Binance Square

attack

47,165 次浏览
65 人讨论中
CryptoGuider
·
--
攻击浪潮来了!2025年有72个模拟者消失! 攻击激增75%。超过4090万美元被抽走。这只是冰山一角。欧洲是新的战争区。法国引领冲锋。身体暴力正在爆发。加密货币鲸鱼的绑架是真实的。危险迫在眉睫。现在保护你的资产。 免责声明:这不是财务建议。 #CryptoSecurity #SimpSwap #Attack #FOMO 🚨
攻击浪潮来了!2025年有72个模拟者消失!

攻击激增75%。超过4090万美元被抽走。这只是冰山一角。欧洲是新的战争区。法国引领冲锋。身体暴力正在爆发。加密货币鲸鱼的绑架是真实的。危险迫在眉睫。现在保护你的资产。

免责声明:这不是财务建议。

#CryptoSecurity #SimpSwap #Attack #FOMO 🚨
查看翻译
What Is a 51% Attack?Before diving into the 51% attack, it is crucial to have a good understanding of mining and blockchain-based systems. One of the key strengths of Bitcoin and its underlying blockchain technology is the distributed nature of building and verifying data. The decentralized work of the nodes ensures that the protocol rules are being followed and that all network participants agree on the current state of the blockchain. This means that the majority of nodes need to regularly reach consensus in regards to the process of mining, to the version of the software being used, to the validity of transactions, and so forth. The Bitcoin consensus algorithm (Proof of Work) is what assures that miners are only able to validate a new block of transactions if the network nodes collectively agree that the block hash provided by the miner is accurate (i.e. the block hash proves that the miner did enough work and found a valid solution for that block’s problem).  The blockchain infrastructure - as a decentralized ledger and distributed system - prevents any centralized entity from making use of the network for its own purposes, which is the reason why there is no single authority on the Bitcoin network. Since the process of mining (in PoW-based systems) involves the investment of huge amounts of electricity and computational resources, a miner’s performance is based on the amount of computational power he has, and this is usually referred to as hash power or hash rate. There are many mining nodes in various locations and they compete to be the next to find a valid block hash and be rewarded with newly generated bitcoins. In such a context, the mining power is distributed over different nodes across the world, which means the hash rate is not in the hands of a single entity. At least it is not supposed to be. But what happens when the hash rate is no longer distributed well enough? What happens if, for example, one single entity or organization is able to obtain more than 50% of the hashing power? One possible consequence of that is what we call a 51% attack, also known as a majority attack. What Is a 51% Attack? A 51% attack is a potential attack on a blockchain network, where a single entity or organization is able to control the majority of the hash rate, potentially causing network disruption. In such a scenario, the attacker would have enough mining power to intentionally exclude or modify the ordering of transactions. They could also reverse transactions they made while being in control - leading to a double-spending problem. A successful majority attack would also allow the attacker to prevent some or all transactions from being confirmed (transaction denial of service) or to prevent some or all other miners from mining, resulting in what is known as a mining monopoly. On the other hand, a majority attack would not allow the attacker to reverse transactions from other users nor to prevent transactions from being created and broadcasted to the network. Changing the block’s reward, creating coins out of thin air, or stealing coins that never belonged to the attacker are also deemed impossible events. How Likely Is a 51% Attack?  