Scan to download
BTC $75,823.89 +1.60%
ETH $2,356.21 +0.75%
BNB $631.29 +1.40%
XRP $1.45 +2.38%
SOL $88.58 +3.86%
TRX $0.3244 -0.39%
DOGE $0.0989 +3.00%
ADA $0.2582 +3.56%
BCH $449.16 +2.12%
LINK $9.52 +2.85%
HYPE $44.17 -2.58%
AAVE $115.36 +9.32%
SUI $0.9954 +2.00%
XLM $0.1686 +4.70%
ZEC $335.46 -2.19%
BTC $75,823.89 +1.60%
ETH $2,356.21 +0.75%
BNB $631.29 +1.40%
XRP $1.45 +2.38%
SOL $88.58 +3.86%
TRX $0.3244 -0.39%
DOGE $0.0989 +3.00%
ADA $0.2582 +3.56%
BCH $449.16 +2.12%
LINK $9.52 +2.85%
HYPE $44.17 -2.58%
AAVE $115.36 +9.32%
SUI $0.9954 +2.00%
XLM $0.1686 +4.70%
ZEC $335.46 -2.19%

click

DGrid AI launches the AI agent platform DClaw, helping users build their personal local AI assistant with one click

AI infrastructure service provider DGrid officially launched its core product DClaw ------ a one-click personal AI agent deployment platform specifically designed for the DGrid ecosystem, aimed at significantly lowering the participation threshold for the open agent economy, providing out-of-the-box personal local AI assistants for individuals, developers, teams, and various communities.According to the official introduction, compared to the open-source framework OpenClaw, DClaw has achieved a comprehensive product upgrade. It focuses on true one-click agent deployment capabilities, compressing the technical configuration process that originally took hours into minutes; it natively integrates DGrid's unified model access API, allowing immediate access to top global models such as GPT-5.4, Claude Opus 4.6, Kimi K2.5 without the need for additional API key configuration; at the same time, it natively adapts to mainstream office and communication platforms such as WeChat, WeChat Work, DingTalk, and Telegram, enabling a single agent to operate uniformly across different environments.In addition, DClaw features a user-controlled persistent memory system and a hot-swappable modular skill plugin ecosystem, supporting multi-agent collaborative work to meet automation execution needs across various scenarios. Each DClaw instance can serve as an intelligent node in the DGrid network, achieving a deep integration of personal usage value and open ecosystem construction.Currently, DClaw has officially launched, allowing users to quickly build their own personal AI agents and participate in the construction of the DGrid open agent economy ecosystem.

ClickFix attack escalates, hackers impersonate VCs and hijack browser extensions to steal crypto assets

The cybersecurity agency Moonlock Lab reports that crypto hackers have recently upgraded their "ClickFix" attack method, beginning to impersonate venture capital firms to contact target users through social platforms and lure them into executing malicious code to steal crypto assets.Attackers disguise themselves as fake venture capital firms such as SolidBit, MegaBit, and Lumax Capital, sending collaboration invitations via LinkedIn and guiding victims to fake Zoom or Google Meet meeting links. The pages embed a fake Cloudflare "I am not a robot" verification button, which, when clicked, copies malicious commands to the clipboard and tricks users into pasting and executing them in the terminal, thus completing the attack. Researchers point out that this method circumvents traditional security mechanisms by "making victims execute commands themselves."Meanwhile, hackers are also hijacking browser extensions to carry out attacks. John Tuckner, founder of cybersecurity company Annex Security, revealed that the Chrome extension QuickLens, after changing ownership on February 1, released a new version containing malicious scripts two weeks later, triggering ClickFix attacks and stealing user data. The extension had about 7,000 users and has since been removed from the store. Reports indicate that the hijacked extension scans crypto wallet data and mnemonic phrases, and scrapes Gmail content, YouTube channel data, and web login or payment information.

Hackers impersonate VC and hijack the QuickLens plugin, using ClickFix technology to steal cryptocurrency assets

According to Cointelegraph, hackers are using the "ClickFix" attack method to steal cryptocurrencies, with the latest two attacks involving impersonating venture capital firms and hijacking browser extensions.Cybersecurity company Moonlock Lab reports that scammers impersonate fake VCs such as SolidBit, MegaBit, and Lumax Capital, contacting users via LinkedIn to offer collaboration opportunities, then directing them to click on fake Zoom and Google Meet links. After clicking the link, users are led to a page with a forged Cloudflare "I'm not a robot" verification box; clicking this box copies malicious commands to the clipboard and prompts users to open a terminal to paste the so-called verification code, thus executing the attack.Moonlock Lab points out that this method turns victims into execution mechanisms, bypassing defenses in the security industry. Meanwhile, hackers are also spreading malware by hijacking the Chrome extension QuickLens. This extension allows users to run Google Lens searches directly in the browser, and after ownership was transferred, the new version contains malicious scripts that can initiate ClickFix attacks and steal information.The extension has about 7,000 users, and once hijacked, it searches for cryptocurrency wallet data and recovery phrases to steal funds, as well as scraping Gmail inbox content, YouTube channel data, and login credentials or payment information entered in web forms. The extension has been removed from the Chrome Web Store. The ClickFix technique has been popular among hackers since last year, forcing victims to manually execute malicious payloads, affecting thousands of businesses and multiple industries worldwide.
app_icon
ChainCatcher Building the Web3 world with innovations.