![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
它的支持者通过拥护权力下放来抵制批评,而其批评者则指出了最近的活动,这些活动表明了该协议的某些集中倾向。
A decentralized protocol is supposed to be neutral, but what happens when it becomes the preferred tool for state-backed hackers to loot Web3 projects and convert their stolen cryptocurrency?
一个分散的协议应该是中立的,但是当它成为国家支持黑客抢劫Web3项目并转换其失窃的加密货币的首选工具时会发生什么?
This scenario has played out with THORChain, a decentralized exchange protocol that has become a hot topic in crypto circles after the Lazarus Group, a North Korean state-backed hacking collective, used it extensively to process and convert ether (ETH) stolen from Bybit.
这种情况与Thorchain(一种分散的交换协议)一起发挥了作用,该协议已成为Crypto Circles的热门话题,此前Lazarus Group(朝鲜州支持的黑客集体)广泛地使用了它来处理和转换从BYBIT偷来的Ether(Eth)。
The hackers’ exploits began in March 2024, when they infiltrated Bybit, a major cryptocurrency exchange, and stole an enormous sum of ether, valued at around $1.4 billion at the time.
黑客的漏洞始于2024年3月,当时他们渗入了主要的加密货币交易所Bybit,并偷走了一笔巨大的Ether,当时价值约14亿美元。
After exploiting vulnerabilities in Bybit’s hot wallet, Lazarus Group hackers began transferring the stolen ether to a new address, kicking off a three-month saga tracking their movements.
在利用拜比特(Bybit)的热钱包中的漏洞之后,拉撒路集团(Lazarus Group Hackers)开始将被盗的以太转移到一个新的地址,开始了一个三个月的传奇,追踪了他们的动作。
After swiftly draining the ether to a mixer, hackers began converting it to Bitcoin (BTC) via various decentralized exchanges.
在将醚迅速将其排入混合器之后,黑客开始通过各种分散交换将其转换为比特币(BTC)。
While the hackers also used Uniswap and OKX DEX, THORChain became the main focus due to the sheer volume of funds passing through it.
虽然黑客也使用了Uniswap和OKX DEX,但由于资金经过了大量资金,Thorchain成为主要重点。
Bybit CEO Ben Zhou said in an X post on March 4 that 72% of the stolen funds—361,255 ETH—had passed through THORChain, far surpassing activity on other DeFi services.
Bybit首席执行官Ben Zhou在3月4日的X帖子中说,被盗资金的72%(361,255 ETH)通过了Thorchain,超过了其他Defi服务的活动。
Over $1 billion in Ether from the Bybit theft was traced to THORChain. Source: Coldfire/Dune Analytics
超过10亿美元的贝特盗窃案被追溯到索兰。资料来源:Coldfire/Dune Analytics
A truly decentralized platform’s strength lies in its neutrality and censorship-resistance, which are foundational to blockchain’s value proposition, according to Rachel Lin, CEO of decentralized exchange SynFutures.
分散交易交易所同步瑞切尔·林(Rachel Lin)表示,真正的分散平台的实力在于其中立性和审查制度,这是区块链价值主张的基础。
“The line between decentralization and responsibility can evolve with technology,” Lin told Cointelegraph. “While human intervention contradicts decentralization’s ethos, protocol-level innovations could automate safeguards against illicit activity.”
林告诉Cointelegraph:“权力下放和责任之间的界限可以随着技术而发展。” “尽管人类干预与权力下放的精神矛盾,但协议级创新可以自动化免于非法活动的保障措施。”
However, protocol-level changes require community consensus, which can be difficult to achieve, especially in a decentralized protocol.
但是,协议级别的变化需要社区共识,这可能很难实现,尤其是在分散协议中。
Moreover, any intervention by protocol maintainers could open a can of worms, as it would imply an obligation to intervene in future cases.
此外,协议维护者的任何干预措施都可以打开一罐蠕虫,因为这意味着有义务干预以后的情况。
Hackers also used Asgardex to swap stolen cryptocurrency and collect a portion of the protocol’s fees. Source: Yogi (Screenshot cropped by Cointelegraph for visibility)
黑客还使用Asgardex交换了被盗的加密货币并收集了一部分协议费用。资料来源:瑜伽士(Cointelegraph裁剪以可见性裁剪的屏幕截图)
A snapshot of Asgardex’s UI. Credit: Asgardex
Asgardex UI的快照。信用:asgardex
Last December, hackers used mixers like Tornado Cash to try and obfuscate the stolen funds, but the US Treasury later imposed sanctions on Tornado Cash for facilitating money laundering.
去年12月,黑客使用龙卷风现金等搅拌机试图使被盗的资金混淆,但美国财政部后来对龙卷风现金实施了制裁,以促进洗钱。
However, despite the attention on THORChain, it is worth noting that the protocol is not a mixer, and the output of its smart contracts remains traceable.
然而,尽管关注胸切除,但值得注意的是,该协议不是混合器,其智能合约的产出仍然可以追溯。
Hackers finished converting their ether to Bitcoin within 10 days, showcasing the efficiency of Web3 technologies when used for malicious purposes.