Since a blockchain is maintained by a distributed network of nodes, all participants cooperate in the process of reaching consensus. This is one of the reasons they tend to be highly secure. The bigger the network, the stronger the protection against attacks and data corruption. When it comes to Proof of Work blockchains, the more hash rate a miner has, the higher the chances of finding a valid solution for the next block. This is true because mining involves a myriad of hashing attempts and more computational power means more trials per second. Several early miners joined the Bitcoin network to contribute to its growth and security. With the rising price of Bitcoin as a currency, numerous new miners entered the system aiming to compete for the block rewards (currently set as 6.25 BTC per block). Such a competitive scenario is one of the reasons why Bitcoin is secure. Miners have no incentive to invest large amounts of resources if it is not for acting honestly and striving to receive the block reward. Therefore, a 51% attack on Bitcoin is rather unlikely due to the magnitude of the network. Once a blockchain grows large enough, the likelihood of a single person or group obtaining enough computing power to overwhelm all the other participants rapidly drops to very low levels. Moreover, changing the previously confirmed blocks gets more and more difficult as the chain grows, because the blocks are all linked through cryptographic proofs. For the same reason, the more confirmations a block have, the higher the costs for altering or reverting transactions therein. Hence, a successful attack would probably only be able to modify the transactions of a few recent blocks, for a short period of time. Going further, let’s imagine a scenario where a malicious entity is not motivated by profit and decides to attack the Bitcoin network only to destroy it, no matter the costs. Even if the attacker manages to disrupt the network, the Bitcoin software and protocol would be quickly modified and adapted as a response to that attack. This would require the other network nodes to reach consensus and agree on these changes, but that would probably happen very quickly during an emergency situation. Bitcoin is very resilient to attacks and is considered the most secure and reliable cryptocurrency in existence. Although it is quite difficult for an attacker to obtain more computational power than the rest of the Bitcoin network, that is not so challenging to achieve on smaller cryptocurrencies. When compared to Bitcoin, altcoins have a relatively low amount of hashing power securing their blockchain. Low enough to make it possible for 51% attacks to actually happen. A few notable examples of cryptocurrencies that were victims of majority attacks include Monacoin, Bitcoin Gold and ZenCash. $BNB #Attack

