• Home
  • Cryptocurrency Market
    • Analysis
    • Exchanges
    • Investing
    • Venture Capital
  • Blockchain Applications
    • Market
    • DeFi
    • DApps
    • Platforms
  • Technology
    • Bitcoin
    • Ethereum
    • Altcoins
  • Regulations
  • Interviews
  • All Posts
Hot News

Stop Pretending That Bitcoin Self-Custody Is Simple; The Reality Is Different

Aug. 20, 2025

Bitcoin Falls Below $113,000 as U.S. Semiconductor Stocks Lead Decline: Nvidia Drops 3.5%, AMD Plummets 5.4%

Aug. 20, 2025

Japanese Construction Company LibWork Announces Acquisition of 500 Million Yen in Bitcoin and Launch of 3D Printed Housing NFT Tokenization

Aug. 19, 2025
Facebook X (Twitter) Instagram
X (Twitter) Telegram
BlockRenaBlockRena
  • Home
  • Cryptocurrency Market
    • Analysis
    • Exchanges
    • Investing
    • Venture Capital
  • Blockchain Applications
    • Market
    • DeFi
    • DApps
    • Platforms
  • Technology
    • Bitcoin
    • Ethereum
    • Altcoins
  • Regulations
  • Interviews
  • All Posts
Subscribe
BlockRenaBlockRena
Home ยป Binance’s Slow Response Causes Massive Loss of Assets: Unveiling the Terrifying Nature of Chrome’s Malicious Extension, Aggr – Binance’s Public Response
Cryptocurrency Market

Binance’s Slow Response Causes Massive Loss of Assets: Unveiling the Terrifying Nature of Chrome’s Malicious Extension, Aggr – Binance’s Public Response

Jun. 4, 20245 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Binance's Slow Response Causes Massive Loss of Assets: Unveiling the Terrifying Nature of Chrome's Malicious Extension, Aggr - Binance's Public Response
Binance's Slow Response Causes Massive Loss of Assets: Unveiling the Terrifying Nature of Chrome's Malicious Extension, Aggr - Binance's Public Response
Share
Facebook Twitter LinkedIn Pinterest Email

A user on the X platform recounted their painful experience of having their Binance account funds stolen yesterday. The hacker was able to steal almost all of their funds on Binance without obtaining their account password and two-factor authentication (2FA) instructions. The user accused Binance of the speed of their response and the actions they took regarding this incident…

(Background information:
Browser Mining: Analysis of Chrome Extension Theft
)
(The following content is an index of the article)

What was the reason for the theft?
Aggr Malicious Extension was already in existence
Nakamao vents frustrations: Becoming a sacrifice for Binance
Binance: Unable to provide compensation
Community debates differ

Yesterday evening, a Twitter user named @CryptoNakamao recounted the painful experience of having their Binance account funds completely stolen on the X platform. They stated that without the hacker obtaining their Binance account password and 2FA code, their almost $1 million funds were stolen through “wash trading” alone.

Note: Wash trading is a trading strategy used by market makers or institutional investors. The specific operation involves opening accounts on multiple exchanges simultaneously and manipulating prices by quoting between different exchanges.

What was the reason for the theft?
According to the user’s account, it was discovered through the assistance of a security company’s investigation that the hacker manipulated their account by hijacking their web page cookies. At the same time, they purchased tokens such as QTUM and DASH on the highly liquid USDT trading pair and placed limit sell orders above market price on low liquidity trading pairs such as BTC and USDC. Finally, they used the user’s account to open leveraged trades and made large purchases to complete the wash trading.

The user further pointed out that the ultimate reason the hacker was able to hijack their Binance account by hijacking their web page cookies was due to their use of a Chrome extension called “Aggr,” which was recommended by various overseas KOLs and certain Telegram channels.

Aggr is a version of a long-standing open-source market data website’s Chrome extension. The specific operating principle behind the hacker’s malicious actions was that once the extension is installed, the hacker is able to collect the user’s cookies and forward them to the hacker’s server.

The hacker then uses the collected cookies to hijack active user sessions (posing as the user) and gain control of their account without requiring a password or 2FA. However, the user’s data is stored in 1password, so the hacker cannot directly withdraw their assets by bypassing the 2FA. They can only complete the theft through wash trading using the cookies.

Aggr Malicious Extension was already in existence
It is worth noting that according to the blockchain security company SlowMist Technology’s investigation, this malicious Aggr extension has been in existence for a long time. As early as March 1st this year, Twitter user @doomxbt provided feedback that there were abnormal situations with their Binance account and their funds were suspected to have been stolen.

Initially, this incident did not attract much attention. However, on May 28, 2024, Twitter user @Tree_of_Alpha analyzed and discovered that the victim @doomxbt had likely installed a malicious Aggr extension from the Chrome store, which had many positive reviews. It can steal all the cookies from websites visited by users, and two months ago, someone paid influential individuals to promote it.

