![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
它的支持者通过拥护权力下放来抵制批评,而其批评者则指出了最近的活动,这些活动表明了该协议的某些集中倾向。
A decentralized protocol is supposed to be neutral, but what happens when it becomes the preferred tool for state-backed hackers to loot Web3 projects and convert their stolen cryptocurrency?
一个分散的协议应该是中立的,但是当它成为国家支持黑客抢劫Web3项目并转换其失窃的加密货币的首选工具时会发生什么?
This scenario has played out with THORChain, a decentralized exchange protocol that has become a hot topic in crypto circles after the Lazarus Group, a North Korean state-backed hacking collective, used it extensively to process and convert ether (ETH) stolen from Bybit.
这种情况与Thorchain(一种分散的交换协议)一起发挥了作用,该协议已成为Crypto Circles的热门话题,此前Lazarus Group(朝鲜州支持的黑客集体)广泛地使用了它来处理和转换从BYBIT偷来的Ether(Eth)。
The hackers’ exploits began in March 2024, when they infiltrated Bybit, a major cryptocurrency exchange, and stole an enormous sum of ether, valued at around $1.4 billion at the time.
黑客的漏洞始于2024年3月,当时他们渗入了主要的加密货币交易所Bybit,并偷走了一笔巨大的Ether,当时价值约14亿美元。
After exploiting vulnerabilities in Bybit’s hot wallet, Lazarus Group hackers began transferring the stolen ether to a new address, kicking off a three-month saga tracking their movements.
在利用拜比特(Bybit)的热钱包中的漏洞之后,拉撒路集团(Lazarus Group Hackers)开始将被盗的以太转移到一个新的地址,开始了一个三个月的传奇,追踪了他们的动作。
After swiftly draining the ether to a mixer, hackers began converting it to Bitcoin (BTC) via various decentralized exchanges.
在将醚迅速将其排入混合器之后,黑客开始通过各种分散交换将其转换为比特币(BTC)。
While the hackers also used Uniswap and OKX DEX, THORChain became the main focus due to the sheer volume of funds passing through it.
虽然黑客也使用了Uniswap和OKX DEX,但由于资金经过了大量资金,Thorchain成为主要重点。
Bybit CEO Ben Zhou said in an X post on March 4 that 72% of the stolen funds—361,255 ETH—had passed through THORChain, far surpassing activity on other DeFi services.
Bybit首席执行官Ben Zhou在3月4日的X帖子中说,被盗资金的72%(361,255 ETH)通过了Thorchain,超过了其他Defi服务的活动。
Over $1 billion in Ether from the Bybit theft was traced to THORChain. Source: Coldfire/Dune Analytics
超过10亿美元的贝特盗窃案被追溯到索兰。资料来源:Coldfire/Dune Analytics
A truly decentralized platform’s strength lies in its neutrality and censorship-resistance, which are foundational to blockchain’s value proposition, according to Rachel Lin, CEO of decentralized exchange SynFutures.
分散交易交易所同步瑞切尔·林(Rachel Lin)表示,真正的分散平台的实力在于其中立性和审查制度,这是区块链价值主张的基础。
“The line between decentralization and responsibility can evolve with technology,” Lin told Cointelegraph. “While human intervention contradicts decentralization’s ethos, protocol-level innovations could automate safeguards against illicit activity.”
林告诉Cointelegraph:“权力下放和责任之间的界限可以随着技术而发展。” “尽管人类干预与权力下放的精神矛盾,但协议级创新可以自动化免于非法活动的保障措施。”
However, protocol-level changes require community consensus, which can be difficult to achieve, especially in a decentralized protocol.
但是,协议级别的变化需要社区共识,这可能很难实现,尤其是在分散协议中。
Moreover, any intervention by protocol maintainers could open a can of worms, as it would imply an obligation to intervene in future cases.
此外,协议维护者的任何干预措施都可以打开一罐蠕虫,因为这意味着有义务干预以后的情况。
Hackers also used Asgardex to swap stolen cryptocurrency and collect a portion of the protocol’s fees. Source: Yogi (Screenshot cropped by Cointelegraph for visibility)
黑客还使用Asgardex交换了被盗的加密货币并收集了一部分协议费用。资料来源:瑜伽士(Cointelegraph裁剪以可见性裁剪的屏幕截图)
A snapshot of Asgardex’s UI. Credit: Asgardex
Asgardex UI的快照。信用:asgardex
Last December, hackers used mixers like Tornado Cash to try and obfuscate the stolen funds, but the US Treasury later imposed sanctions on Tornado Cash for facilitating money laundering.
去年12月,黑客使用龙卷风现金等搅拌机试图使被盗的资金混淆,但美国财政部后来对龙卷风现金实施了制裁,以促进洗钱。
However, despite the attention on THORChain, it is worth noting that the protocol is not a mixer, and the output of its smart contracts remains traceable.
