follow us on twitter . like us on facebook . follow us on instagram . subscribe to our youtube channel . announcements on telegram channel . ask urgent question ONLY . Subscribe to our reddit . Altcoins Talks Shop Shop


This is an Ad. Advertised sites are not endorsement by our Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise Here

Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.


Messages - coin_zz

Pages: [1]
1
Over the past 12 months, crypto has seen a troubling flood of attacks and exploits. There have been too many to track – this is an issue that desperately needs to be addressed.
Fortunately, there’s hope. Protocols can up their game when it comes to auditing code, monitoring network activity and setting clear attack response plans when an exploit does occur. If the industry takes note and implements these protections, it’s very plausible years like this will remain in the rear view mirror.

The plague of attacks

According to Chainalysis, 2022 is on track to be the worst year on record for funds stolen through hacks and exploits. Some $3 billion was stolen, at last count.
The Ronin hack is particularly notable. In March, North Korean-linked Lazarus Group expropriated about $620 million worth of ETH and USDC from the Ronin Network, a sidechain built for the popular Web3 game Axie Infinity.
What’s most surprising is it took over a week for this attack to be discovered. Law enforcement officials have been able to recover about $30 million of the stolen funds and Binance has been able to freeze an additional $5.8 million, but the majority of assets remain under the hackers’ control.
Funds have also not yet been recovered from the Wormhole bridge attack in February. This bridge, which connects Ethereum, Solana, Avalanche and other blockchain networks, was not the first to be attacked, but it might be the most notable. Somehow an attacker was able to mint 120,000 wrapped ether, or wETH, without having to put up any collateral. They then converted that free wETH into regular ETH and SOL, netting themselves $320 million. While these funds have not been recovered, Jump Trading did step in to inject Wormhole with 120,000 ETH to bring the bridge back into operation.
The list goes on and on. Nomad bridge lost $190 million. Wintermute, a decentralized finance (DeFi) platform, was hit for $160 million. Even a Binance BNB Network bridge was exploited for $100 million. Something needs to be done to make cryptocurrency services more secure against hacks and exploits.

How to move forward

The good news is things don’t have to stay as dire as they are now. We will see far fewer attacks, or at least mitigate their impact, in 2023 and beyond if crypto platforms and protocols are willing to expand their defensive efforts. This can come in a variety of forms, but all involve improved monitoring as well as proactive systems in place to respond when an event does occur.
The first line of defense is for all smart contract code to be carefully audited by reputable, third-party sources. The results of these audits should also be transparently shared with the community, to properly disclose any problems found and what was done to fix them.
However, a one-time security audit isn’t enough (as we’ve seen by the multiple DeFi platforms that were audited and hacked). Instead, every time the code is updated, new audits should be performed. This will ensure no new issues are being introduced. Even a small change to the code can have unforeseen ramifications, and it’s crucial for teams to adopt a more security-centric stance as they develop and deploy smart contracts.
Audits are essential, but if they were enough the crypto space wouldn’t be seeing so many of these exploits. Even thoroughly tested and well-audited code needs to be deployed in such a way that allows teams the ability to guard against potential risk vectors. Without robust security and operational monitoring that keeps track of the state of privileged accounts as well as wider interrelationships between system components and blockchain state, users will not be able to trust that their funds are secure.
This is why there is a need for a more real-time, proactive approach to security for decentralized services. Projects need to have systems in place that actively monitor transactions on a given platform and can detect anomalous or suspicious activity such as sudden spikes in usage, changes in price or interaction with blacklisted accounts as well as governance proposals submitted using flash loans.
In many cases, the first sign of an attack is exactly that – transactions are unusually large and/or many are going to the same address in a very short period of time. Being able to detect these events as they happen can help teams stay informed about potential threats. It also opens the door for such measures to be automated, eliminating or minimizing the need for human interaction.

