Hey

Coinbase responds to account restriction "FUD": The surge in users has led to an increase in restricted accounts, and they are addressing user feedback

ChainCatcher news, according to TheBlock, some Coinbase users reported that their accounts were suddenly restricted by the platform over the weekend. The official Coinbase Support account on X responded to users in a series of posts, asking them to "please be patient and not to trust everything on the X platform." In recent weeks, there has been an increase in reports of attacks targeting Coinbase users. According to a message posted on the X platform by pseudonymous security researcher and SEAL 911 team member @pcaversaccio, multiple accounts were attacked and funds were stolen on Saturday night.The official Coinbase Support account stated, "The increase in new users after the U.S. elections and the reactivation of old accounts has led to a 2-3 times surge in fraud attempts, but the anti-fraud system successfully saved tens of millions of dollars in losses." Researchers have recently advised Coinbase users to use virtual private networks, and Coinbase's Product Director Scott Shapiro stated in a post on December 2 that since attackers often use virtual private networks, even legitimate use may be seen as a risk signal. Using a virtual private network alone will not trigger a flag, but when combined with other factors (such as logging in from unknown devices and sending large amounts of cryptocurrency), it may trigger a security review. @pcaversaccio, in response to Shapiro's original post, stated that virtual private networks are a digital umbrella for users, helping to protect privacy. Competitor Kraken's Chief Security Officer Nick Percoco criticized Coinbase for forcing users to choose between financial freedom and privacy protection.

Radiant Capital published a review of the theft process, stating that they will identify the attackers and recover the stolen funds as soon as possible

ChainCatcher news, Radiant Capital's official social media post reviewed that the protocol experienced a highly complex security vulnerability on the 16th, resulting in a loss of $50 million. The attacker exploited multiple developers' hardware wallets through highly advanced malware injection.During the intrusion, the front end of Safe Wallet (also known as Gnosis Safe) displayed legitimate transaction data, while the poisoned transactions were signed and executed in the background. This vulnerability occurred during a routine multi-signature emission adjustment process, which is conducted regularly to adapt to market conditions and utilization rates. DAO contributors strictly adhered to many industry standard operating procedures throughout the process. Each transaction was simulated on Tenderly to ensure accuracy and was individually reviewed by multiple developers at each signature stage. During these reviews, neither Tenderly nor the front-end checks in Safe showed any anomalies. To emphasize the importance of this, it was completely undetectable during the manual review of the Gnosis Safe UI and the Tenderly simulation of regular transactions, as confirmed by external security teams.Radiant Capital stated that it has been working closely with Seal911 and Hypernative and has implemented more robust multi-signature controls. The FBI and zeroShadow are fully aware of the violations and are actively working to freeze all stolen assets. The DAO is deeply disturbed by this attack and will continue to work tirelessly with relevant agencies to identify the attackers and recover the stolen funds as soon as possible.
ChainCatcher Building the Web3 world with innovators