Back to home
Technology

$40 million worth of crypto stolen from Step Finance — hackers compromise executives’ devices to gain illicit access

Source

Tom's Hardware

Published

TL;DR

AI Generated

Step Finance, a DeFi platform, experienced a breach resulting in the theft of approximately $40 million in crypto. The hack was executed through compromising the devices of the executive team. Despite recovering some assets, the platform has halted operations temporarily to enhance security. The investigation is ongoing to determine how the attack occurred, with the company cautioning users against using STEP tokens until normal operations resume. This incident contributes to the growing trend of crypto thefts, with nearly $400 million lost in 42 reported incidents in 2026.

Read Full Article

Similar Articles

Tennessee bans crypto ATMs that have become 'payment portal of choice for scammers' — second state to restrict machines after Indiana

Tennessee bans crypto ATMs that have become 'payment portal of choice for scammers' — second state to restrict machines after Indiana

Tennessee has joined Indiana in banning cryptocurrency ATMs due to their association with scams and fraud, with Minnesota considering similar legislation. The FBI has warned of significant losses due to fraud involving these machines. Despite not being inherently fraudulent, cybercriminals exploit crypto ATMs to steal funds from victims who mistakenly believe they offer the same protections as banks. Law enforcement actions against operators like Bitcoin Depot and Athena Bitcoin highlight the growing concerns around crypto ATM scams, leading to increased regulatory measures across states to protect consumers.

Tom's Hardware
Enthusiast fixes 30-year issue with S3 graphics card — hacking the VBIOS fixes black levels by scalpelling out the Virge DX’s ‘pedestal bit’

Enthusiast fixes 30-year issue with S3 graphics card — hacking the VBIOS fixes black levels by scalpelling out the Virge DX’s ‘pedestal bit’

A retro hardware enthusiast successfully fixed a 30-year-old issue with S3 graphics cards by hacking the VBIOS to address the 'pedestal bit' problem that caused washed-out black levels. By adjusting the hexadecimal value in the VBIOS code, the darkest blacks were restored to their proper color, eliminating the undesirable gray appearance. The enthusiast used debugging tools to locate and modify the pedestal bit, then dumped the VBIOS to a file, made the necessary tweaks, and flashed it back to the hardware. The fix resulted in a deep black background upon booting, confirming the successful elimination of the pedestal bit issue. This solution can potentially be applied to other S3 Virge DX models, offering a resolution to a long-standing problem in graphics card technology.

Tom's Hardware
Biohacker claims to have sequenced their own genome at the kitchen table with M3 Ultra Mac Studio, Claude, and a $3,200 sequencer — DIY project requires 100GB of data storage per run, oodles of RAM

Biohacker claims to have sequenced their own genome at the kitchen table with M3 Ultra Mac Studio, Claude, and a $3,200 sequencer — DIY project requires 100GB of data storage per run, oodles of RAM

A biohacker claims to have sequenced their own genome at home using a Mac Studio and biotech gadgets like the Oxford Nanopore MinION, costing $3,200. The DIY project requires significant data storage and RAM. Motivated by a family history of autoimmune disease, the individual emphasizes that this kitchen table genome sequencing is not a substitute for clinical diagnosis. The process involved using the MinION sequencer to target specific genes related to the autoimmune disease. The blogger provides detailed information on the equipment used and expenses incurred, welcoming others interested in genome sequencing to reach out for assistance.

Tom's Hardware
US-sanctioned currency exchange says $15 million heist done by "unfriendly states"

US-sanctioned currency exchange says $15 million heist done by "unfriendly states"

Grinex, a US-sanctioned cryptocurrency exchange in Kyrgyzstan, announced a $15 million heist allegedly orchestrated by hackers linked to "unfriendly states." TRM researchers confirmed the theft, noting more drained addresses than initially reported by Grinex. The attack targeted Russian users, with Grinex attributing it to a coordinated effort to harm Russia's financial sovereignty. TokenSpot, another Kyrgyzstan-based exchange, was also breached, with both exchanges becoming inoperable on Wednesday. The US Treasury Department had previously sanctioned Grinex's predecessor, Garantex, for facilitating ransomware actors and cybercriminals.

Ars Technica

We use cookies

We use cookies to ensure you get the best experience on our website. For more information on how we use cookies, please see our cookie policy.