The scam started with a clean, official-looking message urging him to โ€œreverifyโ€ his wallet or risk losing access due to smart contract issues. It sounded technical enough to feel real. He clicked. ๐ŸŸ What followed was a flawless replica of Phantomโ€™s interface. He connected his wallet, signed what seemed like a harmless prompt โ€” and boom. 2000 SOL, gone. Not frozen. Not locked. Drained. The scam had routed a malicious transaction in the background, and by the time he noticed, it was too late. ๐ŸŸ But instead of rage-quitting, the guy started tracing the money. He mapped out transactions on SolanaFM and Solscan, uncovered automated bots splitting and mixing the funds through DEXes, and watched the money eventually bridge to Ethereum โ€” likely into Tornado Cash. Clean, fast, and brutal. ๐ŸŸ Heโ€™s now building a public trace map of the scam, tagging wallets and coordinating with onchain analysts. His hope? That enough eyes on this case might catch these scammers slipping when they try to off-ramp. ๐Ÿ‘ป His message is clear: never trust email links, treat urgency as a red flag, and lock your wallet down like itโ€™s your bank account โ€” because it is. No pity needed. Just awareness โ€” and maybe a few more eyes watching the chain. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 333โค 152๐Ÿ”ฅ 71๐Ÿ‘Ž 22๐Ÿฅฐ 12๐Ÿ‘ 10๐ŸŽ‰ 2
Photo unavailableShow in Telegram
โšก๏ธ $5.8M Hack on Loopscale Turns Into Negotiation Drama ๐ŸŸ  Another DeFi protocol, another exploit โ€” but this time the hacker wants to talk. After draining $5.8M from Loopscaleโ€™s yield vaults on Solana, the attacker reached out via Etherscan with a white hat bounty proposal. Loopscaleโ€™s team confirmed theyโ€™re open to a deal, though the hacker is asking for a 20% cut in return for the stolen funds. ๐ŸŸ  As a show of โ€œgood faith,โ€ the hacker already returned 5,000 wSOL. Meanwhile, the remaining funds โ€” 5.7M USDC and 1,200 SOL โ€” are still in limbo as negotiations unfold. ๐ŸŸ  The incident paused Loopscaleโ€™s lending markets and left the protocol scrambling. While loan repayments and top-ups are back online, withdrawals remain frozen. The attack affected about 12% of the protocolโ€™s total value locked โ€” not a total wipe, but not trivial either. ๐ŸŸ  Web3 bug bounties like this arenโ€™t new, but they rarely lead to full recovery. With over $1.6B lost to hacks in Q1 2025 alone, this latest case is a familiar dance: a protocol gets wrecked, a hacker plays โ€œethical,โ€ and the community is left waiting on-chain for the final act. ๐Ÿ™ The question isnโ€™t whether this is justice โ€” itโ€™s whether DeFi has become so vulnerable that negotiation is the best-case scenario. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 311โค 138๐Ÿ”ฅ 67๐Ÿ‘ 21๐Ÿฅฐ 13๐Ÿ‘Ž 12๐Ÿ‘พ 10
Photo unavailableShow in Telegram
โ˜ ๏ธ $330M Bitcoin Heist Hits Elderly US Investor ๐ŸŸ  One of the biggest crypto thefts ever โ€” $330 million in BTC โ€” has been traced back to a sophisticated social engineering attack targeting an elderly American who had quietly held over 3,000 Bitcoin since 2017. On April 28, the attacker drained 3,520 BTC and immediately began laundering it across six instant exchanges and over 300 wallets, rapidly converting a large chunk into Monero. ๐ŸŸ  The laundering was methodical. Funds were broken into smaller transactions using peel chains, funneled through at least 20 exchanges and mixers including Binance, and obfuscated until nearly $60M remained traceable. Meanwhile, the sudden demand for Monero sent its price soaring 50%, providing the attacker cover as XMRโ€™s privacy features made the funds virtually untraceable. ๐ŸŸ  Blockchain analysts say this wasnโ€™t a random hack โ€” it was premeditated. The attacker likely had pre-opened accounts across multiple exchanges and OTC desks, suggesting insider-level knowledge of laundering routes and timing. ๐ŸŸ  Unlike previous mega-heists, this one doesnโ€™t match the style of North Koreaโ€™s Lazarus Group. Analysts suspect a highly organized but independent operator, possibly a new player capable of large-scale, automated laundering. ๐Ÿ‘ต The victim may never recover their funds. And with $1.6B already stolen this year, the lesson is brutal but clear: in crypto, your biggest vulnerability isnโ€™t code โ€” itโ€™s trust. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 317โค 161๐Ÿ‘ 62๐Ÿ”ฅ 32๐Ÿ‘Ž 6๐Ÿฅฐ 5
