ForensicsS | Private Detective & Digital Forensics Investigation Experts
  • info@forensicss.com

    Send Email

  • 11400 West Olympic Blvd, Los Angeles, CA 90064

  • Home
  • About Us
  • Services
    • Domestic Investigation
      • Los Angeles Private Eye
      • Infidelity Investigations
      • Asset Investigations
      • Private Detective Orange County
      • Child Custody Investigations
      • Missing Person Locates
      • Wire Fraud
      • Corporate Security Investigations
      • Surveillance Operations
      • Financial Fraud Investigations
      • Asset and Hidden Finances Investigations
      • Bug Sweep TSCM Investigation
    • Cyber Security
      • Cyber Bullying Online Investigation
      • Penetration Testing Service
      • Social Media Monitoring
      • Romance Scam Investigator
      • Cyber Stalking Investigation
      • Crypto Scam Investigation
      • Cyber Security Assessment
      • Cyber Harassment Online Investigator
      • Ransomware Attack Investigation
      • Social Media Investigator
      • Extortion Investigation services
      • Background Screening
      • Insurance Fraud Detective
      • Forensic Accounting
      • Online Identity Theft
      • Online Blackmail
      • Cell Phone Forensics
      • Automotive Forensics
      • Audio Video Forensics
      • E-Discovery
      • Computer and Cell Phone Forensics
  • Closed Cases
    • Closed Cases
    • Case Details
  • News
  • Contact
310-270-0598

Confidentiality Guaranteed

310-270-0598

Confidentiality Guaranteed

Logo

Contact Info

  • 11400 West Olympic Blvd, Los Angeles, CA 90064
  • 310-270-0598
  • info@forensicss.com

    Blog Details

      ForensicsS | Private Detective & Digital Forensics Investigation Experts > News > Uncategorized > Nobitex’s Source Code Released a Day After Hackers Seize Tokens All the tactic by method of Bitcoin, EVM, Ripple Networks
    Nobitex’s Source Code Released a Day After Hackers Seize Tokens All the tactic by method of Bitcoin, EVM, Ripple Networks
    19
    Jun
    • ForensicsS
    • 0 Comments

    Nobitex’s Source Code Released a Day After Hackers Seize Tokens All the tactic by method of Bitcoin, EVM, Ripple Networks

    Data breach

    data breach Logo

    Data breach The true-Israel community Gonjeshke Darande follows by method of on its threats, publishing the plump change code and safety files, thereby placing the last Nobitex property in threat.

    Up to this point Jun 19, 2025, 1:04 p.m. Published Jun 19, 2025, 10:34 a.m.

    data breach hacker

    Educated-Israel hacker community Gonjeshke Darande launched the source code for Iran’s Nobitex crypto change(Unsplash)

    What to understand:

    • The true-Israel hacker community Gonjeshke Darande launched the plump source code of Iranian crypto change Nobitex after conducting a $100 million exploit.
    • The leak exposes customers’ property to doubtless theft since the public code dismantles the platform’s reduction-discontinue safety.
    • Nobitex acknowledged it plans to revive products and companies within five days despite web disruptions in Iran.

    The true-Israel hacker collective Gonjeshke Darande launched the plump source code of Iranian crypto change Nobitex, factual a day after orchestrating a $100 million exploit across a few blockchains because the battle between the two worldwide locations nears the discontinue of its first week.

    The pass raised new concerns for customers who maintain no longer but withdrawn their property from the platform since the code makes it extremely straightforward for nefarious actors to access and exploit.

    Israel attacked militia and nuclear sites in Iran on Friday asserting it needed to rob motion to discontinue its enemy, which has vowed to wipe the Jewish narrate off the diagram, reaching nuclear weapons. Iran answered with ballistic missile launches focusing on the full country, sending hundreds and hundreds into shelters at short understand.

    In an X post on Thursday, the hacker community, whose title is Farsi for Predatory Sparrow, wrote: “Time’s up – plump source code linked below. ASSETS LEFT IN NOBITEX ARE NOW ENTIRELY OUT IN THE OPEN.”

    Time’s up – plump source code linked below.

    ASSETS LEFT IN NOBITEX ARE NOW ENTIRELY OUT IN THE OPEN.
    بازمانده دارایی های شما در نوبیتکس هم اکنون در معرض دید و خطر هستند

    But forward of that, lets meet Nobitex from the within:

    Replace Deployment (1/8) pic.twitter.com/jiMfBpNXwd

    — Gonjeshke Darande (@GonjeshkeDarand) June 19, 2025

    The leak included blockchain scripts, interior privacy settings and a list of servers, successfully dismantling the change’s reduction-discontinue safety.

