国产成人 综合 亚洲欧美,羞羞影院成人午夜爽爽在线,中文字幕av在线一二三区,午夜私人成年影院在线观看,男人把大ji巴放进女人视频

okx

Turnaround | Gaming platform security breach ends

時間:2024-03-28|瀏覽:945

Late on Tuesday night, the crypto community witnessed another breach. Ethereum Layer-2 NFT gaming platform Munchables reported that it was attacked on an X post.

The cryptocurrency heist, which at one point stole more than $62 million, took a shocking turn when the identity of the attacker was revealed.

Cryptocurrency Developer Turns Hacker

Yesterday, Blast-powered gaming platform Munchables suffered a security breach that resulted in the theft of 17,400 ETH worth approximately $62.5 million. Shortly after this X announcement, crypto sleuth ZachXBT revealed the amount stolen and the address to which the funds were sent.

It was later revealed that the crypto theft was the work of an insider rather than an outside attack, as one of the project's developers appeared to be the culprit.

Solidity developer 0xQuit shared worrying information about Munchable on X. The developer pointed out that the smart contract poses a serious security risk because it is a proxy contract that can be upgraded, but its implementation contract does not need to be verified.

TURNAROUNDGAMINGPLATFORMSECURITYBREACHENDSWITH62MILLIONINCRYPTOCURRENCYRETURNS

The vulnerability does not appear to be complex, as it involves claiming stolen funds from the contract. However, it requires the attacker to be an authorized party, which confirms that the theft was a conspiracy orchestrated within the project.

0xQuit conducted an in-depth investigation and concluded that the attack had been planned since its deployment. The developers of Munchable took advantage of a feature of smart contracts, which is that contracts can be updated and upgraded. In the process, the developer secretly set himself a huge ether balance before replacing the implementation of the contract with a ostensibly compliant version.

When the total value locked (TVL) is high enough, the developer “simply withdraws the balance.” Data from DeFiLlama shows that before the breach, Munchables’ TLV was $96.16 million. As of this writing, TVL has plummeted to $34.05 million.

As BlockSec reported, the funds were sent to a multi-signature wallet. The attacker eventually shared all private keys with the Munchables team. These keys provide access to $62.5 million worth of ETH, 73 WETH, and owner keys containing the rest of the project’s funds. According to calculations by Solidity developers, the total amount is close to $100 million.

TURNAROUNDGAMINGPLATFORMSECURITYBREACHENDSWITH62MILLIONINCRYPTOCURRENCYRETURNS

Changing attitudes or fear in the crypto community?

Unfortunately, encryption breaches, hacks, and scams are common in the industry. Most of the time, hackers walk away with huge sums of money, leaving investors with empty pockets.

This time, the events are even more thrilling than usual, as the developer takes on the identity of a hacker, uncovering a web of lies and deception. As ZachXBT suggests, Munchable's renegade developer appears to be North Korean and appears to be associated with the Lazarus group.

However, the movie doesn't end there: Blockchain investigators revealed that four different developers employed by the Munchables team were all related to the exploiter, and they all appear to be the same person.

TURNAROUNDGAMINGPLATFORMSECURITYBREACHENDSWITH62MILLIONINCRYPTOCURRENCYRETURNS

These developers recommended each other for the job and regularly transferred payments to two different deposit addresses on the same exchange to fund each other's wallets.

Journalist Laura Shin raised the possibility that these developers may not be the same person, but different people working for the same organization: the North Korean government.

The CEO of Pixelcraft Studios added that he has offered the developer a trial hire in 2022. In the month the former Munchables developer worked for them, he exhibited "very suspicious" behavior.

The CEO believes a link to North Korea is possible. Furthermore, he revealed that the operating model at the time was similar to this incident, as the developer tried to get his "friend" to be hired.

An X user highlighted that the developer's GitHub codename is "grudev325" and pointed out that "gru" may be related to the Russian Federal Military Intelligence Service.

Pixelcrafts' CEO commented that at the time, the developer explained that the nickname came about after his love for the Gru character from the Despicable Me movies. Ironically, the character is a supervillain who spends most of his time trying to steal the moon.

TURNAROUNDGAMINGPLATFORMSECURITYBREACHENDSWITH62MILLIONINCRYPTOCURRENCYRETURNS

Whether he was trying to steal the moon or failed like Gru, the developer ultimately returned the funds without asking for "compensation." Many users believe that this suspicious "change in attitude" is due to ZackXBT's penetration into the attacker's web of lies and warnings.

The thriller ended with a response from a crypto investigator to a now-deleted post. In his reply, the detective threatened to destroy the developer and "other North Korean developers" and said "your country will face another blackout." #安全漏洞 #Munchables

熱點: IN

歐易

歐易(OKX)

用戶喜愛的交易所

幣安

幣安(Binance)

已有賬號登陸后會彈出下載

« 上一條| 下一條 »
區(qū)塊鏈交流群

相關(guān)資訊

數(shù)藏交流群

合作伙伴

數(shù)字黃金 元宇宙Web 談股票 黃金行情 減肥瘦身吧 谷歌留痕 百悅米 數(shù)字財經(jīng) 媽媽知道 金色幣圈 代特幣圈 聚幣網(wǎng) 裝修裝飾網(wǎng) 幣圈論壇 周公解夢 今日黃金 旅游資訊網(wǎng) 玩合約 愛網(wǎng)站 兼職信息網(wǎng) 趣玩幣 茶百科 培訓(xùn)資訊網(wǎng) 玩票票財經(jīng) 美白沒斑啦 皮卡丘資訊 非小號行情 借春秋 寶寶起名 幣圈ICO官網(wǎng) 去玩唄SPA 秒懂域名 天天財富 幣圈交流群 百科書庫 借春秋財經(jīng) 幣圈官網(wǎng)
非小號交易所排名-專業(yè)的交易行情資訊門戶網(wǎng)站,提供區(qū)塊鏈比特幣行情查詢、比特幣價格、比特幣錢包、比特幣智能合約、比特幣量化交易策略分析,狗狗幣以太坊以太幣玩客幣雷達幣波場環(huán)保幣柚子幣萊特幣瑞波幣公信寶等虛擬加密電子數(shù)字貨幣價格查詢匯率換算,幣看比特兒火幣網(wǎng)幣安網(wǎng)歐易虎符抹茶XMEX合約交易所APP,比特幣挖礦金色財經(jīng)巴比特范非小號資訊平臺。
非小號行情 yonghaoka.cn 飛鳥用好卡 ?2020-2024版權(quán)所有 桂ICP備18005582號-1