# Social Engineering Related Articles

HTX News Center provides the latest articles and in-depth analysis on "Social Engineering", covering market trends, project updates, tech developments, and regulatory policies in the crypto industry.

Morse Code "Stole" $440,000 from Bankr, Undermining Trust in AI Agent Interactions Again

On May 20th, the AI agent platform Bankr reported an attack where 14 user wallets were compromised, resulting in losses exceeding $440,000. The incident, confirmed by security firm SlowMist, was a social engineering attack exploiting the trust layer between automated agents, similar to an attack on May 4th that stole $150k-$200k from a Grok-associated wallet. Bankr allows users and AI agents to manage wallets and execute transactions via instructions sent to @bankrbot on X. The platform monitors posts from specific agents like @grok, treating them as potential transaction commands, especially if the agent holds a "Bankr Club Membership" NFT which grants high-permission operations. The attacker exploited this design. First, they airdropped the required NFT to Grok's wallet. Then, they posted a Morse code message on X requesting a translation from Grok. The AI agent helpfully decoded and replied, but the decoded text contained a direct instruction to @bankrbot to transfer a large sum of DRB tokens to the attacker's address. Bankr's system, monitoring Grok's feed and verifying the NFT permissions, automatically signed and broadcast the transaction. The core issue is a flawed trust assumption: Bankr treated Grok's natural language output as authorized financial commands without verifying the intent. LLMs like Grok cannot distinguish between a genuine user request and a manipulated instruction. Using encoded messages like Morse code bypasses potential content filters, as the translation task itself appears harmless. This attack highlights a systemic vulnerability in platforms granting on-chain execution rights to AI agents. While Bankr has paused transactions and promised full reimbursement from its treasury, the incident underscores that defenses against "malicious-injection-via-LLM-output" were not part of the original security model. As AI agents gain financial agency, such trust-layer exploits represent a growing threat class.

marsbitYesterday 03:32

Morse Code "Stole" $440,000 from Bankr, Undermining Trust in AI Agent Interactions Again

marsbitYesterday 03:32

18-Year-Old Hacker's Boastful Discord Display Leads to Uncovering of $19 Million Theft Case

An 18-year-old hacker from the U.S., Dritan Kapllani Jr., has been exposed by on-chain investigator ZachXBT for his alleged involvement in multiple cryptocurrency social engineering attacks, with total funds stolen estimated at $19 million. The case gained attention after Dritan inadvertently revealed his involvement during a Discord voice call in April 2026, where he screen-shared his Exodus wallet containing approximately $3.68 million to show off his wealth during a "Band 4 Band" argument. Tracing this wallet address led investigators to uncover its connection to a major theft from March 14, 2026, where 185 Bitcoin (worth around $13 million at the time) was stolen. Approximately $5.3 million from that heist was funneled into Dritan’s wallet. Further analysis linked the same wallet to over $5.85 million from other social engineering attacks dating back to 2025. While Dritan has not yet been formally charged, he is identified as "Co-Conspirator 1" in recently unsealed court documents related to the 185 Bitcoin theft case. Another individual, Meme coin KOL yelotree, is also implicated for allegedly assisting with money laundering through a car rental business. Dritan, who had been living a lavish lifestyle and was previously seen as untouchable within hacking circles, turned 18 recently, making him legally accountable. His previous "immunity" has ended as law enforcement closes in.

Odaily星球日报05/13 00:45

18-Year-Old Hacker's Boastful Discord Display Leads to Uncovering of $19 Million Theft Case

Odaily星球日报05/13 00:45

In-Depth Reconstruction of the $285 Million Drift Hack: How Should DeFi Governance Move Beyond "Amateur Hour"?

On April 1, 2026, Drift Protocol, the largest perpetual futures DEX on Solana, suffered a catastrophic hack resulting in a loss of $285 million. The attack, attributed to a sophisticated social engineering campaign rather than a technical exploit, unfolded over several months. Hackers first infiltrated Drift’s internal circles by posing as a legitimate market maker, building trust over time. They then exploited Solana’s "Durable Nonce" feature to trick core team members into blindly signing transactions that granted administrative control. A critical vulnerability was introduced when Drift migrated to a 2/5 multisig structure without a timelock, allowing instant execution of privileged transactions with just two signatures. The attackers finally triggered the attack by adding a fake token (CVT) to the whitelist, manipulating its oracle price, and using it as collateral to drain the protocol’s treasury. The incident highlights fundamental flaws in DeFi governance, including overreliance on multisig mechanisms that lack intent verification and are vulnerable to social engineering. It underscores the misalignment between retail-grade security tools and institutional-scale treasury management. The hack signals the need for a security paradigm shift in DeFi, including adoption of Hardware Security Modules (HSMs) for key management, intent-based policy engines for transaction validation, and professional third-party custody solutions to ensure institutional-grade safety.

marsbit04/13 12:00

In-Depth Reconstruction of the $285 Million Drift Hack: How Should DeFi Governance Move Beyond "Amateur Hour"?

marsbit04/13 12:00

CertiK Releases Cryptocurrency ATM Fraud Report: Losses Reach $330 Million, AI Scams and Cross-Border Money Laundering Emerge as Major Threats

CertiK's "Skynet Cryptocurrency ATM Fraud Report" reveals that losses from such scams reached $330 million in 2025, a 33% year-on-year increase, making it one of the fastest-growing financial crimes in the U.S. The report highlights that these scams have evolved into a highly organized transnational criminal industry, leveraging social engineering and AI technologies. Cryptocurrency ATMs, with 78% located in the U.S., serve as a rapid channel for fraudsters to transfer funds. Victims, often elderly individuals who account for 86% of the losses, are manipulated via phone calls or messages to deposit cash into these machines. The funds are quickly converted into cryptocurrency and transferred to wallets controlled by criminals, making recovery nearly impossible once the transaction is on the blockchain. AI-driven scams, including voice cloning and deepfake videos, have proven 4.5 times more profitable than traditional methods. Criminal networks use automated scripts and employ "smurfing" tactics to bypass transaction limits. The illicit funds are rapidly laundered through mixing services, cross-chain bridges, and decentralized exchanges, often within minutes. The report emphasizes that the only effective intervention point is at the transaction entry level, before funds are on-chain. It calls for enhanced KYC measures, industry-wide intelligence sharing, real-time risk screening, and stronger cross-border law enforcement cooperation to combat this escalating threat.

marsbit04/02 07:36

CertiK Releases Cryptocurrency ATM Fraud Report: Losses Reach $330 Million, AI Scams and Cross-Border Money Laundering Emerge as Major Threats

marsbit04/02 07:36

活动图片