![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
拉撒路集團是朝鮮相關的網絡犯罪集團,試圖黑客網絡聯合創始人肯尼·李(Kenny Li)。襲擊是由
A North Korea-affiliated cybercrime syndicate, known as Lazarus Group, attempted to scam Manta Network co-founder Kenny Li in a new phishing attempt.
朝鮮附屬的網絡犯罪集團被稱為拉撒路集團(Lazarus Group),試圖在新的網絡釣魚嘗試中騙曼塔網絡聯合創始人肯尼·李(Kenny Li)。
According to a recent report by TokenPost, the hackers contacted Li on Telegram, posing as a trusted contact who had arranged a Zoom meeting on April 17.
根據Tokenpost的最新報告,黑客在Telegram上與Li聯繫,認為是一個值得信賴的聯繫人,他於4月17日安排了Zoom會議。
During the call, Li noticed several strange prompts, including a request for camera access and a script file download, which raised his suspicions. As a result, he deleted their messages and left the meeting, only to discover later that the contact had blocked him.
在通話中,李注意到了幾個奇怪的提示,包括訪問攝像機的請求和腳本文件下載,這引起了他的懷疑。結果,他刪除了他們的信息並離開了會議,只是發現接觸阻止了他。
This experience highlights a growing trend of Zoom-based attacks against members of the crypto community, which have been linked by cybersecurity experts to the Lazarus Group, who have been exploiting vulnerabilities in Web3 infrastructure.
這種經歷強調了對加密社區成員的基於變焦的攻擊的日益增長的趨勢,這些攻擊已由網絡安全專家與Lazarus集團聯繫起來,Lazarus集團一直在利用Web3基礎架構中的漏洞。
How Lazarus Exploits Zoom for Crypto Scams
拉撒路如何利用Zoom進行加密騙局
The attack on Li involved a fake Zoom call with pre-recorded footage from previous meetings, that was probably obtained by compromising team members’s email accounts. The audio was not working and familiar faces were shown, mimicking a legitimate meeting, before a prompt to download a script file appeared.
對李的攻擊涉及一個假縮放電話,其中包括先前會議的預錄錄像,這可能是由於損害團隊成員的電子郵件帳戶而獲得的。在提示下載腳本文件之前,音頻沒有工作,並顯示了熟悉的面孔,模仿了合法的會議。
This tactic is similar to what has been previously reported about Zoom scams. For instance, SlowMist conducted an investigation last year that found hackers were using fake Zoom interfaces to trick users to download malware. These malicious files steal system data, browser cookies and cryptocurrency wallet credentials and send them to the remote server of the attackers.
這種策略類似於以前報導的有關變焦騙局的策略。例如,Slowmist去年進行了一項調查,發現黑客正在使用假縮放界面來欺騙用戶下載惡意軟件。這些惡意文件竊取系統數據,瀏覽器cookie和加密貨幣錢包憑據,並將其發送到攻擊者的遠程服務器。
In another instance, a user from Vow | ContributionDAO had a nearly identical experience on April 18, when an attacker, pretending to be part of a blockchain team, demanded a specific Zoom link. However, when the user suggested switching to Google Meet, the attackers disappeared.
在另一種情況下,來自Vow的用戶|貢獻者在4月18日的經驗幾乎相同,當時一名攻擊者假裝是區塊鏈團隊的一部分,要求有特定的變焦鏈接。但是,當用戶建議切換到Google見面時,攻擊者消失了。
As these attacks become increasingly sophisticated, members of the crypto community are raising alarm. These scams can become very convincing when they are made using deepfake technology or pre-recorded footage.
隨著這些攻擊變得越來越複雜,加密社區的成員正在引起警報。當使用Deepfake技術或預錄錄像製作時,這些騙局可能會變得非常令人信服。
KiloEx Recovers $7.5M After Separate Exploit
Kiloex單獨利用後恢復了750萬美元
In a separate development, decentralized exchange KiloEx has recovered $7.5 million after being hacked.
在另一個發展中,分散的交易所Kiloex被黑客入侵後已收回了750萬美元。
The DeFi protocol announced on Wednesday that the attacker returned the funds, stolen four days earlier, after they reached an agreement on a bounty deal.
DEFI協議週三宣布,襲擊者在達成賞金協議的協議後,在四天前被盜的資金退還了資金。
The exploit was due to a manipulated price oracle, a known vulnerability of decentralized finance platforms. KiloEx had enlisted the help of several cybersecurity firms, including SlowMist and Sherlock to trace the attack.
漏洞利用是由於價格甲骨文的操縱,這是分散融資平台的已知漏洞。 Kiloex邀請了幾家網絡安全公司的幫助,包括Slowmist和Sherlock來追踪襲擊。
After the exploit, KiloEx temporarily suspended operations and is still deciding whether to pursue legal action against the hacker. The incident also serves as a stark reminder that vulnerabilities in smart contracts and oracles remain prime targets for cybercriminals in the DeFi sector.
漏洞利用後,Kiloex暫時暫停了行動,並且仍在決定是否針對黑客採取法律訴訟。該事件還提醒人們,智能合約和甲骨文中的脆弱性仍然是Defi行業網絡犯罪分子的主要目標。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
-
-
-
- 澤德冠軍不僅是一場比賽,而且是現場經濟
- 2025-05-23 06:30:13
- ZED冠軍不僅是一款遊戲,而且是一種現實的經濟,每次交易,比賽結果和繁殖決策都會塑造系統
-
- 注入式(INJ)價格剛剛破壞了下降趨勢 - 激增130%?
- 2025-05-23 06:30:13
- 注射劑表明其較長的下降可能正在逆轉,引起了交易者的注意。今天的代幣今天躍升了15%,交易約為13.75美元
-
-
- 美國造幣廠將停止生產便士
- 2025-05-23 06:25:13
- 在一個歷史性的轉變中,可以標誌著數百年曆史的美國袋裝零錢的結束,美國造幣廠將停止生產新的便士
-