October 2022 is now the biggest month in the largest year for hacks. As of the 13th, a whopping $718 MILLION has been lost to malicious actors in
#DeFi
per
@chainalysis
reports.
Lets discuss how we can make Q4 safer for all individuals and protocols alike:
Hey
@TGIGFestival_
you can delete us from your discord but unfortunately you cannot delete the irrefutable evidence of your negligence toward your customers.
Find withdrawals from Tornado Cash & Railgun using Laundry!
Following TG channels Storm Watch and Gun Watch, I endeavored to consolidate the data, facilitate searches & present it clearly.
I remain committed to building tools that make hunting threat actors more efficient.
CBDC’s will inherit weaker security through minimal distance to entropy, contingent on tighter controls of the infrastructure.
Expect:
1. More vulnerabilities as a function of time in the market
2. Exploits extracting larger value.
Less energy in = shorter distance to entropy.
@tayvano_
This makes sense, Boeing 777 = 8 filters and recirculating every 2 minutes roughly, maintaining 50% ratio.
737-800 can vary from 1 - 2 filters and recirc every 2-3 minutes.
This boils down to 777 = ~ 68 passengers /filter,
787 = 96 - 149 passengers /filter
Generally Airbus >
@AlboMP
10 Tweets in the last 3 days, 9 of those about the Voice, and only 1 about the ongoing events in the Middle East. No tweet for the murdered Australian either. Priorities….
New day new rug.
@dictumexchange
pulled the wool over many
@arbitrum
projects eyes.
Crypto is a nuanced, fickle thing.
Bring on 2023 and the year of better due diligence.
More
#Lazarus
activity: Crypto themed NPM packages found delivering malware in stealth.
Package names included "erc20-testenv", "blockledger", "cryptotransact" and "chainflow", each package maintained by a different user on github.
I built a telegram channel and bot that monitors for withdrawals >100ETH from Tornado.
For web3 security folk, monitoring withdrawals can be an important part of the hunt, so I've decided to share it here.
I'm back, did you miss me? I have some huge news!
Over the last year and a half, I've been working on something big in secret with the rest of the crypto security community. Today, we're finally ready to reveal ourselves to the world. We are
@_SEAL_Org
There’s so much misinformation being spread throughout CT that VPNs are a viable solution to IP tracing. This is categorically false, both Gvmt and ISPs can see who is using a VPN, and use gateway enumeration to identify source IP address.
Will provide an article soon™️
Yesterday address 0xfa6b7e8709ddbf1a734b463ae9661760d4c438f0 withdrew 3,200 ETH from the Tornado Cash 100E router. This amounted to 32 * 100E withdrawals over a 24 hr period, before ALL the funds were sent back to Tornado cash in a series of 32 Deposits..
Last pass has been breached ... again, I know of at least one DeFi protocol and team that use it. Here are some details:
While passwords were encrypted, Emails were not and credit card info is yet to be seen.
Expect large-scale phishing campaigns to follow.
New name, new theme, new updates.
Retrace consolidates withdrawals from Tornado Cash and Railgun on Ethereum, facilitating efficient hunting. Now with a new theme, transaction hashes linking to
@MetaSleuth
for faster investigations, and search by date.
h/t
@RAILGUN_Project
@tayvano_
Yea A330 has one of the best ratios at 36 pax / filter. Altitude also plays a part so you want shorter recirculation intervals which also improve 02 levels. Best seats are generally fwd center at a window.
With the Kyber Network Exploiter's recent transactions we can establish a link to various exchanges.
A Kyber exploiter related address began exploiting a vulnerability related to Thirdweb transferring 455,184,210,526 HXA from 0x…dead onward to
Our second guy was a little more active, having funds spread across Arbitrum and Mainnet, and deploying various contracts since August.
They been cooking for a while..
We experienced a token approval exploit from our new router and have paused our router to contain the issue.
Any funds lost due to the bug on our new router will be compensated. Your keys and wallets are safe.
We will release a detailed response after investigations conclude.
step 4 cont:
I recommend .
@skiffprivacy
provides encryption by default, but also allows you to create multiple accounts and handles. The cherry on-top? Skiff has encrypted cloud and functioning notion replacement. Sign in w/
@keplrwallet
+
@MetaMask
😉
> Deposit into TC
> Waiting.jpeg
> Withdraw from TC
> Transfer funds to the same address that deposited...
> Transfer more funds to a pink drainer wallet
Why waste the time and ETH 🫠
First integration now released.
If you email a Skiff user with an address that has a
@farcaster_xyz
profile, the profile info, display name, and picture are auto-populated in Skiff
Crypto users are being targeted through pirated applications distributed via torrents.
