Binance Square
attack
42,638 visningar
25 Inlägg
Hot
Latest
LIVE
LIVE
davut1karabulut
--
Cardano (ADA) Creator Reveals Real Trigger Behind Regulatory Attack on Crypto. #cardano #ADA #attack
Cardano (ADA) Creator Reveals Real Trigger Behind Regulatory Attack on Crypto.

#cardano #ADA #attack
#BTC #attack @aayannoman90 @MirzaNoman90 @Mbeyaconscious @On-chain_News @Wise_Analyze @Crypto-Matrix Defi Platform Levana Protocol Says $1.14 Million Was Lost During an 'Oracle Attack' The decentralized finance platform Levana Protocol confirmed on Dec. 27 that unknown attackers had drained approximately $1.14 million from the liquidity pool. The Levana team however insisted that the issue has “been fixed and opening positions will relaunch next week.” ‘Precognition Oracle Attacks’ The decentralized finance (defi) platform, Levana Protocol, recently confirmed that it was a victim of an oracle attack, in which approximately 10% or $1.14 million was drained from the liquidity pool (LP). However, in an update shared via X on Dec. 27, the Levana team insisted that the issue has already “been fixed and opening positions will relaunch next week.” According to the update, the attack occurred 14 days earlier, and over 12 days, the hackers were able to drain approximately 4% off the LP. However, the attack increased significantly during Osmosis congestion on Dec. 26, resulting in an additional 5% drain. Initially, the Levana team attributed the resulting change in the profit and loss (PNL) to “organic trader profits and lack of effective cash.”
#BTC #attack @AayanCom @Aayannoman @Mbeyaconscious @On-chain_News @Wise Analyze @CryptoMatrix
Defi Platform Levana Protocol Says $1.14 Million Was Lost During an 'Oracle Attack'

The decentralized finance platform Levana Protocol confirmed on Dec. 27 that unknown attackers had drained approximately $1.14 million from the liquidity pool. The Levana team however insisted that the issue has “been fixed and opening positions will relaunch next week.”

‘Precognition Oracle Attacks’
The decentralized finance (defi) platform, Levana Protocol, recently confirmed that it was a victim of an oracle attack, in which approximately 10% or $1.14 million was drained from the liquidity pool (LP). However, in an update shared via X on Dec. 27, the Levana team insisted that the issue has already “been fixed and opening positions will relaunch next week.”

According to the update, the attack occurred 14 days earlier, and over 12 days, the hackers were able to drain approximately 4% off the LP. However, the attack increased significantly during Osmosis congestion on Dec. 26, resulting in an additional 5% drain. Initially, the Levana team attributed the resulting change in the profit and loss (PNL) to “organic trader profits and lack of effective cash.”
FPG, Crypto Prime Brokerage, Suspends Withdrawals After $15 Million Cyber Attack In the wake of a cyber #attack resulting in a loss of $15 million, FPG, a leading crypto prime brokerage, has temporarily #suspended all #withdrawal requests. This precautionary measure has been implemented to safeguard user funds and investigate the incident thoroughly. The security breach highlights the ongoing challenges faced by the crypto industry in terms of cybersecurity. FPG aims to address the issue promptly and resume normal operations to ensure the safety and confidence of its customers.
FPG, Crypto Prime Brokerage, Suspends Withdrawals After $15 Million Cyber Attack

