![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
總部位於BNB連鎖的Memecoin發射平台Four。最終恢復了運營,在遭受了三明治攻擊的攻擊後,該攻擊以120,000美元的價格利用了它。
Four.Meme, a BNB Chain-based memecoin launch platform, has resumed its launch function after being hit with a sandwich attack that exploited it for around $120,000, a crypto security firm said.
一家加密貨幣安全公司說,Forth.meme是一家位於BNB連鎖店的Memecoin發射平台,在被三明治攻擊襲擊以120,000美元左右的三明治攻擊襲擊之後,已恢復其發射功能。
The launch function was back after inspecting and addressing a security issue, Four.Meme said in an March 18 X post.
Four。在3月18日X帖子中說,在檢查和解決安全問題後,發射功能又回來了。
It had earlier suspended the function to investigate it, saying it was “under attack.”
它早些時候暫停了調查功能,稱其“受到攻擊”。
“The launch function has now been resumed after a full security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is imen. Space available for full integration.”
“在進行全面安全檢查後,現在已經恢復了啟動功能。我們的團隊已經解決了該問題並加強了系統安全性。受影響的用戶的薪酬是可供完整集成的空間。”
But Web3 security firm ExVul said in an X post that the exploit appeared to be a market manipulation technique known as a sandwich attack. It said the attacker “pre-calculated the address for creating the liquidity pool’s trading pair” and utilized one of Four.Meme’s functions to purchase tokens, which successfully bypassed the platform’s token transfer restrictions.
但是Web3安全公司Exvul在X帖子中說,漏洞利用似乎是一種被稱為三明治攻擊的市場操縱技術。它說,攻擊者“預先計算了創建流動性池的交易對的地址”,並利用了四個產品之一。Meme可以購買代幣的功能,該功能成功繞過了平台的代幣傳輸限制。
“Subsequently, the hacker lay in wait for Four.Meme to add liquidity to the transaction, ultimately siphoning off the funds,” ExVul added.
Exvul補充說:“隨後,黑客等待四個。
Blockchain security firm CertiK came to a similar conclusion and said the attacker transferred an imbalanced amount of un-launched tokens to pair addresses before the pair was created, then manipulated the price at launch to sell them afterward for profit.
區塊鏈安全公司Certik得出了類似的結論,並表示,攻擊者在創建這對夫婦之前將不平衡的未啟動令牌轉移到配對地址,然後操縱發射時的價格以後以獲利。
“In this case of SBL token, for example, the attacker sent a bit of SBL token to the pre-calculated pair address in advance, then profited 21.1 BNB by sandwiching the add liquidity transaction at launch.”
“例如,在這種情況下,攻擊者提前向預算的對地址發送了一些SBL令牌,然後通過將添加的添加流動性交易夾在發射時,從而獲利了21.1億美元。”
The tactic saw the attacker leave with at least 192 BNB (BTCUSD,) which they sent to the decentralized crypto exchange FixedFloat, according to CertiK.
據Certik稱,攻擊者至少有192 BNB(BTCUSD)離開,他們發送給了分散的加密交易所固定股。
It’s the second time that Four.Meme has been attacked in as many months, with a Feb. 11 exploit resulting in the loss of about $183,000 in digital assets.
這是第四次在數月內遭到攻擊,2月11日的利用,導致數字資產損失約183,000美元。
Across the broader crypto industry, February saw $1.53 billion in losses to scams, exploits and hacks, with the $1.4 billion Bybit hack accounting for the lion’s share.
在整個更廣泛的加密貨幣行業中,二月份,騙局,漏洞和黑客損失了15.3億美元,其中14億美元的Bybit Hack佔了獅子的份額。
Blockchain analytics firm Chainalysis says the past year saw $51 billion in illicit transaction volume, partly due to crypto crime entering a professionalized era dominated by AI-driven scams, stablecoin laundering, and efficient cyber syndicates.
區塊鏈分析公司鏈分析說,過去一年的非法交易量為510億美元,部分原因是加密犯罪進入了一個以AI驅動的騙局,穩定的騙子洗錢和有效的網絡集團為主導的專業時代。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
- XRP價格預測為Wyckoff模式信號集會
- 2025-04-21 17:25:12
- 今天4月21日,加密市場是看好的,因為比特幣在諸如Ripple(XRP)之類的Altcoins周圍的三周高度樂觀情緒中激增。
-
- Circle推出了新的匯款和跨境支付網絡,目標是600億美元
- 2025-04-21 17:20:15
- 週二,$ 600億美元的Stablecoin背後的公司Circle正在啟動新的付款和跨境匯款網絡
-
- BTFD硬幣:新的模因硬幣標準。這不僅是個玩笑,而且是金礦
- 2025-04-21 17:20:15
- 本週的辛辣陣容包括四枚模因硬幣,使頭腦頭頂,但其中一個已經騎著火箭到月球上了,那就是BTFD硬幣。
-
-
- 比特幣在周一下降後周一反映了國家和國際交流的利潤
- 2025-04-21 17:15:12
- 在美國總統唐納德·特朗普(Donald Trump)宣布廣泛宣布的一段時間後,比特幣反映了國家和國際交流的利潤
-
-
-