The malicious applications facilitate an asyncRAT via port 3309, and once infected hosts a clipboard hijacker which replaces users crypto addresses with those of the attacker when copied to
Well
@farcaster_xyz
has certainly been a smoother on-boarding experience than
@LensProtocol
, really enjoying the UX thus far. Desktop app is smooth as mustard.
Ty
@optimizoor
for the tweet that encouraged me to try it and
@dwr
for helping me jump aboard!
As this exploit was to do with ERC20 approvals, the exploiters wallet currently contains no ETH.
It will be interesting to see how they fund this wallet and if they can execute it prior to USDC being frozen.
OKx Dex was just exploited, with several users losing funds.
Hackers address is 0x1f14e38666cdd8e8975f9acc09e24e9a28fbc42d
The first victim transaction is 0x37ef37adf6f25438fa6011632749d68e12879952fa7f68c6d0c183a16de9c1bf
This victim unfortunately lost >15kUSDC
The OKX exploiters' address was eventually funded from 0xeb982159ec32b601b6201a0553a05745a14e8f6c at transaction 0x4c3cfdf935aef79d46510c86bad7c5099dc7ca04d5d002ba1f9abd05769132c5.
The second okx exploiter wallet 0xFacf375Af906f55453537ca31fFA99053A010239 rx'd funds via
As this exploit was to do with ERC20 approvals, the exploiters wallet currently contains no ETH.
It will be interesting to see how they fund this wallet and if they can execute it prior to USDC being frozen.
Seems there is a demand, so I will release.
@GMX_IO
report is done, next up is
@Buffer_Finance
as I try to prioritize the
#RealYield
protocols first.
Which protocol should I do next? 👇
Built another telegram bot monitoring withdrawals from Railgun on Ethereum.
I remain committed to building tools that make hunting threat actors more efficient.
Both the Railgun monitor channel and Tornado monitor channel are linked below.
Calling all DeFi Detectives and on-chain sleuths! This tool is for you.
Speed up your investigations with Defi Detective, a browser extension made by yours truely. No more copy and pasting, just install, highlight and click.
Attempts to categorize APTs based solely on their technical prowess often fall short. The varied tactics and methodologies defining APTs call for a more nuanced understanding, one that cannot be aptly captured with simplistic, broad-brush approaches.
More interesting behavior following withdrawals from the TC 100E pool.
> 7 Addresses withdraw 100E each.
> Route through a dummy "WETH" contract
> Followed by an address that withdrew ~2800E in Nov
> Route 200E on-wards to addresses that deposit to Fixed Float and Mexc.
7
Web3 is not immune to Web2 vulnerabilities. Following the Velodrome FE compromize I created another TG channel to monitor select Web3 frontends for indicators of compromize.
Reminder to revoke old token approvals!
0x..3cDf0 Is deploying contracts that exploit and extract ERC20 tokens vulnerable to often predisclosed vulnerabilities and sending those tokens directly to the NFT Trader Exploiter.
Recently seen with uboost and swap0x
Another URL to watch, using the same script
tornado-cash[.]com.
Over the last 3 days, the following addresses dominated 100E pool withdrawals:
0xfa6b7e8709ddbf1a734b463ae9661760d4c438f0
0xe901dea7a92dadb188626feb62ea475897e61f8c
0x3ba4fd5124479a7d21e9540bd8d8568121a68bd0
Well, shit.
Encrypted traffic interception on Hetzner and Linode targeting , the largest Russian XMPP (Jabber) messaging service.
The instant messaging have been wiretapped for 3 months, on both hosting providers in Germany.
List of businesses affected by the
#optus
outage:
- Melb Metro rail
- ACT Government (phones)
- Royal Melb Hospital
- Budget Direct
- Western Syd University
- Virgin Australia (Velocity call-center)
- Commbank
- ANZ
- Tafe QLD
- Speech pathology Au
- Long seed & grain
More .👇
The key takeaway here is to remain vigilant and practice good OPSEC. This includes limiting behaviors that are conductive to effective phish campaigns:
1. Stop using password managers, rather, keep air-gapped records using your own obfuscation technique
2. Stop using LinkedIn
No mud, No lotus 🪷
2022 has exposed the mud in Defi, so the true lotus flowers can push through the surface.
Secrecy, lack of transparency and complete disregard for retail investors and employees serve no purpose moving forward.
I’m optimistic for 2023.
OKx Dex was just exploited, with several users losing funds.