In the wake of a cyber #attack resulting in a loss of $15 million, FPG, a leading crypto prime brokerage, has temporarily #suspended all #withdrawal requests. This precautionary measure has been implemented to safeguard user funds and investigate the incident thoroughly. The security breach highlights the ongoing challenges faced by the crypto industry in terms of cybersecurity. FPG aims to address the issue promptly and resume normal operations to ensure the safety and confidence of its customers.
🚨🚨Address Poisoning: The New Wave of Attacks Targeting Crypto WalletsAs the world of cryptocurrencies grows rapidly with innovation, the increasing security threats in this area cannot be ignored. A new type of attack, known as "address poisoning," has emerged, posing a serious threat to crypto users. In this article, we will explore what address poisoning is, how it works, and how you can protect yourself from such attacks.What is Address Poisoning?Address poisoning is a method of attack that involves tricking users by imitating cryptocurrency wallet addresses. The basic principle of the attack is for hackers to analyze the transactions of targeted wallets and create addresses very similar to those the wallets normally send money to, then send small amounts of money to these addresses. Victims, mistaking these addresses for familiar ones, may mistakenly make large transfers of money.Recent Cases and LossesIn the past four months, 21 Safe Wallet users have lost 5 million dollars due to such attacks. These cases highlight the serious consequences that address poisoning can have. A critical role in these attacks is played by the Create2 function in Solidity. Security firm Slowmist reported another group of hackers using the Create2 function to steal 3 million dollars from 11 victims.The Role of the Create2 FunctionCreate2 is a function in Solidity, the programming language of Ethereum. This function allows for the pre-computation of contract addresses. However, this feature can be exploited by malicious individuals. Hackers can use this function to create addresses similar to existing ones and convince users to send money to these addresses.Ways to Protect YourselfAs a crypto user, here are ways to protect yourself from such attacks:- Careful Address Verification: Always check the sending address carefully before each transaction.- Use Secure Wallets: Choose reliable wallet providers.- Stay Alert to Suspicious Transactions: Be cautious of unexpected small transfers.With the rapid growth of the crypto sector, security threats are also increasing. New types of attacks like address poisoning require users to be careful and informed. Always be vigilant and conduct your transactions safely.#attack #BinanceTournament #Web3Wallet

