CRYPTO ROAST
Ir al canal en Telegram
Serving the Hottest Scams, Celeb Fails, and Trader Blunders in Crypto Cooperation - @samoeq
Mostrar más2025 año en números

1 244 186
Suscriptores
-49724 horas
-4 1607 días
-20 86830 días
Archivo de publicaciones
Photo unavailableShow in Telegram
🔤 Arrested the Wrong Ape?
🟠In one of the most embarrassing twists in NFT crime history, U.S. law enforcement allegedly cuffed a Yuga Labs security researcher for a $1M Bored Ape heist… that he was investigating.
🟠According to ZachXBT, Sam Curry — ex-Yuga staffer — got flagged based on an OpenSea log tied to his home IP. Problem? He was doing whitehat work, analyzing a phishing site where the real attacker had left a private key inside JavaScript.
🟠Meanwhile, the actual scammer jacked 14 Bored Apes (then worth ~$86K each), laundered the funds through Tornado Cash, and vanished — until Zach reconstructed the trail and matched it to a deleted X account. Not bad for a chain sleuth.
🟠Now Zach’s calling on cops to chase the right wallet. He’s dropped addresses, suspect details, and on-chain proof. The only thing missing? Accountability from the system that turned a whitehat into a suspect.
🫰 Moral of the story? In Web3, the real threats hide in the code — not behind an airport boarding gate.
➡️CRYPTO ROAST
👍 285❤ 156👏 46🥰 23🔥 16🤯 8👎 7
⭐️ UPD: Germany Just Seized $38M Tied to the Bybit Hack
🟠The Lazarus trail is heating up. German authorities just confiscated $38 million in crypto from eXch — a shadowy laundering service used to wash funds from the $1.4B Bybit exploit. That’s the third-largest crypto seizure in the country’s history.
🟠eXch had been operating since 2014 with zero AML compliance, processing $1.9B in crypto — much of it dirty. Think BTC, ETH, LTC, DASH — all now sitting in government hands. The platform quietly shut down on May 1, blaming “SIGINT pressure” and the “hostile environment.” Translation? They knew the net was closing in.
🟠ZachXBT previously flagged eXch for laundering funds from Lazarus-linked exploits, including Genesis ($243M), Multisig drains, and FixedFloat. Authorities have now seized 8 terabytes of server data — this wasn’t just a bust, it was a digital decapitation.
🐶 Lazarus may be state-sponsored, but their infrastructure isn’t bulletproof. Every off-ramp is a vulnerability — and governments are finally catching up. You can obfuscate the source, but you can’t hide the flow.
➡️CRYPTO ROAST
👍 305❤ 158👏 52🔥 41🥰 6
Photo unavailableShow in Telegram
🔤 LockBit Hit by Karma: 60K BTC Wallets Exposed
🟠One of the world’s most infamous ransomware gangs just got a taste of their own medicine. Hackers breached LockBit’s dark web panel and leaked a database containing nearly 60,000 Bitcoin wallet addresses — the same addresses tied to years of ransomware payments. And they did it with style: “Don’t do crime. CRIME IS BAD xoxo from Prague,” the hackers wrote.
🟠While no private keys were leaked, the dump included a goldmine of metadata — from ransom negotiation chats to ransomware build details and victim targeting logs. Blockchain sleuths now have a clear trail of LockBit’s laundering patterns, exposing the infrastructure that powered billions in extortion schemes.
🟠The hack may be tied to a similar breach of the Everest ransomware group, which used the same calling card message. If it’s the same vigilante crew, they’re not just taking names — they’re nuking whole playbooks.
🟠This leak doesn’t just humiliate LockBit — it arms law enforcement and crypto investigators with the breadcrumbs they’ve been chasing for years. Every exposed BTC address is now a lead. Every “anonymous” ransom is now a puzzle with fewer missing pieces.
❗️ The takeaway? Even the worst criminals can’t escape the transparency of blockchain. And sometimes, the biggest burn doesn’t come from law enforcement — it comes from your own playbook used against you.