Photo unavailableShow in Telegram
๐Ÿ’ต Bankeraโ€™s ICO Dreams Funded Luxury Villas Instead ๐ŸŸ  In 2018, Bankera promised to become โ€œthe bank of the blockchain era,โ€ raising a whopping $114 million in its ICO. But according to a bombshell OCCRP report, nearly half of those funds were quietly funneled through a Vanuatu-based bankโ€”purchased by Bankeraโ€™s own foundersโ€”to finance high-end real estate in France and Lithuania. ๐ŸŸ  Founders Vytautas Karaleviฤius, Justas Dobiliauskas, and Mantas Mockeviฤius allegedly used the Vanuatu bank to issue massive loans to their own companies and even to themselves, under the guise of โ€œbusiness operationsโ€ and โ€œpersonal use.โ€ Villas on the French Riviera and luxury assets were the true outcome. ๐ŸŸ  While lawyers deny outright fraud, theyโ€™ve refused to explain the specifics. The projectโ€™s key promisesโ€”like an EU banking license and weekly BNK token revenue sharesโ€”never materialized. The revenue sharing ended in 2022, and the fully diluted market cap of BNK now sits under $1 million. ๐Ÿฆ Instead of building the future of crypto banking, Bankera became yet another ICO-era mirageโ€”one that swapped investor trust for seaside property. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 280โค 150๐Ÿ”ฅ 74๐Ÿ˜ 25๐Ÿ‘ 23๐Ÿฅฐ 11๐Ÿ‘Ž 8
Photo unavailableShow in Telegram
๐Ÿ”ค Alex Mashinsky: From Crypto King to Courtroom Villain ๐ŸŸ  Celsius founder Alex Mashinsky is facing calls for a life sentence from furious investors who say he โ€œdevastated lives.โ€ Over 200 victim statements have poured into court ahead of his May 8 sentencing, with many comparing him to Bernie Madoff. Some victims even blamed Mashinsky for driving people to suicide after Celsius collapsed. ๐ŸŸ  Mashinsky pleaded guilty to two felony counts โ€” misleading customers about Celsiusโ€™s health and pumping CEL token prices with customer funds. At its peak, Celsius froze $4.7 billion in assets, leaving thousands trapped and triggering a chain reaction across the crypto world during the brutal 2022 crypto winter. ๐ŸŸ  Internal messages revealed it wasnโ€™t just bad luck. Executives openly admitted CELโ€™s price was fake. Mashinsky allegedly dumped his personal CEL bags on the market while the company was propping up the price behind the scenes. ๐ŸŸ  Despite facing up to 30 years, Mashinsky is asking for leniency, hiring the same lawyers who defended Sam Bankman-Fried. Meanwhile, victims are demanding the maximum punishment, hoping the court sends a message: if you abuse trust in this space, thereโ€™s no easy way out. ๐Ÿ”ค Crypto was supposed to break the system. Instead, for Mashinsky and others, it just became another way to break people. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 309โค 138๐Ÿ”ฅ 66๐Ÿ‘ 24๐Ÿฅฐ 17๐Ÿ™ˆ 9๐Ÿ‘พ 8๐Ÿ‘Ž 7๐Ÿ’ฏ 6
Photo unavailableShow in Telegram
๐ŸคŽ Another $700K vanished โ€” welcome to the golden age of address poisoning ๐ŸŸ  On Sunday, an Ethereum user lost nearly $700,000 in USDT after falling for one of the simplest tricks in crypto. He had just sent a small test transaction to a Binance wallet โ€” and seconds later, accidentally copied a scammerโ€™s poisoned address from his history. ๐ŸŸ  The scammerโ€™s wallet looked almost identical: same beginning, same ending. But the inside? Totally different. Using automated tools, scammers blast out thousands of similar addresses and pray that someone messes up. ๐ŸŸ  Thatโ€™s exactly what happened. 699,990 USDT gone. Instantly swapped into DAI to avoid getting frozen by Tether. Unlike USDT, DAI is decentralized โ€” no freeze button, no way back. ๐ŸŸ  Security experts warn: address poisoning scams are exploding. One trader lost $70 million last year to the same tactic. Another lost $467K just last week. Itโ€™s a low-effort, high-reward play โ€” and itโ€™s working. ๐Ÿซฐ The real takeaway? Never trust the โ€œ0x123โ€ฆabcโ€ shortcut. Always double-check full wallet addresses character by character. In crypto, one lazy copy-paste can cost you everything. โžก๏ธCRYPTO ROAST
Show all...