What Is a 51% Attack?

Before diving into the 51% attack, it is crucial to have a good understanding of mining and blockchain-based systems.
One of the key strengths of Bitcoin and its underlying blockchain technology is the distributed nature of building and verifying data. The decentralized work of the nodes ensures that the protocol rules are being followed and that all network participants agree on the current state of the blockchain. This means that the majority of nodes need to regularly reach consensus in regards to the process of mining, to the version of the software being used, to the validity of transactions, and so forth.
The Bitcoin consensus algorithm (Proof of Work) is what assures that miners are only able to validate a new block of transactions if the network nodes collectively agree that the block hash provided by the miner is accurate (i.e. the block hash proves that the miner did enough work and found a valid solution for that block’s problem). 
The blockchain infrastructure - as a decentralized ledger and distributed system - prevents any centralized entity from making use of the network for its own purposes, which is the reason why there is no single authority on the Bitcoin network.
Since the process of mining (in PoW-based systems) involves the investment of huge amounts of electricity and computational resources, a miner’s performance is based on the amount of computational power he has, and this is usually referred to as hash power or hash rate. There are many mining nodes in various locations and they compete to be the next to find a valid block hash and be rewarded with newly generated bitcoins.
In such a context, the mining power is distributed over different nodes across the world, which means the hash rate is not in the hands of a single entity. At least it is not supposed to be.
But what happens when the hash rate is no longer distributed well enough? What happens if, for example, one single entity or organization is able to obtain more than 50% of the hashing power? One possible consequence of that is what we call a 51% attack, also known as a majority attack.
What Is a 51% Attack?
A 51% attack is a potential attack on a blockchain network, where a single entity or organization is able to control the majority of the hash rate, potentially causing network disruption. In such a scenario, the attacker would have enough mining power to intentionally exclude or modify the ordering of transactions. They could also reverse transactions they made while being in control - leading to a double-spending problem.
A successful majority attack would also allow the attacker to prevent some or all transactions from being confirmed (transaction denial of service) or to prevent some or all other miners from mining, resulting in what is known as a mining monopoly.
On the other hand, a majority attack would not allow the attacker to reverse transactions from other users nor to prevent transactions from being created and broadcasted to the network. Changing the block’s reward, creating coins out of thin air, or stealing coins that never belonged to the attacker are also deemed impossible events.
How Likely Is a 51% Attack? 
Since a blockchain is maintained by a distributed network of nodes, all participants cooperate in the process of reaching consensus. This is one of the reasons they tend to be highly secure. The bigger the network, the stronger the protection against attacks and data corruption.
When it comes to Proof of Work blockchains, the more hash rate a miner has, the higher the chances of finding a valid solution for the next block. This is true because mining involves a myriad of hashing attempts and more computational power means more trials per second. Several early miners joined the Bitcoin network to contribute to its growth and security. With the rising price of Bitcoin as a currency, numerous new miners entered the system aiming to compete for the block rewards (currently set as 6.25 BTC per block). Such a competitive scenario is one of the reasons why Bitcoin is secure. Miners have no incentive to invest large amounts of resources if it is not for acting honestly and striving to receive the block reward.
Therefore, a 51% attack on Bitcoin is rather unlikely due to the magnitude of the network. Once a blockchain grows large enough, the likelihood of a single person or group obtaining enough computing power to overwhelm all the other participants rapidly drops to very low levels.
Moreover, changing the previously confirmed blocks gets more and more difficult as the chain grows, because the blocks are all linked through cryptographic proofs. For the same reason, the more confirmations a block have, the higher the costs for altering or reverting transactions therein. Hence, a successful attack would probably only be able to modify the transactions of a few recent blocks, for a short period of time.
Going further, let’s imagine a scenario where a malicious entity is not motivated by profit and decides to attack the Bitcoin network only to destroy it, no matter the costs. Even if the attacker manages to disrupt the network, the Bitcoin software and protocol would be quickly modified and adapted as a response to that attack. This would require the other network nodes to reach consensus and agree on these changes, but that would probably happen very quickly during an emergency situation. Bitcoin is very resilient to attacks and is considered the most secure and reliable cryptocurrency in existence.
Although it is quite difficult for an attacker to obtain more computational power than the rest of the Bitcoin network, that is not so challenging to achieve on smaller cryptocurrencies. When compared to Bitcoin, altcoins have a relatively low amount of hashing power securing their blockchain. Low enough to make it possible for 51% attacks to actually happen. A few notable examples of cryptocurrencies that were victims of majority attacks include Monacoin, Bitcoin Gold and ZenCash.
$BNB
#Attack
有没有想过为什么在袭击期间加密货币市场会出现大规模抛售? 战争对加密货币产生了很大的影响,因为它在市场上造成了不确定性和恐惧。 当以色列-真主党袭击或俄罗斯-乌克兰升级等冲突发生时,投资者倾向于将资金转移到黄金或传统货币等更稳定的资产上,从而导致加密货币市场暴跌。 这种暴跌的发生是因为人们希望在危机时期保护自己的投资,导致对加密货币的需求减少,价格下跌。#CryptoNewss #attack #MarketDownturn
有没有想过为什么在袭击期间加密货币市场会出现大规模抛售?

