News list for " Attacker"

CAT Protocol: has collected important clues about protocol attackers and is willing to reward them within the scope of the policy solely for exposing vulnerabilities

CAT Protocol sent a letter to the protocol attackers on the X platform, saying it has gathered significant leads about the attempted attack and is working with security companies and law enforcement agencies such as SlowMist to track down and hold those responsible accountable. If the attacker's intention is to expose the vulnerability, encourage responsible and ethical engagement and contact via email, CAT Protocol is willing to reward such disclosure within the scope of the policy.

clock
2025-01-16 10:08:22
SlowMist: DEXX event attackers are constantly exchanging assets and bridging to Ethereum

According to MistTrack, the DEXX event attackers are currently exchanging assets and bridging to Ethereum, as of now: There is still a balance of $620,000 in the 0xFFB9 address, which is distributed across the Ethereum and BNB chains and the Base chain. DEXX hackers have transferred 6212.4 ETH to Tornado Cash.

clock
2024-12-12 18:51:18
Scam Sniffer: Most Solana wallet attackers actively use third-party domains to bypass the wallet blacklist. Please be aware of the risks

According to Scam Sniffer, most Solana wallet attackers actively use third-party domains to bypass the wallet blacklist. (For example, register an expired DAPP domain, now exploiting XSS vulnerabilities). If you see a DAPP pop-up with a second window (or redirect) asking to connect in another window, double check that it is secure.

clock
2024-12-09 01:04:53
ZachXBT: Radiant attackers go long ETH on Hyperliquid

ZachXBT, a detective on the chain, wrote on the X platform: "Radiant attackers have been long ETH on Hyperliquid through multiple addresses and have made about $600,000 so far."

clock
2024-12-08 22:06:49
Slow Mist Cosine: DEXX Attackers Collect Funds and Cross-Chain Assets to Ethereum via Wormhole

Slow Mist founder Cosine Yu X confirmed in a post that DEXX attackers are collecting scattered stolen funds on Solana and splitting them from the collection address. Some of them are starting to use Wormhole cross-chain services to cross assets to addresses starting with Ethereum 0xffe224e.

clock
2024-12-05 07:44:51
Slow Mist Cosine: DEXX attackers exchanged a large number of tokens for SOL early this morning

The founder of Slow Mist, Cosine Yu X, wrote that in the early morning of this morning, various value tokens on the Solana address related to the DEXX attacker were exchanged for SOL. At present, these SOL have not been transferred out. In addition, the attacker's EVM (ETH/BSC/BASE) addresses have begun to experience abnormal tests, and there has been no large-scale abnormal.

clock
2024-11-29 08:10:50
Slow Mist Cosine: DEXX Attackers Started Testing EVM Chain Token Exchange ETH Operation Half an Hour Ago

SlowMist Cosine revealed on the X platform that the DEXX attacker started testing the token exchange ETH operation of the EVM chain half an hour ago.

clock
2024-11-29 00:04:42
SlowMist has released a list of DEXX attacker addresses, and 8612 addresses have been identified on the Solana chain so far

SlowMist has released a list of DEXX attacker addresses, and 8,612 addresses have been identified on the Solana blockchain. The data comes from DEXX officials and reports from thousands of victims. As for the EVM chain, it is still cleaning and compiling statistics and is expected to be ready in the coming days.

clock
2024-11-28 23:07:21
Slow Mist Cosine: Attackers use the XSS vulnerability of the Cointelegraph website to trick target users into opening the Cointelegraph official website

Slow Mist founder Cosine X issued a statement saying that the attacker used the XSS vulnerability of the Cointelegraph website to trick the target user to open the Cointelegraph official website (with XSS malicious script), so: - malicious script loading execution; - The address bar is set to https://cointelegraph [.] com/not-public/drafts/article-1033 at first glance, I thought it was an official unpublished draft; - Sign in with X box; - After clicking Sign in with X, open X's third-party app ...

clock
2024-11-28 09:16:58
Slow Mist Cosine: DEXX Attacker Associated Address began exchanging a large number of tokens for SOL at 4am this morning.

The founder of Slow Mist, Cosine Yu X, wrote that at around 4 a.m. this morning, various value tokens on the Solana address related to the DEXX attacker were exchanged for SOL. At present, these SOL have not been transferred out. In addition, the attacker's EVM address has not been changed for the time being.

clock
2024-11-28 08:19:31
Pump Science: URO and RIF create wallets Attackers are issuing more fraudulent tokens, users need to be aware of the risks

Pump Science said on social media that the attackers are issuing more tokens from our compromised wallet. These tokens were not created by our team and the wallet has been compromised. Once again, none of these tokens were issued by our team and are fraudulent. Do not trust PSCIENCE's information page.

clock
2024-11-27 10:26:23
CertiK: Polterfinance attacker has deposited 220 ETH into Ethereum

According to CertiK, the Polterfinance attackers split 11.5 million FTM (about $8 million) of stolen funds into Arbitrum and Ethereum in batches, and then began depositing funds into Tornado.Cash. So far, 220 ETH ($689,000) has been deposited into Ethereum from addresses starting with 0x141C.

clock
2024-11-19 15:57:31
Polterfinance attackers have transferred 120 ETH to TornadoCash

According to PeckShield monitoring, polterfinance attackers have transferred 120 ETH to Tornado Cash. Previously, polterfinance was hacked and lost about $8.70 million worth of cryptocurrency.

clock
2024-11-19 11:53:13
CoinStats attackers resume money laundering activities after a few months

According to CertiK, the CoinStats attackers have just resumed their money laundering activities after months of inactivity. On November 9, approximately 2.6 million dai were transferred to four new addresses, and a day later another approximately 2.6 million dai were deposited into MakersDai contracts. Nonetheless, half of the 3,027 ETH (about $10 million) transferred to 0x7397 did not move, as 2.6 million Dai on 0x7b00 and 762 ETH on 0x7d38.

clock
2024-11-11 11:56:39
SUNRAY private key was leaked and attacked, losing $2.855 million

SUNRAY_DEX private keys were compromised; the attackers took ownership of the SUN and ARC tokens, minted a large number of them, and then dumped them to exhaust the dex pair. So far, the attackers have stolen 2.855 million dollars,

clock
2024-10-31 10:44:29