star reaction 9๐Ÿ‘ 351โค 167๐Ÿฅฐ 35๐Ÿ‘Ž 23๐Ÿ”ฅ 22๐ŸŒš 5๐Ÿ‘พ 4๐Ÿ‘ป 3๐Ÿ‘ 2
Photo unavailableShow in Telegram
๐ŸŽธ North Koreaโ€™s Lazarus Group Is Now Hiringโ€ฆ Malware ๐ŸŸ  North Korean hackers are once again innovating โ€” this time not with zero-days, but with fake crypto consulting firms. According to Silent Push, a subgroup of the infamous Lazarus Group set up three shell companies โ€” BlockNovas, Angeloper Agency, and SoftGlide โ€” posing as recruiters for blockchain devs. Two of these firms were legally registered in the U.S. ๐ŸŸ  The scam plays out like a phishing thriller. Developers applying for jobs get prompted to record intro videos โ€” but a fake โ€œerror messageโ€ tricks them into copying and pasting code that installs malware. Three strains have been spotted: BeaverTail (steals info), OtterCookie, and InvisibleFerret (both focused on swiping wallet keys and clipboard data). ๐ŸŸ  To sell the illusion, the hackers used AI-modified faces and stolen LinkedIn images to build fake employee profiles. In some cases, real photos were run through AI to create a โ€œdifferent enoughโ€ clone. Sophisticated digital catfishing. ๐ŸŸ  One dev had their MetaMask wallet drained. Another dodged a bullet. The FBI has already seized one of the domains (BlockNovas), but others like SoftGlide are still live. This isnโ€™t just about fake job interviews โ€” itโ€™s state-sponsored economic warfare. ๐Ÿ‘‹ In 2025, the โ€œwork from homeโ€ dream can come with North Korean spyware baked in. Always vet job offers, double-check domains, and if your โ€œinterviewโ€ asks you to paste code โ€” shut it down. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 252โค 176๐Ÿ˜ 67๐Ÿ”ฅ 42โคโ€๐Ÿ”ฅ 15๐Ÿฅฐ 9๐Ÿ‘ 5๐Ÿ˜ 4๐Ÿ‘Ž 3๐Ÿ‘พ 2
Photo unavailableShow in Telegram
๐Ÿ”ค PGI Global: $198M in โ€œAI Tradingโ€ and Lamborghinis ๐ŸŸ  In the U.S., the SEC has charged PGI Global founder Ramil Palafox with running a nearly $200M crypto scam. The pitch was textbook: high returns from crypto and forex trading, multi-level marketing referrals, and flashy promises of โ€œAI auto-trading.โ€ ๐ŸŸ  Instead of trading, there was luxury. $57M in investor funds allegedly went toward Lamborghinis, watches, and real estate. The rest kept the Ponzi going โ€” payouts to earlier investors to maintain the illusion of profitability. ๐ŸŸ  The SEC claims the whole operation was a fraud dressed up in innovation. There was no AI, no sophisticated trading โ€” just smoke, mirrors, and an exit plan. Now, Palafox faces criminal charges, and the FBI and IRS are involved. ๐ŸŸ  The agency is also seeking a full ban on his participation in crypto or securities marketing. Relatives and affiliated firms are named in the case too, with demands for disgorgement of misused funds. ๐Ÿค˜ Hype, โ€œguaranteed passive income,โ€ and AI buzzwords โ€” it sounds like the future. But when your DeFi platform looks more like a luxury lifestyle showroom, itโ€™s probably not your gains theyโ€™re maximizing. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 225โค 192๐Ÿ”ฅ 69๐Ÿฅฐ 33๐Ÿ‘ 22โคโ€๐Ÿ”ฅ 5๐Ÿ‘พ 2
Photo unavailableShow in Telegram