    The source code dump follows by method of on threats issued a day earlier, when Gonjeshke Darande claimed responsibility for the hack and promised to originate interior files.

    The community accused Nobitex of assisting Iran in circumventing worldwide sanctions and called the platform the “regime’s favorite sanctions violation instrument.”

    Over $90 million in tokens from Bitcoin, EVM, Ripple, Dogecoin, Solana and other networks had been intentionally despatched to burner addresses, making restoration no longer going.

    Blockchain files reveals that funds had been moved to provocatively named wallets, similar to “1FuckiRGCTerroristsNoBiTEXXXaAovLX” and “DFuckiRGCTerroristsNoBiTEXXXWLW65t,” suggesting utilizing brute-force-generated self-esteem addresses that the attackers pause no longer bear deepest keys for. The IRCG, or Islamic Modern Guard Corps, is an significant and influential branch of the Iranian militia.

    Nobitex answered on Thursday, stating that no extra losses took place after the leak and that it plans to launch restoring products and companies within five days, although ongoing web disruptions in Iran can even delay the restoration.

    Shaurya Malwa

    Shaurya is the Co-Chief of the CoinDesk tokens and data team in Asia with a highlight on crypto derivatives, DeFi, market microstructure, and protocol diagnosis.

    Shaurya holds over $1,000 in BTC, ETH, SOL, AVAX, SUSHI, CRV, NEAR, YFI, YFII, SHIB, DOGE, USDT, USDC, BNB, MANA, MLN, LINK, XMR, ALGO, VET, CAKE, AAVE, COMP, ROOK, TRX, SNX, RUNE, FTM, ZIL, KSM, ENJ, CKB, JOE, GHST, PERP, BTRFLY, OHM, BANANA, ROME, BURGER, SPIRIT, and ORCA.

    He affords over $1,000 to liquidity pools on Compound, Curve, SushiSwap, PancakeSwap, BurgerSwap, Orca, AnySwap, SpiritSwap, Rook Protocol, Yearn Finance, Synthetix, Harvest, Redacted Cartel, OlympusDAO, Rome, Vendor Joe, and SUN.

    X icon

    data breach Shaurya Malwa

    Read More

    • Tags

    • cybercrime email-fraud forensics|digital-forensics Investigation malware Nobitex's online-scam private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker Source

    Recent Posts

    • FBI, cybersecurity companies yelp a prolific hacking crew is now concentrating on airways and the transportation sector
    • Scattered Spider hackers shift focal point to aviation, transportation companies
    • University of Virginia President Resigns Underneath Stress From Trump Administration
    • Change WinRAR now! This security flaw leaves your PC exposed to malware
    • FBI: Immigration Raid at Alabama Faculty Constructing Assign Nets 37 Arrests

    Recent Comments

    No comments to show.

    Categories

    • cybersecurity
    • Investigations
    • Uncategorized

    Recent Posts

    FBI, cybersecurity companies yelp a prolific hacking crew is now concentrating on airways and the transportation sector
    June 28, 2025
    FBI, cybersecurity companies yelp a prolific hacking crew is now concentrating on airways and the transportation sector
    Scattered Spider hackers shift focal point to aviation, transportation companies
    June 27, 2025
    Scattered Spider hackers shift focal point to aviation, transportation companies
    University of Virginia President Resigns Underneath Stress From Trump Administration
    June 27, 2025
    University of Virginia President Resigns Underneath Stress From Trump Administration

    Popular Tags

    accused administration calls Court Crypto Cyber cybercrime cybercrimefraud cybercrimehacker cybercrimephishing-attack cybersecurity deputy digital-forensics director email-fraud Extortion forensics|digital-forensics fraud government hacker hackers Investigation investigationcybersecurity Korea Korean Launches malware malwarefraud malwarephishing-attack Million North online-scam online-scamphishing-attack orders Patel phishing-attack private-detective scam|fraud private-eye cyber|cybersecurity private-eye phishing|phishing-attack private-investigator private-investigator hacking|hacker probe suspect Trump warns

    Forensics – Trusted Experts in Surveillance, Cyber Security, Background Checks, and Digital Forensics across California.

    • 310-270-0598
    • info@forensicss.com
    • 11400 West Olympic Blvd, Los Angeles, CA 90064

    Explore

    • News
    • About
    • Our Services
    • Find A Person
    • Child Custody
    • Contact Us
    • Los Angeles
    • Orange County
    • San Diego

    Services

    • Cyber Security
    • Online Blackmail
    • Cell Phone Forensics
    • Domestic Investigation
    • Social Media Investigator
    • Crypto Scam Investigation

    Newsletter

    Sign up email to get our daily latest news & updates from us

    © Copyright 2021 by KRIGO