Decentralized financial systems can also be hacked. Hacker took over $600 million out of Axie Infinity
A few days ago, there was probably the largest theft of funds from the decentralized financial system.
An unknown hacker reportedly hacked into the Ronin sidechain, which is based on the famous NFT game Axie Infinity, and was able to withdraw 173,600 Ethereum coins from the project, which is about $600 million at the current exchange rate. In addition, another 25.5 million USDC stablecoins were withdrawn. Interestingly, the hack happened on March 23, and the company only found out about it on March 29.
As the Ronin developers explain, the Sky Mavis Ronin network currently consists of nine validator nodes. To make a transfer, five of the nine validator signatures are required. The attacker managed to gain control of four Sky Mavis validators and a third-party validator operated by Axie DAO.
The validator’s key scheme is set up to be decentralized to limit an attack vector like this, but the attacker found the backdoor via an RPC node.
The developers also claim that most of the funds are stored on the hacker’s wallet. We are currently working with law enforcement agencies.
Microsoft has released a new version of Windows 11: a new widget panel, copying security codes, improved “Settings” and more
Microsoft has released a major functional update for the Windows 11 operating system. It brings an extensive list of innovations and improvements to various aspects of the system.
Windows 11 22H2 Moment 3 (KB5026446) is currently available as an optional update, but these changes will also be included in the mandatory Patch Tuesday in June.
One of the main features is the new look of the widget panel with three columns – with two columns for news and one for widgets. Microsoft has also included animated icons for widgets on the taskbar. Another big change is the ability to copy security codes from notifications, so if you use two-factor authentication and receive notifications via email (or SMS from your phone), you can immediately copy this code to your clipboard.
The Settings app now has a USB4 page where you can manage docking stations and connected devices. There’s also now a Presence Privacy Settings page that gives you more granular control over features like wake up your PC when approached or lock when you leave. There are also additional settings for brightness, touch keyboard. The Accounts page has also been updated to accurately display the available storage for all of a user’s OneDrive subscriptions.
In File Explorer, context menus now support access keys. Accessibility has also been improved, including support for live subtitles in more languages, as well as support for voice access in more English dialects.
Taskbar improvements include displaying VPN status, and in response to user feedback, there is now an option to display seconds on the clock on the taskbar. The update brings an extra layer of protection against phishing and insecure passwords, and adds support for Bluetooth Low Energy Audio.
This is not a complete list of changes that Windows 11 22H2 Moment 3 brings. There are also improvements that are less noticeable to users, as well as a number of bugs, crashes and shortcomings.
Telegram has a vulnerability that allows attackers to use the MacBook’s camera and microphone
Google engineer Dan Reva has discovered a vulnerability in Telegram for macOS that allows attackers to use the laptop’s camera and microphone.
The vulnerability allows to inject a dynamic library (Dylib) with a malicious exploit into Telegram on macOS. With it, attackers will be able to record video from a camera with sound and save the file to a hidden folder on a Mac. Moreover, video and audio recording will work even if the corresponding permissions are disabled.
This is possible because Telegram for macOS does not use Apple’s built-in Hardened Runtime security mechanism.
Reva reported this issue to the Telegram team in February 2022. But the developers did not get in touch and still have not eliminated the vulnerability.
Cybercriminals hacked into a hardware crypto wallet lying in a safe: bitcoins worth 30 thousand dollars were stolen
Kaspersky Lab has discovered and studied a non-trivial cyber incident. The attackers managed to steal 1.33 bitcoins from a hardware wallet (at the time of the study, in the amount of $29,585). Moreover, the theft took place when the device, disconnected from the Internet, was in the owner’s safe.
According to experts, hardware wallets are considered a safer way to store digital assets than software “hot” wallets, since they need to connect separate USB devices to a computer to send cryptocurrency or interact with decentralized financial protocols.
To steal, the attackers had to physically open the device in advance, as well as make changes to the original firmware of the bootloader and the wallet itself. Externally, the hacked crypto wallet worked as usual, but the cybercriminals had already gained full control over it. The Lab said:
Instead of ultrasonic welding, the halves of the wallet were filled with glue and fastened with double-sided tape. In addition, another microcontroller with modified firmware and bootloader was installed instead of the original one. Thus, it turned out that the victim bought a hardware wallet that was already infected, and at the time of purchase, the factory packaging and holographic stickers looked intact and did not arouse suspicion.
The attackers removed the control of protective mechanisms from the firmware. Also, at the initialization stage or when resetting the wallet, a randomly generated seed phrase was replaced with one of 20 pre-created and saved in the fraudulent firmware. Thirdly, if the owner set an additional password to protect the master key, only its first character was used. Thus, in order to pick up the key to a particular fake wallet, the attackers had to go through a total of 1280 options.
Stanislav Golovanov, cybersecurity expert at Kaspersky Lab, explained:
Although hardware wallets are considered one of the safest ways to store cryptocurrencies, attackers have found a way to hack them by selling infected or fake devices. Such attacks can be avoided. We strongly recommend purchasing such devices only from official and trusted sources in order to minimize the risks.
In 2023 in all top smartphones. Arm introduced the Cortex-X4 supercore
Arm has unveiled the Cortex-X4 supercore, which will be used in the next generation of flagship single-chip systems. Arm is...
Nvidia has figured out how to overclock monitors to over 1000 and even over 2000 Hz. ULMB 2 technology introduced
Nvidia has introduced G-Sync Ultra Low Motion Blur 2 (ULMB 2) technology, which should make the image on the monitor...
You can lose your photos: Apple is closing the free My Photo Stream service
Apple has announced the imminent end of support for the service My Photo Stream (My photo stream). This means users...
US ‘will not tolerate’ Chinese ban on Micron chips and ‘strongly oppose’ such action
The United States “will not tolerate” a de facto Chinese ban on the purchase of Micron Technology memory chips by...
Phones6 days ago
Samsung is first again. Introduced smartphone screen that measures heart rate and blood pressure
Software7 days ago
Recent Windows 10 update causes PC to brick, Blue Screen of Death, and other crashes
Software6 days ago
From settings to clipboard: Microsoft makes chatbot ChatGPT part of Windows 11
Laptops6 days ago
Hermes Leather Patch for Laptop Camera and More Introduced