Aha Group $35 Million Crypto Fraud Draws Harsh Jail Terms in South Korea
Senior executives of the Aha Group have been handed lengthy prison sentences for orchestrating a crypto fraud of $35 million.
简体中文
繁體中文
English
Pусский
日本語
ภาษาไทย
Tiếng Việt
Bahasa Indonesia
Español
हिन्दी
Filippiiniläinen
Français
Deutsch
Português
Türkçe
한국어
العربية
Abstract:A Chinese trader fell prey to a sophisticated hacking scam on Binance, losing $1 million after hackers exploited a deceptive Chrome plugin, Aggr, to bypass security measures, execute leveraged trades, and manipulate low liquidity trading pairs, raising questions about Binance's security protocols and responsibility for compensating such losses.

A significant financial loss has befallen a Chinese trader, totalling $1 million, due to a deceitful scheme involving a promotional Google Chrome extension named Aggr.
The plugin, Aggr, reportedly extracted cookies from users, granting hackers access to bypass password and two-factor authentication (2FA) protocols, thus breaching the traders Binance account.
The incident, narrated by the trader under the pseudonym CryptoNakamao on the social media platform X, transpired on May 24. Upon checking the Bitcoin price through the Binance app, the trader detected peculiar trading activities within their account. Regrettably, by the time they sought assistance, the entirety of their funds had been withdrawn by the hacker.
The trader disclosed that the hackers infiltrated his web browsers cookie data through the Aggr Chrome extension. Initially installed for gaining insights from notable traders, the trader remained oblivious to its covert function of pilfering browsing data and cookies. Leveraging the stolen cookies, the hackers seized active user sessions, circumventing the necessity for passwords or authentication. This enabled them to execute numerous leveraged trades and exploit low liquidity trading pairs for profit.

Despite the hindrance of 2FA preventing direct fund withdrawals, the hackers utilized the cookies and active login sessions to engage in trading activities. Employing high liquidity tokens in the Tether (USDT) trading pair, the hackers placed limit sell orders at inflated prices across Bitcoin (BTC), USD Coin (USDC), and other trading pairs with low liquidity. Subsequently, they initiated leveraged positions, acquiring substantial amounts, and executed cross-trading manoeuvres, a tactic involving the offsetting of buy and sell orders for the same asset without recording the transaction on the exchange.
The trader levelled accusations against Binance, alleging a deficiency in implementing requisite security measures, especially considering the abnormal trading activities observed. Furthermore, the trader asserted that despite reporting the issue promptly, Binance failed to take timely action. According to the trader, Binance was already cognizant of the fraudulent nature of the plugin, yet failed to notify users or enact preventative measures.
In response, Yi He, co-founder of Binance, refuted CryptoNakamao‘s claims, attributing the account breach to the compromised state of the user’s own computer. Yi He clarified on social media that following the hack, the hacker was unable to withdraw funds, resulting in trading losses upon the sale of the victims coins.
Expressing sympathy for the trader's ordeal, Binance reiterated its stance, indicating that the cause of asset loss stemmed from the manipulation of the traders devices due to the installation of malicious plugins. Consequently, Binance disclaimed responsibility for compensating such instances unrelated to its platform.
Disagreeing with Binances assessment, Nakamao contended that the exchange had prior knowledge of the malicious plugin and had even encouraged a key opinion leader (KOL) to gather intelligence from the hacker.
In a cautionary note, Yi He advised users against logging into accounts with active cookie plugins to avert the inconvenience of repeated password entries. She emphasized Binances inability to provide compensation in instances of compromised login devices.

Disclaimer:
The views in this article only represent the author's personal views, and do not constitute investment advice on this platform. This platform does not guarantee the accuracy, completeness and timeliness of the information in the article, and will not be liable for any loss caused by the use of or reliance on the information in the article.

Senior executives of the Aha Group have been handed lengthy prison sentences for orchestrating a crypto fraud of $35 million.

Are you struggling to receive withdrawals from Ester, a Saint Lucia-based forex broker? Did you face trade manipulation on various aspects, including copytrading? Did this manipulation lead to massive capital losses? You are not alone! Several traders have accused the broker of trading misconduct. In this Ester review article, we have examined their allegations. Have a look!

GODO, a Mauritius-based forex broker, is gaining attention from users worldwide for the various products and services it offers to them. According to the broker’s official website, it attributes the decision and success to making trading go beyond a service to becoming an exceptional experience for clients. So, if you are already its customer or are planning to become one, here is the comprehensive GODO review you must read. The review will take you through different account types, trading conditions and user reports.

TRADE.COM, a Mauritius-based forex broker, is gaining attention on broker review platforms, such as WikiFX, for more negative reasons than positive ones. The negative reports have emerged on account of the constant withdrawal denials and capital losses due to the alleged wrong trading guidance by the broker. There are positive reviews too, but most of them sound too generic. Exposure reports cover specific glitches traders have faced here. In this TRADE.COM review article, we have investigated multiple complaints against the forex broker. Read on!