市值: $2.7109T -0.800%
體積(24小時): $74.0549B 0.520%
  • 市值: $2.7109T -0.800%
  • 體積(24小時): $74.0549B 0.520%
  • 恐懼與貪婪指數:
  • 市值: $2.7109T -0.800%
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
Top News
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
bitcoin
bitcoin

$82992.240739 USD

-0.74%

ethereum
ethereum

$1905.557390 USD

-0.09%

tether
tether

$1.000184 USD

0.02%

xrp
xrp

$2.288240 USD

-2.48%

bnb
bnb

$639.836036 USD

0.18%

solana
solana

$125.371788 USD

-2.70%

usd-coin
usd-coin

$1.000156 USD

0.01%

cardano
cardano

$0.709189 USD

-2.10%

dogecoin
dogecoin

$0.168054 USD

-3.39%

tron
tron

$0.225003 USD

5.02%

chainlink
chainlink

$14.178727 USD

2.78%

unus-sed-leo
unus-sed-leo

$9.821699 USD

-0.06%

toncoin
toncoin

$3.542072 USD

3.56%

stellar
stellar

$0.270845 USD

-0.96%

hedera
hedera

$0.188253 USD

-1.44%

加密貨幣新聞文章

Thorchain被稱為洗錢方案 - 標籤沒有分散的財務(DEFI)項目想要

2025/03/11 23:39

它的支持者通過擁護權力下放來抵制批評,而其批評者則指出了最近的活動,這些活動表明了該協議的某些集中傾向。

A decentralized protocol is supposed to be neutral, but what happens when it becomes the preferred tool for state-backed hackers to loot Web3 projects and convert their stolen cryptocurrency?

一個分散的協議應該是中立的,但是當它成為國家支持黑客搶劫Web3項目並轉換其失竊的加密貨幣的首選工具時會發生什麼?

This scenario has played out with THORChain, a decentralized exchange protocol that has become a hot topic in crypto circles after the Lazarus Group, a North Korean state-backed hacking collective, used it extensively to process and convert ether (ETH) stolen from Bybit.

這種情況與Thorchain(一種分散的交換協議)一起發揮了作用,該協議已成為Crypto Circles的熱門話題,此前Lazarus Group(朝鮮州支持的黑客集體)廣泛地使用了它來處理和轉換從BYBIT偷來的Ether(Eth)。

The hackers’ exploits began in March 2024, when they infiltrated Bybit, a major cryptocurrency exchange, and stole an enormous sum of ether, valued at around $1.4 billion at the time.

黑客的漏洞始於2024年3月,當時他們滲入了主要的加密貨幣交易所Bybit,並偷走了一筆巨大的Ether,當時價值約14億美元。

After exploiting vulnerabilities in Bybit’s hot wallet, Lazarus Group hackers began transferring the stolen ether to a new address, kicking off a three-month saga tracking their movements.

在利用拜比特(Bybit)的熱錢包中的漏洞之後,拉撒路集團(Lazarus Group Hackers)開始將被盜的以太轉移到一個新的地址,開始了一個三個月的傳奇,追踪了他們的動作。

After swiftly draining the ether to a mixer, hackers began converting it to Bitcoin (BTC) via various decentralized exchanges.

在將醚迅速將其排入混合器之後,黑客開始通過各種分散交換將其轉換為比特幣(BTC)。

While the hackers also used Uniswap and OKX DEX, THORChain became the main focus due to the sheer volume of funds passing through it.

雖然黑客也使用了Uniswap和OKX DEX,但由於資金經過了大量資金,Thorchain成為主要重點。

Bybit CEO Ben Zhou said in an X post on March 4 that 72% of the stolen funds—361,255 ETH—had passed through THORChain, far surpassing activity on other DeFi services.

Bybit首席執行官Ben Zhou在3月4日的X帖子中說,被盜資金的72%(361,255 ETH)通過了Thorchain,超過了其他Defi服務的活動。

Over $1 billion in Ether from the Bybit theft was traced to THORChain. Source: Coldfire/Dune Analytics

超過10億美元的貝特盜竊案被追溯到索蘭。資料來源:Coldfire/Dune Analytics

A truly decentralized platform’s strength lies in its neutrality and censorship-resistance, which are foundational to blockchain’s value proposition, according to Rachel Lin, CEO of decentralized exchange SynFutures.

分散交易交易所同步瑞切爾·林(Rachel Lin)表示,真正的分散平台的實力在於其中立性和審查制度,這是區塊鏈價值主張的基礎。

“The line between decentralization and responsibility can evolve with technology,” Lin told Cointelegraph. “While human intervention contradicts decentralization’s ethos, protocol-level innovations could automate safeguards against illicit activity.”

林告訴Cointelegraph:“權力下放和責任之間的界限可以隨著技術而發展。” “儘管人類干預與權力下放的精神矛盾,但協議級創新可以自動化免於非法活動的保障措施。”

However, protocol-level changes require community consensus, which can be difficult to achieve, especially in a decentralized protocol.

但是,協議級別的變化需要社區共識,這可能很難實現,尤其是在分散協議中。

Moreover, any intervention by protocol maintainers could open a can of worms, as it would imply an obligation to intervene in future cases.

