personal information

The Ministry of Public Security has supervised the resolution of a major case involving virtual currency hacking, where 5 individuals illegally profited over 6.4 million yuan by stealing 200 million pieces of personal information

ChainCatcher news, according to Phoenix Network, the Public Security Bureau of Neijiang City, Sichuan Province held a press conference announcing that the Neijiang police recently cracked a case of illegally obtaining computer system data, which was supervised by the Ministry of Public Security, and arrested 5 people. It is reported that the gang consists of high-end "hackers" engaged in network technology, one of whom is an employee of a large cybersecurity company. They obtained citizens' personal information by writing hacking programs to gain unauthorized access, and ultimately sold citizens' personal information on overseas websites for virtual currency, with prices reaching up to 5 yuan per piece.According to police investigations, the case involves 57 government and enterprise websites, and the gang stole 208 million pieces of citizens' personal information, including flight trajectories, diplomas, and addresses, with illegal profits exceeding 6.4 million yuan. The special investigation team seized illegal gains of over 5.6 million yuan, confiscated more than 30 sets of core code for hacking tools written by the suspects, over 10 hacking virtual machine penetration attack systems, and 270 penetration scripts. The case has now been transferred for prosecution and is currently under trial.

ZachXBT: Prisma attackers suspected of multiple attack incidents, personal information has been obtained

ChainCatcher news, on-chain detective ZachXBT released an investigation regarding the suspected $11.1 million exploit of Prisma by 0x77 (Trung) and several vulnerabilities involved. On March 28, 2024, the Prisma team observed a series of transactions on the MigrateTroveZap contract, resulting in a loss of 3,257 ETH (approximately $11.1 million).Initially, the attacker communicated with the Prisma deployers, claiming it was a white hat attack. However, later that same day, all funds were transferred to Tornado Cash, contradicting the previous statement. The exploiter began to make excessive demands, requesting a $3.8 million (34%) white hat bounty. This amount is far above the industry standard of 10%, effectively extorting the team, as the treasury did not have sufficient assets to compensate users.Through on-chain tracking, PrismaFi exploiter 0x77 was previously implicated in the Arcade exploit incident in March 2023 and the Pine protocol exploit incidents starting in February 2024. Additionally, the exploiter's address is linked to the deployer address of Modulus Protocol. 0x77 is one of the few followers of this project, strengthening the connection between each event. Further analysis of this suspected scammer's phone number, email, and other details has been conducted. Their posts on X indicate they have a strong technical background. Currently, all personal details have been compiled, and the Prisma team is pursuing all possible legal avenues in Vietnam and Australia. ZachXBT urged this scammer to return the funds promptly to prevent further escalation and save time for everyone.
ChainCatcher Building the Web3 world with innovators