Cointime

Download App
iOS & Android

Security

Cosine: After a user used GPT to write a bot with a backdoor code, the private key was sent to a phishing website

SlowMist Yu Xian stated in a post on the X platform that a user used GPT to write a bot with code and sent the private key to a phishing website. The reason why the private key was stolen was because it was directly sent to the phishing website in the HTTP request body. Yu Xian reminded that when using LLM such as GPT/Claude, one must pay attention to the common fraudulent behavior of these LLM. It was previously mentioned that AI poisoning attacks were carried out, and now this is a real attack case targeting the crypto industry.

Polymarket Blocks French Users Amid Government Investigation into Gambling Law Compliance

Polymarket has blocked users from France following reports of an investigation by the country's gaming authority for compliance with gambling laws. The ban was not stated in Polymarket's terms of service, but French users attempting to access the website using a VPN from a French server were met with a digital blockade. The ANJ, France's national gaming authority, began investigating Polymarket after a French trader placed large bets on Donald Trump winning the 2024 US Presidential election.

Upbit has returned 8.5 billion won to 380 users

Upbit has refunded approximately KRW 8.5 billion to 380 users who were victims of telecommunications fraud. Dunamu, the operator of Upbit, froze the funds involved in the case using its real-time abnormal transaction monitoring system (FDS) and worked with the Seoul Metropolitan Police Agency to identify and contact unreported victims to complete the refund. The refund includes KRW 5 billion from February and the latest KRW 3.5 billion.

A blockchain engineer took advantage of his position to obtain virtual currency for profit and was sentenced to 3 and a half years in prison

On November 21st, according to the Workers' Daily, the Changping District People's Court in Beijing recently released a case in which an employee used his position to obtain virtual currency for profit, constituting the crime of illegally obtaining computer information system data. Zhang is a blockchain engineer at a certain network company. When participating in project development, he learned that there was a large amount of Ethereum in the account and planned to attack the company's account to obtain it. He took advantage of his position to request program code and private keys beyond his authority from colleagues, and shared them with a "technical exchange group", inviting group members to crack and attack the company's account, successfully obtaining 106.15 Ethereum and illegally profiting 38,329.76 yuan.

The court held that Zhang violated the regulations, illegally obtained Ethereum information in the company's computer system and traded for profit, constituting the crime of illegally obtaining computer information system data. Although there were loopholes in the company's management, this was not an excuse for Zhang's crime. In the end, Zhang was sentenced to three years and six months in prison, fined 60,000 yuan, and confiscated the illegal gains of 38,329.76 yuan. The second-instance ruling rejected the appeal and upheld the original verdict.

Yonhap News Agency: North Korean hackers stole $42 million worth of Ethereum from Upbit in 201

According to a report from Yonhap News Agency, North Korea stole $42 million worth of Ethereum from Upbit.

An engineer took advantage of his position to attack the company account and obtained 106.15 Ethereum for profit. He was sentenced to 3 years and 6 months in prison

the Beijing Changping District People's Court recently released a case in which an employee used his position to obtain virtual currency for profit, constituting the crime of illegal acquisition of computer information system data. Zhang obtained program code and private keys beyond his work authorization from a colleague in a certain network company under the guise of "code learning", and invited members of a "technical exchange group" to crack the code and attack the company's account to obtain 106.15 Ethereum. Afterwards, he converted the obtained Ethereum into other forms of currency and transferred it back to his own account through multiple accounts. Finally, the court sentenced the defendant Zhang to three years and six months in prison for the crime of illegally obtaining computer information system data in accordance with the law.

Yao Qian, former director of the Science and Technology Supervision Department of the China Securities Regulatory Commission, was expelled from the party and removed from public office for allegedly u

the Discipline Inspection and Supervision Team of the Central Commission for Discipline Inspection and the National Supervision Commission stationed in the China Securities Regulatory Commission and the Supervision Commission of Shantou City, Guangdong Province, recently conducted disciplinary review and supervision investigations into Yao Qian, former director of the Science and Technology Supervision Department of the China Securities Regulatory Commission and former director of the Information Center, for serious violations of discipline and law.

After investigation, Yao Qian abandoned his original mission, disregarded politics, pursued fame, claimed to be a financial technology expert, and spared no effort to support specific technology service providers for his own benefit, becoming a "key cultivation object" for hunters. He abused his regulatory powers such as policy advice, formulation, and execution, abandoned his technology supervision responsibilities, sought improper benefits for others in expanding business in information technology system service agencies, software and hardware procurement, and engaged in power-for-money transactions using virtual currency. He engaged in superstitious activities, disregarded the eight-point code of conduct, violated regulations by accepting expensive gifts such as Maotai liquor and banquets, violated organizational principles by seeking benefits for others in staff recruitment, violated integrity and discipline by having his rental car expenses paid by the regulatory target, illegally borrowing large sums of money from the regulatory target, and illegally investing in and holding stakes in enterprises. He illegally accepted a huge amount of property.

FBI investigates fraudulent trading platform Bitkanant for $5 million in cryptocurrency scam

the Federal Bureau of Investigation (FBI) has been investigating a cryptocurrency Ponzi scheme since August, with a total amount involved of $5 million. The scheme targeted 71 victims through fraudulent investment plans. According to court documents, the scammers used fake social media profiles to lure individuals into a fraudulent trading platform called Bitkanant. In August, federal prosecutors in North Carolina executed a search warrant and seized unhosted USDT wallets worth over $4.99 million, marking the beginning of the investigation. The funds are currently being held by the US Marshals Service.

Apple releases emergency update to fix zero-day vulnerability for Intel-based Mac systems

On November 20th, Apple released an emergency security update to fix two zero-day vulnerabilities targeting Intel-based Mac users. These vulnerabilities involve the WebKit and JavaScriptCore engines and could allow attackers to execute arbitrary code by triggering malicious web pages or emails, allowing attackers to implant malicious software on devices. The vulnerabilities are identified as CVE-2024-44308 (JavaScriptCore vulnerability) and CVE-2024-44309 (WebKit vulnerability), discovered by the Google Threat Analysis Group, implying or related to nation-state hacking activities. Apple recommends that users update to macOS Sequoia 15.1.1 and the latest iOS and iPadOS versions as soon as possible to avoid security risks.

Phantom acquires Web3 firewall Blowfish to enhance wallet security

On November 20th, Blowfish, a well-known encryption security platform, announced that it has been acquired by self-hosted wallet Phantom. The aim is to integrate Blowfish's advanced security technology and further enhance the security features of the Phantom wallet. The Blowfish team will join Phantom to jointly develop more powerful security features, including transaction simulation previews and real-time fraud alerts. As the integration progresses, Blowfish's existing services will gradually be closed, and Phantom users will enjoy support for higher security standards. Since its establishment, Blowfish has provided services to more than 40 wallet partners, including Phantom, Kraken, MetaMask, Brave, etc., protecting over $18 billion in user assets and successfully preventing 2.8 million fraud cases.