![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
基於BNB連鎖的Memecoin發射平台在遭受三明治攻擊後恢復了其運營,估計損失了120,000美元。
Four.Meme, a BNB Chain-based memecoin launch platform, has reportedly restored its operations after suffering a sandwich attack that resulted in an estimated $120,000 loss.
據報導,Forth.meme是一家基於BNB連鎖的Memecoin發射平台,據報導,遭受了三明治攻擊後恢復了其運營,估計損失了120,000美元。
On March 18, Four.Meme announced on X that its launch function was back online following a security review. The platform had temporarily suspended the function earlier in the day to investigate what it described as being “under attack.”
3月18日,有四人在X上宣布,在安全審查後,其啟動功能又在線返回。該平台在當天早些時候暫時暫停了該功能,以調查其所描述的“受到攻擊”。
“The launch function has now been resumed after a thorough security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is underway,” the Four.Meme team stated.
“我們的團隊已經解決了該問題,並為受影響的用戶提供了補償。
The post added that the platform was cooperating fully with relevant parties to identify and mitigate any risks involved.
該帖子補充說,該平台正在與相關方充分合作,以識別和減輕所涉及的任何風險。
However, Web3 security firm ExVul identified the exploit as a sandwich attack, a market manipulation tactic where an attacker attempts to execute trades immediately before and after another user’s transaction to inflate trading costs.
但是,Web3安全公司Exvul確定了漏洞攻擊是一種三明治攻擊,這是一種市場操縱策略,攻擊者試圖在另一位用戶交易前後立即執行交易以使交易成本膨脹。
According to ExVul, the attacker pre-calculated an address to create a liquidity pool’s trading pair and then leveraged one of Four.Meme’s functions to purchase tokens—bypassing the platform’s built-in token transfer restrictions.
根據Exvul的說法,攻擊者預先計算了一個地址,以創建流動性池的交易對,然後利用四個。Meme可以購買令牌的功能,這是該平台內置的代幣傳輸限制。
“The hacker lay in wait for Four.Meme to add liquidity to the transaction, ultimately siphoning off the funds,” ExVul explained.
Exvul解釋說:“黑客在等待四分之一。
A Deep Dive Into The Attack
深入研究攻擊
Meanwhile, blockchain security firm CertiK arrived at a similar conclusion, noting that the attacker manipulated the launch process by transferring an imbalanced number of unlaunched tokens to designated liquidity pair addresses.
同時,區塊鏈安全公司Certik得出了類似的結論,並指出,攻擊者通過將不平衡的未扣除令牌傳輸到指定的流動性對地址來操縱發射過程。
Once the token was officially launched, the attacker inflated the price and sold the tokens at a profit.
令牌正式推出後,攻擊者會誇大價格並以獲利的價格出售令牌。
One example cited was the SBL token, where the attacker sent a small amount of SBL to the pre-calculated pair address and then profited 21.1 BNB by sandwiching the liquidity-adding transaction at launch.
引用的一個例子是SBL令牌,攻擊者在該攻擊者中將少量的SBL發送給預定的對地址,然後通過夾在發射時將流動性添加的交易夾住,從而獲利了21.1 BNB。
This marks the second exploit on Four.Meme in just over a month. On February 11, the platform suffered a separate attack that led to losses of $183,000 worth of digital assets.
這標誌著第二個漏洞的四個月。 2月11日,該平台遭受了另一種攻擊,導致價值183,000美元的數字資產損失。
The incident comes amid a broader wave of crypto-related exploits. In February alone, cybercriminals stole $1.53 billion through scams and hacks, with the $1.4 billion Bybit exploit accounting for most of the losses.
該事件發生在更廣泛的加密相關漏洞中。僅在2月,網絡犯罪分子通過騙局和黑客偷走了15.3億美元,其中大部分損失的14億美元bybit利用會計。
According to Chainalysis, crypto crime is becoming more sophisticated, with AI-driven scams, stablecoin laundering, and coordinated cyber syndicates contributing to a $51 billion illicit transaction volume over the past year.
根據鏈分析,加密犯罪越來越複雜,在過去的一年中,AI驅動的騙局,穩定的洗錢和協調的網絡集團造成了51億美元的非法交易量。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
- 模因硬幣革命比以往任何時候都更加強大,項目不斷崩潰並帶來巨大的收益
- 2025-03-19 23:31:00
- 尤其是一種模因硬幣是現在購買的最佳模因硬幣預售 - BTFD硬幣(BTFD)
-
- 購買蘸醬的最佳加密貨幣不僅僅是抓住任何看起來便宜的東西
- 2025-03-19 23:31:00
- 聰明的投資者知道,真實資金是用紅色而不是綠色賺取的。當其他人驚慌失措時,那些堆放在頂級加密貨幣上的人會在蘸醬中積聚
-
- 今天的PI網絡(PI)價格:崩潰15%後加密貨幣恢復
- 2025-03-19 23:31:00
- 在Pi Network Coin持有者的極大救濟中,加密貨幣在最後一天墜毀後的24小時內恢復了一點點。
-
-
-
-
- HBAR是Hedera網絡的本地加密代幣,最近嘗試了一次恢復集會
- 2025-03-19 23:25:59
- HEDERA網絡的本地加密代幣HBAR最近嘗試了恢復集會,但價格缺乏維持其上升勢頭所需的支持。
-
- PI網絡發布2FA以進行錢包確認 - 這會影響PI硬幣價格嗎?
- 2025-03-19 23:25:59
- PI網絡已發布了兩因素身份驗證(2FA)以用於錢包確認,這是一種新的安全措施,需要一些先驅