Search results for "MIST"
2025-12-23
05:54

Slow Mist CISO: MacSync new variant malware can bypass macOS security protection and steal Crypto Assets Wallet data.

According to ChainCatcher, 23pds, the Chief Information Security Officer of Slow Fog Technology, disclosed that a new variant of the information-stealing malware MacSync has emerged, capable of successfully bypassing the macOS Gatekeeper security mechanism, resulting in user assets being stolen. This malware employs various techniques to evade detection, including file expansion, network connection validation, and self-destruct scripts after execution. Attackers can use this software to steal sensitive data from victims, such as iCloud keychains, browser passwords, and Crypto Assets Wallets. Users should remain vigilant, avoid downloading software from unknown sources, promptly update operating system security patches, and take additional measures to protect asset security.
More
15:13

Security Warning: ZEROBASE Frontend Hacked

BlockBeats News, December 12 — Slow Mist founder Yu Xian issued a security warning: ZEROBASE frontend was hacked, and some users authorized malicious contracts to USDT, resulting in asset theft. Please users pay attention to asset security.
More
ZBT1,69%
15:30

Slow Fog Cosine: GANA was stolen due to the leak of the Owner Private Key of the GANA Payment Stake contract.

Odaily News Slow Mist Yu Xian published an article on the X platform stating that the theft of GANA was caused by the leak of the Private Key of the GANA Payment Stake contract Owner. The subsequent attack employed some techniques, such as the use of 7702 deleGate, which also conveniently bypassed the onlyEOA check of unstake. By changing the relevant Rate and Fee, hundreds of stakes were achieved.
More
12:08
1

Slow Fog Cosine: A certain Hacker has stolen assets from at least 7 users, or has obtained a batch of mnemonic phrases.

Foresight News reports that Slow Mist founder Yu Xian responded to a user whose 112 BNB was stolen today while using the imtoken Wallet to participate in Binance's Per-TGE event. He stated that the hacker address starting with 0x8aeb has already stolen assets from at least 7 users. In most cases, users transferred large amounts of funds, after which the hacker quickly discovered and moved these assets. There are also some special cases where the team speculates that the hacker may have obtained a batch of mnemonic phrases or Private Keys and gradually implemented theft operations.
More
BNB0,28%
04:18

Slow Fog Cosine: The 402Bridge attack originated from a Private Key leak, and the possibility of internal personnel involvement cannot be ruled out.

According to ChainCatcher news and Slow Mist's analysis, the attack on the cross-chain bridges project 402Bridge originated from a Private Key leak, and the possibility of internal personnel involvement cannot be ruled out. The domain 402 bridge.fun was only registered for two days before suspending services, and the stolen funds have not shown any further movement. This is the first publicly disclosed security incident related to the 402 protocol, and Slow Mist states that this incident is not a typical case of collective malicious behavior by the project party.
More
01:48

Slow Fog Cosine: There are situations where AI can be poisoned, beware of the risks of AI-generated code.

ChainCatcher news, Slow Mist Yu Xian released a security reminder on social media stating that there is a risk of poisoning AI, and advised users not to blindly trust AI-generated code, especially when dealing with sensitive operations. Yu Xian suggested prioritizing the use of mature and well-known Open Source code, while also being aware of Supply Chain poisoning risks. Another security approach is to compare the open source implementations of well-known wallets (including hardware wallets) to ensure security through extensive observation and comparison.
More
03:36

DeBot: Confirm that the wallet theft reported by a certain user is not an issue with the Debot platform.

PANews, October 8th news, DeBot posted on the X platform stating that recently, a user reported their Wallet was stolen, and it has been confirmed that it is not an issue with the Debot platform. After verification by the Slow Mist team and confirmation from the user, it was mentioned that only 2 out of the Wallets imported to DeBot, while the others had never been associated with the platform, thus ruling out any connection between DeBot and this theft.
More
13:42

Slow Mist Cosine: The intention of the malicious tool stealing the mnemonic phrase in the FTX fake compensation email is very clear.

ChainCatcher message, regarding community users claiming that the FTX fake compensation email mentioned needing to download a tool to generate XPUB, Slow Mist founder Yu Xian responded on the X platform, saying: "This malicious tool appears to be pieced together by AI, with the intent to steal the mnemonic phrase being very, very clear. The malicious Telegram bot is ftxsexxerbot."
More