Crypto
Bybit CEO Ben Zhou sounds alarm again as Pi value more than halves – VnExpress International
“Here is an official police warning of Pi from Chinese police back in 2023, warning to the public that it’s a scam targeted at elderly folks which leaks their personal data and loses their pension,” Zhou wrote on X (formerly Twitter) on Feb. 21. “There are multiple other reports out there questioning the project’s legitimacy.”
The warning attached to Zhou’s post was from the Wuxi city police department, which writes of elderly Chinese people downloading the Pi Network app on other people’s “invitation,” providing important personal documents, even making meeting appointments to “invest,” which turn out to be fraudulent.
“Criminals use the lure of ‘free’ and ‘gifts’ to attract people who are greedy for small profits to download their software, and then sweeten the situation by claiming there is no capital investment required and offering a small amount of ‘Pi tokens’ as gifts,” the Wuxi police said. “They then expand the victim group by rewarding targets for recruiting more people, ultimately reselling users’ personal information and defrauding victims out of their money.”
Zhou emphasized that Bybit has never made any requests to the Pi Network team and shall not be listing the currency at all. Some sources previously suggested that Bybit did not pass the Know Your Business (KYB) requirements set by Pi Network.
|
Pi’s value dropped sharply in just under a day after launch. Photo by Duy Phong |
“If the project is legitimate and straight up, then you should come forth and address these reports so everyone can understand, but instead you choose to make up [profanity] and do these childish attacks with no grounds,” Zhou said. “Yes, I still think [they] are a scam, and no, Bybit will not list scams.”
Pi Network achieved open network status on 20 February afternoon. With 6.3 billion tokens in circulation and an initial price of US$2, Pi’s total airdrop is worth $12.6 billion, double that of Uniswap’s $6.43 billion in 2020. (In crypto, airdropping is the practice of gifting free coins or tokens to users before becoming an open network.)
Immediately upon launch Pi became volatile. From $2, it went as high as over $3 on some exchanges on its first day, dropped to $0.90, rebounded to $2.10, dropped again to $1.40 before finally finishing at $0.79.
The Pi Network project was created in 2019, with advertising stating users can get Pi tokens for free with daily logins to the app. When Pi Network announced plans to become an open network on February 12 this year, Zhou immediately announced his exchange would not be listing the token, citing past troubles from older people asking for their lost money back.
Zhou’s February 12 announcement cited an additional warning from blockchain researcher Haotian-CryptoInsight, who observed that Pi Network is particularly popular in markets where financial literacy is low, and that slogans of “one Pi for one Bitcoin” contributed to much misunderstanding of Pi’s true value. The immense public reaction toward this cryptocurrency’s listing is a sign of its potentially many issues, they added.
Among crypto exchanges, Bybit has the second largest trading volume behind only Binance, according to CoinMarketCap data.
As for the largest player, Binance has been surveying its community on whether to list Pi Network since February 13, but has made no further announcement.
Many Pi Network enthusiasts expected the token to be valued very highly, setting a “consensus value” for Pi at US$500-1,000 and demanding “no dumping”. One community set its global consensus value at US$314,159 per Pi.
OneSafe was skeptical of such rates, calling them “astronomical”, as Pi’s supply is expected to be capped at 100 billion and there are six billion in circulation after it became an open network. Nam Nguyen, a crypto investor for four years, pointed out: “If Pi is valued as the community expects, its capitalization will be unimaginable, and there is no actual proof or market data to back it up.”
Crypto Times commented: “There has been so much hyperbole around Pi Coin and Pi Network since its launch. This project is surviving only on its hype using investors’ sentiments just like Hamster Kombat. However, over time everyone will get a reality check on whether Pi coin is a horse for a long race or not.”
Crypto
North Korean hackers allegedly stole record $2.02 billion of cryptocurrency in 2025. Here’s how they did it | Stock Market News
North Korea remains dominant threat to cryptocurrency security in 2025, even while confirmed incidents have decreased, according to a report by blockchain analytics company Chainanlysis.
Hackers from the Democratic People’s Republic of Korea (DPRK) allegedly stole a record $2.02 billion of crypto this year — a 51% jump compared to 2024, and taking their all-time total to $6.75 billion, it added.
The analysis further found that the DRPK is achieving larger thefts with fewer incidents, using unique methods to gain access and pull off their heists.
North Korea’s alleged crypto heists: Here’s how they did it
As per the report, these hacks were often carried out in unique fashion by embedding IT workers inside crypto services or using sophisticated impersonation tactics targeting executives.
Embedding IT workers
This is among the DPRK’s “principal attack vectors”, the report said. It added that the hackers secured jobs inside crypto services to gain privileged access and enable high‑impact compromises.
“Part of this record year likely reflects an expanded reliance on IT worker infiltration at exchanges, custodians, and web3 firms, which can accelerate initial access and lateral movement ahead of large‑scale theft,” it noted.
Fake jobs
Further, taking the IT worker model and “flipping it on its head”, the analysis said that DPRK-linked operators are also increasingly impersonating recruiters for prominent web3 and AI firms. This way, they orchestrate fake hiring processes that culminate in “technical screens” designed to harvest credentials, source code, and VPN or SSO access to the victim’s current employer.
“At the executive level, a similar social‑engineering playbook appears in the form of bogus outreach from purported strategic investors or acquirers, who use pitch meetings and pseudo–due diligence to probe for sensitive systems information and potential access paths into high‑value infrastructure,” it added.
