On January 22nd, according to Slow Mist Cosine's post on x, according to @realScamSniffer's feedback, the recent phishing fraud in the Solana ecosystem has shifted to stealing mnemonic words. With a large number of new users flooding into the Solana ecosystem, these users have become the main victims and suffered serious losses in capital.
On January 17, 23pds, the chief information security officer of Slow Mist Technology, said on the X platform that it had recently detected a data breach of a third-party service used by a leading trading platform, involving a large amount of employee information, including email, password and other sensitive data. The relevant situation has been synchronized to the relevant parties for processing. The end of the year is approaching, reminding everyone to be vigilant and pay attention to the safe...
On January 13, the SlowMist security team released an investigation report confirming that the screenshots of the chat related to the scamming case of actor Wang Xing were forged. The group name in the screenshot is "Fufu Special Group, the buyer places a bet of 14000u". The screenshot mentions that Wang Xing has boarded the car, and the so-called guarantee fee is 14,000 USDT, accompanied by a cryptocurrency address used to collect the guarantee fee. The on-chain data shows that the TRON address...
Security agency SlowMist recently released the "Blockchain Security and Anti-Money Laundering Annual Report 2024", which states: According to SlowMist Hacked, there were 410 security incidents in 2024, with a loss of $2.013 billion. Compared with 2023 (464 incidents, with a loss of about $2.486 billion), the loss decreased by 19.02% year-on-year. DeFi remains the most commonly attacked area. In 2024, there were 339 DeFi security incidents, accounting for 82.68% of the total number of security in...
According to the statistics of the security agency Slow Mist, among the top 10 running incidents in 2024, ZKasino, IBXtrade, and Essence Finance ranked among the top 3 in the amount of $33 million, $21.80 million, and $20 million, respectively. It is worth mentioning that Cosine said: "Most of the top 10 running events in 2024 (I am not sure whether they will be returned later) should not be people projects, and it is not necessary to treat people projects completely."
SlowMist Cosine commented on the "zombie concept coin" on the X platform. He said: "I don't know about the rest, but Forbes must be full of huge misunderstandings about Monero (XMR)... completely unaware of the'charm 'of this king of the dark web, black hard currency, privacy steel plate..."
For community users, "SlowMist's statistical results are one of the four key steps for DEXX victims to get money". SlowMist Cosine responded: "The'SlowMist Statistics' transaction is not a serial relationship with several others, because the general loss has basically been disclosed in the two or three days after the incident (the stolen market value was greater than $21 million at that time), and the subsequent increase is almost all small losses. If there is still a large amount, we...
According to SlowMist Cosine's post on the X platform, a user will send the private key to the phishing website after writing the bot with GPT code. The reason why the private key was stolen is because the private key was sent directly to the phishing website in the HTTP request body. Cosine reminds that when using LLMs such as GPT/Claude, you must pay attention to the general deception of these LLMs. AI poisoning attacks were mentioned before, and now this is a real attack case against the Cryp...
Slow Mist founder Cosine issued a message on X to remind Radiant Capital users to cancel the authorization of some addresses in time to avoid secondary damage.
On September 11th, SlowMist Chief Information Security Officer 23pds said on the X platform that after analysis, it was found that Indodax was not hacked with its hot wallet private key, but other systems were attacked, such as signature machines. It was previously reported that at 7:00 on September 11, according to the monitoring of Cyvers Alerts, Indodax's wallet carried out more than 150 suspicious transactions on different networks, with a total loss of about $18.20 million, and the suspicio...
According to a live report, Cosine, the founder of Slow Mist, pointed out in the roundtable forum entitled "Looking at the Possible Path of RWA Linking to New Global Opportunities in the Future": Once RWA is implemented with relevant smart contracts, we must first make sure that there will be no vulnerabilities in it, because everyone knows that as long as it is based on blockchain for asset issuance, it is facing attacks from all over the world.
On August 22nd, according to Slow Mist Monitoring, about 55 million DAIs stolen by a user due to phishing attacks were sent to different addresses, but some were again collected in the address 0x8cc568f3565a7ed44b3b0af8765a7ef67b8bc2dc. Most were later exchanged for ETH. Current address holdings: 0xdd6397104d57533e507bd571ac88c4b24852bce9: 6745.88 ETH and about 19.27 million USD DAI; 0x77b9f7e33e42b1f64b915bb27e9a9bca199da83e: 2164.48 ETH; 0xba258b2b0afdbff8a6b4171f2da3ef1ae8071843: 2164.45 ETH;...
August 6th news, slow fog chief information security officer 23pds on the X platform, said that according to slow fog monitoring Web3 vulnerability bounty platform Immunefi official bounty 10% of the total service fee address, the bounty service fee received so far has exceeded 30 million dollars.
A North Korean hacker posing as a US-based IT professional applied to infiltrate US cyber security company KnowBe4, but was discovered before successfully gaining access to the company's intranet. The company discovered that the newly hired senior software engineer was actually a North Korean state-level hacker who attempted to hack into the security awareness training company's systems. The fake IT employee had successfully passed background checks and multiple rounds of interviews before joini...
On July 25th, Slow Mist founder Cosine posted on the X platform that the Monoswap hack incident involved the use of the fake Kakao video conferencing Trojan software kakaocall [.] kr. The software may be spread by the OurTinTinLand project party and its participants. If you have downloaded this software, it is recommended to transfer assets safely and perform an antivirus reset immediately.