🚨🚨Address Poisoning: The New Wave of Attacks Targeting Crypto Wallets

As the world of cryptocurrencies grows rapidly with innovation, the increasing security threats in this area cannot be ignored. A new type of attack, known as "address poisoning," has emerged, posing a serious threat to crypto users. In this article, we will explore what address poisoning is, how it works, and how you can protect yourself from such attacks.What is Address Poisoning?Address poisoning is a method of attack that involves tricking users by imitating cryptocurrency wallet addresses. The basic principle of the attack is for hackers to analyze the transactions of targeted wallets and create addresses very similar to those the wallets normally send money to, then send small amounts of money to these addresses. Victims, mistaking these addresses for familiar ones, may mistakenly make large transfers of money.Recent Cases and LossesIn the past four months, 21 Safe Wallet users have lost 5 million dollars due to such attacks. These cases highlight the serious consequences that address poisoning can have. A critical role in these attacks is played by the Create2 function in Solidity. Security firm Slowmist reported another group of hackers using the Create2 function to steal 3 million dollars from 11 victims.The Role of the Create2 FunctionCreate2 is a function in Solidity, the programming language of Ethereum. This function allows for the pre-computation of contract addresses. However, this feature can be exploited by malicious individuals. Hackers can use this function to create addresses similar to existing ones and convince users to send money to these addresses.Ways to Protect YourselfAs a crypto user, here are ways to protect yourself from such attacks:- Careful Address Verification: Always check the sending address carefully before each transaction.- Use Secure Wallets: Choose reliable wallet providers.- Stay Alert to Suspicious Transactions: Be cautious of unexpected small transfers.With the rapid growth of the crypto sector, security threats are also increasing. New types of attacks like address poisoning require users to be careful and informed. Always be vigilant and conduct your transactions safely.#attack #BinanceTournament #Web3Wallet
Explained: Distributed Denial of Service (DDoS) AttackWhat is Distributed Denial of Service (DDoS) attack? Distributed Denial of Service (DDoS) attack is a type of cyber-attack that aims to disrupt the availability of a targeted website or network by overwhelming it with traffic from multiple sources. The goal of a DDoS attack is to take down a website or network, making it inaccessible to its intended users. This type of #attack is typically carried out by botnets, which are networks of compromised devices that are under the control of the attacker. DDoS attacks can have significant consequences for businesses and organizations, including lost revenue, damaged reputation, and diminished customer trust. Types of DDoS Attacks There are several types of DDoS attacks that attackers can use to disrupt the availability of a targeted website or #network . Some of the most common types of DDoS attacks include: Volumetric Attacks: This type of attack aims to saturate the bandwidth of a targeted website or network by flooding it with a high volume of traffic. The traffic may consist of malformed packets, random data, or a combination of both. Protocol Attacks: This type of attack aims to consume the resources of a targeted website or network by exploiting weaknesses in the protocol used to communicate with it. The attack may involve sending a large number of requests to the target, sending malformed packets, or exploiting vulnerabilities in the protocol itself. Application Layer Attacks: This type of attack aims to overload the application layer of a targeted website or network by sending a high volume of legitimate requests. This can be achieved by targeting specific vulnerabilities in the application #layer or by mimicking legitimate user behavior. Methods used by Attackers Attackers use a variety of methods to carry out DDoS attacks. Some of the most common methods include: Botnets: Attackers can use botnets to launch DDoS attacks. A botnet is a network of compromised devices that are under the control of the attacker. The attacker can use the botnet to send a large volume of traffic to the targeted website or network. Amplification: Attackers can use amplification techniques to increase the volume of traffic they can generate. This can be achieved by sending requests that trigger large responses from the targeted website or network. Reflection: Attackers can use reflection techniques to generate traffic that appears to come from legitimate sources. This can be achieved by sending requests to servers that are configured to respond to requests from any source. Defending against DDoS Attacks There are several strategies that businesses and organizations can use to defend against DDoS attacks. Some of the most effective strategies include: Network Monitoring: Organizations can use network monitoring tools to detect and respond to DDoS attacks. These tools can identify unusual traffic patterns and alert security personnel to potential attacks. Traffic Filtering: Organizations can use traffic filtering tools to block traffic from known malicious sources. This can help to reduce the volume of traffic that the targeted website or network receives. Load Balancing: Organizations can use load balancing techniques to distribute traffic across multiple servers. This can help to prevent a single server from becoming overwhelmed by traffic. Cloud-based Solutions: Organizations can use cloud-based solutions to defend against DDoS attacks. Cloud-based solutions can provide greater scalability and flexibility than traditional on-premises solutions. Final Words DDoS attacks are a serious threat to businesses and organizations of all sizes. These attacks can have significant consequences, including lost revenue, damaged reputation, and diminished customer trust. By understanding the different types of DDoS attacks and the methods used by attackers, organizations can develop effective strategies for defending against these attacks. Some of the most effective

Explained: Distributed Denial of Service (DDoS) Attack

What is Distributed Denial of Service (DDoS) attack?

Distributed Denial of Service (DDoS) attack is a type of cyber-attack that aims to disrupt the availability of a targeted website or network by overwhelming it with traffic from multiple sources. The goal of a DDoS attack is to take down a website or network, making it inaccessible to its intended users. This type of #attack is typically carried out by botnets, which are networks of compromised devices that are under the control of the attacker. DDoS attacks can have significant consequences for businesses and organizations, including lost revenue, damaged reputation, and diminished customer trust.

Types of DDoS Attacks

There are several types of DDoS attacks that attackers can use to disrupt the availability of a targeted website or #network . Some of the most common types of DDoS attacks include:

Volumetric Attacks: This type of attack aims to saturate the bandwidth of a targeted website or network by flooding it with a high volume of traffic. The traffic may consist of malformed packets, random data, or a combination of both.

Protocol Attacks: This type of attack aims to consume the resources of a targeted website or network by exploiting weaknesses in the protocol used to communicate with it. The attack may involve sending a large number of requests to the target, sending malformed packets, or exploiting vulnerabilities in the protocol itself.

Application Layer Attacks: This type of attack aims to overload the application layer of a targeted website or network by sending a high volume of legitimate requests. This can be achieved by targeting specific vulnerabilities in the application #layer or by mimicking legitimate user behavior.

