A U.S. government contractor has been arrested for allegedly stealing $46M in cryptocurrency tied to the 2016 Bitfinex hack while working with the U.S. Marshals Service.
Investigators say privileged access was used to divert seized crypto assets.

https://www.technadu.com/us-government-contractor-arrested-in-46m-us-marshals-cryptocurrency-theft/622340/

Insider threat or weak custody controls?
#Cybersecurity #CryptoSecurity #Blockchain

A crypto operational mistake allegedly cost South Korea nearly $4.8M.

Authorities shared images celebrating seized assets from tax evaders - but one photo reportedly revealed the recovery phrase of a hardware wallet.
Within hours:
• Attacker funded gas fees with ETH
• 4M PRTG tokens transferred
• ~$4.8M gone
A reminder that OpSec failures can compromise even offline crypto storage.

Source: https://www.generation-nt.com/actualites/crypto-coree-sud-fisc-perte-seed-phrase-2071790

What safeguards should governments implement for seized digital assets?

Join the conversation and follow TechNadu for more cybersecurity and cybercrime coverage.

#CyberSecurity #CryptoSecurity #Blockchain #DigitalAssets #InfoSec #CryptoWallet #CyberCrime #OpSec #ThreatIntel

South Korea's Tax Agency Handed Thieves a $4.8m Crypto Key in a Press Release

Seoul's tax agency published a seized wallet's seed phrase in a press release, enabling thieves to drain nearly $4.8 million in cryptocurrency overnight.

The Daily Perspective

South Korea tax office exposed a wallet seed phrase in press materials.

Impact:
~$4.8M in seized PRTG tokens drained.
Agency now overhauling crypto custody procedures.
Private key exposure = total compromise.

Full details:
https://www.technadu.com/south-korea-tax-office-leaks-cryptocurrency-assets-critical-failure-leads-to-wallet-breach/621664/

#InfoSec #CryptoSecurity #Blockchain #OpSec

$48M in crypto was stolen after a wallet seed was exposed by a Korean tax agency — one secret leaked, millions lost. Key management is everything. 🔑💸 #CryptoSecurity #SecretManagement

https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/

$4.8M in crypto stolen after Korean tax agency exposes wallet seed

South Korea's National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M) worth in cryptocurrency.

BleepingComputer
Seoul's Tax Triumph Turns to Farce After Crypto Key Exposed in Press Photo

South Korea's NTS published a press photo showing a seized crypto wallet seed phrase. Within hours, thieves drained $4.8M in tokens. A lesson for all governments.

The Daily Perspective
Belastingdienst blundert met miljoenen: een harde les in crypto beveiliging. Leer ervan! #CryptoSecurity 🚀 
https://itinsights.nl/cybersecurity/miljoenenfout-belastingdienst-de-ultieme-les-in-crypto-beveiliging/
Miljoenenfout belastingdienst: de ultieme les in crypto beveiliging.

Fout belastingdienst: lessen in crypto beveiliging en miljoenenverlies Een recente onthulling toont hoe de Zuid-Koreaanse belastingdienst per abuis een…

IT INSIGHTS

Alright team, it's been a pretty active 24 hours in the cyber trenches! We've got a couple of notable breaches, some concerning new malware and AI-related vulnerabilities, and a strong message from the DEF CON community. Let's dive in:

Crypto Heists & Malicious Extensions 💸

- South Korea's National Tax Service made a costly blunder, publicly exposing the mnemonic recovery phrase of a seized crypto wallet in a press release, leading to the theft of $4.8 million in Pre-Retogeum (PRTG) tokens. This highlights a critical lack of basic understanding of virtual asset security by authorities.
- The "QuickLens - Search Screen with Google Lens" Chrome extension, with around 7,000 users, was compromised after a change of ownership. A malicious update introduced ClickFix attacks (fake Google Update prompts) and info-stealing functionality, targeting crypto wallets (MetaMask, Phantom, etc.) and credentials, with macOS users potentially hit by the AMOS infostealer.
- If you've used QuickLens, remove it, scan your device, reset passwords, and move crypto funds to a new wallet immediately.

🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/48m-in-crypto-stolen-after-korean-tax-agency-exposes-wallet-seed/
🤖 Bleeping Computer | https://www.bleepingcomputer.com/news/security/quicklens-chrome-extension-steals-crypto-shows-clickfix-attack/

New Malware & AI Agent Vulnerabilities 🤖

- A new Windows RAT called Steaelite is being sold on cybercrime forums, offering an all-in-one solution for double extortion attacks. It bundles ransomware, data theft, credential/crypto stealers, and live surveillance, with automated data harvesting kicking in the moment a victim connects. An Android module is also reportedly in development.
- The OpenClaw AI agent ecosystem is facing significant security scrutiny. A high-severity "ClawJacked" flaw (fixed in v2026.2.25) allowed malicious websites to hijack local AI agents by brute-forcing gateway passwords via WebSocket and silently registering as trusted devices.
- Beyond "ClawJacked," the OpenClaw ecosystem has seen multiple other vulnerabilities (RCE, command injection, SSRF, auth bypass, path traversal) and a surge in malicious skills on ClawHub, used to distribute infostealers like Atomic Stealer and facilitate crypto scams. Microsoft advises treating OpenClaw as untrusted code and deploying it only in isolated environments.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/27/double_extortion_whammy_steaelite_rat/
📰 The Hacker News | https://thehackernews.com/2026/02/clawjacked-flaw-lets-malicious-sites.html

Google Cloud API Key Exposure 🔒

- Truffle Security found nearly 3,000 Google Cloud API keys, originally intended for billing or benign services like embedded maps, could be abused to authenticate to sensitive Gemini endpoints.
- This occurs when the Gemini API is enabled on a Google Cloud project, silently granting existing API keys (even publicly exposed ones) access to Gemini, allowing attackers to access uploaded files, cached data, and rack up huge LLM-usage bills.
- Google has implemented proactive measures to detect and block leaked keys, but users are strongly advised to audit their Google Cloud projects, check for enabled AI-related APIs, and rotate any publicly accessible keys, especially older ones.

📰 The Hacker News | https://thehackernews.com/2026/02/thousands-of-public-google-cloud-api.html

Cyber Policy & Community Frustration 🏛️

- The DEF CON community, particularly figures like Jake Braun, is expressing significant frustration with governments' inability to effectively address major societal threats: cybercrime, AI, and authoritarianism. The annual Hacker's Almanack highlights hackers stepping up to secure critical infrastructure and fight back against cybercriminals and oppressive regimes.
- There's a growing concern about the accelerating power of AI for offensive hacking, with calls for industry-wide security controls for AI, similar to CIS Critical Security Controls.
- In a separate but related development, the Pentagon has designated AI firm Anthropic as a "supply chain risk" due to an impasse over the company's refusal to allow its Claude AI model to be used for mass domestic surveillance or fully autonomous weapons. This highlights a growing tension between AI ethics and military applications, with OpenAI reportedly taking a different stance with the DoD.

🕵🏼 The Register | https://go.theregister.com/feed/www.theregister.com/2026/02/28/def_con_jake_braun_fed_up_govt/
📰 The Hacker News | https://thehackernews.com/2026/02/pentagon-designates-anthropic-supply.html

#CyberSecurity #ThreatIntelligence #Ransomware #Malware #RAT #AI #Vulnerability #APISecurity #CloudSecurity #CryptoSecurity #ChromeExtension #SupplyChainRisk #DEFCON #InfoSec #CyberAttack #IncidentResponse

$4.8M in crypto stolen after Korean tax agency exposes wallet seed

South Korea's National Tax Service accidentally exposed the mnemonic recovery phrase of a seized cryptocurrency wallet in an official press release, allowing hackers to steal 6.4 billion won ($4.8M) worth in cryptocurrency.

BleepingComputer

Incident Overview:
Platform: Step Finance
Loss: ~$40M treasury theft
Vector: Compromised executive devices
Status: Operations terminated

Recovery efforts:
• ~$3.7M Remora assets recovered
• ~$1M additional tokens recovered
• Snapshot-based reimbursement for STEP holders
• Buyback + redemption process underway

Collateral shutdown:
Remora Markets, SolanaFloor

Strategic insight:
Executive endpoint compromise → treasury compromise.

Crypto treasury management must incorporate hardened device policies, hardware-backed key storage, enforced MFA, anomaly detection.

Source: https://therecord.media/step-finance-cryptocurrency-theft-shutdown

Follow us for tactical crypto threat briefings.
Share mitigation strategies below.

#Infosec #CryptoSecurity #DeFiRisk #TreasuryManagement #EndpointSecurity #Blockchain #DigitalAssets #ThreatModeling #CyberIncident #SecurityOperations

Cartografía de la seguridad de activos: Visualización de vectores de riesgo en exchanges vs. billeteras de hardware según el reporte 2026. 🧠👾 🔗 https://www.glitchmental.com/p/insights-visuales.html #DataVisualization #CryptoSecurity #BlockchainAnalysis #GlitchMentalMX