市值: $4.1421T 1.86%
成交额(24h): $203.0568B 4.46%
  • 市值: $4.1421T 1.86%
  • 成交额(24h): $203.0568B 4.46%
  • 恐惧与贪婪指数:
  • 市值: $4.1421T 1.86%
加密货币
话题
百科
资讯
加密话题
视频
热门新闻
加密货币
话题
百科
资讯
加密话题
视频
bitcoin
bitcoin

$120167.907534 USD

1.27%

ethereum
ethereum

$4468.611945 USD

2.53%

xrp
xrp

$3.013607 USD

1.80%

tether
tether

$1.000549 USD

-0.01%

bnb
bnb

$1092.592149 USD

6.28%

solana
solana

$231.391244 USD

4.59%

usd-coin
usd-coin

$0.999699 USD

-0.04%

dogecoin
dogecoin

$0.259020 USD

4.30%

tron
tron

$0.342747 USD

0.34%

cardano
cardano

$0.860977 USD

1.07%

hyperliquid
hyperliquid

$50.155412 USD

5.34%

chainlink
chainlink

$22.637678 USD

0.46%

ethena-usde
ethena-usde

$1.000528 USD

-0.07%

avalanche
avalanche

$30.613779 USD

-0.07%

stellar
stellar

$0.403905 USD

0.94%

加密货币新闻

2024 年 10 月的 Web3 安全事件导致 1.47 亿美元损失

2024/11/03 04:04

2024 年 10 月,Web3 安全事件导致总损失约 1.47 亿美元。据慢雾区块链综合报道

2024 年 10 月的 Web3 安全事件导致 1.47 亿美元损失

Web3 Security Incidents in October: Analysis and Key Events

10 月份 Web3 安全事件:分析和关键事件

In October of 2024, Web3 security incidents led to total losses of approximately $147 million. According to the comprehensive SlowMist Blockchain Hack Archive, 28 separate attacks resulted in about $129 million in losses, with $19.3 million later recovered. These incidents are said to have involved various abusive tactics, including so-called exit scams, account takeovers, as well as price manipulation.

2024 年 10 月,Web3 安全事件导致总损失约 1.47 亿美元。根据综合慢雾区块链黑客档案,28 次单独的攻击导致约 1.29 亿美元的损失,后来恢复了 1930 万美元。据称,这些事件涉及各种滥用手段,包括所谓的退出诈骗、账户接管以及价格操纵。

In addition, Web3 anti-fraud platform Scam Sniffer has reportedly recorded 12,058 phishing victims, with losses totaling a substantial $18.04 million during just this last month.

此外,据报道,Web3反欺诈平台Scam Sniffer在上个月就记录了12,058名网络钓鱼受害者,损失总额高达1804万美元。

Here are some of the most notable Web3 security incidents that occurred in October, as reported by MistTrack:

据 MistTrack 报道,以下是 10 月份发生的一些最引人注目的 Web3 安全事件:

EIGEN Token Theft

自己的代币被盗

On October 5, EigenLayer announced on X that an isolated attack occurred in which a “communication thread between an investor and a custodian was compromised, leading to the unauthorized transfer of 1,673,645 EIGEN tokens to the attacker.” The attacker then exchanged the tokens “through decentralized platforms, transferring the proceeds to centralized exchanges.” Collaborative efforts with these platforms and law enforcement have “led to partial funds being frozen.”

10 月 5 日,EigenLayer 在 X 上宣布发生了一次孤立的攻击,其中“投资者和托管人之间的通信线程遭到破坏,导致 1,673,645 个 EIGEN 代币未经授权转移给攻击者。”然后,攻击者“通过去中心化平台交换代币,将收益转移到中心化交易所”。与这些平台和执法部门的合作“导致部分资金被冻结”。

SlowMist was invited as an independent investigator, concluding that the incident was initiated by a phishing attack “on the investor's employee email account, allowing the attacker to impersonate both the investor and custodian to redirect the token transfer.” EigenLayer expressed gratitude to SlowMist for their “thorough and timely investigation.”

慢雾受邀作为独立调查员,得出的结论是,该事件是由“针对投资者员工电子邮件帐户的网络钓鱼攻击发起的,该攻击允许攻击者冒充投资者和托管人来重定向代币转移”。 EigenLayer 对慢雾的“彻底、及时的调查”表示感谢。

Radiant Capital Attack

光芒四射的资本攻击

On October 17, Radiant Capital reported a security issue on BNB Chain and Arbitrum, “leading to the suspension of its Base and mainnet markets.” SlowMist analysis also notably revealed that after “taking control of three multisig permissions, the attacker upgraded a malicious contract to steal funds.”

10 月 17 日,Radiant Capital 报告了 BNB Chain 和 Arbitrum 的安全问题,“导致其 Base 和主网市场暂停”。慢雾分析还特别揭示,在“控制了三个多重签名权限后,攻击者升级了恶意合约以窃取资金”。

By October 18, Radiant Capital released an incident report, “confirming around $50 million in losses due to a complex malware injection, which compromised devices of three core contributors, enabling malicious transaction signing.”