➡️CRYPTO ROAST
👍 266❤ 123🥰 34👎 22👏 20🎉 16🔥 14💋 12
Photo unavailableShow in Telegram
🎸 $45K Phishing Scam Hits Tron — Curve Finance Also Compromised
🟠In 2025, it’s not smart contracts getting hacked — it’s the people behind them. Both Tron DAO and Curve Finance have joined the growing list of major crypto projects hit by social engineering attacks on their X (Twitter) accounts.
🟠On May 2, Tron DAO’s official account posted a shady contract and began DMing users offering paid promo spots. Sounds dumb? It worked. Around $45,000 was funneled into the scam address before the team cut off access. Even after regaining control, the attacker continued messaging people as if nothing happened — pushing ads from the “official” Tron account.
🟠Tron says the breach stemmed from a malicious phishing attack targeting a team member — textbook social engineering. Just days later, Curve Finance was hit too. A May 5 post from its X account promoted a fake CRV airdrop. Though quickly deleted, the attacker had already blocked users like CrediBULL Crypto who tried to raise the alarm. Curve’s team confirmed the hack and said there’s no sign of client-side compromise, but they’re still unsure how access was taken.
🟠These aren’t isolated cases. Pump.fun, Kaito AI, and even a UK MP had their X accounts hijacked in recent months. The attackers? Smarter, subtler, and increasingly organized — skipping the broken English and going full corporate scammer mode.
🟠The worst part? It works. Web3 protocols might be permissionless and decentralized, but a single human error can put entire ecosystems at risk.
🤝 Lesson: In crypto, your biggest vulnerability isn’t the code — it’s your inbox. Use 2FA. Enable hardware keys. And remember: no legit promo starts with a DM and a shady smart contract. If it smells off, it probably is.
➡️CRYPTO ROAST
👍 297❤ 140🥰 51🔥 37❤🔥 16👏 11🎉 9
Photo unavailableShow in Telegram
💵 From Minecraft Mods to Million-Dollar Crimes — The $243M Bitcoin Heist That Turned Into a Real-Life Kidnapping
🟠What started as a textbook case of crypto social engineering turned into a Netflix-worthy thriller — complete with Lamborghinis, Discord bragging, and a brutal kidnapping. Here’s how a group of Zoomer hackers stole 4,100 BTC ($243M)… and how it all came crashing down.
🟠It began with a call. A crypto investor in Washington D.C. was tricked by two scammers impersonating Google and Gemini support. Under the guise of a “security upgrade,” they convinced him to install malware. Minutes later, his wallets were emptied. Gone: 4,100 BTC.
🟠Enter ZachXBT. Mid-air on a flight, the blockchain sleuth got a tip and started tracing the stolen funds. He followed them across dozens of wallets, mixers, and exchanges, even getting platforms to freeze some assets. But then came the twist.
🟠An anonymous tip dropped a screen recording into Zach’s inbox. In it: a group of teens celebrating the heist on Discord, flexing millions on screen — and one of them, a high school honors student, accidentally doxxing himself. Meet Vir Chetal, 18, from Danbury, CT.
🟠Turns out, Vir wasn’t just a smart kid. He was a core member of “Com” — an underground group of gamers-turned-cybercriminals that evolved from Minecraft modding to SIM swaps, wallet drains, and high-stakes theft.
🟠Vir’s flexing escalated fast: school in a Corvette, then a BMW, then a Lambo. Yacht parties. Champagne. Custom fits. The usual script for a TikTok crypto flexer — except it was all off stolen BTC.
🟠Then it got dark. A week after the hack, Vir’s parents were kidnapped. Armed men forced them into a van in broad daylight, duct-taped and vanished. Why? The crew wanted to extort Vir for a cut of the loot.
🟠Thankfully, alert bystanders and an off-duty FBI agent helped rescue them. Within hours, 4 of 6 suspects were in custody. Vir was arrested shortly after. His alleged partner, Singaporean hacker Malone Lam (aka “Grievous”), was caught weeks later in Miami, flaunting money in clubs.
🟠By March 2025, five kidnappers had pleaded guilty. Dozens of wallets were traced. Some funds recovered. And Vir, the teen who couldn’t stop flexing, now faces federal charges.
