incident

OKLink Security Monthly Report: Zero major Rug Pull incidents in November, with total losses across the network amounting to approximately 203 million USD

OKLink released the November 2024 Security Report, which indicates that on-chain security incidents across the network have resulted in a total loss of approximately $203 million. Phishing scams alone accounted for 64.80% of the total losses, amounting to about $131 million, with no significant Rug Pull incidents reported. REKT incidents accounted for 22.06% of the losses, totaling approximately $45 million.On November 13, a user copied an incorrect address from contaminated transaction history, resulting in a loss of $129 million. An hour later, the attacker returned all the assets. On November 15, the v1 liquidity pool contract of the Aptos ecosystem project Thala was attacked due to a security vulnerability, causing a loss of $25.5 million. Subsequently, Thala negotiated with the attacker to recover all user assets through a $300,000 bounty.OKLink reminds everyone to carefully verify the receiving address when performing on-chain operations. Some users have lost over $100 million by copying incorrect addresses from contaminated transaction records. It is essential to double-check the recipient's address when conducting on-chain operations and avoid the habit of directly copying addresses from transaction records or chat logs. Additionally, learn to use Web3 on-chain tools to mitigate risks. OKLink provides tools for on-chain address queries, token authorization checks, and large transfer monitoring, ensuring on-chain security and keeping you informed of market trends, helping you overcome on-chain anxiety.

The Singapore government reminds citizens to be vigilant against cryptocurrency theft incidents

ChainCatcher news, according to 8world, the Singapore Police Force and the Cyber Security Agency issued a joint statement indicating that recently, criminals have been observed using various methods to steal cryptocurrency from victims' wallets. Their common tactics include:Impersonating legitimate entities on social media, using giveaways or promotional activities as bait, and asking victims to "verify" their wallets by sharing login credentials and other personal information.Criminals may also impersonate the owners of cryptocurrency companies, sending malicious links under the pretext of assessing the victims' capabilities in the blockchain field. Once clicked, these links automatically transfer cryptocurrency from the victims' wallets.Additionally, criminals may exploit phishing websites, software vulnerabilities, smart contracts, etc., to invade victims' wallets and steal cryptocurrency.Singapore government agencies urge the public to take preventive measures to protect their wallets, such as: using hardware wallets and other secure offline storage devices; employing strong passwords and two-factor authentication; and regularly checking accounts.If you suspect that you have become a victim, you should immediately contact the cryptocurrency exchange to stop trading or freeze your account if possible; check and revoke any suspicious token authorizations; promptly transfer any remaining cryptocurrency from the affected wallet to another wallet; and report to the relevant authorities.

Safe responds to the blind signature security incident and recommends multi-device signing

ChainCatcher message, the Safe team reviewed the security incident mentioned in the post-mortem report of Radiant Capital, noting that the Safe {Wallet} front-end functioned normally, but external devices were compromised during the signing process, allowing hackers to replace transaction data and trick signers into signing malicious transactions.The Safe team believes this incident highlights the risks of blind signing, where users approve transactions without fully viewing the transaction details, especially when using hardware wallets. To address this issue, Safe recommends using multiple signing devices from different vendors (for example, a combination of Ledger and Trezor) and connecting these devices through trusted interfaces to enhance transaction visibility and security.Additionally, Safe is exploring technologies like conditional signing to provide more contextual information without sacrificing security. The Safe team is considering directly calculating the Ledger hash in its interface so that users can verify the hash displayed on the hardware wallet and the interface. The Safe team emphasizes that all parties in the ecosystem need to collaborate to address the blind signing issue and is committed to working with hardware wallet providers and the community to improve transaction and message signing processes.
ChainCatcher Building the Web3 world with innovators