![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
徽章保險庫首席執行官傑克·加倫(Jake Gallen)在縮放會議上與默認安全設置濫用的變焦會議上分享了他通過X帳戶與危險的網絡攻擊打交道的經驗。
A prominent crypto executive has issued a stark warning to the digital asset community after falling victim to a sophisticated scam known as “Elusive Comet,” resulting in a staggering loss of over $100,000 in cryptocurrency.
一位著名的加密高管在成為一個被稱為“難以捉摸的彗星”的騙局的受害者之後向數字資產社區發出了明顯的警告,導致加密貨幣的損失驚人的損失超過100,000美元。
The incident, which has left the executive deeply affected, highlights the urgent need for heightened awareness and robust security measures in the crypto sphere. The executive, Emblem Vault CEO Jake Gallen, took to his X account to share his harrowing experience of dealing with a dangerous cyberattack during a Zoom meeting with default security settings.
這一事件使高管受到了深遠的影響,強調了對加密貨幣領域提高認識和強大安全措施的迫切需求。高管徽標金庫首席執行官傑克·加倫(Jake Gallen)在與默認安全環境的縮放會議上分享了他與危險的網絡攻擊打交道的痛苦經歷。
The Zoom video interview provided hackers with the opportunity to attack an unprepared cryptocurrency user through advanced malware methods which cost the victim $100,000. The Gallen incident reveals essential knowledge which crypto experts together with enthusiasts need to understand.
Zoom視頻採訪為黑客提供了通過高級惡意軟件方法攻擊未準備好的加密貨幣用戶的機會,這使受害者耗資100,000美元。加倫事件揭示了基本知識,加密專家以及發燒友需要了解的是哪些知識。
The Elusive Comet Attack in a Deceptive Zoom Interview
難以捉摸的彗星攻擊在一次欺騙性的Zoom面試中
Gallen appeared with @tacticalinvest_ for a YouTube video interview on April 8, 2025, although the personality maintained more than 90,000 subscribers at that time. Gallen first appeared genuine in his request because he confirmed the interview followed back, and the interviewer kept their social media active with matching links.
加倫(Gallen)與@TacticalInvest _出現在2025年4月8日進行YouTube視頻採訪,儘管當時的人格維持了90,000多個訂戶。加倫(Gallen)在他的要求中首先出現是真正的,因為他確認了隨後的採訪,面試官保持了與匹配鏈接的社交媒體活躍。
The interview started to become problematic because some unusual indicators emerged. The interviewer operated his camera in an off position while using external recording equipment that stands as an unusual technique in crypto communities. Unbeknownst to Gallen, the interviewer exploited Zoom’s default “remote access” feature to install malware named “goopdate” on his computer.
訪談開始變得有問題,因為出現了一些異常指標。訪調員在使用外部錄音設備的同時,在加密社區中用作不尋常技術的外部錄音設備,將相機操作。對於加倫(Gallen)而言,訪調員不知道,訪問者利用了Zoom的默認“遠程訪問”功能,以在其計算機上安裝名為“ Goopdate”的惡意軟件。
The attacker achieved complete system control with the malware to steal all Ethereum and Bitcoin wallet contents from Gallen. Through the X and Gmail platform security breach the hacker accessed both networks to send deceptive messages to his contact network.
攻擊者通過惡意軟件實現了完整的系統控制,以竊取加倫的所有以太坊和比特幣錢包。通過X和Gmail平台安全違反了黑客訪問兩個網絡,將欺騙性消息發送到他的聯繫網絡。
The sophisticated skills of the attacker became evident when Gallen discovered unauthorized sales of his NFTs on OpenSea on April 9. The hacker maintained control over the cryptocurrency assets after Gallen tried to revoke the approval process and stole funds worth more than $100,000.
當加倫在4月9日在Opensea上發現他在Opensea上的NFT銷售未經授權的銷售時,攻擊者的精緻技能變得顯而易見。在Gallen試圖撤銷批准過程並偷走了價值超過100,000美元的資金後,黑客對加密貨幣資產保持了控制。
Fake Tokens and Active Interference Expose Scammers’ Tactics
假令牌和主動干擾暴露了騙子的戰術
The scammers developed a method to stop Gallen from retrieving his wallet funds through this technique. Scammers sent fraudulent ERC20 tokens into the compromised wallet at 2:40 PM PST on April 9 after Gallen had accessed the wallet thirty minutes before.
騙子開發了一種方法,以阻止加倫通過這項技術取回他的錢包資金。騙子在4月9日下午2:40 PST將欺詐性的ERC20代幣送入了折磨的錢包,加倫在三十分鐘前訪問了錢包。
The scammers carried out this operation to disrupt his transactions because they aimed to generate wallet confusion or freeze the account to hide their asset theft. The scammer’s actions to manipulate wallet activity remain unclear to him because it shows how they actively blocked asset transfers through his X post.
騙子進行了此操作以破壞他的交易,因為它們旨在引起錢包混亂或凍結帳戶以隱藏其資產盜竊。騙子操縱錢包活動的行動對他來說尚不清楚,因為它表明了他們如何通過他的X帖子積極阻止資產傳輸。
These active actions show the Elusive Comet scam operators had effective organization. Security Alliance (SEAL) tracked the malware signature through its path until it revealed its membership in an extensive crypto-targeting operation.Strong anger from crypto users targeted Zoom because of its recent incident which now requires default setting adjustments according to these users. Cybercriminals continue to target remote work tools such as Zoom through constant attacks since 2020 according to the 2020 Acronis report because they sell remote code execution exploits on dark web marketplaces for prices up to $500,000.
這些積極的行動表明,難以捉摸的彗星騙局運營商具有有效的組織。安全聯盟(SEAL)通過其路徑跟踪了惡意軟件簽名,直到它以廣泛的加密靶向操作揭示了其成員資格。加密用戶的strong Anger針對Zoom,因為其最近的事件現在需要根據這些用戶進行默認設置調整。根據2020年Acronis的報告,網絡犯罪分子繼續針對遠程工作工具,例如自2020年以來的持續攻擊,因為他們以最高500,000美元的價格出售遠程代碼執行漏洞。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
-
-
-
-
- 當退休金開始重大變化時,退休時的工人可能會獲得6000美元的折扣
- 2025-04-16 13:25:13
- 從2026年7月開始,將要求雇主在發薪日而不是季度支付養老金。
-
-
-
- NVDA股票DUMBL
- 2025-04-16 13:15:13
- 比特幣在早期交易中達到高峰,高達86429.35美元,然後在一夜之間急劇下降至83100美元。