📌 What’s the takeaway? Crypto isn’t just a financial revolution — it’s now deeply entangled with real-world violence. As coins get harder to trace, the people behind them become the targets. The digital world and the physical world aren’t just touching — they’re colliding.
➡️CRYPTO ROAST
👍 296❤ 119🔥 44🥰 24👎 13👏 11🎉 7🙏 7
Photo unavailableShow in Telegram
☠️ Paris: Crypto Blood Money
🟠In broad daylight on a Paris street, the father of a crypto millionaire was kidnapped. The attackers demanded €5–7 million in ransom and severed one of his fingers to send a message. This isn’t fiction — it’s the latest in a rising wave of brutal extortions targeting crypto-affluent families.
🟠The victim was forced into a delivery van by four masked men while a fifth waited behind the wheel. French police later arrested all five — all in their 20s. According to prosecutors, the man’s son made his fortune in crypto marketing, and the family had received prior threats.
🟠No ransom was paid. A Saturday night police raid freed the victim before the attackers could cash in. The wife confirmed the threats were ongoing before this attack — and the trauma is now painfully real.
🟠This isn’t isolated. Ledger’s co-founder was similarly mutilated. A Canadian crypto user was tortured because his X posts made people think he held millions — he had $100K.
🫴 In crypto, wealth is freedom — and a bullseye. As fortunes grow on-chain, so do the risks offline.
➡️CRYPTO ROAST
👍 275❤ 117🥰 42🔥 32👏 14👎 8🎉 6
Photo unavailableShow in Telegram
🅰️ “Secure” setup, instant regret: $XMR gone in minutes after Tails boot
🟠Picture this: you’re on Tails — the privacy-first Linux OS booted from a USB stick, routed through Tor, and beloved by digital minimalists and paranoid geniuses alike. You feel like Mr. Robot. You update Feather Wallet, fire it up, transfer Monero from Kraken… and five minutes later — poof, it’s gone.
🟠That’s exactly what happened to one Redditor this week. He followed all the “right” steps — OSPEC checked, latest wallet version installed, funds received overnight. But when he rebooted Tails and opened Feather Wallet again, his Monero was already gone.
🟠Turns out, the seed phrase — the master key to the wallet — was saved in a plain .txt file. On the same Tails session. Like putting a vault on your door and taping the key to it. Sure, Tails is ephemeral and Tor is cool, but no amount of anonymity can fix bad opsec hygiene.
🟠The attacker likely waited, lurking silently — perhaps through an infected USB, malicious node, or backdoored wallet binary. And once the coins hit the address, they were gone. No noise, no warning. Just a silent exfiltration into the Monero void.
🟠What makes this especially cruel is the illusion of safety. Tails feels like Fort Knox, but for many users, it’s more like flying a fighter jet with no training — and thinking autopilot will save you from crashing.
✈️ Privacy tools don’t forgive mistakes. Saving your seed phrase as a text file, even on a “secure” system, is like locking your door and tweeting your spare key location. Tails, Monero, Feather — they’re powerful. But they won’t save you from yourself.
➡️CRYPTO ROAST
❤ 200👍 163🔥 44🥰 26👎 11🎉 6👏 1👀 1
Photo unavailableShow in Telegram
🤎 Phantom-style scam steals 2000 SOL from Redditor — but he’s fighting back
🟠A Reddit user just dropped one of the most detailed first-hand accounts of getting absolutely wrecked by a fake Phantom wallet email — and it’s a masterclass in modern phishing. The scam started with a clean, official-looking message urging him to “reverify” his wallet or risk losing access due to smart contract issues. It sounded technical enough to feel real. He clicked.
🟠What followed was a flawless replica of Phantom’s interface. He connected his wallet, signed what seemed like a harmless prompt — and boom. 2000 SOL, gone. Not frozen. Not locked. Drained. The scam had routed a malicious transaction in the background, and by the time he noticed, it was too late.
