Scan to download
BTC $74,357.39 -1.61%
ETH $2,275.13 -2.41%
BNB $620.29 -0.34%
XRP $1.41 -1.77%
SOL $84.44 -1.26%
TRX $0.3322 +1.35%
DOGE $0.0943 -0.41%
ADA $0.2450 -1.22%
BCH $438.19 -1.40%
LINK $9.16 -0.69%
HYPE $40.79 -6.38%
AAVE $91.67 -3.13%
SUI $0.9371 -1.27%
XLM $0.1681 -1.48%
ZEC $307.45 -4.63%
BTC $74,357.39 -1.61%
ETH $2,275.13 -2.41%
BNB $620.29 -0.34%
XRP $1.41 -1.77%
SOL $84.44 -1.26%
TRX $0.3322 +1.35%
DOGE $0.0943 -0.41%
ADA $0.2450 -1.22%
BCH $438.19 -1.40%
LINK $9.16 -0.69%
HYPE $40.79 -6.38%
AAVE $91.67 -3.13%
SUI $0.9371 -1.27%
XLM $0.1681 -1.48%
ZEC $307.45 -4.63%

theft

LayerZero reports the KelpDAO theft incident, confirming that it only affects the rsETH configuration

LayerZero Labs released an incident report stating that KelpDAO suffered an attack resulting in a loss of approximately $290 million. Preliminary assessments indicate that the attacker is the Lazarus Group, which has ties to North Korea (more specifically, TraderTraitor). The attack was executed by poisoning the downstream RPC infrastructure relied upon by its decentralized verification network (DVN). The attacker controlled some RPC nodes and, in conjunction with a DDoS attack, induced the system to switch to malicious nodes, thereby forging cross-chain transactions.All affected RPC nodes have been taken offline and replaced, and the DVN has now resumed operation. LayerZero emphasized that this incident was limited to the rsETH application configuration of KelpDAO and did not affect other assets or applications. The reason is that KelpDAO was using a single DVN (1/1) architecture at the time and did not utilize the multi-DVN redundancy mechanism that is officially recommended for long-term use, resulting in a lack of independent verification nodes to identify forged messages.LayerZero pointed out that there were no vulnerabilities in its protocol itself, and applications with multi-DVN configurations were not affected, meaning there is no contagious risk in the system. LayerZero stated that it will urge all projects using single DVN configurations to migrate to multi-DVN architectures as soon as possible and has suspended providing signature and verification services for 1/1 configuration applications. Meanwhile, the company is cooperating with global law enforcement agencies to investigate and assist industry partners in tracking the stolen funds. LayerZero noted that this incident highlights the value of modular security architecture and also reminds the industry to pay attention to the potential security risks of RPC verification links.

Security Company: AI agent's encrypted payment infrastructure has significant security vulnerabilities, LLM router has led to the theft of a $500,000 wallet

According to CoinDesk, researchers from the University of California, Santa Barbara, the University of California, San Diego, blockchain security company Fuzzland, and World Liberty Financial have jointly published a paper warning that "LLM routers"—intermediary services located between users and AI models—have become a significant security risk for crypto assets.The researchers found that 26 LLM routers are secretly injecting malicious tool calls and stealing user credentials, with one incident leading to the emptying of a customer's crypto wallet worth $500,000.Additionally, the researchers were able to control about 400 downstream hosts within hours by "polluting" the router ecosystem. Since sensitive data such as private keys and API credentials are often transmitted in plaintext through these routers, users are effectively exposing their assets to risk without their knowledge.The researchers pointed out that as McKinsey predicts AI agents will mediate $30 trillion to $50 trillion in global consumer spending by 2030, Binance founder Changpeng Zhao also predicts that the payment volume of AI agents will be a million times that of humans. The current infrastructure security is severely lagging behind the pace of industry development, and the risk of the "weakest link" could trigger a systemic chain crisis.

Security experts: North Korea's "public" theft of cryptocurrency assets has become its means of financing

As the infiltration and attacks targeting the cryptocurrency industry continue to escalate, security experts point out that the core difference from hackers with backgrounds in other countries is that cryptocurrency assets have become an important direct source of financing for military expenses in that country. Reports indicate that during a recent months-long infiltration operation against Drift Protocol, North Korean hackers once again caused a stir in the industry.Experts state that this model is not merely a "fund transfer tool," but rather a direct "predatory profit" mechanism used to bypass international sanctions and obtain immediately usable hard currency. Security researchers note that, unlike countries such as Russia and Iran, North Korea almost entirely lacks sustainable foreign economic and commodity export capabilities, making it more reliant on cryptocurrency theft as a core source of income to support its nuclear weapons and ballistic missile programs.Experts also emphasize that North Korean hacker attack targets have expanded from simple phishing to exchanges, wallet services, and key holders of DeFi protocols, commonly employing long-term social engineering and identity disguise infiltration methods. Due to the characteristic of blockchain transactions being "irreversible once confirmed," the cryptocurrency industry is far weaker than the traditional financial system in terms of freezing and recovering funds, making such attacks more destructive in speed and scale. Security personnel warn that this type of "long-term infiltration + precise power seizure" attack model has yet to be effectively addressed by the industry.

Two men in Heilongjiang illegally tapped into high-voltage lines from an oil field for Bitcoin mining, and the main culprit was sentenced to 10 years in prison

The People's Court of Honggang District, Daqing City, Heilongjiang Province recently announced a first-instance judgment. Two men were sentenced for stealing electricity from high-voltage lines in an oil field to mine Bitcoin. The main offender, Zhang, was sentenced to 10 years in prison and fined 50,000 yuan, while the accomplice, Zhao, was sentenced to 4 years and 10 months in prison and fined 20,000 yuan.According to the judgment, Zhang illegally connected to the high-voltage line of an oil field from a certain oil extraction plant in Daqing and set up 24 Bitcoin mining machines in an abandoned pigsty he rented. In December of the same year, Zhao joined in knowing that Zhang was stealing electricity and purchased an additional 12 mining machines, bringing the total to 36 machines running. In August 2025, the two were arrested by the public security authorities. It was calculated that Zhang stole 565,375.2 kilowatt-hours of electricity, valued at 438,580.52 yuan; Zhao stole 468,060 kilowatt-hours, valued at 363,750.78 yuan. The court found both men guilty of theft, with Zhang being the principal offender and Zhao the accomplice. The court also ordered Zhang to compensate 438,580.52 yuan, while Zhao was jointly liable for 363,750.78 yuan of that amount. The mining machines and related equipment involved in the case will be handled by the public security authorities in accordance with the law.
app_icon
ChainCatcher Building the Web3 world with innovations.