Private Key

OKLink Security Monthly Report: In July, the total losses across the network amounted to approximately $290 million, with losses due to private key leaks accounting for 88.31% of the total losses

ChainCatcher news, OKLink released the July 2024 security report, stating that the cumulative losses from on-chain security incidents across the network amount to approximately $290 million. Losses due to private key leaks account for 88.31% of the total losses, phishing incidents account for 3.03%, REKT incidents account for 7.33%, and RugPull incidents account for 1.31%.On July 18, the private key of the WazirX exchange's multi-signature wallet was leaked, resulting in a loss of approximately $235 million, making it the largest security incident in July. On July 16, the LiFi Protocol cross-chain bridge aggregation protocol was attacked, leading to a loss of about $10 million. The attacker exploited a vulnerability that allowed arbitrary calls to steal assets authorized by users of this contract.In addition, there were a total of 14 incidents of scams and phishing on official social media, resulting in losses of approximately $3.89 million, a decrease of 81.34% compared to June. OKLink reminds users not to disclose your private keys or mnemonic phrases to anyone, not to click on unverified links, and to learn how to use Web3 on-chain tools to mitigate risks. This is an important line of defense in protecting yourself in the Web3 world.

A former suspected HTX employee was sentenced to three years in prison for stealing tens of thousands of private keys

ChainCatcher news, according to the official WeChat account of Ping An Xuhui, employees of Company A, Zhang, Dong, and Liu, decided in early March 2023 to add a backdoor program to a certain virtual currency wallet software to obtain user private keys. By the end of May 2023, after saving the stolen private keys and the corresponding digital wallet addresses, the three destroyed the servers and databases, agreeing that these private keys could only be used to illegally obtain users' virtual currency two years later. The three illegally obtained more than 27,000 mnemonic phrases and over 10,000 private keys, successfully converting more than 19,000 digital wallet addresses. In April 2024, the Xuhui District People's Court sentenced defendants Liu, Zhang A, and Dong to three years in prison for illegally obtaining data from computer information systems, and fined them 30,000 yuan.However, strangely, the reporter Ou was not stolen from by the aforementioned three (not yet at the agreed time). Upon investigation, it was found that in another virtual wallet software platform used by Ou, a backdoor program was also implanted by Zhang B, who had previously worked at Company A. In July 2021, he wrote a piece of code in the client code to collect user private keys and mnemonic phrases. When users traded virtual currency, the code would automatically obtain the mnemonic phrases or private keys used by the user for signing operations and send them to Zhang B's email.In April 2023, due to personal financial pressure, Zhang B learned Ou's virtual wallet address through the illegally obtained mnemonic phrases and private keys, transferring all the virtual currency to his own wallet address. Zhang B illegally obtained more than 6,400 user private keys and mnemonic phrases, and was sentenced to three years in prison for illegally obtaining data from computer information systems, and fined 50,000 yuan.It is worth noting that Company A is suspected to be the original Huobi company. In 2023, due to former employees setting up Trojans, some users' mnemonic phrases or private keys of iToken (original Huobi wallet) have been leaked. HTX responded that the Trojan was set up by former Huobi employees before the acquisition, stealing others' mnemonic phrases and private keys. HTX stated that it is cooperating with the Shanghai Public Security Bureau to conduct investigations and evidence collection.

Beosin: The leakage of the administrator's private key of the multi-signature wallet on the Indian exchange WazirX has led to asset theft

ChainCatcher news, according to Beosin Alert monitoring, it was discovered that the Indian exchange WazirX was attacked. The attacker obtained the signature data of the multi-signature wallet administrator of the exchange, modified the logic contract of the wallet, and executed incorrect logic to steal assets.Attacker address: 0x6eedf92fb92dd68a270c3205e96dccc527728066Attacked address: 0x27fd43babfbe83a81d14665b1a6fb8030a60c9b4Based on the attacker's behavior, it is speculated that the reason is the leakage of the multi-signature wallet administrator's private key. Beosin summarizes the cause of the attack as follows:The attacker deployed the attack contract: 0x27fd43babfbe83a81d14665b1a6fb8030a60c9b4. The function of this contract is to extract the token assets specified by this contract.The attacker obtained the signature data of the WazirX multi-signature wallet administrator and modified the wallet's logic contract to the already deployed attack contract. The corresponding transaction is:https://etherscan.io/tx/0x48164d3adbab78c2cb9876f6e17f88e321097fcd14cadd57556866e4ef3e185dThe attacker submitted a token withdrawal transaction to the WazirX multi-signature wallet. Due to the proxy model mechanism, the wallet contract will use delegatecall to invoke the relevant functions of the attack contract, transferring the wallet's tokens.The flowchart of the stolen funds shows that, so far, the hacker has transferred part of the funds to Changenow and Binance exchanges.
ChainCatcher Building the Web3 world with innovators