Cointime

Download App
iOS & Android

Security

SlowMist Cosine: Beware of new scams in conference software targeting crypto assets

The founder of SlowMist, Yu Xian, shared the experience of Twitter user @0xMaxLin being a victim of job fraud on the X platform, warning the community to be aware of fake video conferencing software. These software are used to lure potential victims into downloading malicious applications and stealing encrypted assets. Maxlin.eth reported a job fraud case where the scammer pretended to be from the infrastructure development company xLabs and contacted the victim through Telegram, inducing them to download malicious software. The scammer claimed to offer a marketing position and used Zoom for a fake interview to lower the victim's guard. Near the end of the interview, the scammer asked the user to download a meeting software called Meetly. After installation, the software malfunctioned and the user eventually discovered that the link was a fraudulent website. The user promptly transferred their assets to another wallet, successfully avoiding potential theft risks.

ZachXBT: Sorta Finance may have an exit scam, it is recommended not to use the protocol

 ZachXBT posted on X platform that Sorta Finance may be involved in an exit scam and advises against using the protocol. It is reported that the fraudsters have previously used scams such as Magnate, Kokomo, Lendora, Solfire, Crolend, HashDAO to steal over $25 million. The protocol operates by forking Compound V2 on various EVM chains. It is said that once the protocol's TVL reaches a sufficient amount, they will suspend withdrawals/borrowing and restrict all users.

MonoSwap has been hacked and 371 ETH has been laundered through Tornado

According to PeckShield monitoring, MonoSwap has been hacked. The hacker has transferred the stolen funds from BLAST to Ethereum and has whitewashed 371 ETH (worth about $1.3 million) through Tornado Cash.

Zhenjiang City, Jiangsu Province cracked a case of illegal fundraising using virtual currency, involving more than 40 million yuan

According to the Yangtze Evening News, under the guise of "investing 1 FIL coin for double profits, and developing a downline for four times the team's profits," a partnership was formed to develop a specialized company that attracted over 10,000 members from provinces and cities such as Jiangsu, Guizhou, and Hunan in less than a year, involving over 40 million yuan. On July 20th, the reporter learned from the Jingkou District Prosecutor's Office in Zhenjiang City, Jiangsu Province that after the public prosecution was initiated, the court recently sentenced Li and eight others to three years in prison for illegally absorbing public deposits, with a probation period of three to five years and a fine of 210,000 to 250,000 yuan. After investigation, the case team believed that Li and Li set up static and dynamic income to promote the FPM platform. Although the dynamic income rule belongs to the pyramid scheme crime of pulling in people with high returns as bait and continuously developing downline personnel, it was found through appraisal and audit that Li and others used a large amount of FIL coins absorbed to cooperate with mining machine merchants to pledge "mining." As of the time of the case, Li and others' investment in FIL coins still generated profits through "mining," and there was no behavior of transferring funds. Therefore, they did not have the subjective intent of defrauding property and should be convicted of "illegal absorption of public deposits." During the review and prosecution period, the procuratorial organ conscientiously implemented the policy of combining leniency with strictness in criminal justice, strengthened the interpretation of the law, and encouraged the eight suspects to voluntarily plead guilty. Recently, the court adopted all the opinions and sentencing suggestions of the procuratorial organ and made the aforementioned judgment.

Microsoft: Crowdstrike falcon EDR root cause has been fixed

Microsoft (MSFT.O) stated that the root cause of the latest version of Crowdstrike falcon EDR has been fixed. Microsoft's (MSFT.O) pre-market decline narrowed to 1.5%, after previously falling more than 3%.

Paidun: WazirX hackers have sent 110 million DENTs to ChangeNow

According to PeckShield monitoring, the WazirX hacker tagged address has transferred 110 million DENT tokens, worth about $151,000, to ChangeNow.

Beosin: Analysis of the $10 million loss in the LI.FI attack

Beosin Alert monitoring and warning discovered that the cross-chain protocol LI.FI was attacked. The main attacker used the call injection of the project contract to transfer the authorized user's assets to the contract. Beosin Trace tracked the stolen funds and found that the loss amount was approximately 6.3359 million USDT, 3.1919 million USDC, and 0.1695 million DAI, or about 10 million US dollars. The attack occurred on two chains, ETH and Arbitrum. Currently, most of the funds have been transferred to ETH with no new developments. Beosin has added the hacker's related address to the KYT blacklist and will continue to track and monitor the situation.

DeFi Protocol LI.FI Hit by $8M Exploit Following Suspicious Withdrawals

The LI.FI protocol, a decentralized finance platform, has suffered an $8 million exploit resulting in suspicious withdrawals. Users are advised not to interact with any LI.FI powered applications while the potential exploit is being investigated. The stolen funds include 1,715 ether worth $5.8 million and stablecoins USDC, USDT, and DAI. Crypto security firm Decurity has identified the exploit as involving the LI.FI bridge and attributed it to an arbitrary call with user-controlled data.

Cyvers: LI.FI suspected of suspicious transactions, more than 8 million US dollars of funds affected

According to Cyvers Alerts monitoring, the cross-chain trading aggregator LI.FI has allegedly experienced suspicious transactions, and users are advised to revoke relevant authorizations. So far, more than 8 million US dollars of user funds have been affected, most of which are stablecoins, and the attacker is converting USDC and USDT to ETH.

A user lost about $238,000 in rsETH due to a phishing attack

According to Scam Sniffer monitoring, a user lost 70 rsETH (238,328 USD) pledged in Pendle due to signing a Permit phishing signature on the network three hours ago.