🟠But instead of rage-quitting, the guy started tracing the money. He mapped out transactions on SolanaFM and Solscan, uncovered automated bots splitting and mixing the funds through DEXes, and watched the money eventually bridge to Ethereum — likely into Tornado Cash. Clean, fast, and brutal.
🟠He’s now building a public trace map of the scam, tagging wallets and coordinating with onchain analysts. His hope? That enough eyes on this case might catch these scammers slipping when they try to off-ramp.
👻 His message is clear: never trust email links, treat urgency as a red flag, and lock your wallet down like it’s your bank account — because it is. No pity needed. Just awareness — and maybe a few more eyes watching the chain.
➡️CRYPTO ROAST
👍 333❤ 152🔥 71👎 22🥰 12👏 10🎉 2
Photo unavailableShow in Telegram
⚡️ $5.8M Hack on Loopscale Turns Into Negotiation Drama
🟠 Another DeFi protocol, another exploit — but this time the hacker wants to talk. After draining $5.8M from Loopscale’s yield vaults on Solana, the attacker reached out via Etherscan with a white hat bounty proposal. Loopscale’s team confirmed they’re open to a deal, though the hacker is asking for a 20% cut in return for the stolen funds.
🟠 As a show of “good faith,” the hacker already returned 5,000 wSOL. Meanwhile, the remaining funds — 5.7M USDC and 1,200 SOL — are still in limbo as negotiations unfold.
🟠 The incident paused Loopscale’s lending markets and left the protocol scrambling. While loan repayments and top-ups are back online, withdrawals remain frozen. The attack affected about 12% of the protocol’s total value locked — not a total wipe, but not trivial either.
🟠 Web3 bug bounties like this aren’t new, but they rarely lead to full recovery. With over $1.6B lost to hacks in Q1 2025 alone, this latest case is a familiar dance: a protocol gets wrecked, a hacker plays “ethical,” and the community is left waiting on-chain for the final act.
🙏 The question isn’t whether this is justice — it’s whether DeFi has become so vulnerable that negotiation is the best-case scenario.
➡️CRYPTO ROAST
👍 311❤ 138🔥 67👏 21🥰 13👎 12👾 10
Photo unavailableShow in Telegram
☠️ $330M Bitcoin Heist Hits Elderly US Investor
🟠 One of the biggest crypto thefts ever — $330 million in BTC — has been traced back to a sophisticated social engineering attack targeting an elderly American who had quietly held over 3,000 Bitcoin since 2017. On April 28, the attacker drained 3,520 BTC and immediately began laundering it across six instant exchanges and over 300 wallets, rapidly converting a large chunk into Monero.
🟠 The laundering was methodical. Funds were broken into smaller transactions using peel chains, funneled through at least 20 exchanges and mixers including Binance, and obfuscated until nearly $60M remained traceable. Meanwhile, the sudden demand for Monero sent its price soaring 50%, providing the attacker cover as XMR’s privacy features made the funds virtually untraceable.
🟠 Blockchain analysts say this wasn’t a random hack — it was premeditated. The attacker likely had pre-opened accounts across multiple exchanges and OTC desks, suggesting insider-level knowledge of laundering routes and timing.
🟠 Unlike previous mega-heists, this one doesn’t match the style of North Korea’s Lazarus Group. Analysts suspect a highly organized but independent operator, possibly a new player capable of large-scale, automated laundering.
👵 The victim may never recover their funds. And with $1.6B already stolen this year, the lesson is brutal but clear: in crypto, your biggest vulnerability isn’t code — it’s trust.
➡️CRYPTO ROAST
👍 317❤ 161👏 62🔥 32👎 6🥰 5
Photo unavailableShow in Telegram
💵 Bankera’s ICO Dreams Funded Luxury Villas Instead
🟠 In 2018, Bankera promised to become “the bank of the blockchain era,” raising a whopping $114 million in its ICO. But according to a bombshell OCCRP report, nearly half of those funds were quietly funneled through a Vanuatu-based bank—purchased by Bankera’s own founders—to finance high-end real estate in France and Lithuania.
🟠 Founders Vytautas Karalevičius, Justas Dobiliauskas, and Mantas Mockevičius allegedly used the Vanuatu bank to issue massive loans to their own companies and even to themselves, under the guise of “business operations” and “personal use.” Villas on the French Riviera and luxury assets were the true outcome.
