ATTA

Solv co-founders respond to public attacks: The accusations regarding Solv's asset security issues are incorrect and self-contradictory

ChainCatcher news, BTCFi project Solv Protocol co-founder Ryan Chow stated, "After experiencing a whole day of baseless public opinion attacks regarding '1,800 RUG' and 'private agreements' yesterday, today Solv has faced even more absurd accusations. These accusations invariably target the core asset security issues, but their basis is erroneous and contradictory, attempting to mislead the public through confusion. In response, we have decided to address these claims head-on and shatter these false statements with facts."Regarding the accusation from Nubit co-founder Hans about the misappropriation of the underlying BTC of SolvBTC.BBN, Chow pointed out that the mempool transactions cited by the other party are actually routine operations of SolvBTC.CORE. According to the project mechanism, SolvBTC.CORE needs to re-stake BTC to a new script address every half month, with the last staking occurring on December 19, and the extraction and re-staking taking place on January 2, which is also the reason for updating the address to DeFiLlama.Additionally, in response to the doubts about the decline in TVL of SolvBTC.BBN during Babylon Cap3, Chow stated that this is due to the project initiating a normal redemption mechanism, which precisely reflects the product's liquidity and flexibility. At the same time, he also refuted market speculation regarding the "BTC three flowers," which suggests that the same BTC is counted three times in the TVL.Chow emphasized that as a project that has been deeply engaged for four years, Solv is facing such a meticulously planned attack during the sensitive period leading up to the TGE (Token Generation Event), and has provided ample on-chain evidence and technical documentation to support its position, inviting the market and users to make their own judgments.

Security companies: There has been a significant increase in password theft attacks targeting encrypted wallets, especially against Apple macOS users

ChainCatcher news, according to Forbes, security company ESET has just released its latest threat report, which examines the threat landscape trends from June to November 2024. The number of password theft attacks targeting cryptocurrency wallets has increased, with the most significant rise occurring among macOS users.The report states: "According to ESET's telemetry data for the second half of 2024, the number of password-stealing software across multiple platforms (especially Windows, macOS, and Android) has increased," but compared to the first half of the year, the detection of password-stealing software targeting cryptocurrency wallets on macOS has more than doubled. Meanwhile, the number of password-stealing software on the Windows platform grew by 56%, while financial threats on the Android platform, including password-stealing malware, increased by 20%.ESET's analysis shows that the number of password-stealing software targeting the macOS platform (especially those related to cryptocurrency wallet credentials) surged by 127%. Security researchers noted: "Although these threats cannot be simply classified as password-stealing software just because they have broader functionalities, they do reveal a significant upward trend in password theft activities on the macOS platform." From a geographical perspective, ESET's analysis indicates that attacks on Bitcoin and other cryptocurrencies targeting macOS are mostly aimed at the United States, followed by Italy, China, Spain, and Japan.
ChainCatcher Building the Web3 world with innovators