黑客在10天内将其以太币转换为比特币,在用于恶意目的时展示了Web3技术的效率。
After swiftly draining the ether to a mixer, hackers began converting it to Bitcoin (BTC) via various decentralized exchanges.
在将醚迅速将其排入混合器之后,黑客开始通过各种分散交换将其转换为比特币(BTC)。
While the hackers also used Uniswap and OKX DEX, THORChain became the main focus due to the sheer volume of funds passing through it.
虽然黑客也使用了Uniswap和OKX DEX,但由于资金经过了大量资金,Thorchain成为主要重点。
Bybit CEO Ben Zhou said in an X post on March 4 that 72% of the stolen funds—361,255 ETH—had passed through THORChain, far surpassing activity on other DeFi services.
Bybit首席执行官Ben Zhou在3月4日的X帖子中说,被盗资金的72%(361,255 ETH)通过了Thorchain,超过了其他Defi服务的活动。
Over $1 billion in Ether from the Bybit theft was traced to THORChain. Source: Coldfire/Dune Analytics
超过10亿美元的贝特盗窃案被追溯到索兰。资料来源:Coldfire/Dune Analytics
A truly decentralized platform’s strength lies in its neutrality and censorship-resistance, which are foundational to blockchain’s value proposition, according to Rachel Lin, CEO of decentralized exchange SynFutures.
分散交易交易所同步瑞切尔·林(Rachel Lin)表示,真正的分散平台的实力在于其中立性和审查制度,这是区块链价值主张的基础。
“The line between decentralization and responsibility can evolve with technology,” Lin told Cointelegraph. “While human intervention contradicts decentralization’s ethos, protocol-level innovations could automate safeguards against illicit activity.”
林告诉Cointelegraph:“权力下放和责任之间的界限可以随着技术而发展。” “尽管人类干预与权力下放的精神矛盾,但协议级创新可以自动化免于非法活动的保障措施。”
However, protocol-level changes require community consensus, which can be difficult to achieve, especially in a decentralized protocol.
但是,协议级别的变化需要社区共识,这可能很难实现,尤其是在分散协议中。
Moreover, any intervention by protocol maintainers could open a can of worms, as it would imply an obligation to intervene in future cases.
此外,协议维护者的任何干预措施都可以打开一罐蠕虫,因为这意味着有义务在将来的情况下进行干预。
Hackers also used Asgardex to swap stolen cryptocurrency and collect a portion of the protocol’s fees. Source: Yogi (Screenshot cropped by Cointelegraph for visibility)
黑客还使用Asgardex交换了被盗的加密货币并收集了一部分协议费用。资料来源:瑜伽士(Cointelegraph裁剪以可见性裁剪的屏幕截图)
Snapshot of Asgardex's UI. Credit: Asgardex
Asgardex UI的快照。信用:asgardex
Last December, hackers used mixers like Tornado Cash to try and obfuscate the stolen funds, but the US Treasury later imposed sanctions on Tornado Cash for facilitating money laundering.
去年12月,黑客使用龙卷风现金等搅拌机试图使被盗的资金混淆,但美国财政部后来对龙卷风现金实施了制裁,以促进洗钱。
However, despite the attention on THORChain, it is worth noting that the protocol is not a mixer, and the output of its smart contracts remains traceable.
然而,尽管关注胸切除,但值得注意的是,该协议不是混合器,其智能合约的产出仍然可以追溯。
Hackers finished converting their ether to Bitcoin within 10 days, showcasing the efficiency of Web3 technologies when used for malicious purposes.
黑客在10天内将其以太币转换为比特币,在用于恶意目的时展示了Web3技术的效率。
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
-
- 全天死亡(DBD)代码以及如何赎回它们(2025年3月)
- 2025-03-18 22:50:58
- 行为互动经常通过日光代码来释放,从而使您能够像所有重要的血点一样兑现免费的奖励
-
-
- Falconx和Stonex执行Solana Futures(SOL)的第一笔交易
- 2025-03-18 22:50:58
- 这项活动标志着通过受管制的衍生产品制度采用加密货币的重要一步。
-
- Shibarium,shiba inu开发的2层区块链平台
- 2025-03-18 22:50:58
- 根据Shiba INU社区帐户的公告,此升级旨在加强和加快代币创建和发现的过程
-
- 埃隆·马斯克(Elon Musk
- 2025-03-18 22:50:58
- 在最近的“判决”播客的一集中,埃隆·马斯克(Elon Musk)大胆的主张表明,各种美国政府机构运营着他所谓的“魔力计算机”
-
- Dogecoin(Doge)加强价格
- 2025-03-18 22:45:58
- Dogecoin Meme Coin现在在更广泛的加密市场的不确定性中显示出强度的迹象。
-
-
- 比特币(BTC)市场进入主要去杠杆化周期
- 2025-03-18 22:45:58
- 分析平台加密量表表明,比特币(BTC)市场正在经历一个主要的去杠杆化周期。