Hackers Breach TRON DAO’s Official Account with Ingenious Tactics

By: cointurk|2025/05/04 01:45:01
0
Share
copy
TRON DAO’s official X account faced a sophisticated social engineering attack on May 2nd, targeting a team member. An unauthorized individual took control of the account and shared a suspicious smart contract address, sent numerous direct messages, and started following random accounts on the platform. Despite TRON DAO management regaining access to the account, the hacker continued sending messages and promoting offers through the account. Initial Breach Details: How TRON DAO’s Account Was Hacked The hack reportedly targeted a TRON DAO employee, manipulating personal authentication processes through convincing scenarios. This method granted the attacker direct administrative access. Although the exact technique remains undisclosed, the spear-phishing social engineering method was executed via emails and corporate communication channels used in daily workflows. TRON DAO promptly issued a warning, “We never share contract addresses from our account, please delete any DMs received on May 2nd,” alerting the community to potential scams. Even after restricting access to TRON DAO’s account, authorities discovered the hacker reaching out to X profiles @flacadivinaroja and @behisollg, offering paid postings from the main account. The individual, identified as using the Telegram pseudonym @EmanAbioo, is under investigation by U.S. and international law enforcement to uncover their identity. Enhancing Security Measures TRON DAO spokespersons announced a comprehensive internal investigation alongside coordinating with federal authorities. Measures considered include restructuring multi-factor authentication, mandating social engineering awareness training, and restricting critical access points. The organization aims to heighten personnel awareness against phishing due to the hacker targeting human error. Industry experts perceive this incident as a wake-up call for cryptocurrency world institutions to develop stricter anti-phishing and social engineering protocols. Although TRON DAO’s swift response limited potential financial damage, repairing reputational harm might take time. On the X platform, separate inquiries focus on analyzing suspicious IPs and session durations to track the hacker’s digital footprint.

You may also like

Stop Talking About Gold, Bitcoin Is Not a Safe Haven Asset

One cannot rely on macro narratives like "Gold Rotation" to determine whether Bitcoin has bottomed. True bottom signals will only appear during position unwinding and extreme pessimistic sentiment.

Aave Founder: What Is the Secret of the DeFi Lending Market?

When on-chain lending becomes significantly cheaper to operate end-to-end compared to traditional lending, mass adoption becomes not a question of if, but of when.

The Trader's Playbook: 7 Market Cycle Lessons From LALIGA’s 90 Minutes

What do LALIGA matches teach about crypto markets? Learn how consolidation, breakouts, and late-cycle volatility shape disciplined trading decisions.

How Smart Money Tracker Survived Live AI Trading at WEEX AI Hackathon

Discover how WEEX AI Trading Hackathon tested strategies with real capital—no simulations. See how Smart Money Tracker survived flash crashes and leveraged 18x in live markets.

80% Win Rate to 40% Drawdown: An AI Trader's Brutal Recalibration at WEEX AI Wars

Dive into the technical blueprint of an AI trading system built on LLaMA reasoning and multi-agent execution. See how Quantum Quaser uses confidence thresholds & volatility filters at WEEX AI Wars, and learn the key to unlocking 95% win rate trades.

AI Trading Strategy Explained: How a Beginner Tiana Reached the WEEX AI Trading Hackathon Finals

Can AI trading really outperform human emotion? In this exclusive WEEX Hackathon finalist interview, discover how behavioral signal strategies, SOL trend setups, and disciplined AI execution secured a spot in the finals.

Popular coins

Latest Crypto News

Read more