Theft

The Singapore government reminds citizens to be vigilant against cryptocurrency theft incidents

ChainCatcher news, according to 8world, the Singapore Police Force and the Cyber Security Agency issued a joint statement indicating that recently, criminals have been observed using various methods to steal cryptocurrency from victims' wallets. Their common tactics include:Impersonating legitimate entities on social media, using giveaways or promotional activities as bait, and asking victims to "verify" their wallets by sharing login credentials and other personal information.Criminals may also impersonate the owners of cryptocurrency companies, sending malicious links under the pretext of assessing the victims' capabilities in the blockchain field. Once clicked, these links automatically transfer cryptocurrency from the victims' wallets.Additionally, criminals may exploit phishing websites, software vulnerabilities, smart contracts, etc., to invade victims' wallets and steal cryptocurrency.Singapore government agencies urge the public to take preventive measures to protect their wallets, such as: using hardware wallets and other secure offline storage devices; employing strong passwords and two-factor authentication; and regularly checking accounts.If you suspect that you have become a victim, you should immediately contact the cryptocurrency exchange to stop trading or freeze your account if possible; check and revoke any suspicious token authorizations; promptly transfer any remaining cryptocurrency from the affected wallet to another wallet; and report to the relevant authorities.

Radiant Capital published a review of the theft process, stating that they will identify the attackers and recover the stolen funds as soon as possible

ChainCatcher news, Radiant Capital's official social media post reviewed that the protocol experienced a highly complex security vulnerability on the 16th, resulting in a loss of $50 million. The attacker exploited multiple developers' hardware wallets through highly advanced malware injection.During the intrusion, the front end of Safe Wallet (also known as Gnosis Safe) displayed legitimate transaction data, while the poisoned transactions were signed and executed in the background. This vulnerability occurred during a routine multi-signature emission adjustment process, which is conducted regularly to adapt to market conditions and utilization rates. DAO contributors strictly adhered to many industry standard operating procedures throughout the process. Each transaction was simulated on Tenderly to ensure accuracy and was individually reviewed by multiple developers at each signature stage. During these reviews, neither Tenderly nor the front-end checks in Safe showed any anomalies. To emphasize the importance of this, it was completely undetectable during the manual review of the Gnosis Safe UI and the Tenderly simulation of regular transactions, as confirmed by external security teams.Radiant Capital stated that it has been working closely with Seal911 and Hypernative and has implemented more robust multi-signature controls. The FBI and zeroShadow are fully aware of the violations and are actively working to freeze all stolen assets. The DAO is deeply disturbed by this attack and will continue to work tirelessly with relevant agencies to identify the attackers and recover the stolen funds as soon as possible.
ChainCatcher Building the Web3 world with innovators