CoinInsight360.com logo CoinInsight360.com logo
A company that is changing the way the world mines bitcoin

WallStreet Forex Robot 3.0
Cryptopolitan 2024-12-31 06:55:28

Blockchain Bandit resurfaces after 2 years, moves all $172M in stolen Ether

The Blockchain Bandit is back. After two years of silence, the infamous crypto thief responsible for one of the most sophisticated Ethereum heists has moved 51,000 Ether—worth $172 million at today’s prices—into a single wallet. Blockchain investigator ZachXBT, who has tracked the Bandit’s exploits for years, broke the news in a Telegram post . According to him, the stolen funds were moved from ten separate wallets into a multi-signature address—“0xC45…1D542.” This consolidation happened in batches of 5,000 Ether each, all within a span of 24 minutes. The transfers started at 8:54 pm UTC and wrapped up by 9:18 pm UTC. As of press time, there hasn’t been any noticeable effects to Ether’s prices. The Ethercombing mastermind The Blockchain Bandit earned their name between 2016 and 2018 after they pulled off a stunning series of hacks using a technique called “Ethercombing.” The method? Exploiting weak private keys. By taking advantage of flaws in Ethereum’s early key generation processes, the Bandit managed to guess private keys tied to active wallets. This was systematic. Over roughly 49,060 transactions, the hacker raked in close to 45,000 Ether, uncovering a total of 732 private keys. It was all about poorly secured cryptography. Issues like predictable random number generation and sloppy coding practices left many wallets vulnerable. The Bandit automated the process, scanning thousands of potential keys to find the weakest links. Fast forward to today, and those early vulnerabilities are still haunting Ethereum users. The 51,000 Ether that was moved recently is the same stash that had been sitting untouched since January 21, 2023. On that day, the hacker had previously shifted the funds from a prior location, along with 470 Bitcoin, to keep their loot under the radar. North Korean links? The Blockchain Bandit’s operation has drawn more than just technical scrutiny. Some cybersecurity analysts suspect a connection to North Korean hacker groups . These groups are infamous for targeting crypto platforms to fund state-sponsored activities, including weapons programs. The Bandit’s methods and the sheer size of the theft look a lot like the tactics used by Lazarus, the secretive hacker group linked to North Korea. A closer look at the Bandit’s methods shows just how much of the problem lies with users themselves. Weak private keys were a goldmine for this hacker, and they didn’t need to break into exchanges or bypass high-end security systems. They simply took advantage of lazy coding and user negligence. Even today, many users fail to follow basic security protocols. Poorly chosen passwords, reliance on default settings, and a lack of understanding about private key management all contribute to the ongoing risks. Ethereum’s early vulnerabilities didn’t help, either. Developers are now working hard to become better at coding practices, but in this case, the damage is already done. The Bandit’s automated key-scanning system exploited those flaws at scale, draining wallets with shocking efficiency. From Zero to Web3 Pro: Your 90-Day Career Launch Plan

면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.