市值: $3.148T -1.760%
體積(24小時): $82.8917B 17.240%
  • 市值: $3.148T -1.760%
  • 體積(24小時): $82.8917B 17.240%
  • 恐懼與貪婪指數:
  • 市值: $3.148T -1.760%
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
Top News
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
bitcoin
bitcoin

$95948.582879 USD

-0.40%

ethereum
ethereum

$2733.981661 USD

-2.16%

xrp
xrp

$2.499032 USD

-2.66%

tether
tether

$1.000127 USD

0.01%

bnb
bnb

$644.381094 USD

-3.18%

solana
solana

$161.557113 USD

-5.85%

usd-coin
usd-coin

$0.999977 USD

0.00%

dogecoin
dogecoin

$0.233287 USD

-4.70%

cardano
cardano

$0.747213 USD

-3.58%

tron
tron

$0.245310 USD

1.12%

chainlink
chainlink

$16.936759 USD

-5.38%

sui
sui

$3.363904 USD

-0.65%

avalanche
avalanche

$24.153930 USD

-5.68%

stellar
stellar

$0.322611 USD

-3.09%

litecoin
litecoin

$125.230744 USD

-1.45%

加密貨幣新聞文章

Bybit Hackers使用Exch洗錢資金

2025/02/24 13:05

Beosintrace在08:58:23再次跟踪了@bybit_official Hacker轉移資產。新地址0x83C7678492D623FB98834F0FBCB2E7B7F5AF8950於2025年2月24日開始轉移資產,08:58:23。

Bybit Hackers使用Exch洗錢資金

Last Friday, the world witnessed one of the largest crypto heists in history, with Bybit losing around $1.5 billion in an attack attributed to the notorious North Korean hacking group, Lazarus. Now, a recent report suggests that the hacker behind the Bybit attack is laundering stolen funds through the cryptocurrency exchange eXch.

上週五,世界目睹了歷史上最大的加密搶劫案之一,拜比特(Bybit)損失了約15億美元的襲擊,歸因於臭名昭著的朝鮮黑客黑客組織拉扎魯斯(Lazarus)。現在,最近的一份報告表明,Bybit攻擊背後的黑客是通過加密貨幣交易所洗錢的資金。

This revelation comes despite eXch’s previous denial of any involvement in money laundering. On February 23, the exchange released a statement claiming, “We are not laundering money for Lazarus/DPRK,” and assured users that all funds were safe and operations were unaffected by the Bybit hack.

儘管Exch先前否認任何參與洗錢的參與,但這一啟示仍在。 2月23日,該交易所發表聲明,聲稱“我們不是為拉撒路/朝鮮洗錢。”,並向用戶保證,所有資金都是安全的,並且運營不受Bybit Hack的影響。

However, Web3 security firm BeosinTrace tracked the Bybit hacker making another transfer of stolen assets at 08:58:23 UTC+8 today. According to BeosinTrace, the method of laundering funds has become more consistent, mainly using Thorchain to transfer assets to the BTC blockchain, then converting the funds into DAI via the OKX decentralized exchange (DEX). These converted DAI tokens are then sent to eXch.

但是,Web3安全公司BeoSintrace跟踪了Bybit Hacker在今天的08:58:23 UTC+8今天的偷竊資產轉移。根據Beosintrace的說法,洗滌資金的方法已經變得更加一致,主要是使用胸科將資產轉移到BTC區塊鏈,然後通過OKX分散交易所(DEX)將資金轉換為DAI。然後將這些轉換後的DAI令牌發送到Exch。

On February 23, at 21:37:23 UTC, BeosinTrace identified a transaction from the hacker’s address, linked to the Bybit attack (0xfc926659dd8808f6e3e0a8d61b20b871f3fa6465), which was detected sending funds to settlement addresses and routed through Thorchain:Router.

2月23日,在21:37:23 UTC,BeoSintrace確定了黑客地址的交易,鏈接到BYBIT攻擊(0xFC926659D8808F6E3E3E0A8D61B20B20B20B20B20B20B20B20B20B20B20B871F3F3F3F3FA6465),該交易被檢測到了通過funcess的地址,並將其轉移到了funch incessesseptesseptessept。

Today, BeosinTrace reports that the hacker’s asset transfer was completed at 04:00:02 UTC on February 24, 2025, with the same address, 0xfc926659dd8808f6e3e0a8d61b20b871f3fa6465, being used. The asset laundering process continues to stabilize, with the funds being routed through Thorchain to the BTC chain and then exchanged for DAI on OKX DEX, before flowing into eXch.

今天,BeoSintrace報告說,黑客的資產轉移於2025年2月24日在04:00:02 UTC完成,並使用相同的地址為0xFC926659DD8808F6E3E0A8D61B20B20B20B20B20B20B20B20B20B20B20B20B20B871F3FA3FA6465。資產洗滌過程繼續穩定,這些資金通過胸鏈路由到BTC鏈,然後在OKX DEX上交換為DAI,然後才流入Exch。

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年02月24日 其他文章發表於