战争对加密货币产生了很大的影响,因为它在市场上造成了不确定性和恐惧。
当以色列-真主党袭击或俄罗斯-乌克兰升级等冲突发生时,投资者倾向于将资金转移到黄金或传统货币等更稳定的资产上,从而导致加密货币市场暴跌。
这种暴跌的发生是因为人们希望在危机时期保护自己的投资,导致对加密货币的需求减少,价格下跌。#CryptoNewss #attack #MarketDownturn
·
--
看跌
一篇学术论文指出,国家行为者可能会瞄准以隐私为重点的区块链网络,如 #Monero 和 #Zcash ,因为它们能够隐藏交易细节。 这引发了人们的担忧,即政府可能会攻击这些隐私链,以阻止洗钱等犯罪活动,同时也对寻求财务隐私的合法用户构成风险。 该论文主张在隐私和监管措施之间取得平衡,以避免滥用,而不会损害个人自由。 #PrivacyfocusedBlockchain #attack #TrendingTopic
一篇学术论文指出,国家行为者可能会瞄准以隐私为重点的区块链网络,如 #Monero #Zcash ,因为它们能够隐藏交易细节。
这引发了人们的担忧,即政府可能会攻击这些隐私链,以阻止洗钱等犯罪活动,同时也对寻求财务隐私的合法用户构成风险。
该论文主张在隐私和监管措施之间取得平衡,以避免滥用,而不会损害个人自由。
#PrivacyfocusedBlockchain #attack #TrendingTopic
🚨🚨 Loopring 智能钱包遭遇安全漏洞攻击。 Loopring 智能钱包,尤其是那些使用#Loopring卫士的钱包,成为黑客的目标。黑客通过冒充钱包所有者重置所有权并提取资产。 #CyberSafety #attack #Loopring #HackerNews
🚨🚨 Loopring 智能钱包遭遇安全漏洞攻击。

Loopring 智能钱包,尤其是那些使用#Loopring卫士的钱包,成为黑客的目标。黑客通过冒充钱包所有者重置所有权并提取资产。

#CyberSafety #attack #Loopring #HackerNews
```警报:#Pakistan 也遭遇了网络攻击。巴哈瓦尔普尔伊斯兰大学被攻击(超过 15 万条记录泄露) 请不要点击随机链接,特别是那些要求您打开网页的链接。这是一个陷阱。 保持警觉,保持警醒,并传播这个消息。``` #CYBER #attack
```警报:#Pakistan 也遭遇了网络攻击。巴哈瓦尔普尔伊斯兰大学被攻击(超过 15 万条记录泄露)

请不要点击随机链接,特别是那些要求您打开网页的链接。这是一个陷阱。

保持警觉,保持警醒,并传播这个消息。```
#CYBER
#attack
Binance News
·
--
UXLINK经历了在声称攻击后显著下跌
根据BlockBeats的报道,UXLINK的市场价值经历了急剧下降,在短时间内下降超过44%。这一下跌 reportedly 与有关UXLINK的疑似攻击的消息有关,导致损失超过$11 million。因此,市场资本化降至$86 million。
·
--
#BREAKING "华盛顿特区的恐怖" 两名以色列大使馆工作人员在华盛顿特区的国会犹太博物馆外被刺杀。 袭击者被确认名为埃利亚斯·罗德里格斯,他在开火并杀死这对犹太夫妇之前喊道“解放巴勒斯坦”。 #Washington #DC #TRUMP #attack
#BREAKING "华盛顿特区的恐怖" 两名以色列大使馆工作人员在华盛顿特区的国会犹太博物馆外被刺杀。
袭击者被确认名为埃利亚斯·罗德里格斯,他在开火并杀死这对犹太夫妇之前喊道“解放巴勒斯坦”。
#Washington #DC #TRUMP #attack
美国袭击委内瑞拉2026年1月,美国在委内瑞拉展开大规模军事行动,导致委内瑞拉总统尼古拉斯·马杜罗及其妻子希莉亚·弗洛雷斯被捕。该行动包括对军事目标的空袭,并动用美国特种部队将他们押解至美国,面临联邦毒品贩运和武器指控。$OL #attack #US #venezuela

美国袭击委内瑞拉

2026年1月,美国在委内瑞拉展开大规模军事行动,导致委内瑞拉总统尼古拉斯·马杜罗及其妻子希莉亚·弗洛雷斯被捕。该行动包括对军事目标的空袭,并动用美国特种部队将他们押解至美国,面临联邦毒品贩运和武器指控。$OL #attack #US #venezuela
SAGA 爆炸。 700 万消失。 入场: 0.75 🟩 目标 1: 0.90 🎯 止损: 0.60 🛑 SagaEVM 已经崩溃。一次大规模攻击耗尽了 700 万美元。Saga Dollar 跌至 0.75。稳定币 Colt 和 Mustang 也受到影响。Saga 团队暂停了链。他们正在锁定资金并与交易所合作。主网是安全的,但 TVL 下降了 55%。安全审计即将进行。这是你的机会。 免责声明:交易有风险。自己做功课。 #Saga #Crypto #DeFi #Attack #FOMO 🚨
SAGA 爆炸。 700 万消失。