Methods used by Attackers

Attackers use a variety of methods to carry out DDoS attacks. Some of the most common methods include:

Botnets: Attackers can use botnets to launch DDoS attacks. A botnet is a network of compromised devices that are under the control of the attacker. The attacker can use the botnet to send a large volume of traffic to the targeted website or network.

Amplification: Attackers can use amplification techniques to increase the volume of traffic they can generate. This can be achieved by sending requests that trigger large responses from the targeted website or network.

Reflection: Attackers can use reflection techniques to generate traffic that appears to come from legitimate sources. This can be achieved by sending requests to servers that are configured to respond to requests from any source.

Defending against DDoS Attacks

There are several strategies that businesses and organizations can use to defend against DDoS attacks. Some of the most effective strategies include:

Network Monitoring: Organizations can use network monitoring tools to detect and respond to DDoS attacks. These tools can identify unusual traffic patterns and alert security personnel to potential attacks.

Traffic Filtering: Organizations can use traffic filtering tools to block traffic from known malicious sources. This can help to reduce the volume of traffic that the targeted website or network receives.

Load Balancing: Organizations can use load balancing techniques to distribute traffic across multiple servers. This can help to prevent a single server from becoming overwhelmed by traffic.

Cloud-based Solutions: Organizations can use cloud-based solutions to defend against DDoS attacks. Cloud-based solutions can provide greater scalability and flexibility than traditional on-premises solutions.

Final Words

DDoS attacks are a serious threat to businesses and organizations of all sizes. These attacks can have significant consequences, including lost revenue, damaged reputation, and diminished customer trust. By understanding the different types of DDoS attacks and the methods used by attackers, organizations can develop effective strategies for defending against these attacks. Some of the most effective
DeFi trader suffers 100% slippage in sandwich attack Arkham Intelligence reveals a transaction where the trader experienced a sandwich attack leading to a 100% slippage Source:blockchainreporter.net #DeFi #crypto2023 #attack #cryptotrading
DeFi trader suffers 100% slippage in sandwich attack

Arkham Intelligence reveals a transaction where the trader experienced a sandwich attack leading to a 100% slippage

Source:blockchainreporter.net

#DeFi #crypto2023 #attack #cryptotrading
Kazakhstan Regulator Issues Subpoena to Atomic Wallet Operators According to Folklog, a media specializing in cryptocurrencies, Kazakhstan's regulator has issued a subpoena to the operator of Atomic Wallet, a cryptocurrency wallet that was recently exposed to hacking attacks. In addition, the regulatory body requested access to the log-in record server of Atomic Wallet users. Previously, Atomic Wallet announced a wallet security issue on the 3rd, and announced that it was estimated that at least $35 million of cryptocurrency was stolen.  The attack was reportedly carried out by the North Korean hacker group Lazarus. #attack #cryptocurrency #hackers #fraud #attack
Kazakhstan Regulator Issues Subpoena to Atomic Wallet Operators

According to Folklog, a media specializing in cryptocurrencies, Kazakhstan's regulator has issued a subpoena to the operator of Atomic Wallet, a cryptocurrency wallet that was recently exposed to hacking attacks. In addition, the regulatory body requested access to the log-in record server of Atomic Wallet users. Previously, Atomic Wallet announced a wallet security issue on the 3rd, and announced that it was estimated that at least $35 million of cryptocurrency was stolen. 

The attack was reportedly carried out by the North Korean hacker group Lazarus.

