关于「 slowmist」的内容列表

Slow Mist CISO: North Korean hackers launch specific attacks on Web3 developers

SlowMist CISO 23pds revealed in a post on X: "North Korean hackers launched a cyber attack on Web3 and cryptocurrency software developers called'Operation 99 '. The operation started with fake recruiters and was conducted on platforms such as LinkedIn, using project testing and code reviews to lure developers." Once the victim takes the bait, they are directed to clone a malicious GitLab repository, seemingly harmless but full of disaster. The clone code connects to a command and control (C2) se...

clock
2025-01-16 07:58:26
SlowMist CISO: Lazarus is using fake Willo-Talent software to trick users into downloading malicious programs

Slow Mist Chief Information Security Officer @im23pds posted a warning on social media, recently monitoring that the Lazarus organization no longer relies solely on video conferencing tools such as Zoom and Meeting as a means of attack, but instead turns to Trojan software disguised as the Willo-Talent recruitment video platform to trick recruiters into downloading and running malicious programs.

clock
2025-01-13 15:18:27
SlowMist Alert: Detected an attack on UniLend, losing about $200,000

According to SlowMist Alert on social media, UniLend was detected to be attacked and lost $197,600. The root cause of the attack was that the attacker took advantage of a vulnerability in the redemption process and manipulated the share price, causing the protocol to miscalculate the value of the attacker's collateral.

clock
2025-01-13 12:29:26
SlowMist Alert:侦测到一起针对 UniLend 的攻击,损失约 20 万美元

据SlowMist Alert在社交平台披露,检测到 UniLend 遭受了攻击,损失了197,600美元。攻击的根本原因是攻击者利用了赎回过程中的一个漏洞,通过操纵份额价格,导致协议错误计算了攻击者的抵押品价值。

clock
2025-01-13 12:29:26
Slow Mist CISO: OpenSea email service provider was attacked and the leaked address is now fully public

SlowMist Chief Information Security Officer @im23pds posted a warning on social media that the email address leaked in 2024 due to the attack on the OpenSea email service provider has been fully disclosed after multiple broadcasts. Please be aware of the relevant risks and be alert to phishing emails and other potential cyber attacks, including email addresses including CZ. Previously reported, on June 30, 2024, according to OpenSea official news, the NFT trading market disclosed its email deliv...

clock
2025-01-13 10:24:58
Slow Mist: Detection of potentially suspicious activity related to Mosca

SlowMist tweeted that it has detected potentially suspicious activity related to the Mosca token on the BNB Chain.

clock
2025-01-06 15:19:05
Solv Protocol official X account stolen and misinformation posted, please beware of the risk

According to Slow Mist Cosine Monitor, Solv Protocol official X account was stolen and released misinformation, please be vigilant and beware of the risk.

clock
2025-01-05 09:18:17
Slow Mist CISO: In the past two months, North Korean hackers have continued to pretend to be Hack VC and other conference scams. Please be vigilant against risks

Slow Mist Chief Information Security Officer 23pds said on the X platform that in the past two months, North Korean hackers have continued to impersonate Hack VC, SevenX Ventures and other institutions or individuals to commit conference fraud. Please be vigilant against the risks.

clock
2024-12-30 12:11:07
Slow Mist Cosine: Humanity Protocol project parties store plaintext private keys in sessionStorage

According to the founder of Slow Mist Cosine Disclosure, the Humanity Protocol project directly stores the plaintext private key in the browser sessionStorage, provided that it is logged in by Web2, such as email, and the platform will automatically assign wallets to users. Fortunately, this is just a test network, and there is no actual harm.

clock
2024-12-24 19:50:18
LockBit ransomware group developer and coder Rostislav Panev has received around $230,000 in cryptocurrency transfers

According to the Department of Justice, Israeli national Rostislav Panev allegedly worked as a developer and coder for the LockBit ransomware group since around January 2022, and received about $230,000 in cryptocurrency transfers as part of his work.

clock
2024-12-21 09:57:30
Data: Cryptocurrencies stolen from January to July 2024 have accumulated to $1.58 billion

SlowMist Chief Information Security Officer 23pds tweeted that the cumulative value of cryptocurrencies stolen between January 2024 and July 2024 has reached $1.58 billion, which is about 84.4% higher than the value stolen during the same period in 2023. In 2024, private key leakage accounted for the largest proportion of stolen cryptocurrencies, reaching 43.8%.

clock
2024-12-20 10:24:38
SlowMist 23pds: 1inch discovered that attackers fraudulently gained access to the private key belonging to the owner of the 1inch Labs parser smart contract

Slow Mist Technology Chief Information Security Officer 23pds issued a statement saying that 1inch disclosed that it discovered a security bugs on December 9, and the attacker fraudulently obtained access to the private key belonging to the owner of the 1inch Labs parser smart contract.

clock
2024-12-12 09:03:04
Slow Mist: DEXX attackers have transferred over 4,700 ETH to Tornado Cash

According to MistTrack, a Web3 security tool owned by SlowMist, DEXX attackers have transferred more than 4,700 ETH to Tornado Cash so far.

clock
2024-12-11 08:36:29
MistTrack: DEXX hackers have transferred 1512.4 ETH to Tornado Cash

SlowMist's Web3 security tool MistTrack has released a DEXX security incident update: DEXX hackers have transferred 1,512.4 ETH to Tornado Cash. There are still a total of 3,149.55 ETH in some Ethereum addresses. The main EVM collection address (starting with 0xFFB9) has a current balance of 1,253.83 ETH and other tokens worth 130,000 USD; Solana addresses (starting with 4smi8T) have a balance of $96,417, and Solana addresses (starting with GPuNX8) have a balance of $2200. The team will continue...

clock
2024-12-10 11:52:57
SlowMist: November Web3 security incident lost more than $86 million

According to the Slow Mist hacking database, the total cost of the Web3 security incident last month was about $86.24 million. Of the 21 hacks, about $76.86 million was lost, and "$25.50 million was recovered". The main causes of these incidents include: smart contract vulnerabilities, account breaches, and price manipulation. In addition, 9,208 victims were victims of phishing attacks in November, with "total losses of $9.38 million".

clock
2024-12-09 12:17:00