Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
DeepSeek has been hacked: all of their data in the public domain - secret keys, unencrypted chats, logs, and even the backend.
Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fully open, allowing anyone to obtain access.
I cannot confirm or deny their conclusions at this time. But I think it's interesting enough news to share: x.com/officer_cia/status/1884740598579540060
#ai #news #security
Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fully open, allowing anyone to obtain access.
I cannot confirm or deny their conclusions at this time. But I think it's interesting enough news to share: x.com/officer_cia/status/1884740598579540060
#ai #news #security
π₯6β€1π1
Vladimir S. | Officer's Channel
DeepSeek has been hacked: all of their data in the public domain - secret keys, unencrypted chats, logs, and even the backend. Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fullyβ¦
1 Million Deepseek Data Breach
DeepSeek AI Data Breach Exposes Over 1 Million Logs and Sensitive Secrets - Chinese AI startup DeepSeek left a database exposed online, leaking over 1 million log lines, chat histories, API keys, and sensitive backend details
Seems service had backdoor
@EthSecurity1
DeepSeek AI Data Breach Exposes Over 1 Million Logs and Sensitive Secrets - Chinese AI startup DeepSeek left a database exposed online, leaking over 1 million log lines, chat histories, API keys, and sensitive backend details
Seems service had backdoor
@EthSecurity1
- Uniswap V4: Hooks Security Considerations
- kyberswap hacker arrested - crypto losses in janurary 2025 @EthSecurity1
- kyberswap hacker arrested - crypto losses in janurary 2025 @EthSecurity1
Certik
Uniswap V4: Hooks Security Considerations - CertiK
This article discusses some of the new features of Uniswap V4, and explores the security considerations related to Uniswap V4 hooks.
β€12
New Patrick Collins course
https://m.youtube.com/watch?v=nWsLw_1OpE0&pp=ygUMRnJlZWNvZGVjYW1w
@EthSecurity1
https://m.youtube.com/watch?v=nWsLw_1OpE0&pp=ygUMRnJlZWNvZGVjYW1w
@EthSecurity1
YouTube
Vyper and Python Smart Contracts on Blockchain β Full Course for Beginners
If you're interested in learning how to write software that runs on a blockchain distributed ledger database, this comprehensive course will teach you everything from scratch using Python and Vyper, even if you're a complete beginner.
The course will enableβ¦
The course will enableβ¦
π₯7
250 LBTC hacked form ionicmoney. why? because ionic listed fake LBTC on mode chain
Thus, the attacker can call mint() with fabricated inputs and pass the check. @EthSecurity1
Thus, the attacker can call mint() with fabricated inputs and pass the check. @EthSecurity1
π€―8π2π±1
Web3 Security Auditor's 2024 Rewind - The Highlights https://blog.openzeppelin.com/web3-security-auditors-2024-rewind @EthSecurity1
π7
Zklend been hacked for ~3600 ETH on starknet @EthSecurity1
π€¬14π₯3β‘1
ZKlend Hack rootcause: The attacker manipulated the "lending_accumulator" to be very large at 4.069297906051644020, then took advantage of the rounding error during ztoken mint() and withdraw() to repeatedly deposit 4.069297906051644021 wstETH getting 2 wei then withdraw 4.069297906051644020*1.5 -1 = 6.103946859077466029 wstETH to expend just 1 wei. @EthSecurity1
π13
an issue found by zellic in the Cairo VM during a recent audit of Starknet OS.
This bug has been fixed as an immediate patch to Starknet's current version 0.13.3.
https://community.starknet.io/t/remediating-a-potential-sequencer-prover-inconsistency-in-the-cairo-vm/115313
@EthSecurity1
This bug has been fixed as an immediate patch to Starknet's current version 0.13.3.
https://community.starknet.io/t/remediating-a-potential-sequencer-prover-inconsistency-in-the-cairo-vm/115313
@EthSecurity1
Starknet Community Forum
Remediating a potential sequencer-prover inconsistency in the Cairo VM
This post presents the disclosure process of a subtle issue in the Cairo VM which was discovered during the Starknet OS audit. The transaction execution in SN is done in 2 phases: Sequencing and proving. During a Starknet OS audit done by @fcremo from @Zellic_ioβ¦
π6β€2
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
SlowMist founder: we discovered that the hacker who attacked zkLend has a close connection to the hacker who attacked EraLend in July 2023, and we suspect they are the same person: x.com/officer_cia/status/1890132436589445291?12
#security #privacy #investigation
#security #privacy #investigation
X (formerly Twitter)
Vladimir S. | Officer's Notes (@officer_secret) on X
. @SlowMist_Team founder @evilcos : we discovered that the hacker who attacked @zkLend has a close connection to the hacker who attacked @Era_Lend in July 2023, and we suspect they are the same person.
