ChangeNOW helping to recover stolen Bithumb funds

01 Apr, 2019 | Updated: 01 Apr, 2019
by David Robb
Hack
ChangeNOW helping to recover stolen Bithumb funds

Leading Korean crypto exchange Bithumb was hacked again recently, in an incident that has been described as an inside job. Another trading platform, ChangeNOW has released a statement regarding the hack.

A significant amount of the stolen crypto was sent to the ChangeNOW exchange, which was brought to the attention of the team in a tweet thread, as well as a direct message received from Bithumb.

Read more: Bithumb experiences another major hack, 3M of EOS & 20M of XRP lostBithumb's statement on the most recent hack: It was insiders' job

ChangeNOW claims that it is now working with Bithumb and with local authorities in order to protect the funds, as well as hopefully returning them to their rightful owners and assisting with the capture of the perpetrators of this hack. 

The announcement states that: "EOS and XRP deposits had been temporarily disabled on ChangeNOW as an emergency measure. All the malicious addresses received from Bithumb have been blacklisted....we have managed to stop a solid number of EOS and XRP exchanges that the hackers tried to make through us. The total amount of crypto that we have managed to retain from being stolen is worth about half a million US dollars...All stolen exchange deposits retained during the hack have been frozen and are stored on a secure cold wallet per an official request from law enforcement".

Read more: Will Bitcoin recover in 2019?

Follow Chepicap now on Twitter, YouTubeTelegram and Facebook!

Chepicap is here for you 24/7 to keep you informed on everything crypto. Like what we do? Tip us some Satoshi with the exciting new Lightning Network Tippin.me tool!

 

Read more: How to tip and receive Bitcoin via the Lightning Network with Tippin.me

Read more about: Bithumb

Poll

Can Bithumb's reputation recover from this second major hack?

(6 votes)

Add a comment

Check out the latest news

You will be logged out and redirected to the homepage