loss

DeBox operating account private key leaked, resulting in a loss of over 4.87 million BOX and 31 ETH

ChainCatcher news, DeBox officially announced that due to the leakage of the private key of the EOA wallet of the DeBox operational account, 31.03 ETH and 4.879 million BOX were stolen. The official emphasized that this incident is unrelated to the asset security of platform users, and the community can rest assured.The response plan includes:Stabilization Fund Buyback: The stabilization fund will be used to buy back the stolen tokens from exchanges, expected to be completed within a week.Token Distribution: All repurchased tokens will be injected into the BOX DAO asset pool, with specific uses to be decided by community voting.Account Security Upgrade: Once the DeBox App supports multi-signature login, the operational account will be migrated to a multi-signature wallet.Tracking and Accountability: A professional security company has been commissioned to conduct investigations and asset tracking, with progress updates to be provided regularly. Any recovered assets will be managed through BOX DAO voting.The DeBox team stated that they will continue to track the theft address and reserve the right to take legal action, while also committing to continue building an open, transparent, and sustainable ecosystem.Previous news, the DeBox project has dropped over 30% in the past 24 hours, with Uniswap V2 pool liquidity remaining at only $2,900, and total on-chain liquidity around $10,000.

OKLink Security Monthly Report: Zero major Rug Pull incidents in November, with total losses across the network amounting to approximately 203 million USD

OKLink released the November 2024 Security Report, which indicates that on-chain security incidents across the network have resulted in a total loss of approximately $203 million. Phishing scams alone accounted for 64.80% of the total losses, amounting to about $131 million, with no significant Rug Pull incidents reported. REKT incidents accounted for 22.06% of the losses, totaling approximately $45 million.On November 13, a user copied an incorrect address from contaminated transaction history, resulting in a loss of $129 million. An hour later, the attacker returned all the assets. On November 15, the v1 liquidity pool contract of the Aptos ecosystem project Thala was attacked due to a security vulnerability, causing a loss of $25.5 million. Subsequently, Thala negotiated with the attacker to recover all user assets through a $300,000 bounty.OKLink reminds everyone to carefully verify the receiving address when performing on-chain operations. Some users have lost over $100 million by copying incorrect addresses from contaminated transaction records. It is essential to double-check the recipient's address when conducting on-chain operations and avoid the habit of directly copying addresses from transaction records or chat logs. Additionally, learn to use Web3 on-chain tools to mitigate risks. OKLink provides tools for on-chain address queries, token authorization checks, and large transfer monitoring, ensuring on-chain security and keeping you informed of market trends, helping you overcome on-chain anxiety.
ChainCatcher Building the Web3 world with innovators