#attack #cryptocurrency #hackers #fraud #attack
South Korean karaoke platform Somesing recently faced a cyberattack, losing over $11.5 million worthSouth Korean karaoke platform Somesing recently faced a cyberattack, losing over $11.5 million worth of its native token, SSX. The attack occurred on January 27th, sending shockwaves through the cryptocurrency community. The attack is believed to be the work of highly skilled hackers specializing in virtual asset theft. Notably, there is no evidence of involvement from Somesing's team members, as stated in the platform's official response. Somesing reported the incident promptly to the National Police Agency. The platform plans to collaborate with Interpol to investigate the cyber breach thoroughly. Somesing is working alongside the Klaytn Foundation and the cybersecurity firm Uppsala Security, an Interpol partner, to track down the attackers. The platform's main objective is to identify the responsible party quickly. It aims to take appropriate actions, including freezing the stolen assets and pursuing legal measures against those behind the cyberattack. Suspension of Services by Major Exchanges Following the security breach, major South Korean cryptocurrency exchanges temporarily suspended deposit and withdrawal services for SSX, including Upbit, Bithumb, and Coinone. These exchanges also warned their users about the potential for increased price volatility. However, other exchanges, such as HTX and Gate.io, which also list SSX, did not take similar precautionary measures. Somesing operates on the Klaytn blockchain, employing a unique model encouraging users to upload their karaoke recordings. In return for their contributions, users are rewarded with SSX tokens. These rewards are funded by fellow users who donate tokens to support their preferred karaoke performers. The distribution model allocates 60% of donated tokens to singers and 20% to Somesing, with the remaining portion divided for copyright fees and community maintenance. Cybersecurity Concerns in the Cryptocurrency Sector Despite this incident, concerns surrounding cybersecurity in the cryptocurrency sector persist. The Somesing cyberattack is just one in a series of recent security breaches. Notably, the attack on Somesing follows an $81.5 million hack on the Klaytn-linked protocol Orbit Bridge earlier in the same month. However, reports suggest that the total volume of cryptocurrency hacks in 2023 witnessed a significant reduction, dropping by over 50% compared to the previous year. The Somesing cyberattack underscores the ongoing challenges of ensuring the security of blockchain-based platforms. The platform's proactive response and collaboration with relevant entities demonstrate a determined effort to address the breach and protect users after this incident. #hacking #Korean #attack

South Korean karaoke platform Somesing recently faced a cyberattack, losing over $11.5 million worth

