# Сопутствующие статьи по теме Security

Новостной центр HTX предлагает последние статьи и углубленный анализ по "Security", охватывающие рыночные тренды, новости проектов, развитие технологий и политику регулирования в криптоиндустрии.

North Korean Hackers Celebrate a 'Fat Year': Record $2.02 Billion Stolen in 2025, Money Laundering Cycle Approximately 45 Days

North Korean hackers set a record in 2025, stealing $2.02 billion in cryptocurrency, a 51% increase from 2024, despite a decrease in the number of attacks. Their cumulative thefts now total at least $6.75 billion. They achieved this by conducting fewer but more sophisticated attacks, often through infiltrating crypto services with IT workers or using complex impersonation strategies against executives. The overall crypto industry suffered over $3.4 billion in stolen funds. A key trend is the extreme concentration of losses, with the top three hacks accounting for 69% of the total. The disparity between the largest attack and the median hack reached a record 1000x. North Korean actors exhibited distinct money laundering patterns, heavily favoring Chinese OTC services, cross-chain bridges, and mixers. Their laundering cycle for major heists is approximately 45 days, moving through stages of immediate layering, initial consolidation, and final cash-out. Simultaneously, individual wallet thefts surged to 158,000 incidents affecting 80,000 users, though the total value stolen ($713 million) decreased. In a positive development, DeFi hacking losses remained low despite increased Total Value Locked (TVL), indicating improved security measures are having a significant impact. A case study of the Venus Protocol demonstrated effective real-time threat detection and fund recovery.

marsbit01/10 03:10

North Korean Hackers Celebrate a 'Fat Year': Record $2.02 Billion Stolen in 2025, Money Laundering Cycle Approximately 45 Days

marsbit01/10 03:10

Penetrating the Noise of Ethereum's 'Degeneration': Why is 'Ethereum Values' the Widest Moat?

Amidst recent debates questioning Ethereum's perceived "regression" compared to high-performance blockchains, this article argues that Ethereum’s core strength lies in its foundational values—decentralization, censorship resistance, and long-term reliability—rather than short-term efficiency. While other chains prioritize speed through centralized trade-offs, Ethereum emphasizes resilience under worst-case conditions. It has never experienced a full-network outage or rollback in nearly a decade of operation. This resilience stems from deliberate design choices: avoiding hardware centralization, maintaining low node operation costs, and ensuring ordinary users can verify the chain. The concept of "Ethereum Alignment" is clarified not as blind loyalty but as a multidimensional social contract involving technical alignment (using Ethereum’s consensus and open standards), economic alignment (value accrual to ETH), and ideological alignment (public good over extractive growth). Ethereum’s slower evolution reflects a conscious trade-off: performance improvements must integrate with existing security assumptions without compromising decentralization or censorship resistance. Despite criticism, growing ETH staking numbers indicate continued trust in its model. In essence, Ethereum’s “conservative” is strategic—prioritizing sustainable trust over temporary gains, making its value proposition the widest moat in Web3.

marsbit01/09 10:40

Penetrating the Noise of Ethereum's 'Degeneration': Why is 'Ethereum Values' the Widest Moat?

marsbit01/09 10:40

Blockchain Security Science Popularization: Five Identification Techniques to Stay Away from Virtual Currency Pyramid Schemes

Blockchain Security Guide: 5 Tips to Identify and Avoid Virtual Currency Pyramid Schemes As blockchain technology gains popularity, virtual currencies have become a target for criminals who use them as tools for online pyramid schemes. These scams, often disguised as "blockchain innovations" or "virtual asset growth opportunities," lure victims with promises of "guaranteed returns,""overnight wealth," and "always rising values." Unlike traditional pyramid schemes, these operations leverage the decentralized and anonymous nature of cryptocurrencies, using high returns to encourage recruiting downlines. They are more hidden, spread faster, and cause greater harm. Common scam models include: 1. Fake contract exchanges that use pyramid-style commissions. 2. Staking mining schemes that lock funds and require recruiting others. 3. Wallet-based理财 (financial management) apps that use fake arbitrage earnings. 4. DeFi smart contracts that drain funds once deposited. 5. Quant trading bots that show fake profits and steal assets. Key risks: - Irreversible financial losses due to offshore fund transfers. - Legal liability for participants who recruit others. - Disruption of financial order and potential money laundering. - Damage to legitimate blockchain industry development. Regulatory red flags: China bans illegal virtual currency issuance and trading, with strict penalties for pyramid schemes under criminal law. To identify these scams, check if the virtual currency is used as an entry fee, a reward calculation tool, or a recruitment incentive. If profits depend on recruiting others rather than market fluctuations, it is likely a pyramid scheme. Conclusion: The core of these scams remains "recruiting members, multi-level rewards, and fund theft." Remember: high returns come with high risks; guaranteed profits are scams. Stay cautious, avoid greed, and verify projects through professional security services.

marsbit01/08 03:36

Blockchain Security Science Popularization: Five Identification Techniques to Stay Away from Virtual Currency Pyramid Schemes

marsbit01/08 03:36

活动图片