Scan to download
BTC $81,098.97 +0.25%
ETH $2,330.78 +0.32%
BNB $655.47 +0.99%
XRP $1.46 +2.64%
SOL $94.94 +1.65%
TRX $0.3518 +0.42%
DOGE $0.1100 +1.78%
ADA $0.2791 +2.46%
BCH $450.45 -0.50%
LINK $10.56 +0.66%
HYPE $41.44 -2.96%
AAVE $100.18 +3.40%
SUI $1.28 +13.96%
XLM $0.1676 +2.88%
ZEC $568.70 -4.92%
BTC $81,098.97 +0.25%
ETH $2,330.78 +0.32%
BNB $655.47 +0.99%
XRP $1.46 +2.64%
SOL $94.94 +1.65%
TRX $0.3518 +0.42%
DOGE $0.1100 +1.78%
ADA $0.2791 +2.46%
BCH $450.45 -0.50%
LINK $10.56 +0.66%
HYPE $41.44 -2.96%
AAVE $100.18 +3.40%
SUI $1.28 +13.96%
XLM $0.1676 +2.88%
ZEC $568.70 -4.92%

compensation

US law firm applies to block the transfer of Kelp attack, freezing ETH, involving compensation amounting to over 870 million dollars

According to Cointelegraph, the U.S. law firm Gerstein Harrow LLP has applied to the court for an injunction to prevent Arbitrum DAO from transferring frozen Ethereum assets related to the Kelp attack.The law firm claims that its clients have obtained default judgments in three cases against North Korea, totaling approximately $877 million (including punitive damages and interest), and assert a right to claim the related assets.Previously, Kelp DAO was attacked on April 18, resulting in losses of about $292 million, which is believed to be related to the North Korean hacker group Lazarus Group. Subsequently, the Arbitrum security committee urgently froze approximately 30,766 Ether (about $73 million).The incident has sparked controversy. Some community members believe that if the injunction takes effect, it will delay the return of funds to the victimized users and shift the North Korean-related debts onto secondary victims. Previously, Aave Labs had proposed to unfreeze the funds and inject them into a compensation fund to restore the damaged assets.It is worth noting that Gerstein Harrow has previously filed claims regarding assets stolen by North Korean-related hackers and frozen by cryptocurrency platforms, including the 2023 Heco Bridge incident. Industry analysts believe that this case may have a demonstrative impact on the disposal of DAO assets and the definition of cross-jurisdictional claims.

Syndicate Labs suffered a private key leak attack, approximately 18.5 million SYND were transferred, and they promised full compensation to users

According to official news, Syndicate Labs disclosed that its cross-chain bridge contract was maliciously upgraded on two chains due to a private key leak. The attacker transferred and sold approximately 18.5 million SYND (about $330,000) and around $50,000 worth of user tokens. The incident only affected specific chains, while others were not impacted.Syndicate Labs stated that this attack involved multi-stage reconnaissance, infrastructure mapping, and careful execution, demonstrating a high level of technical complexity, and ruled out the involvement of internal personnel. The root cause was that the private key was stored in a password management tool without an additional layer of encryption, and the upgrade process did not utilize multi-signature or hardware signature mechanisms, nor did it have early warning and circuit breaker measures for contract upgrades.Syndicate Labs announced that it will fully compensate all affected users, including returning 18.5 million SYND and providing additional compensation, while also fully compensating affected application chain clients. The company has initiated security upgrade measures, including strengthening private key encryption, tightening access permissions, and plans to introduce hardware or multi-signature mechanisms and upgrade path monitoring to prevent similar incidents from occurring again.

In a $37 million cryptocurrency money laundering case, a suspect was sentenced to nearly 4 years in prison

The U.S. Attorney's Office for the Central District of California has announced that a suspect involved in a large-scale cryptocurrency money laundering scheme has been sentenced. Jingliang Su, a 45-year-old Chinese national, was sentenced to nearly 4 years in federal prison on Tuesday local time for his role in laundering nearly $37 million in illegal digital assets, and he was ordered to pay over $26 million in restitution.Prosecutors noted that Jingliang Su was a member of a transnational criminal network that contacted U.S. victims through text messages, phone calls, and online dating platforms, luring them into participating in fraudulent cryptocurrency investments. Victims were directed to counterfeit websites of legitimate trading platforms and were falsely informed that their investments were generating profits, while the actual funds were being transferred and embezzled.Investigations revealed that the relevant funds were laundered through U.S. shell companies, digital asset wallets, and international bank accounts, with approximately $36.9 million ultimately being wired to an account at Deltec Bank in the Bahamas and converted to USDT. Subsequently, accomplices located in Cambodia transferred the USDT to the masterminds behind the regional scam centers.The U.S. government has confirmed at least 174 American victims. Jingliang Su had previously pleaded guilty in June to a charge of "conspiracy to operate an illegal money transmitting business." A total of 8 individuals involved in the case have pleaded guilty, including another suspect who has been sentenced to over 4 years in prison.
app_icon
ChainCatcher Building the Web3 world with innovations.