South Korean karaoke platform Somesing recently faced a cyberattack, losing over $11.5 million worth of its native token, SSX. The attack occurred on January 27th, sending shockwaves through the cryptocurrency community.
The attack is believed to be the work of highly skilled hackers specializing in virtual asset theft. Notably, there is no evidence of involvement from Somesing's team members, as stated in the platform's official response. Somesing reported the incident promptly to the National Police Agency. The platform plans to collaborate with Interpol to investigate the cyber breach thoroughly.
Somesing is working alongside the Klaytn Foundation and the cybersecurity firm Uppsala Security, an Interpol partner, to track down the attackers. The platform's main objective is to identify the responsible party quickly. It aims to take appropriate actions, including freezing the stolen assets and pursuing legal measures against those behind the cyberattack.
Suspension of Services by Major Exchanges
Following the security breach, major South Korean cryptocurrency exchanges temporarily suspended deposit and withdrawal services for SSX, including Upbit, Bithumb, and Coinone. These exchanges also warned their users about the potential for increased price volatility. However, other exchanges, such as HTX and Gate.io, which also list SSX, did not take similar precautionary measures.
Somesing operates on the Klaytn blockchain, employing a unique model encouraging users to upload their karaoke recordings. In return for their contributions, users are rewarded with SSX tokens. These rewards are funded by fellow users who donate tokens to support their preferred karaoke performers. The distribution model allocates 60% of donated tokens to singers and 20% to Somesing, with the remaining portion divided for copyright fees and community maintenance.
Cybersecurity Concerns in the Cryptocurrency Sector
Despite this incident, concerns surrounding cybersecurity in the cryptocurrency sector persist. The Somesing cyberattack is just one in a series of recent security breaches. Notably, the attack on Somesing follows an $81.5 million hack on the Klaytn-linked protocol Orbit Bridge earlier in the same month. However, reports suggest that the total volume of cryptocurrency hacks in 2023 witnessed a significant reduction, dropping by over 50% compared to the previous year.
The Somesing cyberattack underscores the ongoing challenges of ensuring the security of blockchain-based platforms. The platform's proactive response and collaboration with relevant entities demonstrate a determined effort to address the breach and protect users after this incident.
#hacking #Korean #attack
WHAT IS "SYBIL" AND HOW TO AVOID IT?FOR AIRDROP HUNTERS... When you farm an airdrop you must follow simple rules such as: DYOR the projecttest the platform/game/dappjoin socialsbe active and make transactionsdo NOT do exact same things on the same time on the same project via different wallets - this will turn you into a "SYBIL mode" which is.. In the context of cryptocurrency, a Sybil attack is a malicious attempt to gain undue influence or control over a decentralized network by creating numerous fake identities. This can be achieved by using low-cost or free internet services or by exploiting vulnerabilities in the network's identity verification process. How Sybil Attacks Work A Sybil attacker can use fake identities to perform various actions, such as: Manipulating consensus mechanisms: By creating a large number of fake identities, attackers can outvote honest nodes and alter the consensus rules of the network. This could allow them to double-spend coins, prevent legitimate transactions from being processed, or even halt the network altogether.Influencing governance: In some decentralized networks, certain decisions are made through community voting or governance polls. Sybil attackers can flood the network with fake votes to sway the outcome of these polls and gain control over the network's governance.Dominating airdrops: Airdrops are a common marketing strategy in the crypto space, where tokens are distributed to users based on specific criteria. Sybil attackers can create numerous fake identities to maximize their airdrop rewards, effectively stealing from other participants. Examples of Sybil Attacks in Crypto Monero's RingCT Upgrade: In 2018, an attacker attempted to manipulate the voting process for Monero's RingCT upgrade by creating over 40,000 fake identities. However, the Monero community was able to detect and invalidate these fake votes, preventing the attacker from influencing the outcome.Stealing Uniswap V1 Liquidity: In 2019, an attacker exploited a vulnerability in Uniswap V1's liquidity pool system to create millions of fake identities. This allowed them to siphon off a significant portion of the liquidity pool, causing significant losses for other users. Preventing Sybil Attacks Several strategies can be employed to mitigate the risk of Sybil attacks in decentralized networks: Reputation systems: Networks can implement reputation systems that reward honest behavior and penalize malicious activity. This can make it more difficult for Sybil attackers to gain traction.Collaborative identity verification: Networks can collaborate to verify the identities of their users. This can help to identify and eliminate fake accounts before they can cause harm.Utilizing multiple verification factors: Networks can require multiple verification factors, such as KYC (Know Your Customer) procedures, to ensure the authenticity of user identities.Implementing Sybil-resistant consensus mechanisms: Some consensus mechanisms are inherently more resistant to Sybil attacks, such as Proof of Stake (PoS) systems that require network participants to stake a significant amount of cryptocurrency to participate in the consensus process. Thanks for reading, following and supporting guys! 🙏 #airdropking #Sybil #attack #CryptoNews🔒📰🚫 #educational $BTC

WHAT IS "SYBIL" AND HOW TO AVOID IT?

FOR AIRDROP HUNTERS...

When you farm an airdrop you must follow simple rules such as:
DYOR the projecttest the platform/game/dappjoin socialsbe active and make transactionsdo NOT do exact same things on the same time on the same project via different wallets - this will turn you into a "SYBIL mode" which is..

In the context of cryptocurrency, a Sybil attack is a malicious attempt to gain undue influence or control over a decentralized network by creating numerous fake identities. This can be achieved by using low-cost or free internet services or by exploiting vulnerabilities in the network's identity verification process.

How Sybil Attacks Work
A Sybil attacker can use fake identities to perform various actions, such as:
Manipulating consensus mechanisms: By creating a large number of fake identities, attackers can outvote honest nodes and alter the consensus rules of the network. This could allow them to double-spend coins, prevent legitimate transactions from being processed, or even halt the network altogether.Influencing governance: In some decentralized networks, certain decisions are made through community voting or governance polls. Sybil attackers can flood the network with fake votes to sway the outcome of these polls and gain control over the network's governance.Dominating airdrops: Airdrops are a common marketing strategy in the crypto space, where tokens are distributed to users based on specific criteria. Sybil attackers can create numerous fake identities to maximize their airdrop rewards, effectively stealing from other participants.

