![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
總部位於BNB連鎖的Memecoin發射平台Four。最終恢復了運營,在遭受了三明治攻擊的攻擊後,該攻擊以120,000美元的價格利用了它。
Four.Meme, a BNB Chain-based memecoin launch platform, has resumed its launch function after being hit with a sandwich attack that exploited it for around $120,000, a crypto security firm said.
一家加密貨幣安全公司說,Forth.meme是一家位於BNB連鎖店的Memecoin發射平台,在被三明治攻擊襲擊以120,000美元左右的三明治攻擊襲擊之後,已恢復其發射功能。
The launch function was back after inspecting and addressing a security issue, Four.Meme said in an March 18 X post.
Four。在3月18日X帖子中說,在檢查和解決安全問題後,發射功能又回來了。
It had earlier suspended the function to investigate it, saying it was “under attack.”
它早些時候暫停了調查功能,稱其“受到攻擊”。
“The launch function has now been resumed after a full security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is imen. Space available for full integration.”
“在進行全面安全檢查後,現在已經恢復了啟動功能。我們的團隊已經解決了該問題並加強了系統安全性。受影響的用戶的薪酬是可供完整集成的空間。”
But Web3 security firm ExVul said in an X post that the exploit appeared to be a market manipulation technique known as a sandwich attack. It said the attacker “pre-calculated the address for creating the liquidity pool’s trading pair” and utilized one of Four.Meme’s functions to purchase tokens, which successfully bypassed the platform’s token transfer restrictions.
但是Web3安全公司Exvul在X帖子中說,漏洞利用似乎是一種被稱為三明治攻擊的市場操縱技術。它說,攻擊者“預先計算了創建流動性池的交易對的地址”,並利用了四個產品之一。Meme可以購買代幣的功能,該功能成功繞過了平台的代幣傳輸限制。
“Subsequently, the hacker lay in wait for Four.Meme to add liquidity to the transaction, ultimately siphoning off the funds,” ExVul added.
Exvul補充說:“隨後,黑客等待四個。
Blockchain security firm CertiK came to a similar conclusion and said the attacker transferred an imbalanced amount of un-launched tokens to pair addresses before the pair was created, then manipulated the price at launch to sell them afterward for profit.
區塊鏈安全公司Certik得出了類似的結論,並表示,攻擊者在創建這對夫婦之前將不平衡的未啟動令牌轉移到配對地址,然後操縱發射時的價格以後以獲利。
“In this case of SBL token, for example, the attacker sent a bit of SBL token to the pre-calculated pair address in advance, then profited 21.1 BNB by sandwiching the add liquidity transaction at launch.”
“例如,在這種情況下,攻擊者提前向預算的對地址發送了一些SBL令牌,然後通過將添加的添加流動性交易夾在發射時,從而獲利了21.1億美元。”
The tactic saw the attacker leave with at least 192 BNB (BTCUSD,) which they sent to the decentralized crypto exchange FixedFloat, according to CertiK.
據Certik稱,攻擊者至少有192 BNB(BTCUSD)離開,他們發送給了分散的加密交易所固定股。
It’s the second time that Four.Meme has been attacked in as many months, with a Feb. 11 exploit resulting in the loss of about $183,000 in digital assets.
這是第四次在數月內遭到攻擊,2月11日的利用,導致數字資產損失約183,000美元。
Across the broader crypto industry, February saw $1.53 billion in losses to scams, exploits and hacks, with the $1.4 billion Bybit hack accounting for the lion’s share.
在整個更廣泛的加密貨幣行業中,二月份,騙局,漏洞和黑客損失了15.3億美元,其中14億美元的Bybit Hack佔了獅子的份額。
Blockchain analytics firm Chainalysis says the past year saw $51 billion in illicit transaction volume, partly due to crypto crime entering a professionalized era dominated by AI-driven scams, stablecoin laundering, and efficient cyber syndicates.
區塊鏈分析公司鏈分析說,過去一年的非法交易量為510億美元,部分原因是加密犯罪進入了一個以AI驅動的騙局,穩定的騙子洗錢和有效的網絡集團為主導的專業時代。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- Regtech行業統計數據2025:市場規模,應用和區域見解
- 2025-03-20 01:06:00
- 在快節奏的合規性和技術世界中,Regtech已成為改變遊戲規則的人,簡化了全球企業的監管流程的複雜地形。
-
-
- 這標誌著迪迪世界的改變遊戲的時刻
- 2025-03-20 01:06:00
- 這標誌著在Defi世界中改變遊戲規則的時刻。它使用戶能夠在沒有中間人的情況下24/7全天候交易全鏈股票。
-
-
-
- Dawgz AI(dagz) - 為贏的模因硬幣
- 2025-03-20 01:06:00
- 正如分析師預測未來幾年的巨大增長一樣,現在是時候尋找現在購買最佳山寨幣了。
-
- 嗡嗡聲圍繞著xyzverse,這可能會遇到巨大的激增
- 2025-03-20 01:06:00
- 本文探討了Xyzverse成為市場上下一個主要機會的潛力。
-
- XRP價格飆升10%,因為美國證券交易委員會(SEC)駁回了針對Ripple的案件
- 2025-03-20 01:06:00
- 為此,XRP價格在幾分鐘內上漲了10%以上,價格為2.55美元。
-
- 放屁幣(放屁)一直在模因硬幣空間中揮舞
- 2025-03-20 01:06:00
- Fartcoin(放屁)一直在模因硬幣空間中引起轟動,儘管貿易商堆積了加密貨幣,儘管它具有波動的歷史