🟠 While lawyers deny outright fraud, they’ve refused to explain the specifics. The project’s key promises—like an EU banking license and weekly BNK token revenue shares—never materialized. The revenue sharing ended in 2022, and the fully diluted market cap of BNK now sits under $1 million.
🏦 Instead of building the future of crypto banking, Bankera became yet another ICO-era mirage—one that swapped investor trust for seaside property.
➡️CRYPTO ROAST
👍 280❤ 150🔥 74😐 25👏 23🥰 11👎 8
Photo unavailableShow in Telegram
🔤 Alex Mashinsky: From Crypto King to Courtroom Villain
🟠 Celsius founder Alex Mashinsky is facing calls for a life sentence from furious investors who say he “devastated lives.” Over 200 victim statements have poured into court ahead of his May 8 sentencing, with many comparing him to Bernie Madoff. Some victims even blamed Mashinsky for driving people to suicide after Celsius collapsed.
🟠 Mashinsky pleaded guilty to two felony counts — misleading customers about Celsius’s health and pumping CEL token prices with customer funds. At its peak, Celsius froze $4.7 billion in assets, leaving thousands trapped and triggering a chain reaction across the crypto world during the brutal 2022 crypto winter.
🟠 Internal messages revealed it wasn’t just bad luck. Executives openly admitted CEL’s price was fake. Mashinsky allegedly dumped his personal CEL bags on the market while the company was propping up the price behind the scenes.
🟠 Despite facing up to 30 years, Mashinsky is asking for leniency, hiring the same lawyers who defended Sam Bankman-Fried. Meanwhile, victims are demanding the maximum punishment, hoping the court sends a message: if you abuse trust in this space, there’s no easy way out.
🔤 Crypto was supposed to break the system. Instead, for Mashinsky and others, it just became another way to break people.
➡️CRYPTO ROAST
👍 309❤ 138🔥 66👏 24🥰 17🙈 9👾 8👎 7💯 6
Photo unavailableShow in Telegram
🤎 Another $700K vanished — welcome to the golden age of address poisoning
🟠 On Sunday, an Ethereum user lost nearly $700,000 in USDT after falling for one of the simplest tricks in crypto. He had just sent a small test transaction to a Binance wallet — and seconds later, accidentally copied a scammer’s poisoned address from his history.
🟠 The scammer’s wallet looked almost identical: same beginning, same ending. But the inside? Totally different. Using automated tools, scammers blast out thousands of similar addresses and pray that someone messes up.
🟠 That’s exactly what happened. 699,990 USDT gone. Instantly swapped into DAI to avoid getting frozen by Tether. Unlike USDT, DAI is decentralized — no freeze button, no way back.
🟠 Security experts warn: address poisoning scams are exploding. One trader lost $70 million last year to the same tactic. Another lost $467K just last week. It’s a low-effort, high-reward play — and it’s working.
🫰 The real takeaway? Never trust the “0x123…abc” shortcut. Always double-check full wallet addresses character by character. In crypto, one lazy copy-paste can cost you everything.
➡️CRYPTO ROAST
Photo unavailableShow in Telegram
🎸 North Korea’s Lazarus Group Is Now Hiring… Malware
🟠 North Korean hackers are once again innovating — this time not with zero-days, but with fake crypto consulting firms. According to Silent Push, a subgroup of the infamous Lazarus Group set up three shell companies — BlockNovas, Angeloper Agency, and SoftGlide — posing as recruiters for blockchain devs. Two of these firms were legally registered in the U.S.
🟠 The scam plays out like a phishing thriller. Developers applying for jobs get prompted to record intro videos — but a fake “error message” tricks them into copying and pasting code that installs malware. Three strains have been spotted: BeaverTail (steals info), OtterCookie, and InvisibleFerret (both focused on swiping wallet keys and clipboard data).
🟠 To sell the illusion, the hackers used AI-modified faces and stolen LinkedIn images to build fake employee profiles. In some cases, real photos were run through AI to create a “different enough” clone. Sophisticated digital catfishing.