Examples of Sybil Attacks in Crypto
Monero's RingCT Upgrade: In 2018, an attacker attempted to manipulate the voting process for Monero's RingCT upgrade by creating over 40,000 fake identities. However, the Monero community was able to detect and invalidate these fake votes, preventing the attacker from influencing the outcome.Stealing Uniswap V1 Liquidity: In 2019, an attacker exploited a vulnerability in Uniswap V1's liquidity pool system to create millions of fake identities. This allowed them to siphon off a significant portion of the liquidity pool, causing significant losses for other users.
Preventing Sybil Attacks
Several strategies can be employed to mitigate the risk of Sybil attacks in decentralized networks:
Reputation systems: Networks can implement reputation systems that reward honest behavior and penalize malicious activity. This can make it more difficult for Sybil attackers to gain traction.Collaborative identity verification: Networks can collaborate to verify the identities of their users. This can help to identify and eliminate fake accounts before they can cause harm.Utilizing multiple verification factors: Networks can require multiple verification factors, such as KYC (Know Your Customer) procedures, to ensure the authenticity of user identities.Implementing Sybil-resistant consensus mechanisms: Some consensus mechanisms are inherently more resistant to Sybil attacks, such as Proof of Stake (PoS) systems that require network participants to stake a significant amount of cryptocurrency to participate in the consensus process.

Thanks for reading, following and supporting guys! 🙏
#airdropking #Sybil #attack #CryptoNews🔒📰🚫 #educational $BTC
LIVE
--
Baisse (björn)
🚨 Another day, another hack! 😦 #KyberSwap DEX hit for a whopping $48M. The attacker, now teasing negotiations, has targeted multiple chains, swiping millions in $ETH and $USDC #HackerAlert #attack #KYBER
🚨 Another day, another hack! 😦

#KyberSwap DEX hit for a whopping $48M. The attacker, now teasing negotiations, has targeted multiple chains, swiping millions in $ETH and $USDC

#HackerAlert #attack #KYBER
What an #unlucky guy! He got 275,700 $LINK ($4.42M) stolen by a #phishing #attack . This guy accumulated 290,750 #LINK ($2.26M) at $7.8 from #exchanges between Jun 7, 2022, and Oct 14, 2023, a profit of nearly ~$2.4M currently. Unfortunately, he accidentally clicked on the phishing link and was deceived into signing the approval transaction. Ultimately, he lost a profit of $2.4M and a cost of $2.26M, a total loss of $4.66M!
What an #unlucky guy!

He got 275,700 $LINK ($4.42M) stolen by a #phishing #attack .

This guy accumulated 290,750 #LINK ($2.26M) at $7.8 from #exchanges between Jun 7, 2022, and Oct 14, 2023, a profit of nearly ~$2.4M currently.

Unfortunately, he accidentally clicked on the phishing link and was deceived into signing the approval transaction.

Ultimately, he lost a profit of $2.4M and a cost of $2.26M, a total loss of $4.66M!
LIVE
--
Hausse
- #Curve reports that 70% of funds impacted by a recent #hack have been successfully recovered. - The remaining portion is currently being investigated. - The team is evaluating affected users' shares to distribute the recovered #funds accurately. - Curve issues a security report concerning a hacker attack on its platform. - The #attack resulted from a vulnerability in Vyper versions 0.2.15-0.3.0, impacting aleth, peth, mseth, and crveth pools. - There's a possibility of the arbitrum-tricrypto pool being affected, though no attack has been observed yet. - Users are recommended to steer clear of the affected pool. - All other #pools on Curve are confirmed as safe for use. $CRV $BNB $BTC
- #Curve reports that 70% of funds impacted by a recent #hack have been successfully recovered.

- The remaining portion is currently being investigated.

- The team is evaluating affected users' shares to distribute the recovered #funds accurately.

