福利加码,Gate 广场明星带单交易员三期招募开启!
入驻发帖 · 瓜分$30,000月度奖池 & 千万级流量扶持!
如何参与:
1️⃣ 报名成为跟单交易员:https://www.gate.com/copytrading/lead-trader-registration/futures
2️⃣ 报名活动:https://www.gate.com/questionnaire/7355
3️⃣ 入驻Gate广场,持续发布交易相关原创内容
丰厚奖励等你拿:
首发优质内容即得$30 跟单体验金
每双周瓜分$10,000U内容奖池
Top 10交易员额外瓜分$20,000U登榜奖池
精选帖推流、首页推荐、周度明星交易员曝光
详情:https://www.gate.com/announcements/article/50291
North Korea’s Lazarus behind $300m in 2023 crypto losses
Lazarus group orchestrated nearly 17% of all crypto hacks throughout 2023, mainly targeting centralized platforms like exchanges.
Five successful crypto heists masterminded by Lazarus, a North Korean-funded hacker organization, reportedly resulted in over $300 million stolen from digital asset service providers within 12 months
The state-sponsored criminal actors enacted a change in strategy, switching from defi targets to centralized platforms, according to Immunifi, a leading blockchain bounty company.
As of September 2023, the group had siphoned at least $270 million in 102 days, with services like Atomic Wallet suffering heavy losses. The $115 million ferried from Atomic Wallet remains the single-largest incident attributed to Lazarus during the year
Lazarus is also believed to have launched attacks on CoinEx, crypto casino Stake, and digital payment processor CoinsPaid
Multiple blockchain security firms and even the FBI concurred that Lazarus was responsible for several of these hacks On-chain data showed connections between wallets used to steal funds from protocols and addresses to channel this illicit wealth to crypto mixers like Tornado Cash and Sinbad
The U.S. Treasury Office previously sanctioned Tornado Cash, Sinbad, and Blender.io due to Lazarus allegedly leveraging these crypto-mixing services for money laundry.
The massive losses incurred by cryptocurrency protocols at the hands of Lazarus and other bad actors underpins a larger security threat evident in the nascent digital asset industry
Sipan danyan, co-founder and CEO at Hexens, a cybersecurity firm, said companies must allocate more resources toward combating attack surfaces. The cybersecurity veteran added that continuous security monitoring (CSM) s and value-based bug bounty programs could be key tools against hackers.