然而,尽管关注胸切除,但值得注意的是,该协议不是混合器,其智能合约的产出仍然可以追溯。
Hackers finished converting their ether to Bitcoin within 10 days, showcasing the efficiency of Web3 technologies when used for malicious purposes.
黑客在10天内将其以太币转换为比特币,在用于恶意目的时展示了Web3技术的效率。
After swiftly draining the ether to a mixer, hackers began converting it to Bitcoin (BTC) via various decentralized exchanges.
在将醚迅速将其排入混合器之后,黑客开始通过各种分散交换将其转换为比特币(BTC)。
While the hackers also used Uniswap and OKX DEX, THORChain became the main focus due to the sheer volume of funds passing through it.
虽然黑客也使用了Uniswap和OKX DEX,但由于资金经过了大量资金,Thorchain成为主要重点。
Bybit CEO Ben Zhou said in an X post on March 4 that 72% of the stolen funds—361,255 ETH—had passed through THORChain, far surpassing activity on other DeFi services.
Bybit首席执行官Ben Zhou在3月4日的X帖子中说,被盗资金的72%(361,255 ETH)通过了Thorchain,超过了其他Defi服务的活动。
Over $1 billion in Ether from the Bybit theft was traced to THORChain. Source: Coldfire/Dune Analytics
超过10亿美元的贝特盗窃案被追溯到索兰。资料来源:Coldfire/Dune Analytics
A truly decentralized platform’s strength lies in its neutrality and censorship-resistance, which are foundational to blockchain’s value proposition, according to Rachel Lin, CEO of decentralized exchange SynFutures.
分散交易交易所同步瑞切尔·林(Rachel Lin)表示,真正的分散平台的实力在于其中立性和审查制度,这是区块链价值主张的基础。
“The line between decentralization and responsibility can evolve with technology,” Lin told Cointelegraph. “While human intervention contradicts decentralization’s ethos, protocol-level innovations could automate safeguards against illicit activity.”
林告诉Cointelegraph:“权力下放和责任之间的界限可以随着技术而发展。” “尽管人类干预与权力下放的精神矛盾,但协议级创新可以自动化免于非法活动的保障措施。”
However, protocol-level changes require community consensus, which can be difficult to achieve, especially in a decentralized protocol.
但是,协议级别的变化需要社区共识,这可能很难实现,尤其是在分散协议中。
Moreover, any intervention by protocol maintainers could open a can of worms, as it would imply an obligation to intervene in future cases.
此外,协议维护者的任何干预措施都可以打开一罐蠕虫,因为这意味着有义务在将来的情况下进行干预。
Hackers also used Asgardex to swap stolen cryptocurrency and collect a portion of the protocol’s fees. Source: Yogi (Screenshot cropped by Cointelegraph for visibility)
黑客还使用Asgardex交换了被盗的加密货币并收集了一部分协议费用。资料来源:瑜伽士(Cointelegraph裁剪以可见性裁剪的屏幕截图)
Snapshot of Asgardex's UI. Credit: Asgardex
Asgardex UI的快照。信用:asgardex
Last December, hackers used mixers like Tornado Cash to try and obfuscate the stolen funds, but the US Treasury later imposed sanctions on Tornado Cash for facilitating money laundering.
去年12月,黑客使用龙卷风现金等搅拌机试图使被盗的资金混淆,但美国财政部后来对龙卷风现金实施了制裁,以促进洗钱。
However, despite the attention on THORChain, it is worth noting that the protocol is not a mixer, and the output of its smart contracts remains traceable.
然而,尽管关注胸切除,但值得注意的是,该协议不是混合器,其智能合约的产出仍然可以追溯。
Hackers finished converting their ether to Bitcoin within 10 days, showcasing the efficiency of Web3 technologies when used for malicious purposes.
黑客在10天内将其以太币转换为比特币,在用于恶意目的时展示了Web3技术的效率。
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
- 罗宁正在迁移到链链链链链
- 2025-04-26 18:25:12
- 根据新的Chainlink新闻报告,Ronin正在迁移到Chainlink区块链。这个游戏区块链将连接并将其桥梁迁移到Chainlink的
-
-
-
-
-
- 2025年观看的前7个山寨币:新项目,升级和趋势
- 2025-04-26 18:15:13
- 加密货币市场正在不断发展,而Altcoins(除了比特币以外的其他货币)是这项创新的核心。
-
- 这是Altcoin季节,Ruvi着火了
- 2025-04-26 18:10:13
- 由于山寨币终于到了,在明星中,Sui刚刚飙升至3.60美元
-
- 本周比特币(BTC)ETF流入增长,吸引了26.8亿美元的新投资
- 2025-04-26 18:10:13
- 这意味着越来越多的机构和零售投资者正在寻求进入比特币的风险。这对应于比特币ETF流入的增加
-