Scan to download
BTC $71,271.25 -3.02%
ETH $2,210.84 -3.96%
BNB $595.17 -2.53%
XRP $1.34 -2.13%
SOL $82.71 -3.15%
TRX $0.3221 +0.70%
DOGE $0.0913 -2.83%
ADA $0.2396 -4.90%
BCH $424.00 -3.61%
LINK $8.83 -3.87%
HYPE $40.94 -3.78%
AAVE $90.99 -4.66%
SUI $0.9097 -4.63%
XLM $0.1517 -2.46%
ZEC $364.10 -2.35%
BTC $71,271.25 -3.02%
ETH $2,210.84 -3.96%
BNB $595.17 -2.53%
XRP $1.34 -2.13%
SOL $82.71 -3.15%
TRX $0.3221 +0.70%
DOGE $0.0913 -2.83%
ADA $0.2396 -4.90%
BCH $424.00 -3.61%
LINK $8.83 -3.87%
HYPE $40.94 -3.78%
AAVE $90.99 -4.66%
SUI $0.9097 -4.63%
XLM $0.1517 -2.46%
ZEC $364.10 -2.35%

security

Security experts: North Korea's "public" theft of cryptocurrency assets has become its means of financing

As the infiltration and attacks targeting the cryptocurrency industry continue to escalate, security experts point out that the core difference from hackers with backgrounds in other countries is that cryptocurrency assets have become an important direct source of financing for military expenses in that country. Reports indicate that during a recent months-long infiltration operation against Drift Protocol, North Korean hackers once again caused a stir in the industry.Experts state that this model is not merely a "fund transfer tool," but rather a direct "predatory profit" mechanism used to bypass international sanctions and obtain immediately usable hard currency. Security researchers note that, unlike countries such as Russia and Iran, North Korea almost entirely lacks sustainable foreign economic and commodity export capabilities, making it more reliant on cryptocurrency theft as a core source of income to support its nuclear weapons and ballistic missile programs.Experts also emphasize that North Korean hacker attack targets have expanded from simple phishing to exchanges, wallet services, and key holders of DeFi protocols, commonly employing long-term social engineering and identity disguise infiltration methods. Due to the characteristic of blockchain transactions being "irreversible once confirmed," the cryptocurrency industry is far weaker than the traditional financial system in terms of freezing and recovering funds, making such attacks more destructive in speed and scale. Security personnel warn that this type of "long-term infiltration + precise power seizure" attack model has yet to be effectively addressed by the industry.

Zcash fixes critical vulnerability: previously threatened the security of over 25,000 ZEC, worth approximately 6.5 million dollars

The privacy coin Zcash recently disclosed and fixed a critical security vulnerability that could have been exploited by malicious miners to transfer over 25,000 ZEC (approximately 6.5 million USD) from the deprecated Sprout privacy pool. Security researcher Alex "Scalar" Sol disclosed on March 23 that the vulnerability stemmed from the zcashd node skipping proof verification when processing transactions involving the Sprout pool.The official statement indicated that the vulnerability had existed since July 2020 but had not been actively exploited, and user funds remained safe at all times. The development team has released version 6.12.0 to complete the fix, and mainstream mining pools have completed the upgrade deployment within a few days. Additionally, the unaffected Zebra full node implementation has the capability to trigger a chain fork, providing extra protection in the event of exploitation.It was disclosed that although the Sprout pool closed to new deposits in November 2020, approximately 25,424 ZEC remained untransferred. Even if the vulnerability were exploited, Zcash's "turnstile" mechanism would prevent inflationary issuance, ensuring that the total supply would not be breached. This vulnerability was discovered with the assistance of AI, and the researcher will receive a total bounty of 200 ZEC (approximately 51,000 USD). It is worth noting that this is not the first time Zcash has encountered a significant vulnerability; as early as 2019, it had fixed a serious flaw that could lead to unlimited issuance.
app_icon
ChainCatcher Building the Web3 world with innovations.