Top Categories

Spotlight

UK cyber security damaged by ‘clumsy Home Office political censorship’

todayMarch 8, 2025

Computer Forensic Expert joe h

UK cyber security damaged by ‘clumsy Home Office political censorship’

Computer Forensics Company: Computer Forensics Company: Britain’s National Cyber Security Centre secretly censors computer security guidance and drops references to encryption By Duncan Campbell , 2QQ Ltd, Sussex University Published: 06 Mar 2025 19:26 Britain’s National Cyber Security Centre (NCSC) has secretly censored detailed public computer security guidance provided to [...]

Top Voted
Sorry, there is nothing for the moment.

X hacking spree fuels “$HACKED” crypto token pump-and-dump

Computer Forensic ThorTech todaySeptember 19, 2024

Background
share close

Digital Forensics:

An X account hacking spree has fueled a successful pump-and-dump scheme for the $HACKED Solana token, with people rushing to buy the coin.

The hacked accounts include MoneyControl (1.4 million followers), People Magazine (7.8 million), and even EUinmyRegion (an account operated by the European Commission), with close to 100K followers.

The hacking spree started at approximately 2:00 PM ET, with hundreds of X accounts hacked to post a tweet about pumping the $HACKED token.

All of the posts are identical, stating, “THIS IS HACKED ACCOUNT! INTRODUCING $HACKED ON SOLANA on each account we hack we publish the token address so we pump it and make profits together.”

Hacked X accounts promoting $HACKED pump and dump

Source: BleepingComputer

The cyberattack is promoting a cryptocurrency token named $HACKED on the Solana blockchain, and the marketing campaign appears to be working.

When BleepingComputer first became aware of the hacks, the token had only 42 token holders with a market cap of approximately $5,000. When this story was published, the token had 436 owners, and the market cap had increased to $166,175.57.

However, the market is fluctuating wildly as people take profits in the pump and dump.

It’s not clear how the hackers compromised these X accounts, but it may have been through a compromised API key or third-party apps linked to the accounts.

BleepingComputer has contacted some affected accounts to learn more but has not received any replies.

This is a developing story….

Read More

Written by: ThorTech

Rate it

Previous post

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *


 


LOGO

 

  • info@thorsolution.com


Products


Company


Contacts

Support