市值: $3.2924T -0.700%
體積(24小時): $104.5091B -6.310%
  • 市值: $3.2924T -0.700%
  • 體積(24小時): $104.5091B -6.310%
  • 恐懼與貪婪指數:
  • 市值: $3.2924T -0.700%
加密
主題
加密植物
資訊
加密術
影片
頭號新聞
加密
主題
加密植物
資訊
加密術
影片
bitcoin
bitcoin

$105074.528045 USD

-0.43%

ethereum
ethereum

$2621.549395 USD

0.28%

tether
tether

$1.000419 USD

-0.02%

xrp
xrp

$2.211361 USD

-1.68%

bnb
bnb

$666.078228 USD

-0.14%

solana
solana

$153.930846 USD

-1.43%

usd-coin
usd-coin

$0.999839 USD

0.00%

dogecoin
dogecoin

$0.190358 USD

-2.34%

tron
tron

$0.272783 USD

1.19%

cardano
cardano

$0.674344 USD

-2.95%

hyperliquid
hyperliquid

$35.522762 USD

-2.63%

sui
sui

$3.202047 USD

-2.04%

chainlink
chainlink

$13.919736 USD

-2.44%

avalanche
avalanche

$20.239832 USD

-5.54%

stellar
stellar

$0.268004 USD

-2.06%

加密貨幣新聞文章

Migos的Instagram帳戶被妥協以洩漏Solana聯合創始人Raj Gokal的洩漏敏感數據

2025/05/27 20:00

此案顯然是勒索嘗試的明顯失敗。黑客要求戈卡爾(Gokal)的40個比特幣,如伴隨其中一個職位的標題所示。

Migos的Instagram帳戶被妥協以洩漏Solana聯合創始人Raj Gokal的洩漏敏感數據

A hacker collective has compromised the Instagram account of hip-hop group Migos and shared sensitive data and credentials of Solana co-founder Raj Gokal with the group’s 13 million followers.

一個黑客集體損害了嘻哈集團Migos的Instagram帳戶,並與Solana共同創始人Raj Gokal共享了敏感的數據以及該集團的1300萬關注者。

The hackers posted at least seven images on Migos’s account, which is followed by 12.9 million users. The images included pictures of Gokal and his wife, as well as images of credentials like passports and driver’s licenses.

黑客在Migos的帳戶上發布了至少七張圖像,其次是1,290萬用戶。這些圖像包括Gokal和他的妻子的圖片,以及護照和駕駛執照等證書的圖像。

The hackers also wrote messages on the posts, which appeared to be an unsuccessful extortion attempt. In one of the posts, the hackers demanded 40 Bitcoin (BTC) from Gokal.

黑客還在帖子上寫了消息,這似乎是一次失敗的勒索嘗試。在其中一個帖子中,黑客要求戈卡爾(Gokal)要求40個比特幣(BTC)。

“You should’ve paid the 40 BTC,” the post read.

帖子寫道:“您應該已經支付了40 BTC。”

Another post, which had an image of Gokal holding his passport, read: “It was only 40 BTC.. should’ve paid.”

另一篇文章有​​戈卡爾拿著護照的形象,上面寫著:“只有40 btc ..應該付款。”

Some of the posts included sensitive personal information, such as phone numbers and email addresses. In one instance, the hackers revealed Gokal’s personal number and urged followers to spam him.

一些帖子包括敏感的個人信息,例如電話號碼和電子郵件地址。在一個例子中,黑客透露了戈卡爾的個人電話號碼,並敦促追隨者向他發送垃圾郵件。

One post had an image of someone identified as “Arvind.” The hackers wrote: “Email him at arvind@coinbase.com and tell him to return Migos’s Instagram.”

一個帖子的形像是被識別為“ Arvind”的人。黑客寫道:“給他發送電子郵件至arvind@coinbase.com,並告訴他返回Migos的Instagram。”

The compromised posts were live for about 90 minutes before Meta intervened, restoring control of the account and removing the content.

損壞的帖子在元介入之前進行了大約90分鐘的直播,恢復了對帳戶的控制並刪除內容。

Alongside the leaked images, the hackers had also modified Migos’s Instagram bio to promote a meme coin. The bio now reads: “We own this account. DM for shoutouts and promos. Best meme coin: Banana Token.”