Hackers address is 0x1f14e38666cdd8e8975f9acc09e24e9a28fbc42d
The first victim transaction is 0x37ef37adf6f25438fa6011632749d68e12879952fa7f68c6d0c183a16de9c1bf
This victim unfortunately lost >15kUSDC
The little contract that could:
4 days ago, 0x..87611 deployed a fake "WETH" contract 0x..fe26 after receiving funds from Fixed Float. This contract has since processed >800 ETH in deposits, these deposits come from a series of wallets that withdrew from the 100E pool over the
Me: I'd like some yield on my $ARB, thanks.
Her: Low IL, No IL, Incentivized rewards, single sided staking, concentrated liquidity, non-inflationary yield, locked liq or escrowed tokens?
Me: I just want yield that tastes like real yield...
The rUSDCn market seems to be exploited, with the hacker deploying a contract to take advantage minting new rUSDCn, and swapping rUSDn for USDC.
(From first glance, am on phone)
Pretty aggressive phishing campaign happening right now, with an army of bot accounts link spoofing to appear as
@ArkhamIntel
when in reality the link goes to a separate fake account @ ArkhamIntelDAO, promoting a fake phishing site. Do not click!
For crypto to prevail long term we need to solve for Web2 issues. Users should not get rekt from issues on the front-end. After tackling this issue I blv the most efficient solution is wallet providers map & check url <> contract prior to signing TX.
Let’s promote a discussion.
Watching Railgun withdrawals via Gunwatch:
0x..6e3dd received 193.6ETH from Railgun, before bridging to Arbitrum, then bridging back to Mainnet & leaving the funds split between 0x..ABc61f & 0x..6D4B1.
🚨ALERT🚨Our system has detected an abnormal transaction related to the
@KyberNetwork
exploiter.
The address funded by the
@KyberNetwork
exploiter has received $50M worth of $HXA from the 0x0..000dEaD $ETH address using transferfrom function! 🤯
Address: .
🚨🚨🚨 RED ALERT 🚨🚨🚨:
Do not interact with ANY dApps until further notice. It appears that a commonly used web3 connector has been compromised which allows for injection of malicious code affecting numerous dApps.
Below are
#Lazarus
related and some
#Bluenoroff
activity, some are old but not otherwise tracked.
#Bluenoroff
campaigns have targeted MacOS devices and the crypto industry. They have also expanded to telegram, the latest post by
@AlexMasmej
explains how they were targeted.
Most DeFi protocols lack incident response plans. So a few weeks back I began developing generic DeFi incident response plans that may serve as a starting point for the little guys. It started as a hobby & I called them DIRP's. I've now recognized their value so sharing here.
@RonniSalt
Hypocrisy is apparent when the shoe is on the other foot, those who once wielded power find themselves at the mercy of the very tactics they employed. The coordinated campaign is a testament to the ruthlessness and the lengths to which some wil go to maintain their grip on power
Step 6: Know thy computer telemetry!
The apps you use are in constant communication with servers, sending periodic packets unbeknownst to the end user. Prevent this using Portmaster by it's O/S and free.
Bonus? Forget VPNs, Use Safing SPN!
@SafingIO
While global tensions are rising it is incredibly important to block advertising on all devices, and preferably, at the router. Expect the widespread distribution of “malvertising” to increase over the coming weeks.
@CanteringClark
@UmamiFinance
The most forward-thinking team in DeFi IMO. They apply prudence and care in all undertakings, and do not hesitate to iterate on product launches. Completely transparent and communicate regularly.
They are ushering a new standard for both retail and institutional investors.
If it is anonymity you seek, endpoint obfuscation and telemetry minimization should be your priority.
I have tirelessly provided a free and OS solution for this, which has had little uptake (I have no affiliation with the service, but wish to see frens protected).
Isn’t this a sneaky one, imitating a video but sending to a drainer. Be careful out there.
+ Bonus tip: while it won’t work for Twitter, NextDNS (free) with HageZi blocklist will block most ads being served to you day to day. Fighting malvertizing is a never ending battle.
@crypto_noodles
@crypto_condom
@GMX_IO
Seriously? He has no team. One of the most respected and honest people in Defi, worth having on your side. Glad people can watch you act like this in public, only will reaffirm their fears.
3. Compartmentalize email addresses, providers like Skiff allow the use of aliases for online services, leverage this.
4. If you are a DeFi protocol, listen to the recommendations of your CISO, they preemptively assess risks such as these, do not downplay the impact.
@rpolysec
100% this. There are those in Defi security who are entirely capable of good IR without the post exploit clout farm. Discretion is key in these engagements.