โ˜ ๏ธ Bitgetโ€™s $12B VOXEL Glitch: Bug or Bullsh*t? ๐ŸŸ  Crypto Twitter got a front-row seat to what looked like a VOXEL miracle โ€” $12B in trading volume outta nowhere. But donโ€™t pop the champagne: this โ€œfrenzyโ€ came with a side of broken mechanics, instant order fills, and what users are calling a โ€œzero-cost exploit.โ€ ๐ŸŸ  Traders noticed bizarre flickers in the VOXEL/USDT price, bouncing between $0.125 and $0.138. A bug? A bot? A backdoor? Some traders made six figures starting with just $100. Others got rekt. Bitget suspended accounts, rolled back trades, and offered vague promises of compensation. ๐ŸŸ  But hereโ€™s the kicker โ€” no one knows who the hell was behind the move. Bitgetโ€™s CEO said it was โ€œbetween users,โ€ not the platform. Sure. Meanwhile, the API is open, market makers are anonymous, and everyoneโ€™s under NDA. ๐ŸŸ  Binance had a similar vibe in March when GPS and SHELL tokens collapsed. Same โ€œunnamed market maker,โ€ same lack of answers. Just another day in centralized exchange roulette. ๐ŸŸ  And donโ€™t think this is just about CEXs โ€” even Hyperliquid got caught in a whale liquidation exploit that nuked their JELLY perps. Bitgetโ€™s execs even dunked on Hyperliquidโ€ฆ until their own code started throwing up $12B bugs. ๐Ÿ”ฅ Whatโ€™s the takeaway? In crypto, you donโ€™t just bet on price. You bet on whoโ€™s really in control. And more often than not โ€” no one knows. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 260โค 150๐Ÿ”ฅ 65๐Ÿฅฐ 35๐Ÿ‘Ž 13๐Ÿ‘ 5๐Ÿ˜ 5โคโ€๐Ÿ”ฅ 3
๐Ÿ’ญ UPD: From "Hacked" to Handcuffed? Meteora Faces $69M Lawsuit ๐ŸŸ  Remember that spicy Meteora post where co-founder Ben Chow went full kamikaze on the memecoin scene, only for the team to claim he was "hacked"? Turns out the plotโ€™s thickening faster than your average shitcoin whitepaper. ๐ŸŸ  A new class-action lawsuit just dropped in New York โ€” and itโ€™s brutal. Investors accuse Meteora, Kelsier Labs, and four execs of running a rigged M3M3 token launch to line their own pockets. Losses? At least $69 million between December 2024 and February 2025. ๐ŸŸ  According to the complaint, M3M3 wasnโ€™t some decentralized memetic movement โ€” it was a "blatant fraud", propped up by price manipulation, misleading PR, and smoke blown straight into Solanaโ€™s ecosystem. All while pretending to be โ€œtrusted leadersโ€ offering โ€œlow-riskโ€ exposure. ๐ŸŸ  Meanwhile, Meteora keeps popping up in scandals involving tokens like TRUMP, MELANIA, LIBRA and now M3M3 โ€” all launched with loud promises and suspiciously convenient mechanics. Funny how that works. ๐Ÿ”ค TL;DR: That "hack" excuse? Yeah, the court might call it โ€œfraud.โ€ And investors? Theyโ€™re not buying the copium this time. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 251โค 139๐Ÿฅฐ 47๐Ÿ”ฅ 32๐Ÿ‘ 15โคโ€๐Ÿ”ฅ 14๐Ÿ‘Ž 13
Photo unavailableShow in Telegram
