🎉 Share Your 2025 Year-End Summary & Win $10,000 Sharing Rewards!
Reflect on your year with Gate and share your report on Square for a chance to win $10,000!
👇 How to Join:
1️⃣ Click to check your Year-End Summary: https://www.gate.com/competition/your-year-in-review-2025
2️⃣ After viewing, share it on social media or Gate Square using the "Share" button
3️⃣ Invite friends to like, comment, and share. More interactions, higher chances of winning!
🎁 Generous Prizes:
1️⃣ Daily Lucky Winner: 1 winner per day gets $30 GT, a branded hoodie, and a Gate × Red Bull tumbler
2️⃣ Lucky Share Draw: 10
The mastermind behind the attack on Nobitex is suspected to be the Israeli hacker organization "Gonjeshke Darande".
On June 18, according to OnchainLens, the mastermind behind the hacking of the Iranian crypto trading platform Nobitex is suspected to be the Israeli hacker group “Gonjeshke Darande”. “Gonjeshke Darande” claimed responsibility for the attack, saying that “within the next 24 hours, the source code of Nobitex and its internal network will be released, and any assets within the trading platform will be at risk.” It is reported that the hacker group “Gonjeshke Darande”, which means “predator” in Persian, is known for carrying out cyberattacks on Iran’s critical infrastructure, such as gas stations, steel companies, and banks (such as Bank Sepah). While the group claims to be an independent hacking group, the technical sophistication of its attacks, as well as the targeting choices against the Iranian regime, suggest that it may have ties to the Israeli government or military, such as Unit 8200 of Israel’s military intelligence. Official Israel has maintained a vague policy on this and has never officially acknowledged its ties to the organization.