Suspicious drains detected from the portfolio connected to the founder Mask Network

Published on:

Onchain civilian cyber security platform has detected suspicious outflows on February 27 from the address associated with the founder of the Suji YAN Mask Network.

According to Cyvers, other designated addresses received about $ 4 million in cryptocurrencies, mainly in tokens related to ether (ETH).

Digital assets suspected of stolen, covered 113 ETH, worth over USD 265,000 at the time of writing, 923 Weth, 301 Ezeth, 156 Weet, 90 Puffet, 48,400 masks, 50,000 USDT (USDT) and 15 SWETH.

Tracking the impaired transaction flow. Source: Cywras Alerts

After the initial compromise, the funds were then converted into ETH and flew into six different portfolio addresses, and one of the offensive wallets ends in “DF7”. Meir Dolev, co -founder of Cyvers, said CointeLgraph:

“This incident emphasizes the growing sophistication of threat entities in the Web3 space and emphasizes the urgent need to monitor transactions in real time, preventive prevention and quick response to incidents.”

This incident is the latest from the series of the last noisy hacks and exploits, including Hack Bybit worth $ 1.4 billion on February 21 and Hack in social media on February 26.

Related: From Sony to Bybit: How Lazarus Group became a supervillain of cryptocurrencies

The cryptographic industry shocked by sophisticated hacking techniques

Forensic investigations about the last Hack Bybit show that Exploit took place due to violation of the Safewallet developer’s certificates and directed to the Bybit team.

According to a statement published by a protected team, Exploit has not affected any code for its front-end services or knowledgeable contracts.

Instead, hackers used a threatened system to attack the user interface – sending seemingly justified transactions to Bybit, and then transforming funds from malicious transactions to another hardware portfolio.

However, Martin Köppelmann, co -founder of the Gnoss blockchain network, which has developed and crossed out safely, he said That he could only speculate how hackers used Exploit to deceive many signatories from the Bybit team.

Crypto control added that the Lazarus group, definitely considered an attack, probably avoided attacking other accounts with protected products to avoid detecting and distributing their tactics.

Warehouse: 2 Miss Auditors USD 27 million Penpie Flav

Related

Leave a Reply

Please enter your comment!
Please enter your name here