市值: $2.731T -2.810%
成交额(24h): $179.1293B 18.040%
  • 市值: $2.731T -2.810%
  • 成交额(24h): $179.1293B 18.040%
  • 恐惧与贪婪指数:
  • 市值: $2.731T -2.810%
加密货币
话题
百科
资讯
加密话题
视频
热门新闻
加密货币
话题
百科
资讯
加密话题
视频
bitcoin
bitcoin

$79785.470194 USD

-7.56%

ethereum
ethereum

$2122.537481 USD

-9.79%

tether
tether

$0.998851 USD

-0.02%

xrp
xrp

$2.021993 USD

-9.16%

bnb
bnb

$572.731267 USD

-7.29%

solana
solana

$128.910116 USD

-8.92%

usd-coin
usd-coin

$0.999878 USD

-0.01%

dogecoin
dogecoin

$0.186129 USD

-11.09%

cardano
cardano

$0.593669 USD

-11.26%

tron
tron

$0.219233 USD

-4.14%

litecoin
litecoin

$118.062717 USD

-8.03%

chainlink
chainlink

$13.719065 USD

-11.45%

avalanche
avalanche

$20.643703 USD

-9.63%

unus-sed-leo
unus-sed-leo

$9.125602 USD

0.41%

stellar
stellar

$0.261312 USD

-10.63%

加密货币新闻

今天购买的5个顶级加密货币:探索Aureal One和Dexboss

2025/02/28 15:20

加密货币和区块链景观不断发展,随着既定的市场领导者的出现,新的项目都出现了。

今天购买的5个顶级加密货币:探索Aureal One和Dexboss

A recent report by Sygnia and Verichains has shed light on a significant cryptocurrency heist from Bybit, executed by Lazarus Group, a North Korean hacking group. Their investigation, published in the New Chain analysis, linked a malicious JavaScript code used in the breach to Lazarus Group's activities, specifically targeting Bybit's Ethereum Multisig Cold Wallet.

Sygnia和Verichains最近的一份报告揭示了由北朝鲜黑客组织Lazarus Group执行的拜比特(Bybit)的大量加密货币抢劫案。他们的调查发表在新的链分析中,将违规中的恶意JavaScript代码与Lazarus Group的活动联系起来,特别是针对Bybit的Ethereum Multisig Cold Wallet。

The heist, which occurred in November 2022 and saw cryptocurrency to the tune of $1.5 billion stolen, was initially reported by the FBI, who also confirmed the involvement of TraderTraitor group, known for hacking and draining cryptocurrency exchanges. Among the stolen cryptocurrency was a large sum of Ethereum, rapidly converted by the hackers into Bitcoin and other cryptocurrencies to obfuscate the transactions.

FBI最初报告说,抢劫案发生于2022年11月,目的是被盗的15亿美元被盗。在被盗的加密货币中,有很大的以太坊,由黑客迅速转化为比特币和其他加密货币,以混淆交易。

As reported by Blockware, the cryptocurrency exchange, Bybit, was defrauded to an enormous scale. At the time, the cryptocurrency exchange confirmed the occurrence of the incident but opted not to disclose any further details. Nonetheless, an analysis by Sygnia and Verichains identified a malicious JavaScript code used in the breach and linked it back to Lazarus Group's activities.

正如Blockware报道的那样,加密货币交换BYBIT被欺骗到巨大的规模。当时,加密货币交易所确认了事件的发生,但选择不披露任何其他细节。但是,Sygnia和Verichains的分析确定了违规中使用的恶意JavaScript代码,并将其与Lazarus Group的活动联系起来。

Their investigation, published in the New Chain analysis, uncovered a payload deployed by Lazarus Group, targeting Bybit's Ethereum Multisig Cold Wallet. This code snippet was written in JavaScript and included a function named "handleMessage," designed to intercept and process messages from the webassembly module.

他们的调查发表在新的链分析上,发现了Lazarus Group部署的有效载荷,以Bybit的以太坊Multisig Cold Wallet为目标。此代码段是用JavaScript编写的,其中包含一个名为“ Handlesesgage”的函数,旨在拦截和处理WebAssembly模块的消息。

The analysis further revealed that the malicious actors were able to deposit the stolen cryptocurrency into various cryptocurrency mixers in an attempt to launder the funds and mask the source of the theft. Their investigation also linked the payloads used in the Bybit attack to previously known Lazarus Group campaigns, reinforcing the group's involvement in the breach.

分析进一步表明,恶意行为者能够将被盗的加密货币沉积到各种加密货币混合器中,以试图洗钱并掩盖盗窃的源头。他们的调查还将BYBIT攻击中使用的有效载荷与以前已知的Lazarus小组竞选活动联系起来,从而加强了该小组参与违规行为。

免责声明:info@kdj.com

所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!

如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。

2025年03月01日 发表的其他文章