Scan to download
BTC $75,629.77 -0.78%
ETH $2,336.23 -0.92%
BNB $623.42 -1.65%
XRP $1.43 -0.29%
SOL $85.81 -1.27%
TRX $0.3299 +0.45%
DOGE $0.0946 -1.53%
ADA $0.2483 -1.31%
BCH $441.81 -0.94%
LINK $9.25 -1.38%
HYPE $43.42 -1.83%
AAVE $92.02 -17.45%
SUI $0.9564 -1.19%
XLM $0.1700 +0.21%
ZEC $332.15 +2.24%
BTC $75,629.77 -0.78%
ETH $2,336.23 -0.92%
BNB $623.42 -1.65%
XRP $1.43 -0.29%
SOL $85.81 -1.27%
TRX $0.3299 +0.45%
DOGE $0.0946 -1.53%
ADA $0.2483 -1.31%
BCH $441.81 -0.94%
LINK $9.25 -1.38%
HYPE $43.42 -1.83%
AAVE $92.02 -17.45%
SUI $0.9564 -1.19%
XLM $0.1700 +0.21%
ZEC $332.15 +2.24%

fix

Zcash fixes critical vulnerability: previously threatened the security of over 25,000 ZEC, worth approximately 6.5 million dollars

The privacy coin Zcash recently disclosed and fixed a critical security vulnerability that could have been exploited by malicious miners to transfer over 25,000 ZEC (approximately 6.5 million USD) from the deprecated Sprout privacy pool. Security researcher Alex "Scalar" Sol disclosed on March 23 that the vulnerability stemmed from the zcashd node skipping proof verification when processing transactions involving the Sprout pool.The official statement indicated that the vulnerability had existed since July 2020 but had not been actively exploited, and user funds remained safe at all times. The development team has released version 6.12.0 to complete the fix, and mainstream mining pools have completed the upgrade deployment within a few days. Additionally, the unaffected Zebra full node implementation has the capability to trigger a chain fork, providing extra protection in the event of exploitation.It was disclosed that although the Sprout pool closed to new deposits in November 2020, approximately 25,424 ZEC remained untransferred. Even if the vulnerability were exploited, Zcash's "turnstile" mechanism would prevent inflationary issuance, ensuring that the total supply would not be breached. This vulnerability was discovered with the assistance of AI, and the researcher will receive a total bounty of 200 ZEC (approximately 51,000 USD). It is worth noting that this is not the first time Zcash has encountered a significant vulnerability; as early as 2019, it had fixed a serious flaw that could lead to unlimited issuance.

ClickFix attack escalates, hackers impersonate VCs and hijack browser extensions to steal crypto assets

The cybersecurity agency Moonlock Lab reports that crypto hackers have recently upgraded their "ClickFix" attack method, beginning to impersonate venture capital firms to contact target users through social platforms and lure them into executing malicious code to steal crypto assets.Attackers disguise themselves as fake venture capital firms such as SolidBit, MegaBit, and Lumax Capital, sending collaboration invitations via LinkedIn and guiding victims to fake Zoom or Google Meet meeting links. The pages embed a fake Cloudflare "I am not a robot" verification button, which, when clicked, copies malicious commands to the clipboard and tricks users into pasting and executing them in the terminal, thus completing the attack. Researchers point out that this method circumvents traditional security mechanisms by "making victims execute commands themselves."Meanwhile, hackers are also hijacking browser extensions to carry out attacks. John Tuckner, founder of cybersecurity company Annex Security, revealed that the Chrome extension QuickLens, after changing ownership on February 1, released a new version containing malicious scripts two weeks later, triggering ClickFix attacks and stealing user data. The extension had about 7,000 users and has since been removed from the store. Reports indicate that the hijacked extension scans crypto wallet data and mnemonic phrases, and scrapes Gmail content, YouTube channel data, and web login or payment information.

Hackers impersonate VC and hijack the QuickLens plugin, using ClickFix technology to steal cryptocurrency assets

According to Cointelegraph, hackers are using the "ClickFix" attack method to steal cryptocurrencies, with the latest two attacks involving impersonating venture capital firms and hijacking browser extensions.Cybersecurity company Moonlock Lab reports that scammers impersonate fake VCs such as SolidBit, MegaBit, and Lumax Capital, contacting users via LinkedIn to offer collaboration opportunities, then directing them to click on fake Zoom and Google Meet links. After clicking the link, users are led to a page with a forged Cloudflare "I'm not a robot" verification box; clicking this box copies malicious commands to the clipboard and prompts users to open a terminal to paste the so-called verification code, thus executing the attack.Moonlock Lab points out that this method turns victims into execution mechanisms, bypassing defenses in the security industry. Meanwhile, hackers are also spreading malware by hijacking the Chrome extension QuickLens. This extension allows users to run Google Lens searches directly in the browser, and after ownership was transferred, the new version contains malicious scripts that can initiate ClickFix attacks and steal information.The extension has about 7,000 users, and once hijacked, it searches for cryptocurrency wallet data and recovery phrases to steal funds, as well as scraping Gmail inbox content, YouTube channel data, and login credentials or payment information entered in web forms. The extension has been removed from the Chrome Web Store. The ClickFix technique has been popular among hackers since last year, forcing victims to manually execute malicious payloads, affecting thousands of businesses and multiple industries worldwide.

Flow has confirmed the permanent destruction of 87.4 billion counterfeit FLOW tokens, and all technical fixes for the security incident have been completed

The Flow Foundation officially announced the progress of the security incident resolution, confirming the permanent destruction of 87.4 billion counterfeit FLOW tokens, marking the complete technical resolution of the security incident.The related destruction operations were executed on-chain by the community governance committee, and all seized counterfeit assets have been completely withdrawn from circulation, in accordance with the independent recovery plan disclosed in the previous technical review. Currently, the validation nodes completed the deployment of security patches within 24 hours after the incident, and the network has continued to operate normally since then, with additional security measures introduced at the protocol level. Furthermore, network operation data shows that Flow has returned to a fully healthy state, processing over 3 million transactions in the past week, with all core DeFi protocols operating normally. With the completion of all security repairs, future efforts will focus on ecosystem expansion and product development. Previously, it was reported that Flow suffered a loss of $3.9 million due to a hacker attack, but user deposits were unaffected. In mid-January, its community governance committee completed the final recovery of unliquidated counterfeit FLOW tokens from centralized exchanges, including Binance and HTX.
app_icon
ChainCatcher Building the Web3 world with innovations.