π₯7π3π1
Urgent Update for Geth Users!
Attention validators! If you are running Geth v1.15.1, upgrade to v1.15.2 immediately to prevent potential financial loss! @EthSecurity1
Attention validators! If you are running Geth v1.15.1, upgrade to v1.15.2 immediately to prevent potential financial loss! @EthSecurity1
β‘5π₯2
π5π€―5
If you are running LND older than 0.18.5 and/or LITD older than 0.14.1, upgrade immediately. Apparently, affected Lightning nodes can be completely drained by attackers. #Bitcoin @EthSecurity1
π3
the Lazarus hackers first found the targeted employees through social engineering, added private GitHub repository access to the victims or victimized employees through live chat tools, and tricked the users into running the code that contained the backdoor.
π§΅
https://x.com/im23pds/status/1892767073605931065?s=61
High level Attack flow
https://x.com/dhkleung/status/1893073663391604753?s=61
@EthSecurity1
π§΅
https://x.com/im23pds/status/1892767073605931065?s=61
High level Attack flow
https://x.com/dhkleung/status/1893073663391604753?s=61
@EthSecurity1
X (formerly Twitter)
23pds (ε±±ε₯) (@im23pds) on X
π§Lazarus Hacker, i know you can see my X posting, I've caught you on the trail and we'll be posting a related tracking article disclosing the details of this attack. @SlowMist_Team @evilcos
π«‘10π€―2
Infini defi hacked for $50 million. all dai stolen change into ether and spread in accounts @EthSecurity1
π₯10π’5
Hegic finance hacked for 0.8275 wBTC. root cause is developer forgot to subtract "t.share" value, user can withdraw multiple times. @EthSecurity1 #Reentrancy
π9π¨9
β οΈA critical vulnerability (GHSA-vjh7-7g9h-fjfh) has been discovered in the widely-used elliptic encryption library.
https://slowmist.medium.com/private-key-leakage-in-ecdsa-signatures-analysis-of-malformed-input-vulnerability-in-the-elliptic-24f73c05cac1 @EthSecurity1
https://slowmist.medium.com/private-key-leakage-in-ecdsa-signatures-analysis-of-malformed-input-vulnerability-in-the-elliptic-24f73c05cac1 @EthSecurity1
Medium
Private Key Leakage in ECDSA Signatures: Analysis of Malformed Input Vulnerability in the Ellipticβ¦
Author: enze
Editor: Liz
Editor: Liz
π€―14β€1π₯1
someone with a $500 bankroll accidentally discovered we were using an old FTM price to mark Sonic ($0.70 vs $0.50) and looped it $50/time in our UI for twelve hours today and like +40x'ed his port, whoever you are ggwp you deserve it (you should learn how to use an API tho)
https://x.com/tomkysar/status/1897125825889398817 @EthSecurity1
https://x.com/tomkysar/status/1897125825889398817 @EthSecurity1
X (formerly Twitter)
tk β½οΈ (@tomkysar) on X
someone with a $500 bankroll accidentally discovered we were using an sold FTM price to mark Sonic ($0.70 vs $0.50) and looped it $50/time in our UI for twelve hours today and like +40x'ed his port, whoever you are ggwp you deserve it (you should learn howβ¦
π14
critical vulnerability let in time.fun steal all trading fees and modify metadata (e.g. change "toly's minute" to "vitalik's minute") of every tokens launched.
time.fun provides each new user with a dedicated wallet to deposit USDC for trading. User's private key is securely stored in a third party provider. But SOL is needed to cover gas fees and time.fun wants a seamless interaction for users, the wallet βHW2C...Lo1Hβ signs every trade transaction alongside the userβs wallet signature. Surprisingly, this same wallet also owns all tokens launched by time.fun. As it is one of the signers, we can act on behalf of βHW2C...Lo1Hβ if we can let the backend sign arbitrary data.
@EthSecurity1
time.fun provides each new user with a dedicated wallet to deposit USDC for trading. User's private key is securely stored in a third party provider. But SOL is needed to cover gas fees and time.fun wants a seamless interaction for users, the wallet βHW2C...Lo1Hβ signs every trade transaction alongside the userβs wallet signature. Surprisingly, this same wallet also owns all tokens launched by time.fun. As it is one of the signers, we can act on behalf of βHW2C...Lo1Hβ if we can let the backend sign arbitrary data.
@EthSecurity1
β€4
At 23:00 CET on 05.03.25, the 1inch team discovered a vulnerability in resolver smart contracts using the obsolete Fusion v1 implementation. No end-user funds were at riskβonly resolvers using Fusion v1 in their own contracts. @EthSecurity1
π7