Hacker charged with stealing $53 million from Uranium crypto exchange

BleepingComputer
Actively Exploited

Overview

A Maryland man has been charged with stealing over $53 million from the Uranium Finance cryptocurrency exchange through two separate hacking incidents. The suspect allegedly used a cryptocurrency mixer to launder the stolen funds, complicating the tracking of the illicit gains. This case raises concerns about the security of cryptocurrency exchanges and the effectiveness of measures in place to protect user assets. As the crypto market continues to grow, incidents like this highlight the vulnerabilities that can be exploited by attackers, putting both exchanges and their users at risk. Law enforcement's response may also impact the perceived safety of investing in cryptocurrencies.

Key Takeaways

  • Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
  • Affected Systems: Uranium Finance crypto exchange
  • Timeline: Disclosed on October 2023

Original Article Summary

U.S. prosecutors have charged a Maryland man with stealing more than $53 million after hacking the Uranium Finance crypto exchange twice and laundering the proceeds through a cryptocurrency mixer. [...]

Impact

Uranium Finance crypto exchange

Exploitation Status

This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.

Timeline

Disclosed on October 2023

Remediation

Not specified

Additional Information

This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.

Related Coverage

Cisco source code stolen in Trivy-linked dev environment breach

BleepingComputer

Cisco has been targeted in a cyberattack that resulted in the theft of source code from its internal development environment. This breach was made possible through the use of stolen credentials linked to a prior supply chain attack on Trivy, a tool used for scanning container vulnerabilities. The attackers gained access to sensitive source code belonging not only to Cisco but also to its customers, raising serious concerns about the security of their products and services. This incident emphasizes the risks associated with credential theft and the potential for significant impacts on a wide range of users who rely on Cisco's technology. Companies should assess their security protocols to prevent similar breaches in the future.

Mar 31, 2026

AtlasCross RAT campaign targets Chinese users via typosquatted domains

SCM feed for Latest

A cybercrime campaign attributed to the Silver Fox group is targeting Chinese users using typosquatted domains. This campaign involves malicious versions of various applications, such as VPN clients, encrypted messaging services, video conferencing tools, and e-commerce platforms. By creating fake websites that closely resemble legitimate ones, attackers aim to trick users into downloading these harmful applications. This poses a significant risk not only to individual users but also to businesses that rely on these tools for communication and transactions. As cyber threats continue to evolve, users must be vigilant about the sources from which they download software to avoid falling victim to such scams.

Mar 31, 2026

Maryland man charged in $53 million Uranium Finance crypto heist

SCM feed for Latest

A Maryland man named Spalletta has been charged in connection with a $53 million theft involving Uranium Finance, a decentralized finance platform. The allegations state that he exploited vulnerabilities in the platform's smart contracts on two occasions in April 2021. This incident raises concerns about the security of decentralized finance platforms, which are becoming increasingly popular but also susceptible to attacks. The case highlights the need for stronger security measures in cryptocurrency systems to protect users' investments. As decentralized finance continues to grow, incidents like this could undermine trust in the entire sector.

Mar 31, 2026

TrueConf Zero-Day Exploited in Attacks on Southeast Asian Government Networks

The Hacker News

A significant security vulnerability in TrueConf, a video conferencing software, has been actively exploited in attacks on government networks in Southeast Asia. This vulnerability, identified as CVE-2026-3502, has a CVSS score of 7.8, indicating its severity. The flaw stems from a lack of integrity checks when updating the application, which allows attackers to deliver malicious updates to users. The campaign, named TrueChaos, is specifically targeting government entities, making it a serious concern given the sensitive nature of the information handled by these organizations. Immediate action is necessary to protect affected systems from further exploitation.

Mar 31, 2026

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

SecurityWeek

A recent report reveals that credential theft is a significant factor driving various cyberattacks, including ransomware incidents and breaches of Software-as-a-Service (SaaS) platforms. This trend indicates a shift in focus for cybersecurity efforts, moving from merely preventing breaches to actively detecting and responding to the misuse of legitimate access credentials. The report emphasizes that attackers are increasingly using stolen logins to carry out sophisticated attacks, which complicates the security landscape for many organizations. As a result, businesses must enhance their monitoring capabilities to identify unauthorized use of accounts and protect sensitive information. This shift is particularly crucial as nation-state actors also exploit these vulnerabilities for geopolitical purposes, further elevating the stakes in cybersecurity.

Mar 31, 2026

Venom Stealer Raises Stakes With Continuous Credential Harvesting

SecurityWeek

Venom Stealer is a new type of malware that allows cybercriminals to continuously collect sensitive information from infected devices. This software has features that enable it to maintain persistence, which means it can stay on a system even after a reboot or other attempts to remove it. The malware targets login credentials, session data, and cryptocurrency assets, putting users' financial security at risk. As it automates the data harvesting process, attackers can siphon off valuable information without needing to be present. This poses a significant threat to individuals and organizations that rely on digital platforms for transactions and communications.

Mar 31, 2026