bitcoin
bitcoin

$98192.74 USD 

-0.46%

ethereum
ethereum

$3408.77 USD 

1.98%

tether
tether

$1.00 USD 

0.03%

solana
solana

$255.48 USD 

-1.41%

bnb
bnb

$667.50 USD 

3.21%

xrp
xrp

$1.45 USD 

-6.36%

dogecoin
dogecoin

$0.434696 USD 

-5.24%

usd-coin
usd-coin

$0.999876 USD 

0.00%

cardano
cardano

$1.06 USD 

-3.06%

tron
tron

$0.215118 USD 

3.46%

avalanche
avalanche

$42.60 USD 

-2.83%

stellar
stellar

$0.558552 USD 

28.17%

toncoin
toncoin

$6.47 USD 

16.41%

shiba-inu
shiba-inu

$0.000027 USD 

-0.82%

polkadot-new
polkadot-new

$9.11 USD 

22.91%

加密貨幣新聞文章

區塊鏈偵探揭露了 PrismaFi 駭客嫌疑,揭露了勒索行為

2024/04/17 17:03

加密偵探 ZachXBT 已經確認了所謂的 PrismaFi 駭客的身份,該駭客被稱為 0x77(或 Trung)。據信,這名駭客從協議中竊取了價值 1,110 萬美元的加密貨幣。 ZachXBT 的調查顯示,利用者的地址透過 FixFloat 接收資金,隨後在 Arbitrum 上找到。此漏洞利用程式也與先前的漏洞利用程式相關,例如 Arcade_xyz 漏洞利用程式和 Pine 協議利用程式利用程式。

區塊鏈偵探揭露了 PrismaFi 駭客嫌疑,揭露了勒索行為

Blockchain Detective Exposes Alleged PrismaFi Hacker's Identity and Extortion Demands

區塊鏈偵探揭露了涉嫌 PrismaFi 駭客的身份和勒索需求

Acclaimed blockchain investigator ZachXBT has unveiled the identity of the alleged perpetrator behind the PrismaFi hack, shedding light on their involvement in the audacious $11.1 million heist and subsequent extortion attempts.

備受讚譽的區塊鏈調查員 ZachXBT 公佈了 PrismaFi 駭客事件背後涉嫌犯罪者的身份,揭示了他們參與了這起 1,110 萬美元的大膽搶劫以及隨後的勒索企圖。

Through meticulous research and analysis, ZachXBT identified the individual known as 0x77, also known as Trung, as the prime suspect in the PrismaFi breach. The investigation further revealed Trung's potential involvement in a series of additional exploits, painting a broader picture of their malicious activities within the cryptocurrency realm.

透過細緻的研究和分析,ZachXBT 確定了名為 0x77(也稱為 Trung)的個人是 PrismaFi 洩漏事件的主要嫌疑人。調查進一步揭示了 Trung 可能參與了一系列其他攻擊活動,從而更全面地描繪了他們在加密貨幣領域內的惡意活動。

Unraveling the PrismaFi Hack

破解 PrismaFi 駭客攻擊

In March, the PrismaFi team detected a series of suspicious transactions on their MigrateTroveZap contract, culminating in the loss of 3,257 ETH (valued at approximately $11.1 million at the time). Initially, 0x77 contacted the Prisma deployer, claiming the hack was a mere "whitehat" initiative intended to identify vulnerabilities. However, this facade crumbled when all stolen funds were swiftly transferred to Tornado Cash, a sanctioned crypto mixer notorious for facilitating illicit transactions.