截至 10 月 18 日,Radiant Capital 发布了一份事件报告,“确认由于复杂的恶意软件注入造成了约 5000 万美元的损失,该注入破坏了三个核心贡献者的设备,导致恶意交易签名。”

Tapioca DAO Exploit

木薯 DAO 漏洞利用

On October 18, Tapioca DAO suffered a security breach, “losing around $4.7 million through a social engineering attack.” Attackers gained access to a key developer's private keys through an infectious “interview” tactic. The hacker group, identified as a North Korean entity, infiltrated the developer's device “with malware to acquire the private key.”

10 月 18 日,Tapioca DAO 遭遇安全漏洞,“通过社会工程攻击损失了约 470 万美元”。攻击者通过富有感染力的“采访”策略获得了关键开发人员的私钥。该黑客组织被认定为朝鲜实体,“利用恶意软件渗透开发者的设备以获取私钥”。

This “infectious interview” approach involved disguising as job candidates or recruiters, “luring targets into downloading malicious files.”

这种“传染性面试”方法涉及伪装成求职者或招聘人员,“引诱目标下载恶意文件”。

SHARPEI Token Price Crash

SHARPEI 代币价格暴跌

Launched on October 23, the meme token SHARPEI (SHAR) saw its market cap surge “to $54 million, only to drop 96% after a sudden $3.4 million sell-off by project insiders.” Leaked promotional documents “exposed several false claims, including fake endorsements from KOLs who later denied involvement, as well as fictitious partnerships.” The token's value continued to fluctuate “as these deceptions were revealed.”

模因代币 SHARPEI (SHAR) 于 10 月 23 日推出,其市值飙升“至 5400 万美元,但在项目内部人士突然抛售 340 万美元后又下跌了 96%”。泄露的宣传文件“揭露了一些虚假说法,包括后来否认参与的 KOL 的虚假认可,以及虚构的合作伙伴关系。” “随着这些欺骗行为被揭露”,代币的价值继续波动。

U.S. Government-Controlled Wallet Suspicious Activity

美国政府控制的钱包可疑活动

On October 25, MistTrack reported “unusual” or suspicious outflows from a U.S. government-controlled wallet at address 0x88d5f, amounting to roughly $20 million in tokens, which included 5.4 million USDC, 1.12 million USDT, 13.7 million aUSDC, and 178 ETH. Most of these tokens were swapped for ETH. Following the transaction, “approximately $19.3 million was returned to the government address.”

10 月 25 日,MistTrack 报告称,美国政府控制的钱包地址 0x88d5f 出现“异常”或可疑资金流出,金额约为 2000 万美元代币,其中包括 540 万 USDC、112 万 USDT、1370 万 aUSDC 和 178 ETH。这些代币大部分被兑换成 ETH。交易完成后,“大约 1930 万美元被退回政府地址。”

Event Analysis and Security Recommendations

事件分析和安全建议

In October, attack methods became increasingly “sophisticated, including contract vulnerabilities, account takeovers, and new tactics like supply chain attacks, multisig theft, and price manipulation.” Two major exit scams resulted in multimillion-dollar losses, highlighting the need for “due diligence on project backgrounds and teams before investing.”

10 月份,攻击方法变得越来越“复杂,包括合约漏洞、账户接管以及供应链攻击、多重签名盗窃和价格操纵等新策略”。两起重大退出骗局导致数百万美元的损失,凸显了“投资前对项目背景和团队进行尽职调查”的必要性。

There was also an “uptick” in account compromise incidents, especially on platform X. Users and project teams can follow SlowMist's X Account Security Guidelines to review “permissions and bolster security settings.”

账户泄露事件也“有所增加”,尤其是在 X 平台上。用户和项目团队可以遵循慢雾的 X 账户安全指南来审查“权限并加强安全设置”。

SlowMist advises increased vigilance against social engineering attacks, which, while technically “unsophisticated, can discreetly compromise assets.” Even though there was a decline in phishing-related losses compared to last month, “the number of victims has risen.” Users are urged to exercise caution, “routinely verify permissions, and avoid clicking unknown links or entering private keys/seed phrases.” Installing antivirus software (such as Kaspersky, AVG) and anti-phishing plugins (like Scam Sniffer) can “enhance device security.”

慢雾建议提高对社会工程攻击的警惕性,这种攻击虽然技术上“不复杂,但可以谨慎地损害资产”。尽管与上个月相比,网络钓鱼相关的损失有所下降,但“受害者人数却有所增加。”敦促用户谨慎行事,“定期验证权限,避免点击未知链接或输入私钥/助记词。”安装防病毒软件(如卡巴斯基、AVG)和反网络钓鱼插件(如 Scam Sniffer)可以“增强设备安全性”。

原文来源:crowdfundinsider

免责声明:info@kdj.com

所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!

如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。

2025年10月04日 发表的其他文章