关于「 slowmist」的内容列表

SlowMist Warning: AI Assistant Mistakenly Recommends imToken Phishing Site

On April 3, the SlowMist team issued a warning that when it tested the search results of mainstream AI assistants on imToken's official website, it found that some AI returned phishing links. The unique address of imToken's official website is: token (.) im. SlowMist reminds users not to use AI as a safe search engine, be sure to download wallets from official channels and manually verify the URL.

clock
2025-04-03 13:34:23
SlowMist警告:AI助手错误推荐imToken钓鱼网站

4月3日消息,SlowMist团队发布警告称,其在测试主流AI助手对imToken官网的搜索结果时,发现部分AI返回了钓鱼链接。imToken官网唯一地址为:token(.)im。SlowMist提醒用户切勿将AI当作安全搜索引擎,务必从官方渠道下载钱包,并手动核验网址。

clock
2025-04-03 13:34:23
SlowMist:从未发行过任何代币,用户请保持警惕

SlowMist 在 X 发文表示,在向币安 CEO CZ 报告安全漏洞并获得感谢后,该团队发现在 pump.fun 和 Four.Meme 平台上出现了多个以"SLOWMIST"、"SlowMist"等变体命名的模因币。 SlowMist 安全团队特此提醒,这些模因币均为诈骗项目,并强调 SlowMist 从未发行过任何代币,呼吁用户保持警惕。

clock
2025-03-28 09:51:26
SlowMist issues security alert: Suspicious activity related to $MIN detected

According to the official announcement of SlowMist, the team has detected potential suspicious activity related to the $MIN token (BSC chain) and has reminded users to be vigilant and pay attention to the safety of their funds.

clock
2025-03-28 02:37:44
SlowMist发布安全警报:检测到与$MIN相关的可疑活动

据SlowMist官方公告,团队检测到与$MIN代币(BSC链)相关的潜在可疑活动,并提醒用户提高警惕,注意资金安全。

clock
2025-03-28 02:37:44
Slow Mist Cosine: The front end of Safe has been tampered with and forged to achieve the effect of deception. North Korean hackers have carried out similar operations many times

SlowMist founder Cosine posted on social media that there is no problem with the Safe contract, the problem is in the non-contract part, the front end is tampered with and forged to achieve the effect of deception. This is not an isolated case. North Korean hackers have succeeded in this method several times last year, such as the WazirX incident (stolen $230 million, Safe multi-signature), Radiant Capital incident (stolen $50 million, Safe multi-signature), DMM (stolen $305 million, Gonco multi...

clock
2025-02-22 03:51:30
SlowMist CISO: Bybit attackers may break into the computers of several official personnel, and can monitor internal chat, transfer time and other information

Slow Mist Technology Chief Information Security Officer 23pds said on the X platform that Bybit attackers took away safe owner privileges in a forged signature attack. It is speculated that more than one macOS or Windows computer must have been charged, and the attacker may have stayed on the intranet for a while, able to monitor internal chat, transfer time and other information.

clock
2025-02-22 03:24:22
SlowMist: Bybit attackers exploit backdoor functions sweepETH and sweepERC20 in malicious contracts

SlowMist said on the X platform that the following are some details of the Bybit hackers: - The malicious implementation contract was deployed at 7:15:23 UTC 2025-02-19: 0xbDd077f651EBe7f7b3cE16fe5F2b025BE2969516; 2025-02-21 14:13:35 UTC, the attacker used three owners to sign a transaction to replace the Safe implementation contract with a malicious one: 0x46deef0f52e3a983b67abf4714448a41dd7ffd6d32d32da69d62081c68ad7882; - malicious upgrade logic is embedded in STORAGE [0x0] via DELEGATECALL: 0...

clock
2025-02-21 17:24:17
SlowMist: Detection of potentially suspicious activity related to BOLT tokens

According to a report by SlowMist, the security team has detected potentially suspicious activity related to BOLT tokens, and SlowMist warns users to remain vigilant.

clock
2025-02-19 02:33:49
慢雾:检测到与 BOLT 代币相关的潜在可疑活动

据慢雾科技(SlowMist)报告,安全团队检测到与 BOLT 代币相关的潜在可疑活动,慢雾提醒用户保持警惕。

clock
2025-02-19 02:33:49
Slow Mist Cosine: Mode Successfully Freezes Most of Ionic Money's Stolen Assets

SlowMist Cosine posted on the X platform that the Mode network has taken action to freeze most of the stolen assets of the Ionic Money project. The currently frozen Mode wallet holds $8.80 million of stolen funds, limiting the loss in capital transferred across the chain to outside the Mode network to $3.50 million. The funds that were not intercepted have been transferred through the coin mixing protocol Tornado Cash.

clock
2025-02-13 12:12:24
Slow Mist Cosine: The zkLend hack is suspected to be the 2023 EraLend hack

The founder of Slow Mist, Cosine, wrote on X that the hacker who attacked zkLend was the same as the hacker who attacked EraLend in July 2023.

clock
2025-02-13 10:08:13
Slow Mist Cosine: zkLend was attacked due to a contract safeMath library vulnerability

According to SlowMist founder Cosine Monitor, Starknet's on-chain lending protocol zkLend was hacked on February 12, losing more than $9.50 million. The reason for the attack is that the safeMath library used in its market contract uses direct division when performing division calculations, resulting in a rounding vulnerability in the number of zTokens that actually need to be destroyed when calculating withdrawals. The attacker is taking advantage of this vulnerability to profit. The on-chain d...

clock
2025-02-13 05:50:59
Slow Mist Cosine: Hackers have moved zkLend stolen funds from the Starknet network across chains to other networks

SlowMist Cosine posted on the X platform that hackers have transferred zkLend stolen funds from the Starknet network to other networks, with most of the funds flowing to the Ethereum network.

clock
2025-02-12 11:50:09
SlowMist: Suspicious activity related to the contract "0x.. B1B" on the Base chain has been detected.

On February 11, SlowMist issued a security warning, detecting potentially suspicious activity related to the contract 0xB5486F71... 8F47834D90B1B on the Base chain. The contract has been upgraded to an implementation contract with a backdoor function transferTokens. Attackers use this function to steal user assets that have previously approved the contract. Please revoke the authorization of this contract ASAP.

clock
2025-02-11 07:27:36

7x24 快讯