Lastly, even the most finely tuned operational and security monitoring is limited in helpfulness without some form of response system in place as well. A team that has thoroughly mapped the attack vectors of their systems can plan their responses well in advance of an actual security incident. Smoke tests and thorough planning are a key step in this direction so that based on the alerts each relevant actor can assess the situation and respond to it quickly. This means steps to halt and reverse damage can be taken in hours or even minutes, instead of days or weeks.
Even in the event that there is a loss of funds, a prompt response is crucial to prevent further loss of funds. It may also help bolster trust in the team behind a protocol, even if the system has already been shown to be in jeopardy.
As a security-first mentality becomes ubiquitous, it will also help to deter attackers from attempting such exploits in the first place, as they will know that they will be spotted immediately. Community-led security monitoring efforts help ensure the security of the overall ecosystem by incentivizing such monitoring and allowing anyone to have a window into the operational health of protocols on the blockchain.
To be sure, there isn’t necessarily a “one size fits all” solution for every project out there, but all protocols could benefit from a combination of recurring audits, active security and operational monitoring of their networks, and an automated incident notification and response system.
Such actions have proven to be indispensable, and they are measures taken by leading players in the Web3 ecosystem such as Compound Finance and Matter Labs. If more teams take measures such as these, hopefully 2022 will be the last year where crypto is setting records for the most money ever stolen through an exploit. The sooner the broader industry gets on board, the sooner these events can largely be left in the past.

Source: Coindesk

2
Over the summer, an anonymous hacker stole roughly $600 million in cryptocurrency from Poly Network, a decentralized finance network many outside the crypto world had likely never heard of. Then the hacker gave it back.

Four months later, hackers stole at least $150 million from crypto exchange Bitmart. According to one analysis, unidentified hackers used a stolen private key to open two “hot wallets” and extract funds.

Security incidents like these are not new in the crypto world, but the size of these hacks appears to be growing as cryptocurrency prices have surged over the past year, drawing more mainstream attention.

Five of the 10 largest crypto thefts of all time have happened this year, according to data compiled by consumer website Comparitech. And these incidents may only continue due to increased cryptocurrency usage, according to financial tech experts.

Here’s what you should know about what’s happening — and how to keep your digital assets safe.

What is happening?

The two main targets of crypto hacks currently are centralized exchanges and decentralized finance (DeFi) services, according to Tom Robinson, chief scientist at London-based crypto compliance firm Elliptic.

Centralized exchanges have been the prime target of hacking groups for several years. These exchanges store a user’s assets in “hot wallets,” or digital wallets that are connected to the internet. This makes them more accessible for users, but also potentially more vulnerable to savvy hackers.

The recent BitMart hack was one such example. Another is the Coincheck attack in 2018, which saw roughly $530 million stolen, making it the biggest crypto heist ever — until the Poly Network incident this year, according to Comparitech’s data.

DeFi services are a newer part of the crypto world. DeFi software applications cut out exchanges all together, as they are run directly on top of blockchain platforms, and hacks of these services are usually due to coding errors or issues with design of apps, according to Robinson. Major examples include Poly Network as well as a more recent hack of Badger DAO, a platform that gives users vaults in which to store bitcoin and earn profit. The Badger DAO hack resulted in the loss of $120 million.

“What’s clear from the majority of these attacks this year is that it’s often a vulnerability that’s being exploited,” says Rebecca Moody, head of research at Comparitech. “With the industry growing at an exponential rate and relying on open source technology, this leaves platforms open to exploitation when hackers are able to find a weakness in the code.”

What are you really at risk of losing?

Just because an exchange suffers a hack doesn’t necessarily mean you lose all your money.

Each crypto service has varying levels of resources to cover hacks. BitMart, for example, pledges to cover all stolen assets.

According to crypto-crime analyst Joe McGill of TRM Labs, if an entity does not have the ability to compensate impacted users, there is still the chance that law enforcement — like the IRS Criminal Investigations Cyber Unit — is able to recover the stolen funds.

But there is no guarantee. While many banks typically offer deposit insurance up to a certain amount, there is no such promise when holding crypto assets in a third-party service. Some companies might have insurance to cover losses, but the level of coverage — if there is any at all — varies by platform.

As for the cryptocurrency that’s stolen, it could be gone forever. “More often than not, hackers successfully get away with stolen funds as cryptocurrency is virtually untraceable and easily disguised by laundering it through wallets in a matter of minutes,” Adam Morris, co-founder of Crypto Head, told CNN Business.

How can cryptocurrency holders protect themselves?

When using a crypto wallet or exchange, experts say users should scrutinize the scale and professionalism of the company behind it.

“Do they have people responsible for cybersecurity? Does the company have a good track record? What’s the size of the company? How many employees does it have? Those are all indicators that you can have confidence that that business is going to secure your assets in a responsible way,” says Robinson.