入场: 0.75 🟩
目标 1: 0.90 🎯
止损: 0.60 🛑

SagaEVM 已经崩溃。一次大规模攻击耗尽了 700 万美元。Saga Dollar 跌至 0.75。稳定币 Colt 和 Mustang 也受到影响。Saga 团队暂停了链。他们正在锁定资金并与交易所合作。主网是安全的,但 TVL 下降了 55%。安全审计即将进行。这是你的机会。

免责声明:交易有风险。自己做功课。

#Saga #Crypto #DeFi #Attack #FOMO 🚨
·
--
看跌
🚨 Uwu Lend 遭受 370 万美元的黑客攻击,这是本周第二次闪电贷攻击,共造成 2370 万美元的损失。 两次攻击都与同一作案者有关。 UwULend 此前声称,在 6 月 10 日遭受 2000 万美元的损失后,该问题已得到解决。 #UWU #UwULend #attack #Hacked #TrendingTopic
🚨 Uwu Lend 遭受 370 万美元的黑客攻击,这是本周第二次闪电贷攻击,共造成 2370 万美元的损失。
两次攻击都与同一作案者有关。
UwULend 此前声称,在 6 月 10 日遭受 2000 万美元的损失后,该问题已得到解决。

#UWU #UwULend #attack #Hacked #TrendingTopic
🚨突发:印度与巴基斯坦战争警报 🚨 就在几小时前,印度在不同地区对巴基斯坦发射了导弹打击。包括 🔷 巴哈瓦尔布尔 🔷 科特利 🔷 穆雷德基 🔷 自治克什米尔 这是一场高强度的攻击。此次攻击的后果将非常严重。这场战争可能会影响市场策略。因此,请谨慎对待你的投资。 #Warnig⚠️⚠️ #indiavspakistanwar #attack #FOMCMeeting #uncertainties
🚨突发:印度与巴基斯坦战争警报 🚨
就在几小时前,印度在不同地区对巴基斯坦发射了导弹打击。包括
🔷 巴哈瓦尔布尔
🔷 科特利
🔷 穆雷德基
🔷 自治克什米尔
这是一场高强度的攻击。此次攻击的后果将非常严重。这场战争可能会影响市场策略。因此,请谨慎对待你的投资。
#Warnig⚠️⚠️ #indiavspakistanwar #attack #FOMCMeeting #uncertainties
真是个#unlucky 家伙! 他被 #phishing #attack 窃取了 275,700 个 $LINK(442 万美元)。 2022年6月7日至2023年10月14日期间,此人从#LINK 以7.8美元的价格累积了290,750 #exchanges (226万美元),目前利润近240万美元。 不幸的是,他不小心点击了钓鱼链接,被骗签署了审批交易。 最终,他损失了240万美元的利润和226万美元的成本,总共损失了466万美元!
真是个#unlucky 家伙!

他被 #phishing #attack 窃取了 275,700 个 $LINK (442 万美元)。

2022年6月7日至2023年10月14日期间,此人从#LINK 以7.8美元的价格累积了290,750 #exchanges (226万美元),目前利润近240万美元。

不幸的是,他不小心点击了钓鱼链接,被骗签署了审批交易。

最终,他损失了240万美元的利润和226万美元的成本,总共损失了466万美元!
登录解锁更多内容
浏览最新的加密货币新闻
⚡️ 参与加密货币领域的最新讨论
💬 与喜爱的创作者互动
👍 查看感兴趣的内容
邮箱/手机号码