katigra 🎩 pfp

katigra 🎩

@katigra

1413 Following
765 Followers


katigra 🎩 pfp
0 reply
0 recast
3 reactions

katigra 🎩 pfp
2 replies
0 recast
6 reactions

katigra 🎩 pfp
0 reply
0 recast
1 reaction

katigra 🎩 pfp
1 reply
0 recast
8 reactions

katigra 🎩 pfp
1 reply
0 recast
11 reactions

katigra 🎩 pfp
2 replies
0 recast
7 reactions

katigra 🎩 pfp
1 reply
0 recast
8 reactions

katigra 🎩 pfp
2 replies
0 recast
5 reactions

katigra 🎩 pfp
1 reply
0 recast
6 reactions

katigra 🎩 pfp
3 replies
0 recast
6 reactions

katigra 🎩 pfp
3 replies
0 recast
4 reactions

katigra 🎩 pfp
The vast majority of traders on the memecoin platform pump.fun did not achieve profits above $10,000, according to Dune. According to statistics, out of 13.6 million wallets registered on the site, only 55,296 recorded such profitability, which is only 0.412%. According to Lookonchain, by January 2025, the platform had earned more than 2 million SOL, equivalent to almost $398 million. A significant portion of these funds were converted into the USD Coin (USDC) stablecoin. In September 2024, it became known that out of more than 2 million tokens launched on pump.fun, only 92 had a capitalization exceeding $1 million. n December 2024, the memcoin market experienced volatility that resulted in significant financial losses. The total capitalization of the segment fell from $137 billion to $92 billion
4 replies
0 recast
9 reactions

katigra 🎩 pfp
0 reply
0 recast
1 reaction

katigra 🎩 pfp
1 reply
0 recast
0 reaction

katigra 🎩 pfp
7 replies
1 recast
10 reactions

katigra 🎩 pfp
1 reply
0 recast
5 reactions

katigra 🎩 pfp
3 replies
0 recast
6 reactions

katigra 🎩 pfp
Zoom links help steal cryptocurrencies. The scammers created links to sites that looked like the official Zoom, with the domain app[.]us4zoom[.]us. Users clicking on the link saw a fake Zoom interface. Instead of launching Zoom, the site offered to download an installation file that contained malware. Once installed, the program tricked users into entering their system password. The malicious code collected data about the system, browser, cryptocurrency wallets, notes, cookies, and even the contents of KeyChain. All information was transmitted to the hackers' servers located in the Netherlands. One of the key addresses associated with this attack was a wallet that received over 296 ETH. Some of the funds were transferred to other vaults or converted to USDT. Experts emphasize that such attacks combine elements of social engineering and the use of Trojans. Security researchers advised to always check the authenticity of links, avoid installing unknown programs and update antivirus software in a timely manner.
7 replies
1 recast
16 reactions

katigra 🎩 pfp
5 replies
0 recast
6 reactions

katigra 🎩 pfp
4 replies
0 recast
7 reactions