Higher- value attacks
Over the years, DPRK-linked operators are increasingly undertaking significantly higher-value attacks compared to other threat actors. “This pattern reinforces that when North Korean hackers strike, they target large services and aim for maximum impact,” the report added.
It noted that “this year’s record haul came from significantly fewer known incidents”, including the massive $1.5 billion Bybit hack in February 2025.
DPRK’s distinctive laundering patterns
Not just the hacking process, the laundering of stolen funds is also distinctive, the report said. It noted that more than 60% of laundering was of volume concentrated below $5,00,000 transfer value tranches, despite the total stolen amounts being larger.
“Even while the DPRK consistently steals larger amounts than other stolen fund threat actors, they structure on-chain payments in smaller tranches, speaking to the sophistication of their laundering,” it added.
Crypto
Coinbase Security Impersonation Scheme Exposed as Authorities Claim Nearly $16M Was Siphoned
Crypto
Unmasking the Cryptocurrency Phishing Crisis – OneSafe Blog
What if I told you that a single case could encapsulate the chaotic vulnerabilities of the cryptocurrency world? Enter Ronald Spektor, a figure now infamous for allegedly masterminding a phishing operation that siphoned away a staggering $16 million from naive Coinbase users. The fallout from this scheme plunges deep into the unsettling implications of trust in an era dominated by digital currencies—a stark reminder that the promise of crypto can quickly turn into a nightmare if we’re not careful.
The Dark Art of Cryptocurrency Phishing
Phishing has morphed into a sophisticated form of cybercrime, particularly within the cryptocurrency realm. Spektor’s alleged tactics involved posing as a trusted agent from Coinbase, using clever manipulation to lure unsuspecting users into handing over their hard-won crypto assets. The sheer audacity of exploiting trust is what amplifies the horror.
Picture this: victims, believing they’re engaging with legitimate support personnel, unwittingly become pawns in a malicious game. Spektor’s strategy revolved around deceptive communications that felt alarmingly real—a blend of phone calls and texts designed to strip away defenses. This situation underscores a grim reality: even the latest breakthroughs in blockchain technology cannot entirely shield users from the ploys of manipulative attackers. With reports indicating a relentless rise in account takeovers, the FBI urges continuous vigilance against such deceptions.
Emotional Toll on Victims
Beyond the dollar signs lies emotional wreckage. Victims of Spektor’s alleged scheme endured more than financial losses; their trust was shattered. The narrative here is compelling: years of labor invested in cryptocurrency can vanish in moments of misplaced faith. The ramifications are staggering—over 5,100 reported cases of account takeover fraud in 2025 alone, with losses soaring over $262 million. These numbers highlight a chilling truth—cybercriminals are thriving, particularly preying on those who lack the savvy to spot danger ahead.
A Glimmer of Hope Amid Regulatory Scrutiny
The escalating tide of cryptocurrency fraud thrusts platforms like Coinbase into the spotlight, facing mounting scrutiny over their security measures. As they work closely with law enforcement to reclaim stolen assets, tough questions about their safety protocols emerge. To navigate the ever-shifting landscape of crypto, exchanges must elevate their defensive stances in alignment with groundbreaking technologies.
Regulatory institutions are now taking an active role—pursuing comprehensive strategies to halt the proliferation of scams. This proactive approach extends beyond transaction verification; it’s also about nurturing user awareness and education. Financial institutions are encouraged to enhance protective measures for cryptocurrency users, crafting clearer guidelines to prevent fraud and restoring trust in tumultuous waters.
Innovative Approaches to Security
With evolving threats in the industry, experts call for a paradigm shift that prioritizes cybersecurity education alongside robust frameworks. Imagine harnessing real-time, AI-enhanced phishing detection mechanisms, especially for nascent Web3 startups. The key to protection? Cultivating a culture of awareness where users become savvy enough to recognize telltale signs and verify any critical communication through trusted sources, a necessity in an age where impersonation reigns.
The Road Ahead: A Call to Action
Spektor’s story serves as more than an isolated cautionary tale; it echoes a broader, systemic vulnerability interwoven within the cryptocurrency ecosystem. As technology advances, so do the methods of cybercriminals, reinforcing a critical insight: human error remains the weak link in this chain.
As we steer into the future, it is imperative that both investors and regulators understand and prioritize the safeguarding of security protocols across all platforms. To thrive, cryptocurrency exchanges must harmonize user-friendly transactions with unwavering security measures, crafting an environment where criminal operations struggle to take root.
Conclusion
The saga of Ronald Spektor signals an urgent call to arms against the pervasive threats encircling the cryptocurrency landscape. Strengthening security protocols and empowering an enlightened user base are not just advisable; they’re essential for survival. By championing vigilance and investing in advanced technological defenses, we stand a better chance of shielding investors and stabilizing the innovative yet fragile cryptocurrency market. As we confront the shadows cast by cybercrime, let us resolve to forge a more secure financial future that empowers rather than exploits.
-
Iowa6 days agoAddy Brown motivated to step up in Audi Crooks’ absence vs. UNI
-
Iowa1 week agoHow much snow did Iowa get? See Iowa’s latest snowfall totals
-
Maine5 days agoElementary-aged student killed in school bus crash in southern Maine
-
Maryland6 days agoFrigid temperatures to start the week in Maryland
-
Technology1 week agoThe Game Awards are losing their luster
-
South Dakota7 days agoNature: Snow in South Dakota
-
New Mexico4 days agoFamily clarifies why they believe missing New Mexico man is dead
-
World1 week agoCoalition of the Willing calls for transatlantic unity for Ukraine