Crypto Scam: Binance’s CZ Speaks on CoinMarketCap, Cointelegraph Security Breach

Updated on Jun 23, 2025 at 1:04 pm UTC by · 2 mins read

Hackers exploited CoinMarketCap and Cointelegraph with malicious ads to steal crypto via fake wallet connect prompts.

Crypto scams are evolving. After previously targeting crypto exchanges and trading platforms, hackers are now focusing on popular information sites like CoinMarketCap and Cointelegraph to reach daily visitors.

Binance founder Changpeng Zhao has also highlighted this shift, urging users to remain vigilant and cautious when approving wallet connection requests.

The recent development comes soon after the $82 million hack last week of Iranian crypto exchange Nobitex.

CoinMarketCap Faces Exploit in Latest Crypto Scam

CoinMarketCap faced a massive exploit on June 20. The crypto data provider faced a front-end breach that caused a fake wallet prompt to appear on its homepage.

The vulnerability was traced to an unauthorized JavaScript embedded within a doodle image, which temporarily disrupted the platform’s interface. The platform promptly acknowledged the issue and responded swiftly, stating:

“Our security team identified a vulnerability related to a doodle image displayed on our homepage. This doodle image contained a link that triggered malicious code through an API call, resulting in an unexpected pop-up for some users when visiting our homepage.”

In a similar exploit on Sunday, June 22, popular crypto news publication Cointelegraph confirmed a front-end security breach wherein users were exposed to a malicious pop-up which requested on connecting their crypto wallets.

On June 22, scammers launched a fraudulent campaign promoting a fake Cointelegraph token (CTG) and a counterfeit initial coin offering (ICO).

The breach was first flagged by blockchain security platform Scam Sniffer, which revealed that the attackers sought to trick users into granting wallet access. Once connected, the attackers could drain assets from the compromised wallets.

Exploiting JavaScript Codes

Scam Sniffer identified the exploit as originating from a malicious JavaScript payload embedded through the site’s advertising infrastructure.

The code was traced to a domain mimicking AdButler, which had been recently registered and used to deliver a hidden malicious script within a banner advertisement.

Although the messages on each site varied, both incidents employed a nearly identical delivery method: a deceptive pop-up masquerading as a legitimate platform feature.

This seems like a coordinated campaign leveraging ad-based JavaScript exploits to target high-traffic cryptocurrency websites.

Share:

Related Articles

Bithumb Listing Results in 25% Gains for Haedal Protocol (HAEDAL)

By May 2nd, 2025

HAEDAL, the utility and governance token of the Haedal Protocol, soared over 25% following a high-profile listing on South Korea’s Bithumb exchange.

NBA and Nascar Official X Accounts Hacked to Promote Fake Cryptocurrencies

By March 7th, 2025

Scammers hacked NBA and Nascar’s X accounts, spreading fake crypto launch claims.

Fake Crypto Account Impersonates Moroccan Head of Government

By March 6th, 2025

Morocco and Hong Kong issue warnings about fake crypto accounts impersonating officials to promote scams.

Exit mobile version