|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2025 年針對去中心化金融(DeFi)領域的第一次重大攻擊動員了道德駭客和安全專家。
A major attack on the decentralized finance (DeFi) sector has occurred in early 2025, targeting the Moby Trade protocol on the Arbitrum network. The attack resulted in the loss of approximately $2,5 million,の一部がホワイトハッカーによって回収されたことが判明した。
2025 年初,去中心化金融(DeFi)領域發生了一次針對 Arbitrum 網路上的 Moby Trade 協議的重大攻擊,該攻擊造成約 250 萬美元的損失,其中一部分被白帽追回。
The attack began with the exploitation of a compromised private key, which allowed the attacker to manipulate smart contracts and use an emergency withdrawal function to transfer assets, including 207 WETH and 3,7 WBTC, into external wallets. The attacker then proceeded to exchange the tokens for ETH and send them to addresses on the Ethereum blockchain, according to the Beosin security team.
攻擊首先利用受損的私鑰,這使得攻擊者能夠操縱智能合約並使用緊急提款功能將資產(包括 207 WETH 和 3,7 WBTC)轉移到外部錢包。據 Beosin 安全團隊稱,攻擊者隨後將代幣兌換為 ETH,並將其發送到以太坊區塊鏈上的地址。
However, a swift intervention by a white hat hacker led to the partial recovery of the stolen funds. Tony Ke, a researcher at Solayer Labs and an expert in Maximal Extractable Value (MEV), managed to use a MEV bot to identify a flaw left by the attacker in his own surrogate contract. This vulnerability allowed Ke's bot to perform a version of the same attack technique, rescuing $1,5 million in USDC.
然而,白帽駭客的迅速乾預導致部分被盜資金被追回。 Solayer Labs 研究員、最大可提取價值 (MEV) 專家 Tony Ke 成功使用 MEV 機器人來識別攻擊者在自己的代理合約中留下的缺陷。該漏洞使 Ke 的機器人能夠執行相同攻擊技術的一個版本,從而挽救了 150 萬美元的 USDC。
“It was a race against time. We managed to save part of the funds, but unfortunately we missed the recovery of other assets by about 30 seconds,” Ke said in a statement.
「這是一場與時間的賽跑。我們成功保住了部分資金,但不幸的是,我們比其他資產的回收晚了大約30秒。
The incident has prompted Moby Trade to temporarily suspend operations such as deposits and withdrawals while a full investigation is conducted. The protocol team has also assured users that losses will be compensated.
這事件促使 Moby Trade 暫時停止存款和提款等業務,同時進行全面調查。協議團隊也向用戶保證,損失將獲得賠償。
This attack is the latest in a string of DeFi hacks that have plagued the Arbitrum network in recent months. Similar attacks were also reported on Orange Finance and Stryke Protocol, both on Arbitrum, highlighting a worrying pattern of smart contract exploitation on the platform. In the case of Orange Finance, a compromised private key was also identified as the source of the issue.
這次攻擊是近幾個月來困擾 Arbitrum 網路的一系列 DeFi 駭客攻擊中的最新一起。 Arbitrum 上的 Orange Finance 和 Stryke Protocol 也報告了類似的攻擊,凸顯了該平台上令人擔憂的智慧合約利用模式。在 Orange Finance 的案例中,私鑰被洩露也被認定為問題的根源。
The DeFi market, especially on the Arbitrum network, continues to be a lucrative target for both developers and hackers. Despite the challenges, white hat hacking initiatives like Ke's demonstrate that effective and proactive solutions are possible even in critical situations.
DeFi 市場,尤其是 Arbitrum 網路上的市場,仍然是開發者和駭客利潤豐厚的目標。儘管面臨挑戰,但像 Ke 這樣的白帽駭客舉措表明,即使在危急情況下,有效且主動的解決方案也是可能的。
免責聲明:info@kdj.com
The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!
If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.
-
- 中國銀行前副行長王永利表示比特幣將損害美元霸權
- 2025-01-10 11:00:24
- 中國銀行前副行長王永利批評美國當選總統川普的比特幣儲備提議