There are also basic security measures users can take when accessing their crypto account. McGill recommends two-factor authentication or hardware keys, which are essentially passwords kept on offline devices. He also recommends requiring approval for all crypto withdrawals as well as whitelisting addresses, which only allows certain addresses in your contact list to receive crypto funds from your account.

“There is no 100% guarantee of avoiding cybercrime,” McGill warns, but he said it is important to understand the exchanges being used, their history with cybercrime and the response systems in place.

Another way to protect one’s crypto assets, according to Morris, is to use a hardware wallet, known as “cold storage,” rather than storing it with a service. While considered the most secure method of storing crypto, this route puts all the responsibility on the user to store private keys. If those keys get stolen or lost, there is no larger financial entity to offer support.

Source: CNN

3
Major crypto wallet and platform Crypto.com has temporarily halted withdrawals after “a small number of users reporting suspicious activity on their accounts,” but all funds are reportedly safe at the moment.

A few hours ago, Crypto.com halted withdrawals from its platform in response to several “thefts” reported by customers. Dogecoin (DOGE) founder Billy Markus noticed a suspicious transaction pattern on Etherscan that prompted the company to halt all transactions until it figures out what’s going on with its platform.

Ben Baller, a cryptocurrency enthusiast and jeweler, claimed that his account had been breached, losing 4.28 Ether (ETH) (about $15,000). He also said that he used two-factor authentication, so the alleged perpetrators must have bypassed some of Crypto.com’s security features.

Cointelegraph reached out to Crypto.com for more details regarding its decision to halt withdrawals but did not receive a response as of publishing time. This article will be updated pending new information.

The cryptocurrency industry is no stranger to hacks, rug-pulls and protocol exploits. Earlier this month, decentralized finance security platform and bug bounty service Immunefi found that losses from hacks, scams and other malicious activities exceeded $10.2 billion dollars in 2021.

Per the report, there were 120 crypto exploits or fraudulent rug-pulls, the highest-valued hack being the Poly Network at $613 million.

Source: Coin Telegraph

4
Crypto Exchange AscendEX Confirms Hack, Assures Full Compensation

The exchange lost an estimated $77.7 million of cryptocurrencies across three blockchains.

AscendEX, formerly known as BitMax, has become the latest cryptocurrency exchange to fall victim to a hack, losing an estimated $77.7 million worth of cryptocurrencies.

The Singapore-based exchange officially announced the hack on Sunday through its official Twitter handle. It confirmed unauthorized withdrawals from one of its four hot wallets but assured the safety of all the cryptocurrencies stored in cold wallets.

The perpetrators siphoned multiple cryptocurrencies from the exchange across three blockchains: Ethereum, Binance Smart Chain and Polygon. Though the exchange did not officially put up a figure of the loss, crypto security firm PeckShield estimated the total loss to be around $77.7 million.

Out of the total, $60 million worth of cryptocurrencies were taken from    Ethereum  , $9.2 million from Binance Smart Chain and the rest from Polygon. The largest unauthorized withdrawal of more than $10.8 million was made in lesser-known altcoin TARA, followed by two stablecoins, USDT and USDC. Additionally, sums were siphoned in popular tokens like SHIB, AAVE and COMP.

Meanwhile, the exchange assured that it will compensate all victims fully for their losses in the security breach. Moreover, it highlighted that the value of cryptocurrencies stolen in the attack consists of only a small percentage of total exchange assets.

The action plan of AscendEX includes collaboration with blockchain forensic firms and law enforcement to investigate the attack, migrate the impacted projects and gradually re-start the deposit and withdrawal process.

Furthermore, the crypto exchange shared the wallet addresses to which the stolen funds were transferred.

Meanwhile, crypto exchanges remain vulnerable to attacks despite technological advancements in the industry. Earlier this month, the security of Bitmart, another crypto exchange, was breached, resulting in the theft of $196 million in cryptocurrencies.

Source: Finance Magnates

5
Thank you for sharing. Big attacks keep making news

Pages: [1]
ETH & ERC20 Tokens Donations: 0x2143F7146F0AadC0F9d85ea98F23273Da0e002Ab
BNB & BEP20 Tokens Donations: 0xcbDAB774B5659cB905d4db5487F9e2057b96147F
BTC Donations: bc1qjf99wr3dz9jn9fr43q28x0r50zeyxewcq8swng
BTC Tips for Moderators: 1Pz1S3d4Aiq7QE4m3MmuoUPEvKaAYbZRoG
Powered by SMFPacks Social Login Mod