🟠 One dev had their MetaMask wallet drained. Another dodged a bullet. The FBI has already seized one of the domains (BlockNovas), but others like SoftGlide are still live. This isn’t just about fake job interviews — it’s state-sponsored economic warfare.
👋 In 2025, the “work from home” dream can come with North Korean spyware baked in. Always vet job offers, double-check domains, and if your “interview” asks you to paste code — shut it down.
➡️CRYPTO ROAST
👍 252❤ 176😁 67🔥 42❤🔥 15🥰 9👏 5😍 4👎 3👾 2
Photo unavailableShow in Telegram
🔤 PGI Global: $198M in “AI Trading” and Lamborghinis
🟠 In the U.S., the SEC has charged PGI Global founder Ramil Palafox with running a nearly $200M crypto scam. The pitch was textbook: high returns from crypto and forex trading, multi-level marketing referrals, and flashy promises of “AI auto-trading.”
🟠 Instead of trading, there was luxury. $57M in investor funds allegedly went toward Lamborghinis, watches, and real estate. The rest kept the Ponzi going — payouts to earlier investors to maintain the illusion of profitability.
🟠 The SEC claims the whole operation was a fraud dressed up in innovation. There was no AI, no sophisticated trading — just smoke, mirrors, and an exit plan. Now, Palafox faces criminal charges, and the FBI and IRS are involved.
🟠 The agency is also seeking a full ban on his participation in crypto or securities marketing. Relatives and affiliated firms are named in the case too, with demands for disgorgement of misused funds.
🤘 Hype, “guaranteed passive income,” and AI buzzwords — it sounds like the future. But when your DeFi platform looks more like a luxury lifestyle showroom, it’s probably not your gains they’re maximizing.
➡️CRYPTO ROAST
👍 225❤ 192🔥 69🥰 33👏 22❤🔥 5👾 2
Photo unavailableShow in Telegram
☠️ Bitget’s $12B VOXEL Glitch: Bug or Bullsh*t?
🟠 Crypto Twitter got a front-row seat to what looked like a VOXEL miracle — $12B in trading volume outta nowhere. But don’t pop the champagne: this “frenzy” came with a side of broken mechanics, instant order fills, and what users are calling a “zero-cost exploit.”
🟠 Traders noticed bizarre flickers in the VOXEL/USDT price, bouncing between $0.125 and $0.138. A bug? A bot? A backdoor? Some traders made six figures starting with just $100. Others got rekt. Bitget suspended accounts, rolled back trades, and offered vague promises of compensation.
🟠 But here’s the kicker — no one knows who the hell was behind the move. Bitget’s CEO said it was “between users,” not the platform. Sure. Meanwhile, the API is open, market makers are anonymous, and everyone’s under NDA.
🟠 Binance had a similar vibe in March when GPS and SHELL tokens collapsed. Same “unnamed market maker,” same lack of answers. Just another day in centralized exchange roulette.
🟠 And don’t think this is just about CEXs — even Hyperliquid got caught in a whale liquidation exploit that nuked their JELLY perps. Bitget’s execs even dunked on Hyperliquid… until their own code started throwing up $12B bugs.
🔥 What’s the takeaway? In crypto, you don’t just bet on price. You bet on who’s really in control. And more often than not — no one knows.
➡️CRYPTO ROAST
👍 260❤ 150🔥 65🥰 35👎 13👏 5😁 5❤🔥 3
💭 UPD: From "Hacked" to Handcuffed? Meteora Faces $69M Lawsuit
🟠 Remember that spicy Meteora post where co-founder Ben Chow went full kamikaze on the memecoin scene, only for the team to claim he was "hacked"? Turns out the plot’s thickening faster than your average shitcoin whitepaper.
🟠 A new class-action lawsuit just dropped in New York — and it’s brutal. Investors accuse Meteora, Kelsier Labs, and four execs of running a rigged M3M3 token launch to line their own pockets. Losses? At least $69 million between December 2024 and February 2025.
