Slow Mist Technology Chief Information Security Officer 23pds said on the X platform that Bybit attackers took away safe owner privileges in a forged signature attack. It is speculated that more than one macOS or Windows computer must have been charged, and the attacker may have stayed on the intranet for a while, able to monitor internal chat, transfer time and other information.
Slow Mist Technology Chief Information Security Officer 23pds issued a warning that the latest version of Phantom wallet may have security bugs, and the victim has explained the risk of Phantom Profile: when a user imports a mnemonic from an unknown source, if the mnemonic has been associated with Phantom Profile, the wallet will automatically log in to the account system, putting the user's assets at risk of theft. According to the victim's description, when a user who does not open the Phantom...
In response to 23pds, the chief information security officer of Slow Mist Technology, reminding the trading tool DeBot to upgrade the security level, the DeBot team responded that the emergency upgrade has been completed as soon as possible. Previously reported, the SlowMist CISO said it recommended that the trading tool Debot upgrade its security level.
Slow Mist Technology's chief information security officer 23pds said on the X platform that the private key of the trading tool Debot was directly "streaking" in the data package, and it was recommended to upgrade the security level.
On January 17, 23pds, the chief information security officer of Slow Mist Technology, said on the X platform that it had recently detected a data breach of a third-party service used by a leading trading platform, involving a large amount of employee information, including email, password and other sensitive data. The relevant situation has been synchronized to the relevant parties for processing. The end of the year is approaching, reminding everyone to be vigilant and pay attention to the safe...
SlowMist CISO 23pds revealed in a post on X: "North Korean hackers launched a cyber attack on Web3 and cryptocurrency software developers called'Operation 99 '. The operation started with fake recruiters and was conducted on platforms such as LinkedIn, using project testing and code reviews to lure developers." Once the victim takes the bait, they are directed to clone a malicious GitLab repository, seemingly harmless but full of disaster. The clone code connects to a command and control (C2) se...
"The'JustJoin 'landing page for suspected North Korean hackers has reappeared," SlowMist CISO 23pds said in a post on X.