![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
总部位于BNB连锁的Memecoin发射平台Four。最终恢复了运营,在遭受了三明治攻击的攻击后,该攻击以120,000美元的价格利用了它。
Four.Meme, a BNB Chain-based memecoin launch platform, has resumed its launch function after being hit with a sandwich attack that exploited it for around $120,000, a crypto security firm said.
一家加密货币安全公司说,Forth.meme是一家位于BNB连锁店的Memecoin发射平台,在被三明治攻击袭击以120,000美元左右的三明治攻击袭击之后,已恢复其发射功能。
The launch function was back after inspecting and addressing a security issue, Four.Meme said in an March 18 X post.
Four。在3月18日X帖子中说,在检查和解决安全问题后,发射功能又回来了。
It had earlier suspended the function to investigate it, saying it was “under attack.”
它早些时候暂停了调查功能,称其“受到攻击”。
“The launch function has now been resumed after a full security inspection. Our team has addressed the issue and reinforced system security. Compensation for affected users is imen. Space available for full integration.”
“在进行全面安全检查后,现在已经恢复了启动功能。我们的团队已经解决了该问题并加强了系统安全性。受影响的用户的薪酬是可供完整集成的空间。”
But Web3 security firm ExVul said in an X post that the exploit appeared to be a market manipulation technique known as a sandwich attack. It said the attacker “pre-calculated the address for creating the liquidity pool’s trading pair” and utilized one of Four.Meme’s functions to purchase tokens, which successfully bypassed the platform’s token transfer restrictions.
但是Web3安全公司Exvul在X帖子中说,漏洞利用似乎是一种被称为三明治攻击的市场操纵技术。它说,攻击者“预先计算了创建流动性池的交易对的地址”,并利用了四个产品之一。Meme可以购买代币的功能,该功能成功绕过了平台的代币传输限制。
“Subsequently, the hacker lay in wait for Four.Meme to add liquidity to the transaction, ultimately siphoning off the funds,” ExVul added.
Exvul补充说:“随后,黑客等待四个。
Blockchain security firm CertiK came to a similar conclusion and said the attacker transferred an imbalanced amount of un-launched tokens to pair addresses before the pair was created, then manipulated the price at launch to sell them afterward for profit.
区块链安全公司Certik得出了类似的结论,并表示,攻击者在创建这对夫妇之前将不平衡的未启动令牌转移到配对地址,然后操纵发射时的价格以后以获利。
“In this case of SBL token, for example, the attacker sent a bit of SBL token to the pre-calculated pair address in advance, then profited 21.1 BNB by sandwiching the add liquidity transaction at launch.”
“例如,在这种情况下,攻击者提前向预算的对地址发送了一些SBL令牌,然后通过将添加的添加流动性交易夹在发射时,从而获利了21.1亿美元。”
The tactic saw the attacker leave with at least 192 BNB (BTCUSD,) which they sent to the decentralized crypto exchange FixedFloat, according to CertiK.
据Certik称,攻击者至少有192 BNB(BTCUSD)离开,他们发送给了分散的加密交易所固定股。
It’s the second time that Four.Meme has been attacked in as many months, with a Feb. 11 exploit resulting in the loss of about $183,000 in digital assets.
这是第四次在数月内遭到攻击,2月11日的利用,导致数字资产损失约183,000美元。
Across the broader crypto industry, February saw $1.53 billion in losses to scams, exploits and hacks, with the $1.4 billion Bybit hack accounting for the lion’s share.
在整个更广泛的加密货币行业中,二月份,骗局,漏洞和黑客损失了15.3亿美元,其中14亿美元的Bybit Hack占了狮子的份额。
Blockchain analytics firm Chainalysis says the past year saw $51 billion in illicit transaction volume, partly due to crypto crime entering a professionalized era dominated by AI-driven scams, stablecoin laundering, and efficient cyber syndicates.
区块链分析公司链分析说,过去一年的非法交易量为510亿美元,部分原因是加密犯罪进入了一个以AI驱动的骗局,稳定的骗子洗钱和有效的网络集团为主导的专业时代。
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
-
- 有史以来最讨厌的集会:以太坊(ETH)
- 2025-03-19 22:51:00
- 加密货币市场是一个永恒的狂热与绝望之间振荡的领域,发现自己再次被以太坊(ETH)的神秘舞蹈迷住了。
-
-
-
-
-
- 弗洛基(Floki)的成长迟钝,信号是向比尔贝尔(Beerbear)转变
- 2025-03-19 22:46:00
- 弗洛基(Floki)在《超越》中引起了海浪,但是它的美好时光可能已经在它的后面。
-
-