:

RUSSIAN EXCHANGE BLAMES WEST FOR $15M CYBERATTACK

SECURITY DESK1 MIN READ
FRI, APR 17, 2026

■ AI-SUMMARIZED FROM 1 SOURCE BELOW

Grinex, a Russia-friendly cryptocurrency exchange, claims a Western intelligence agency orchestrated a $15 million cyberattack. The exchange stated the attack required resources available only to hostile state actors.

Grinex attributed the breach to what it called a "western special service," suggesting the sophistication and scale of the attack pointed to government-level involvement rather than independent hackers. The exchange did not provide technical evidence supporting its claim or identify which Western agency it suspected. Such allegations are common following major cyber incidents involving Russian-linked platforms, though attribution in cybersecurity remains contested. The $15 million theft marks a significant loss for the exchange, which operates in Russia's crypto market. Grinex said it is working to recover funds and strengthen security measures. Cyberattacks targeting cryptocurrency exchanges have increased globally, with both state and non-state actors targeting digital assets. The attribution dispute reflects broader tensions between Russia and Western nations over cyber operations.

■ SOURCES

Ars Technica

■ SUMMARY WRITTEN BY AI FROM THE LINKS ABOVE

■ MORE FROM THE SECURITY DESK

Bluesky attributed ongoing service disruptions to a sophisticated distributed denial-of-service attack Friday. The company said it found no evidence of unauthorized access to user data.

1H AGOIndustry Desk

Sam Altman's World project is expanding partnerships to verify human identity, adding Zoom and others to its existing Tinder collaboration as it shifts focus from cryptocurrency to identity verification.

2H AGOIndustry Desk

Nicholas Moore, who hacked into three U.S. government networks using stolen credentials, was sentenced to probation. Moore publicly bragged about the breach and posted victims' personal data on Instagram.

3H AGOSecurity Desk

The Payouts King ransomware exploits QEMU emulation software to run concealed virtual machines on infected systems, allowing it to evade endpoint security tools. The technique uses reverse SSH backdoors to maintain hidden access.

4H AGOSecurity Desk

■ SUBSCRIBE TO THE DAILY BRIEF

ONE EMAIL, 5 STORIES, 06:00 UTC. UNSUBSCRIBE ANYTIME.