News list for " slowmist"

Slow Mist Cosine: The front end of Safe has been tampered with and forged to achieve the effect of deception. North Korean hackers have carried out similar operations many times

SlowMist founder Cosine posted on social media that there is no problem with the Safe contract, the problem is in the non-contract part, the front end is tampered with and forged to achieve the effect of deception. This is not an isolated case. North Korean hackers have succeeded in this method several times last year, such as the WazirX incident (stolen $230 million, Safe multi-signature), Radiant Capital incident (stolen $50 million, Safe multi-signature), DMM (stolen $305 million, Gonco multi...

clock
2025-02-22 11:51:30
SlowMist CISO: Bybit attackers may break into the computers of several official personnel, and can monitor internal chat, transfer time and other information

Slow Mist Technology Chief Information Security Officer 23pds said on the X platform that Bybit attackers took away safe owner privileges in a forged signature attack. It is speculated that more than one macOS or Windows computer must have been charged, and the attacker may have stayed on the intranet for a while, able to monitor internal chat, transfer time and other information.

clock
2025-02-22 11:24:22
SlowMist: Bybit attackers exploit backdoor functions sweepETH and sweepERC20 in malicious contracts

SlowMist said on the X platform that the following are some details of the Bybit hackers: - The malicious implementation contract was deployed at 7:15:23 UTC 2025-02-19: 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516; 2025-02-21 14:13:35 UTC, the attacker used three owners to sign a transaction to replace the Safe implementation contract with a malicious one: 0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882; - malicious upgrade logic is embedded in STORAGE [0x0] via DELEGATECALL: 0...

clock
2025-02-22 01:24:17
SlowMist: Detection of potentially suspicious activity related to BOLT tokens

According to a report by SlowMist, the security team has detected potentially suspicious activity related to BOLT tokens, and SlowMist warns users to remain vigilant.

clock
2025-02-19 10:33:49
慢雾:检测到与 BOLT 代币相关的潜在可疑活动

据慢雾科技(SlowMist)报告,安全团队检测到与 BOLT 代币相关的潜在可疑活动,慢雾提醒用户保持警惕。

clock
2025-02-19 10:33:49
Slow Mist Cosine: Mode Successfully Freezes Most of Ionic Money's Stolen Assets

SlowMist Cosine posted on the X platform that the Mode network has taken action to freeze most of the stolen assets of the Ionic Money project. The currently frozen Mode wallet holds $8.80 million of stolen funds, limiting the loss in capital transferred across the chain to outside the Mode network to $3.50 million. The funds that were not intercepted have been transferred through the coin mixing protocol Tornado Cash.

clock
2025-02-13 20:12:24
Slow Mist Cosine: The zkLend hack is suspected to be the 2023 EraLend hack

The founder of Slow Mist, Cosine, wrote on X that the hacker who attacked zkLend was the same as the hacker who attacked EraLend in July 2023.

clock
2025-02-13 18:08:13
Slow Mist Cosine: zkLend was attacked due to a contract safeMath library vulnerability

According to SlowMist founder Cosine Monitor, Starknet's on-chain lending protocol zkLend was hacked on February 12, losing more than $9.50 million. The reason for the attack is that the safeMath library used in its market contract uses direct division when performing division calculations, resulting in a rounding vulnerability in the number of zTokens that actually need to be destroyed when calculating withdrawals. The attacker is taking advantage of this vulnerability to profit. The on-chain d...

clock
2025-02-13 13:50:59
Slow Mist Cosine: Hackers have moved zkLend stolen funds from the Starknet network across chains to other networks

SlowMist Cosine posted on the X platform that hackers have transferred zkLend stolen funds from the Starknet network to other networks, with most of the funds flowing to the Ethereum network.

clock
2025-02-12 19:50:09
SlowMist: Suspicious activity related to the contract "0x.. B1B" on the Base chain has been detected.

On February 11, SlowMist issued a security warning, detecting potentially suspicious activity related to the contract 0xB5486F71... 8F47834D90B1B on the Base chain. The contract has been upgraded to an implementation contract with a backdoor function transferTokens. Attackers use this function to steal user assets that have previously approved the contract. Please revoke the authorization of this contract ASAP.

clock
2025-02-11 15:27:36
慢雾:检测到Base链上合约“0x..B1B”相关可疑活动

2月11日,慢雾SlowMist发布安全警告,检测到Base链上合约0xB5486F71...8F47834D90B1B相关潜在可疑活动,该合约已升级为包含后门函数transferTokens的实现合约,攻击者使用此功能窃取之前批准过该合约的用户资产。请有关用户尽快撤销此合约授权

clock
2025-02-11 15:27:36
Slow Mist: A scam called "Safeguard" has emerged on Telegram

According to blockchain security firm SlowMist on the X platform, fraudsters are using fake Cloudflare verification pages to induce users to execute malicious code. In addition, a scam called "Safeguard" has appeared on Telegram, and users need to be vigilant. SlowMist advises users to install trusted antivirus software such as AVG, Bitdefender or Kaspersky to enhance security protection.

clock
2025-02-10 17:27:15
慢雾:Telegram 上出现了一种名为「Safeguard」的诈骗活动

据区块链安全公司 SlowMist 在 X 平台表示,诈骗者正在使用伪造的 Cloudflare 验证页面诱导用户执行恶意代码。此外,Telegram 上出现了一种名为「Safeguard」的诈骗活动,用户需提高警惕。SlowMist 建议用户安装可信赖的杀毒软件,如 AVG、Bitdefender 或 Kaspersky,以增强安全防护。

clock
2025-02-10 17:27:15
SlowMist: Spotting suspicious activity related to Cashverse

Crypto security agency SlowMist has issued a security alert, saying it has detected potentially suspicious activity related to Cashverse and urging users to remain vigilant. On-chain data can be seen, involving multiple large transfer transactions of BNB and ADAcash tokens.

clock
2025-02-08 15:28:24
SlowMist:发现 Cashverse 相关可疑活动

加密安全机构 SlowMist 发布安全预警,称检测到与 Cashverse 相关的潜在可疑活动,并呼吁用户保持警惕。从链上数据可见,涉及多笔 BNB 和 ADAcash 代币的大额转账交易。

clock
2025-02-08 15:28:24