EthSecurity
5.23K subscribers
112 photos
20 files
766 links
Download Telegram
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
DeepSeek has been hacked: all of their data in the public domain - secret keys, unencrypted chats, logs, and even the backend.

Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fully open, allowing anyone to obtain access.

I cannot confirm or deny their conclusions at this time. But I think it's interesting enough news to share: x.com/officer_cia/status/1884740598579540060

#ai #news #security
πŸ”₯6❀1πŸ‘1
Vladimir S. | Officer's Channel
DeepSeek has been hacked: all of their data in the public domain - secret keys, unencrypted chats, logs, and even the backend. Researchers from wiz.io were performing a normal infrastructure check when they unintentionally uncovered a database that is fully…
1 Million Deepseek Data Breach

DeepSeek AI Data Breach Exposes Over 1 Million Logs and Sensitive Secrets - Chinese AI startup DeepSeek left a database exposed online, leaking over 1 million log lines, chat histories, API keys, and sensitive backend details

Seems service had backdoor
@EthSecurity1
250 LBTC hacked form ionicmoney. why? because ionic listed fake LBTC on mode chain

Thus, the attacker can call mint() with fabricated inputs and pass the check. @EthSecurity1
🀯8😁2😱1
Web3 Security Auditor's 2024 Rewind - The Highlights https://blog.openzeppelin.com/web3-security-auditors-2024-rewind @EthSecurity1
πŸ‘7
Zklend been hacked for ~3600 ETH on starknet @EthSecurity1
🀬14πŸ”₯3⚑1
ZKlend Hack rootcause: The attacker manipulated the "lending_accumulator" to be very large at 4.069297906051644020, then took advantage of the rounding error during ztoken mint() and withdraw() to repeatedly deposit 4.069297906051644021 wstETH getting 2 wei then withdraw 4.069297906051644020*1.5 -1 = 6.103946859077466029 wstETH to expend just 1 wei. @EthSecurity1
πŸ‘13
Forwarded from Vladimir S. | Officer's Channel (Vladimir S. | officercia)
SlowMist founder: we discovered that the hacker who attacked zkLend has a close connection to the hacker who attacked EraLend in July 2023, and we suspect they are the same person: x.com/officer_cia/status/1890132436589445291?12

#security #privacy #investigation
πŸ”₯7😁3πŸ‘1
Urgent Update for Geth Users!
Attention validators! If you are running Geth v1.15.1, upgrade to v1.15.2 immediately to prevent potential financial loss! @EthSecurity1
⚑5πŸ”₯2
Seems Abstract wallets are being drained !
cardex_space involved
~ 180 ether loss
@EthSecurity1
😁5🀯5
If you are running LND older than 0.18.5 and/or LITD older than 0.14.1, upgrade immediately. Apparently, affected Lightning nodes can be completely drained by attackers. #Bitcoin @EthSecurity1
πŸ‘3
Bybit hacked loss ~ $ 1.46 billion
@EthSecurity1
🀯8😁5😱3πŸŽ‰1
the Lazarus hackers first found the targeted employees through social engineering, added private GitHub repository access to the victims or victimized employees through live chat tools, and tricked the users into running the code that contained the backdoor.
🧡
https://x.com/im23pds/status/1892767073605931065?s=61
High level Attack flow
https://x.com/dhkleung/status/1893073663391604753?s=61

@EthSecurity1
🫑10🀯2
Infini defi hacked for $50 million. all dai stolen change into ether and spread in accounts @EthSecurity1
πŸ”₯10😒5
Hegic finance hacked for 0.8275 wBTC. root cause is developer forgot to subtract "t.share" value, user can withdraw multiple times. @EthSecurity1 #Reentrancy
😁9😨9
someone with a $500 bankroll accidentally discovered we were using an old FTM price to mark Sonic ($0.70 vs $0.50) and looped it $50/time in our UI for twelve hours today and like +40x'ed his port, whoever you are ggwp you deserve it (you should learn how to use an API tho)
https://x.com/tomkysar/status/1897125825889398817 @EthSecurity1
😁14
critical vulnerability let in time.fun steal all trading fees and modify metadata (e.g. change "toly's minute" to "vitalik's minute") of every tokens launched.
time.fun provides each new user with a dedicated wallet to deposit USDC for trading. User's private key is securely stored in a third party provider. But SOL is needed to cover gas fees and time.fun wants a seamless interaction for users, the wallet β€œHW2C...Lo1H” signs every trade transaction alongside the user’s wallet signature. Surprisingly, this same wallet also owns all tokens launched by time.fun. As it is one of the signers, we can act on behalf of β€œHW2C...Lo1H” if we can let the backend sign arbitrary data.

@EthSecurity1
❀4
At 23:00 CET on 05.03.25, the 1inch team discovered a vulnerability in resolver smart contracts using the obsolete Fusion v1 implementation. No end-user funds were at riskβ€”only resolvers using Fusion v1 in their own contracts. @EthSecurity1
πŸ‘7