![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
根據網絡安全研究人員的說法,朝鮮黑客執行了歷史上最大的加密貨幣搶劫,僅在兩分鐘內就竊取了15億美元(12億英鎊)。
North Korean hackers executed the largest cryptocurrency heist in history, stealing $1.5 billion in two minutes, cybersecurity researchers have said.
網絡安全研究人員說,朝鮮黑客執行了歷史上最大的加密貨幣搶劫,兩分鐘內竊取了15億美元。
The hackers had compromised a so-called cold wallet—a hardware-based storage system designed to keep cryptocurrency secure by remaining offline. These wallets, similar to encrypted USB drives, are usually considered highly secure.
黑客損害了一個所謂的冷錢包,這是一個基於硬件的存儲系統,旨在通過離線剩餘的脫機來確保加密貨幣安全。這些錢包類似於加密的USB驅動器,通常被認為是高度安全的。
But when cryptocurrency exchange Bybit attempted to transfer funds from its cold wallet to an online account, the attackers struck within seconds, exploiting the transaction window.
但是,當加密貨幣交換Bybit試圖將資金從其冷錢包轉移到在線帳戶中時,攻擊者在幾秒鐘內襲擊了交易窗口。
Cybersecurity firms Sygnia and Verichains determined that the breach stemmed from a vulnerability in Safe Wallet, a technology used for secure transactions, after reconstructing the attack from digital records.
網絡安全公司Sygnia和Verichains確定,在從數字記錄中重建攻擊後,違規源於安全錢包中的脆弱性,這是一種用於安全交易的技術。
Two days before the attack, North Korean hackers, believed to be part of the notorious Lazarus Group, had embedded malicious code into the online infrastructure of Safe Wallet, the system used to communicate with Bybit’s account upon activation.
襲擊發生前兩天,據信是臭名昭著的Lazarus集團的一部分的朝鮮黑客將惡意代碼嵌入了安全錢包的在線基礎設施中,該系統用於激活後與Bybit的帳戶進行通信。
Safe Global, the company behind Safe Wallet, confirmed that the hackers had managed to “compromise the machine of a Safe Wallet developer,” attributing the breach to the group’s “sophisticated social engineering attacks.”
安全錢包背後的公司安全全球證實,黑客已經設法“妥協了安全錢包開發人員的機器”,這將違反行為歸因於該組織的“複雜的社會工程攻擊”。
The injected code was specifically designed to exploit Bybit’s wallet. It was designed to mimic the coded “signature” of three key accounts, including that of Bybit’s chief executive, enabling the attackers to bypass security checks.
注入的代碼專門設計用於利用Bybit的錢包。它旨在模仿三個關鍵帳戶的編碼“簽名”,包括拜比特的首席執行官,使攻擊者能夠繞過安全檢查。
At 2:15 PM last Friday, when Bybit attempted to transfer funds, the hackers activated their backdoor function, swiftly draining 400,000 Ethereum coins from the exchange’s wallets.
上週五下午2:15,當Bybit試圖轉移資金時,黑客激活了他們的後門功能,從交易所的錢包中迅速耗盡了40萬個以太坊硬幣。
According to a report by Sygnia, “two minutes after the malicious transaction was executed and published,” the hackers had deleted their code and exited the system, even before Bybit detected the theft.
根據Sygnia的一份報告:“惡意交易被執行和發布兩分鐘,”黑客刪除了他們的代碼並退出了系統,甚至在Bybit檢測到盜竊之前。
Following the heist, the North Korean group has been rapidly laundering the stolen funds through multiple cryptocurrency exchanges.
在搶劫之後,朝鮮集團通過多次加密貨幣交易所迅速迅速洗過被盜資金。
On Wednesday, the FBI officially attributed the heist to North Korea and identified the hacking group responsible as TraderTraitor.
週三,聯邦調查局(FBI)正式將搶劫歸因於朝鮮,並將負責的黑客組織確定為交易者。
The agency warned that the hackers are “moving quickly,” having already converted some of the stolen assets into Bitcoin and other cryptocurrencies and dispersing them across thousands of addresses on multiple blockchains.
該機構警告說,黑客正在“迅速移動”,已經將一些被盜資產轉換為比特幣和其他加密貨幣,並將其分散在數千個地址上。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
-
-
- XRP循環和託管系統概述
- 2025-03-02 04:05:36
- Ripple的主要合作夥伴SBI Holdings的最新財務報告突出了XRP的顯著增長。該報告涵蓋截至2025年3月的財政年度
-
- 加密市場面臨另一個動蕩的一周
- 2025-03-02 04:00:36
- 比特幣BTC $ 85 283 24H波動率:1.1%市值:$ 1.69 T卷。 24H:$ 31.78 b
-
-
- 一條震撼加密世界的推文:一個簡單的消息如何增強binance硬幣
- 2025-03-02 03:48:37
- 在Binance廣場繁華的數字論壇上,看似良性的推文成為2025年3月1日旋風市場運動的催化劑。
-
-