- Curve issues a security report concerning a hacker attack on its platform.

- The #attack resulted from a vulnerability in Vyper versions 0.2.15-0.3.0, impacting aleth, peth, mseth, and crveth pools.

- There's a possibility of the arbitrum-tricrypto pool being affected, though no attack has been observed yet.

- Users are recommended to steer clear of the affected pool.

- All other #pools on Curve are confirmed as safe for use.

$CRV $BNB $BTC
November was the 'lossiest' month of 2023 as thieves stole $363 million in crypto. According to blockchain security firm CertiK, the Poloniex exploit, Collaboration/Heco Bridge, and the KyberSwap flash lending attack were the three biggest incidents in November. #hackers #security #attack
November was the 'lossiest' month of 2023 as thieves stole $363 million in crypto.
According to blockchain security firm CertiK, the Poloniex exploit, Collaboration/Heco Bridge, and the KyberSwap flash lending attack were the three biggest incidents in November.
#hackers #security #attack
MakerDAO Offers Bounty to Reporters of ‘Disclosure of Member Identity’ The MakerDAO community has proposed a governance proposal to provide a bounty when reporting a case in which a member's identity has been leaked. The proposer said, "If the identity of a maker DAO representative or member is exposed, it may be attacked by hackers or exposed to potential threats such as bribery. Therefore, as a minimum measure to prevent this, we hope to introduce a reward system for whistleblowers." he explained.  However, the media added that there are not a few internal concerns that unexpected side effects may occur with this proposal. #makerdao #maker #attack #crypto2023 #governance
MakerDAO Offers Bounty to Reporters of ‘Disclosure of Member Identity’

The MakerDAO community has proposed a governance proposal to provide a bounty when reporting a case in which a member's identity has been leaked. The proposer said, "If the identity of a maker DAO representative or member is exposed, it may be attacked by hackers or exposed to potential threats such as bribery. Therefore, as a minimum measure to prevent this, we hope to introduce a reward system for whistleblowers." he explained. 

However, the media added that there are not a few internal concerns that unexpected side effects may occur with this proposal.

#makerdao #maker #attack #crypto2023 #governance
7,000 MetaMask Users Targeted in Security Breach, Consensys Says Thousands of MetaMask users who contacted customer support over an 18 month period were targeted in a personal data breach, Consensys said Friday.  #crypto2023 #metamask #attack #consensys
7,000 MetaMask Users Targeted in Security Breach, Consensys Says

Thousands of MetaMask users who contacted customer support over an 18 month period were targeted in a personal data breach, Consensys said Friday. 

#crypto2023 #metamask #attack #consensys
1. **#MakerDAO Blocks VPN Users from Lending Platform:** MakerDAO's decision to block virtual private network (VPN) users from accessing its newly launched #lending platform, Spark #Protocol, has drawn criticism. The move is aimed at preventing U.S. residents from using VPNs to bypass restrictions, but it effectively prohibits VPN use worldwide, sparking concerns over user #privacy. 2. **DeFi Community Discontent:** The decision has sparked backlash within the decentralized finance (DeFi) community, with critics like DeFi analyst Chris Blec expressing strong dissatisfaction. Blec accuses MakerDAO of prioritizing profits over user privacy and asserts that the move is a global #attack on privacy, not just a U.S.-specific restriction. $MKR
1. **#MakerDAO Blocks VPN Users from Lending Platform:** MakerDAO's decision to block virtual private network (VPN) users from accessing its newly launched #lending platform, Spark #Protocol, has drawn criticism. The move is aimed at preventing U.S. residents from using VPNs to bypass restrictions, but it effectively prohibits VPN use worldwide, sparking concerns over user #privacy.

2. **DeFi Community Discontent:** The decision has sparked backlash within the decentralized finance (DeFi) community, with critics like DeFi analyst Chris Blec expressing strong dissatisfaction. Blec accuses MakerDAO of prioritizing profits over user privacy and asserts that the move is a global #attack on privacy, not just a U.S.-specific restriction.

$MKR