๐Ÿ’ต ZKsync exploit: $5M in tokens minted via admin backdoor ๐ŸŸ  On April 15, a hacker exploited an admin-level account tied to ZKsyncโ€™s airdrop contracts, triggering the sweepUnclaimed() function. The result? 111 million unclaimed ZK tokens minted, worth roughly $5 million. ๐ŸŸ  The exploit affected three airdrop distribution contracts, but ZKsync clarified it was an isolated incident. User funds were untouched, and governance contracts werenโ€™t compromised. ๐ŸŸ  The attacker still controls the majority of the stolen ZK. ZKsync is now working with SEAL Security Alliance to investigate and recover the funds. This particular vulnerability has been patched. ๐ŸŸ  The token market reacted sharply: ZK dropped 16% intraday, before stabilizing around $0.047, still down 7% on the day. ๐Ÿ“† First quarter 2025 has already seen over $2 billion in crypto stolen โ€” and itโ€™s not just shady DEXes or meme tokens. Even polished L2s with real tech and big backers are being tested. Reminder: admin keys are either a safety net โ€” or a loaded weapon. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 231โค 135๐Ÿ”ฅ 47๐Ÿ‘ 31๐Ÿพ 11๐Ÿ’” 9๐Ÿ’‹ 9๐Ÿ‘Ž 7โคโ€๐Ÿ”ฅ 5๐Ÿฅฐ 2๐Ÿ‘Œ 1
Photo unavailableShow in Telegram
๐Ÿค˜ KiloEx vs the Hacker: $750K or Total Exposure ๐ŸŸ  KiloEx just got drained for $7.5M in a textbook oracle exploit. $3.3M on Base, $3.1M on opBNB, $1M on BSC โ€” all gone in a flash thanks to price manipulation via a smart contract bug. ๐ŸŸ  The DEX fired back with a bold offer: return 90% of the loot, keep $750,000 as a white hat bounty, and walk away clean. Theyโ€™ll even tweet a thank-you and close the case. ๐ŸŸ  But if the hacker plays dumb? KiloEx says theyโ€™ve already mobilized cyber sleuths, exchanges, and legal firepower. Wallets are under surveillance. Identity mapping is underway. ๐ŸŸ  The clockโ€™s ticking. One email or onchain message can save face. Ignore it โ€” and the case goes full public with relentless legal pursuit. ๐Ÿค‘750K in your pocket or your face on a wanted poster. Your move, anon. โžก๏ธCRYPTO ROAST
Show all...
๐Ÿ‘ 309โค 123๐Ÿ”ฅ 61๐Ÿฅฐ 36๐Ÿ˜ 14๐Ÿ‘ 9๐Ÿ’‹ 6๐Ÿ‘Ž 5๐Ÿ’” 1
Photo unavailableShow in Telegram
๐Ÿ”ฅ 67,000 men. One giant scam. ๐ŸŸ  A Chinese fraud ring just pulled off one of the most industrial-scale romance pig butchering ops ever โ€” by pretending to be wealthy Indian women. ๐ŸŸ  Between June 2023 and January 2024, nine scammers posed as โ€œemotionally vulnerable but financially stableโ€ Indian ladies โ€” using fitness selfies, travel shots, and fake companies to lure 66,800 Indian men into handing over a total of $6 million. ๐ŸŸ  None of them were Indian. Or women. They used machine translation tools, geolocated social media accounts, pre-written emotional scripts, and classic crypto laundering: INR to USDT to Chinese yuan. ๐ŸŸ  The ringleader, surname He, got prison โ€” along with the rest of the gang โ€” with sentences reaching 14+ years from a Shandong court. ๐ŸŸ  This wasnโ€™t their first rodeo: in March 2024, another crew in China was caught catfishing Turkish men by pretending to be Malaysian designers. Same script. Different audience. ๐Ÿ”ฅ Just remember: if a rich, beautiful, sweet-talking stranger wants to โ€œinvestโ€ with you after 4 days of flirty DMsโ€ฆ It might not be love. It might be Lisa, 31, 170cm, divorced, boutique owner โ€” and she works night shifts in Guangdong. โžก๏ธCRYPTO ROAST
Show all...
star reaction 3๐Ÿ‘ 331๐Ÿคฃ 99โค 70๐Ÿฅฐ 36๐Ÿ‘ 30๐Ÿ”ฅ 28๐Ÿ‘Ž 7๐Ÿ‘จโ€๐Ÿ’ป 1