Subsequently, Nakamao revealed their own experience of being hacked, escalating the attention on this incident. After SlowMist’s analysis, it is highly probable that the hacker is a Russian or Eastern European hacker group, and they have been planning the attack for three years. Once the malicious extension was successfully deployed, the hacker started promoting it on Twitter, waiting for the fish to take the bait…

Further reading:
Browser Mining: Analysis of Chrome Extension Theft
Nakamao vents frustrations: Becoming a sacrifice for Binance

While recounting their experience of being hacked, Nakamao also expressed dissatisfaction with Binance’s response speed and actions taken in this incident. They claimed that Binance had known about the existence of this malicious extension weeks ago but did not promptly notify users in order to trace the hacker without alerting them. They also allowed the extension to be promoted on the X platform.

At the same time, they stated that after reporting the situation to Binance staff, Binance’s response speed was too slow, resulting in the hacker’s funds not being frozen in time, ultimately leading to the inability to recover the losses.

Binance: Unable to provide compensation

In response to the user’s accusations, Binance’s official reply was as follows:

Additionally, Binance co-founder He Yi stated:

Community debates differ

Regarding this incident, community members have differing opinions. Some believe that Binance should compensate the user, as Binance allegedly knew about the malicious extension but did not promptly notify users and failed to freeze the hacker’s funds in time. However, others argue that, as Binance claims, the user’s Binance account was manipulated due to their own decision to download the malicious extension.

Regardless of the arguments on both sides, Dora cautioned users, as the SlowMist team stated:

Related reports:
SlowMist uncovers reverse phishing scam that utilizes “Token Decimals Precision”
SlowMist: Blockchain “Anti-Money Laundering, Stablecoin, SEC Regulation” 2023 Situation Report
SlowMist analyzes technology behind Google’s fake ad “crypto phishing”

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Metrics Ventures: The Easing Cycles in China and the U.S. Stimulate a Surge in RMB Assets, with A-shares Equivalent to $28,000 Bitcoin

Aug. 19, 2025

Is the Bitcoin Frenzy Pausing? Strong U.S. Employment and Rising Inflation Prompt a Brief Market Correction

Aug. 18, 2025

U.S. Policy Nuclear Proposal: Suggesting Trump Use Foreign Tariffs to “Increase Bitcoin Holdings” to Ensure America’s Greatness

Aug. 18, 2025

Bitcoin Surpasses $100,000 for Over 100 Days, Yet Retail Investors Remain Absent: What Accounts for Their Lack of Participation in This Bull Market?

Aug. 18, 2025
Add A Comment

Leave A Reply Cancel Reply

Editors Picks

Odin.fun Officially Commits to “1:1 Compensation” While Collaborating with Law Enforcement to Pursue Hackers and Attempting to Recover Frozen Assets

Aug. 19, 2025

ZachXBT Full Text: After Analyzing North Korean Hacker Tools, I Gained Insight into Their “Operational” Methods

Aug. 15, 2025

Odin.fun Hacked for Approximately 60 BTC! Founder Admits “Insufficient Funds for Compensation” and Blames Chinese Hackers

Aug. 13, 2025

The Three Evolutions of OTC Regulation in Hong Kong: From “Cryptocurrency Shops” to Comprehensive Regulation

Aug. 8, 2025
Latest Posts

ZKEX Secures 25 Million Seed Funding to Build Super DEX MultiChain Decentralized Exchange

Jul. 19, 2024

ZKasino, Suspected of Rug Pull, Announces 1:1 ETH Refund within 72 Hours, Including Return of $ZKAS

May. 29, 2024

Zhu Su’s OPNX Exchange Shuts Down Abruptly! Governance Token $OX Plunges 38%, Urgent Withdrawals Required

Feb. 2, 2024
About Us
About Us

BlockRena is your gateway to the blockchain community, offering a vibrant space where industry insights, innovation, and the latest happenings converge. Explore the ever-growing world of blockchain technology with us.

X (Twitter) Telegram
Hot Category
  • Platforms
  • Altcoins
  • Ethereum
  • Bitcoin
navigation
  • Technology
  • Interviews
  • Regulations
  • Blockchain Applications
  • Cryptocurrency Market
Copyright © 2025 BlockRena. All Rights Reserved.
  • Home
  • Cryptocurrency Market
    • Analysis
    • Exchanges
    • Investing
    • Venture Capital
  • Blockchain Applications
    • Market
    • DeFi
    • DApps
    • Platforms
  • Technology
    • Bitcoin
    • Ethereum
    • Altcoins
  • Regulations
  • Interviews
  • All Posts

Type above and press Enter to search. Press Esc to cancel.