此外,協議維護者的任何干預措施都可以打開一罐蠕蟲,因為這意味著有義務在將來的情況下進行干預。

Hackers also used Asgardex to swap stolen cryptocurrency and collect a portion of the protocol’s fees. Source: Yogi (Screenshot cropped by Cointelegraph for visibility)

黑客還使用Asgardex交換了被盜的加密貨幣並收集了一部分協議費用。資料來源:瑜伽士(Cointelegraph裁剪以可見性裁剪的屏幕截圖)

A snapshot of Asgardex’s UI. Credit: Asgardex

Asgardex UI的快照。信用:asgardex

Last December, hackers used mixers like Tornado Cash to try and obfuscate the stolen funds, but the US Treasury later imposed sanctions on Tornado Cash for facilitating money laundering.

去年12月,黑客使用龍捲風現金等攪拌機試圖使被盜的資金混淆,但美國財政部後來對龍捲風現金實施了製裁,以促進洗錢。

However, despite the attention on THORChain, it is worth noting that the protocol is not a mixer, and the output of its smart contracts remains traceable.

然而,儘管關注胸切除,但值得注意的是,該協議不是混合器,其智能合約的產出仍然可以追溯。

Hackers finished converting their ether to Bitcoin within 10 days, showcasing the efficiency of Web3 technologies when used for malicious purposes.

黑客在10天內將其以太幣轉換為比特幣,在用於惡意目的時展示了Web3技術的效率。

After swiftly draining the ether to a mixer, hackers began converting it to Bitcoin (BTC) via various decentralized exchanges.

在將醚迅速將其排入混合器之後,黑客開始通過各種分散交換將其轉換為比特幣(BTC)。

While the hackers also used Uniswap and OKX DEX, THORChain became the main focus due to the sheer volume of funds passing through it.

雖然黑客也使用了Uniswap和OKX DEX,但由於資金經過了大量資金,Thorchain成為主要重點。

Bybit CEO Ben Zhou said in an X post on March 4 that 72% of the stolen funds—361,255 ETH—had passed through THORChain, far surpassing activity on other DeFi services.

Bybit首席執行官Ben Zhou在3月4日的X帖子中說,被盜資金的72%(361,255 ETH)通過了Thorchain,超過了其他Defi服務的活動。

Over $1 billion in Ether from the Bybit theft was traced to THORChain. Source: Coldfire/Dune Analytics

超過10億美元的貝特盜竊案被追溯到索蘭。資料來源:Coldfire/Dune Analytics

A truly decentralized platform’s strength lies in its neutrality and censorship-resistance, which are foundational to blockchain’s value proposition, according to Rachel Lin, CEO of decentralized exchange SynFutures.

分散交易交易所同步瑞切爾·林(Rachel Lin)表示,真正的分散平台的實力在於其中立性和審查制度,這是區塊鏈價值主張的基礎。

“The line between decentralization and responsibility can evolve with technology,” Lin told Cointelegraph. “While human intervention contradicts decentralization’s ethos, protocol-level innovations could automate safeguards against illicit activity.”

林告訴Cointelegraph:“權力下放和責任之間的界限可以隨著技術而發展。” “儘管人類干預與權力下放的精神矛盾,但協議級創新可以自動化免於非法活動的保障措施。”

However, protocol-level changes require community consensus, which can be difficult to achieve, especially in a decentralized protocol.

但是,協議級別的變化需要社區共識,這可能很難實現,尤其是在分散協議中。

Moreover, any intervention by protocol maintainers could open a can of worms, as it would imply an obligation to intervene in future cases.

此外,協議維護者的任何干預措施都可以打開一罐蠕蟲,因為這意味著有義務在將來的情況下進行干預。

Hackers also used Asgardex to swap stolen cryptocurrency and collect a portion of the protocol’s fees. Source: Yogi (Screenshot cropped by Cointelegraph for visibility)

黑客還使用Asgardex交換了被盜的加密貨幣並收集了一部分協議費用。資料來源:瑜伽士(Cointelegraph裁剪以可見性裁剪的屏幕截圖)

Snapshot of Asgardex's UI. Credit: Asgardex

Asgardex UI的快照。信用:asgardex

Last December, hackers used mixers like Tornado Cash to try and obfuscate the stolen funds, but the US Treasury later imposed sanctions on Tornado Cash for facilitating money laundering.

去年12月,黑客使用龍捲風現金等攪拌機試圖使被盜的資金混淆,但美國財政部後來對龍捲風現金實施了製裁,以促進洗錢。

However, despite the attention on THORChain, it is worth noting that the protocol is not a mixer, and the output of its smart contracts remains traceable.

然而,儘管關注胸切除,但值得注意的是,該協議不是混合器,其智能合約的產出仍然可以追溯。

Hackers finished converting their ether to Bitcoin within 10 days, showcasing the efficiency of Web3 technologies when used for malicious purposes.

黑客在10天內將其以太幣轉換為比特幣,在用於惡意目的時展示了Web3技術的效率。

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年03月18日 其他文章發表於