![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
Wemix基金會首席執行官Kim Seok-Hwan說,在四天后宣布這一消息後,“沒有試圖掩蓋620萬美元的黑客攻擊。
Kim Seok-hwan, the CEO of Wemix Foundation, said on Monday there was “no attempt” to conceal a $6.2 million hack on the platform following an announcement four days later.
Wemix Foundation首席執行官Kim Seok-Hwan週一表示,在四天后宣布之後,“沒有試圖在該平台上隱瞞620萬美元的黑客攻擊。
At a press conference, Kim also denied any intention to deceive investors.
在新聞發布會上,金還否認了任何欺騙投資者的意圖。
On February 28, over 8.65 million WEMIX coins were withdrawn due to an attack on the platform’s Play Bridge Vault. However, the South Korean platform only alerted its investors when an announcement was posted on its homepage on March 4.
2月28日,由於對平台的Play Bridge Vault的攻擊,超過865萬個Wemix硬幣被撤回。但是,韓國平台只有在3月4日在其首頁上發佈公告時才提醒投資者。
“The announcement was delayed due to concerns about the possibility of additional attacks and the possibility of market panic due to stolen assets,” said Kim.
金說:“由於擔心額外攻擊的可能性以及由於被盜資產而引起的市場恐慌的可能性,該公告被推遲了。”
According to the CEO, most of the assets had already been sold and the market impact had already happened, adding that there was no guarantee of “additional risk.”
首席執行官認為,大多數資產已經出售,市場影響已經發生,並補充說,沒有保證“額外風險”。
Bowing his head several times at the press conference, Kim acknowledged full responsibility for the delayed announcement.
金在新聞發布會上鞠躬多次,承認對這一延遲的宣布的全部責任。
Explaining what happened, Kim said an unidentified attacker stole the service monitoring authentication key for its non-fungible token (NFT) platform Nile. According to Kim, the attacker planned the hack for two months, creating abnormal transactions and attempting 15 withdrawals.
在解釋發生了什麼事時,金說,一位身份不明的攻擊者偷走了其不可殺死的令牌(NFT)平台尼羅河的服務監控身份驗證密鑰。據金說,攻擊者計劃了兩個月的黑客,創造了異常的交易並嘗試了15次提款。
Of these, two failed, but 13 were successful, resulting in the theft of 8.65 million Wemix.
其中有兩個失敗,但有13個成功,導致盜竊865萬Wemix。
After learning of the exploit, Kim said they shut down the server and began a detailed analysis. They also filed a complaint against the attacker with the Cyber Investigation Unit of the Seoul Metropolitan Police Agency.
在得知漏洞利用後,金說,他們關閉了服務器並開始了詳細的分析。他們還在首爾大都會警察局的網絡調查部門向襲擊者提出了投訴。
Kim believes that the hack was unlikely carried out by Lazarus, the North Korean-backed hacking group.
金認為,朝鮮支持的黑客小組Lazarus不太可能執行該黑客攻擊。
In recent weeks, several platforms have suffered security breaches, resulting in the theft of various coins.
最近幾週,幾個平台遭受了安全漏洞,導致盜竊各種硬幣。
Last month, Bybit was hacked after those responsible drained $1.4 billion worth of Ethereum from a single wallet. It was later reported that Lazarus was behind the theft.
上個月,拜比特(Bybit)被那些負責的人從一個錢包中耗盡了價值14億美元的以太坊之後被黑客入侵。後來據報導拉撒路在盜竊案後面。
Days later, Infini suffered a $50 million hack. The attacker in this case had retained the admin rights after working on Infini’s development contract, enabling them to gain access to the funds.
幾天后,英菲尼遭受了5000萬美元的黑客攻擊。在這種情況下,攻擊者在簽訂了Infini的開發合同後保留了行政權利,使他們能夠獲得資金。
Regarding the Wemix Foundation, Kim said on March 13 that they will buy back 10 billion Korean won (around $7 million) worth of Wemix tokens. The following day, the foundation announced plans to purchase a further 20 million tokens.
關於Wemix基金會,Kim在3月13日表示,他們將回購價值100億韓國韓元(約合700萬美元)的Wemix令牌。第二天,基金會宣布了計劃再購買2000萬個令牌的計劃。
During the press conference, Kim said they are working towards fully resuming services on Friday, March 21 after introducing new security measures to their blockchain infrastructure.
在新聞發布會上,金說,他們將在3月21日(星期五)向其區塊鏈基礎設施介紹新的安全措施後,努力全面恢復服務。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
-
-
- 比特幣PEPE(BPEP)預售引起了極大的關注,將自己定位為最高競爭者
- 2025-04-20 21:45:12
- 儘管市場動盪,比特幣的價格仍然堅定,這表明彈性吸引了投資者的注意。
-
- 鯨魚垃圾桶隨著價格掙扎
- 2025-04-20 21:40:15
- 隨著一些鯨魚錢包以令人震驚的速度擺脫了藏品,鏈上的數據已增加了狗蛋白生態系統的危險信號。
-
- 加密的未來已經在這裡,但是大多數人仍然缺少它
- 2025-04-20 21:40:15
- 目前,儘管頭條新聞尖叫著關稅搖晃技術和北京的加密貨幣擊倒,但更大的事情正在整個數字金融中悄然發展。
-
-
- Ozak AI(OZ)是AI驅動的加密貨幣空間中的主要競爭者
- 2025-04-20 21:35:12
- 加密貨幣空間中人工智能(AI)的興起正在重塑區塊鏈技術。 AI驅動的加密貨幣越來越成為投資者的重點。
-