Blog

Venus Protocol earned $ 13.5m on attacking phishing


The Decentralized Finance (DEFI) Lending Platform of Venus Protocol has helped a user recover the stolen crypto following a phishing attack tied to the North Korean lazarus group.

On Thursday, the Venus protocol announced this has successfully helped a user recover $ 13.5 million in crypto after The phishing incident that occurred on Tuesday. At this time, the Venus Protocol stopped the platform as a careful proposal and began investigating.

According to Venus, the pause stopped further funding movement, as the audits confirmed that the intelligent contracts of Venus and the front end were not compromised.

Emergency Vote allows fund recovery

A vote on emergency management allows forced extermination of the attacking purse, enabling stolen tokens to be seized and sent to a recovery address.

Source: Kuan Sun

Attacks have seized a malicious zoom client

In the post-mortem, Venus announced that the attacks had used a malicious Zoom client to deceive the victim in providing a delegate account control.

It allowed those who had borrowed and redeemed on behalf of the victim, allowing them to deplete millions in stablecoins and wrapped in property.

However, protocol security partners are hexagate and hypernative that -the weakening transaction in minutes, leading the decision to pause the protocol. According to Venus, the recovery process opened less than 12 hours.

Kuan Sun, identified as the victim of the attack, Thanks The teams behind recovery. “What could be a total disaster that has been a battle that we really won, thanks to an incredible team of teams,” Sun wrote.

Security partners have been hexagating and hypernative has been consumed by a few minutes for a few minutes, motivating the pause. Peckshield, Binance, and Slowmist helped recover.

Related: WLFI blocks hacked onchain -blacklist attempts

PHISHING ACTIVITIES LINING THE LAZARUS GROUP

Slowmist’s review links the Lazarus Group attack, a collective North Korea collectively blamed for major crypto heists, including the $ 600m Ronin Bridge being exploited and the $ 1.5b bybit hack.

Sun said the slowmist had performed extensive evaluation work and “was among the first to point out that Lazaro was behind this attack.”

The Lazarus Group is a North Korea associated with hacking collectively believed to work under the country’s intelligence agency.

The group is tied to some of the biggest crypto heists in history, including the $ 600-million Ronin Bridge exploitation and the $ 1.5 billion bybit hack.

https://www.youtube.com/watch?v=ndv0rFehetq

Magazine: Astrology can make you a better crypto entrepreneur: it was preceded