🟠 According to the complaint, M3M3 wasn’t some decentralized memetic movement — it was a "blatant fraud", propped up by price manipulation, misleading PR, and smoke blown straight into Solana’s ecosystem. All while pretending to be “trusted leaders” offering “low-risk” exposure.
🟠 Meanwhile, Meteora keeps popping up in scandals involving tokens like TRUMP, MELANIA, LIBRA and now M3M3 — all launched with loud promises and suspiciously convenient mechanics. Funny how that works.
🔤 TL;DR: That "hack" excuse? Yeah, the court might call it “fraud.” And investors? They’re not buying the copium this time.
➡️CRYPTO ROAST
👍 251❤ 139🥰 47🔥 32👏 15❤🔥 14👎 13
Photo unavailableShow in Telegram
💵 ZKsync exploit: $5M in tokens minted via admin backdoor
🟠 On April 15, a hacker exploited an admin-level account tied to ZKsync’s airdrop contracts, triggering the sweepUnclaimed() function. The result? 111 million unclaimed ZK tokens minted, worth roughly $5 million.
🟠 The exploit affected three airdrop distribution contracts, but ZKsync clarified it was an isolated incident. User funds were untouched, and governance contracts weren’t compromised.
🟠 The attacker still controls the majority of the stolen ZK. ZKsync is now working with SEAL Security Alliance to investigate and recover the funds. This particular vulnerability has been patched.
🟠 The token market reacted sharply: ZK dropped 16% intraday, before stabilizing around $0.047, still down 7% on the day.
📆 First quarter 2025 has already seen over $2 billion in crypto stolen — and it’s not just shady DEXes or meme tokens. Even polished L2s with real tech and big backers are being tested.
Reminder: admin keys are either a safety net — or a loaded weapon.
➡️CRYPTO ROAST
👍 231❤ 135🔥 47👏 31🍾 11💔 9💋 9👎 7❤🔥 5🥰 2👌 1
Photo unavailableShow in Telegram
🤘 KiloEx vs the Hacker: $750K or Total Exposure
🟠 KiloEx just got drained for $7.5M in a textbook oracle exploit. $3.3M on Base, $3.1M on opBNB, $1M on BSC — all gone in a flash thanks to price manipulation via a smart contract bug.
🟠 The DEX fired back with a bold offer: return 90% of the loot, keep $750,000 as a white hat bounty, and walk away clean. They’ll even tweet a thank-you and close the case.
🟠 But if the hacker plays dumb? KiloEx says they’ve already mobilized cyber sleuths, exchanges, and legal firepower. Wallets are under surveillance. Identity mapping is underway.
🟠 The clock’s ticking. One email or onchain message can save face. Ignore it — and the case goes full public with relentless legal pursuit.
🤑750K in your pocket or your face on a wanted poster. Your move, anon.
➡️CRYPTO ROAST
👍 309❤ 123🔥 61🥰 36😁 14👏 9💋 6👎 5💔 1
Photo unavailableShow in Telegram
🔥 67,000 men. One giant scam.
🟠 A Chinese fraud ring just pulled off one of the most industrial-scale romance pig butchering ops ever — by pretending to be wealthy Indian women.
🟠 Between June 2023 and January 2024, nine scammers posed as “emotionally vulnerable but financially stable” Indian ladies — using fitness selfies, travel shots, and fake companies to lure 66,800 Indian men into handing over a total of $6 million.
🟠 None of them were Indian. Or women. They used machine translation tools, geolocated social media accounts, pre-written emotional scripts, and classic crypto laundering: INR to USDT to Chinese yuan.
🟠 The ringleader, surname He, got prison — along with the rest of the gang — with sentences reaching 14+ years from a Shandong court.
🟠 This wasn’t their first rodeo: in March 2024, another crew in China was caught catfishing Turkish men by pretending to be Malaysian designers. Same script. Different audience.
🔥 Just remember: if a rich, beautiful, sweet-talking stranger wants to “invest” with you after 4 days of flirty DMs…
It might not be love.
It might be Lisa, 31, 170cm, divorced, boutique owner — and she works night shifts in Guangdong.
➡️CRYPTO ROAST
