安全

OKLink Annual Security Report: In 2024, losses across the network due to private key leaks decreased by 65% compared to the previous year, thanks to the indispensable role of on-chain tools

ChainCatcher news, OKLink has officially released the 2024 Security Annual Report, which states that the cumulative losses from on-chain security incidents across the network amount to approximately $1.945 billion. The losses due to private key leaks have decreased by 65.45% compared to 2023, totaling about $305 million, which accounts for 16% of the total losses. Among these, phishing scams caused losses of $705 million, accounting for 36% of the total losses. REKT incidents and RugPull incidents caused losses of $383 million and $141 million, respectively.Mainstream public chains remain the primary targets for hacker attacks, with losses for major public chains such as BTC, ETH, and ARB reaching $744 million, $902 million, and $228 million, respectively. In 2024, OKLink continues to make efforts, providing core technical support to over 120 municipal-level units and successfully assisting in handling more than 300 cases, with a total amount involved of approximately $685 million.At the same time, OKLink also offers a variety of on-chain security tools and features, such as address monitoring and token authorization queries, helping users quickly check and manage the assets authorized to smart contracts by addresses, identify suspicious transactions and addresses, thereby preventing fraudulent transactions.

Vitalik published a long article titled "d/acc: one year later," discussing AI safety and cryptocurrency applications

ChainCatcher news, Ethereum founder Vitalik Buterin published a long article titled "d/acc: one year later," reflecting on the development of the d/acc (decentralized acceleration) concept proposed last year. The article focuses on three key issues: AI safety regulation, the role of cryptocurrency in d/acc, and public goods financing.Vitalik proposed two major strategies for AI safety: first, establishing accountability by setting reasonable legal responsibilities for AI users, deployers, and developers; second, implementing a global "soft pause" mechanism at the industrial hardware level, which can reduce global computing power by 90-99% if necessary. Vitalik stated that d/acc has three major connections with cryptocurrency: the extension of values, the early adopter community, and technological complementarity. In particular, the contributions of the crypto community in areas such as prediction markets and zero-knowledge proofs. The article also mentions innovative mechanisms including quadratic funding, retroactive public goods funding, and deep funding, emphasizing the importance of decentralized financing in promoting the development of open-source projects. Vitalik believes that despite the current challenges of rapid technological development and reduced global cooperation, new tools such as AI and biotechnology provide humanity with the capability to address these challenges.

Solv co-founders respond to public attacks: The accusations regarding Solv's asset security issues are incorrect and self-contradictory

ChainCatcher news, BTCFi project Solv Protocol co-founder Ryan Chow stated, "After experiencing a whole day of baseless public opinion attacks regarding '1,800 RUG' and 'private agreements' yesterday, today Solv has faced even more absurd accusations. These accusations invariably target the core asset security issues, but their basis is erroneous and contradictory, attempting to mislead the public through confusion. In response, we have decided to address these claims head-on and shatter these false statements with facts."Regarding the accusation from Nubit co-founder Hans about the misappropriation of the underlying BTC of SolvBTC.BBN, Chow pointed out that the mempool transactions cited by the other party are actually routine operations of SolvBTC.CORE. According to the project mechanism, SolvBTC.CORE needs to re-stake BTC to a new script address every half month, with the last staking occurring on December 19, and the extraction and re-staking taking place on January 2, which is also the reason for updating the address to DeFiLlama.Additionally, in response to the doubts about the decline in TVL of SolvBTC.BBN during Babylon Cap3, Chow stated that this is due to the project initiating a normal redemption mechanism, which precisely reflects the product's liquidity and flexibility. At the same time, he also refuted market speculation regarding the "BTC three flowers," which suggests that the same BTC is counted three times in the TVL.Chow emphasized that as a project that has been deeply engaged for four years, Solv is facing such a meticulously planned attack during the sensitive period leading up to the TGE (Token Generation Event), and has provided ample on-chain evidence and technical documentation to support its position, inviting the market and users to make their own judgments.

The Ministry of Public Security has supervised the resolution of a major case involving virtual currency hacking, where 5 individuals illegally profited over 6.4 million yuan by stealing 200 million pieces of personal information

ChainCatcher news, according to Phoenix Network, the Public Security Bureau of Neijiang City, Sichuan Province held a press conference announcing that the Neijiang police recently cracked a case of illegally obtaining computer system data, which was supervised by the Ministry of Public Security, and arrested 5 people. It is reported that the gang consists of high-end "hackers" engaged in network technology, one of whom is an employee of a large cybersecurity company. They obtained citizens' personal information by writing hacking programs to gain unauthorized access, and ultimately sold citizens' personal information on overseas websites for virtual currency, with prices reaching up to 5 yuan per piece.According to police investigations, the case involves 57 government and enterprise websites, and the gang stole 208 million pieces of citizens' personal information, including flight trajectories, diplomas, and addresses, with illegal profits exceeding 6.4 million yuan. The special investigation team seized illegal gains of over 5.6 million yuan, confiscated more than 30 sets of core code for hacking tools written by the suspects, over 10 hacking virtual machine penetration attack systems, and 270 penetration scripts. The case has now been transferred for prosecution and is currently under trial.
ChainCatcher Building the Web3 world with innovators