除了洩漏的圖像外,黑客還修改了Migos的Instagram Bio,以促進模因硬幣。簡歷現在寫道:“我們擁有此帳戶。DM大喊大叫和促銷。最佳模因硬幣:香蕉令牌。”

The post count was also reset to 0, and the account name was changed to Banana Token. However, the account’s profile picture remained the same.

帖子計數也已重置為0,帳戶名稱已更改為香蕉令牌。但是,帳戶的個人資料圖片保持不變。

Here’s How Solana Founder’s Account Was Hacked

這是Solana創始人的帳戶被黑客入侵的方式

Commenting on the incident, blockchain investigator ZachXBT said that Gokal’s personal accounts were likely compromised using social engineering techniques over the past week.

區塊鏈調查員Zachxbt在評論事件時說,在過去一周中,Gokal的個人帳戶可能會使用社會工程技術妥協。

“They tried to extort him for funds with the PII obtained. Guess he didn’t pay so they started trolling and posted it after they compromised Migos’s Instagram account today,” he wrote.

他寫道:“他們試圖用PII獲得的資金勒索他。

Thanks for actually blurring the personal info unlike every other account on CT.

感謝您實際上模糊了個人信息,與CT上的其他每個帳戶不同。

Think Raj’s personal accounts got social engineered and they tried to extort him for funds with the PII obtained. Guess he didn’t pay so they started trolling and posted it after they compromised Migos's Instagram account today. pic.twitter.com/Cj2a2yAFa6

認為Raj的個人帳戶經過了社會工程,他們試圖用獲得的PII勒索他的資金。猜猜他沒有付款,所以他們開始拖釣並在今天妥協Migos的Instagram帳戶後發布了拖釣。 pic.twitter.com/cj2a2yafa6

— ZachXBT (@zachxbt) May 27, 2025

- zachxbt(@zachxbt)2025年5月27日

Earlier this month, Gokal had warned that hackers were trying to break into his accounts.

本月初,戈卡爾警告說,黑客試圖闖入他的帳戶。

“Attackers have been trying to take control of my email, social media, Google, Apple, etc. this past week. If you see anything suspect (token launch, soliciting funds, etc) that means they got through. Be careful out there,” Gokal said.

戈卡爾說:“攻擊者一直在嘗試控制我的電子郵件,社交媒體,谷歌,蘋果等。在過去的一周中。如果您看到任何可疑的東西(令牌發布,招募資金等)意味著他們已經通過。請小心。”

Attackers have been trying to take control of my email, social media, Google, Apple, etc. this past week. If you see anything suspect (token launch, soliciting funds, etc) that means they got through.

攻擊者一直在嘗試控制我的電子郵件,社交媒體,Google,Apple等。如果您看到任何可疑的東西(令牌發布,徵集資金等),則意味著他們已經通過。

be careful out there

在那裡小心

— raj 🖤 (@rajgokal) May 20, 2025

-Raj🖤(@rajgokal)2025年5月20日

The leaked images appeared to be similar to Know Your Customer (KYC) verification files, sparking speculation about a potential connection to the recent Coinbase data breach. However, there’s no official confirmation to verify the potential links between the two incidents.

洩漏的圖像似乎類似於了解您的客戶(KYC)驗證文件,引發了有關與最近的Coinbase數據洩露的潛在連接的猜測。但是,沒有官方確認可以驗證這兩個事件之間的潛在聯繫。

Bhushan is a FinTech enthusiast and holds a good flair in understanding financial markets. His interest in economics and finance draw his attention towards the new emerging Blockchain Technology and Cryptocurrency markets. He is continuously in a learning process and keeps himself motivated by sharing his acquired knowledge. In free time he reads thriller fictions novels and sometimes explore his culinary skills.

Bhushan是一名金融科技愛好者,並且在了解金融市場方面具有良好的風格。他對經濟和金融的興趣吸引了他對新的新興區塊鏈技術和加密貨幣市場的關注。他一直在學習過程中,並通過分享自己獲得的知識來保持自己的動力。在空閒時間裡,他閱讀驚悚小說小說,有時探索他的烹飪技巧。

Bhushan Akolkar on Xoutput:

XOUTPUT上的Bhushan Akolkar:

.

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年06月05日 其他文章發表於