3 月份,PrismaFi 團隊在其 MigrateTroveZap 合約上檢測到一系列可疑交易,最終損失了 3,257 ETH(當時價值約 1,110 萬美元)。最初,0x77 聯繫了 Prisma 部署者,聲稱這次駭客攻擊只是旨在識別漏洞的「白帽」舉措。然而,當所有被盜資金迅速轉移到 Tornado Cash 時,這種假象就崩潰了。

Extortion and Audacious Demands

勒索和大膽的要求

Following the heist, 0x77 exhibited brazen audacity by issuing a series of exorbitant demands, including a whopping $3.8 million (34%) "whitehat bounty." This figure far exceeded the industry standard of 10%, raising suspicions of extortion, as ZachXBT astutely observed. The hacker's demands placed undue pressure on the Prisma team, whose treasury lacked the necessary funds to reimburse affected users.

搶劫事件發生後,0x77 表現出厚顏無恥,提出了一系列過高的要求,其中包括高達 380 萬美元(34%)的「白帽賞金」。 ZachXBT 敏銳地觀察到,這個數字遠遠超過了 10% 的行業標準,引發了敲詐勒索的嫌疑。駭客的要求給 Prisma 團隊帶來了過度的壓力,該團隊的財務部門缺乏必要的資金來償還受影響的用戶。

Investigative Trail and Connections to Other Exploits

調查線索以及與其他漏洞的聯繫

ZachXBT's investigation extended beyond the PrismaFi hack, revealing 0x77's intricate connections to a network of previous exploits. The analysis uncovered links to the Arcade_xyz exploit in March 2023 and the Pine Protocol exploit in February of the same year.

ZachXBT 的調查範圍超出了 PrismaFi 駭客攻擊的範圍,揭示了 0x77 與先前漏洞利用網路的錯綜複雜的連接。該分析發現了與 2023 年 3 月的 Arcade_xyz 漏洞和同年 2 月的 Pine Protocol 漏洞的連結。

Furthermore, 0x77's activity extended to the Telegram platform, where they operated under the alias 0x77 and maintained ties to the deployer of @modulusprotocol. These connections solidified the suspect's involvement in a broader pattern of malicious activities.

此外,0x77 的活動擴展到了 Telegram 平台,他們以別名 0x77 進行操作,並與 @modulusprotocol 的部署者保持聯繫。這些聯繫鞏固了嫌疑人參與更廣泛的惡意活動的可能性。

Personal Information and Legal Pursuit

個人資訊與法律追究

The comprehensive investigation conducted by ZachXBT also included an examination of 0x77's personal information, yielding phone numbers and email addresses that hinted at a highly proficient technical background. This gathered data has been promptly relayed to the Prisma team, who are actively pursuing legal action against the alleged hacker in both Vietnam and Australia, as confirmed by ZachXBT.

ZachXBT 進行的全面調查還包括檢查 0x77 的個人信息,得出的電話號碼和電子郵件地址暗示了其高度熟練的技術背景。 ZachXBT 證實,這些收集到的數據已立即轉發給 Prisma 團隊,該團隊正在越南和澳洲積極對涉嫌駭客採取法律行動。

Implications for the Cryptocurrency Industry

對加密貨幣產業的影響

The PrismaFi hack and the subsequent revelations regarding the alleged perpetrator serve as a stark reminder of the prevailing security challenges within the cryptocurrency industry. It underscores the need for enhanced vigilance and robust security measures to combat sophisticated attacks and protect user funds.

PrismaFi 駭客事件以及隨後有關肇事者的曝光事件清楚地提醒人們,加密貨幣行業中普遍存在安全挑戰。它強調需要提高警覺並採取強有力的安全措施來打擊複雜的攻擊並保護用戶資金。

The investigation conducted by ZachXBT is a testament to the critical role that blockchain detectives play in safeguarding the integrity of the cryptocurrency ecosystem. Their meticulous analysis and tenacity in tracking down malicious actors contribute to deterring future exploits and promoting accountability within the industry.

ZachXBT 進行的調查證明了區塊鏈偵探在維護加密貨幣生態系統完整性方面所發揮的關鍵作用。他們在追蹤惡意行為者方面的細緻分析和堅韌有助於阻止未來的攻擊並促進行業內的問責制。

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2024年11月24日 其他文章發表於