PANews reported on December 9th that UXLINK CEO RollandSaf released a security incident review report, stating that the company suffered a total loss of over $11 million in the asset theft incident on September 22nd. He emphasized that the incident was not caused by internal factors within the project team, stating that attackers, by impersonating business partners and utilizing deepfake video conferencing, breached the personal devices of multiple SAFE authorized key holders over several months, stealing sensitive information such as passwords and private keys, and ultimately gaining control of the old version of the arb-UXLINK smart contract. The hackers then illegally issued new tokens, transferred, and sold assets. RollandSaf stated that the hackers exploited compromised personal devices, not the UXLINK system. They used sophisticated impersonation and deepfake techniques. The team immediately filed criminal reports in multiple jurisdictions, including Asia, Europe, and the United States, upon the attack. Through immediate communication with exchanges, millions of dollars have been recovered, all of which were used for buybacks to support community development. Furthermore, significant security upgrades have been implemented to signing devices, internal processes, and systems to prevent similar incidents from recurring. The DAO passed a proposal to unlock an additional 12% supply in advance to help compensate users who purchased during the hack and illegal minting. All major exchanges have received corresponding compensation.PANews reported on December 9th that UXLINK CEO RollandSaf released a security incident review report, stating that the company suffered a total loss of over $11 million in the asset theft incident on September 22nd. He emphasized that the incident was not caused by internal factors within the project team, stating that attackers, by impersonating business partners and utilizing deepfake video conferencing, breached the personal devices of multiple SAFE authorized key holders over several months, stealing sensitive information such as passwords and private keys, and ultimately gaining control of the old version of the arb-UXLINK smart contract. The hackers then illegally issued new tokens, transferred, and sold assets. RollandSaf stated that the hackers exploited compromised personal devices, not the UXLINK system. They used sophisticated impersonation and deepfake techniques. The team immediately filed criminal reports in multiple jurisdictions, including Asia, Europe, and the United States, upon the attack. Through immediate communication with exchanges, millions of dollars have been recovered, all of which were used for buybacks to support community development. Furthermore, significant security upgrades have been implemented to signing devices, internal processes, and systems to prevent similar incidents from recurring. The DAO passed a proposal to unlock an additional 12% supply in advance to help compensate users who purchased during the hack and illegal minting. All major exchanges have received corresponding compensation.

UXLINK releases September security incident review report: External attacks resulted in the theft of over $11 million in assets.

2025/12/09 11:36

PANews reported on December 9th that UXLINK CEO RollandSaf released a security incident review report, stating that the company suffered a total loss of over $11 million in the asset theft incident on September 22nd. He emphasized that the incident was not caused by internal factors within the project team, stating that attackers, by impersonating business partners and utilizing deepfake video conferencing, breached the personal devices of multiple SAFE authorized key holders over several months, stealing sensitive information such as passwords and private keys, and ultimately gaining control of the old version of the arb-UXLINK smart contract. The hackers then illegally issued new tokens, transferred, and sold assets.

RollandSaf stated that the hackers exploited compromised personal devices, not the UXLINK system. They used sophisticated impersonation and deepfake techniques. The team immediately filed criminal reports in multiple jurisdictions, including Asia, Europe, and the United States, upon the attack. Through immediate communication with exchanges, millions of dollars have been recovered, all of which were used for buybacks to support community development. Furthermore, significant security upgrades have been implemented to signing devices, internal processes, and systems to prevent similar incidents from recurring. The DAO passed a proposal to unlock an additional 12% supply in advance to help compensate users who purchased during the hack and illegal minting. All major exchanges have received corresponding compensation.

Sorumluluk Reddi: Bu sitede yeniden yayınlanan makaleler, halka açık platformlardan alınmıştır ve yalnızca bilgilendirme amaçlıdır. MEXC'nin görüşlerini yansıtmayabilir. Tüm hakları telif sahiplerine aittir. Herhangi bir içeriğin üçüncü taraf haklarını ihlal ettiğini düşünüyorsanız, kaldırılması için lütfen service@support.mexc.com ile iletişime geçin. MEXC, içeriğin doğruluğu, eksiksizliği veya güncelliği konusunda hiçbir garanti vermez ve sağlanan bilgilere dayalı olarak alınan herhangi bir eylemden sorumlu değildir. İçerik, finansal, yasal veya diğer profesyonel tavsiye niteliğinde değildir ve MEXC tarafından bir tavsiye veya onay olarak değerlendirilmemelidir.

Ayrıca Şunları da Beğenebilirsiniz

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO

The post Aave DAO to Shut Down 50% of L2s While Doubling Down on GHO appeared on BitcoinEthereumNews.com. Aave DAO is gearing up for a significant overhaul by shutting down over 50% of underperforming L2 instances. It is also restructuring its governance framework and deploying over $100 million to boost GHO. This could be a pivotal moment that propels Aave back to the forefront of on-chain lending or sparks unprecedented controversy within the DeFi community. Sponsored Sponsored ACI Proposes Shutting Down 50% of L2s The “State of the Union” report by the Aave Chan Initiative (ACI) paints a candid picture. After a turbulent period in the DeFi market and internal challenges, Aave (AAVE) now leads in key metrics: TVL, revenue, market share, and borrowing volume. Aave’s annual revenue of $130 million surpasses the combined cash reserves of its competitors. Tokenomics improvements and the AAVE token buyback program have also contributed to the ecosystem’s growth. Aave global metrics. Source: Aave However, the ACI’s report also highlights several pain points. First, regarding the Layer-2 (L2) strategy. While Aave’s L2 strategy was once a key driver of success, it is no longer fit for purpose. Over half of Aave’s instances on L2s and alt-L1s are not economically viable. Based on year-to-date data, over 86.6% of Aave’s revenue comes from the mainnet, indicating that everything else is a side quest. On this basis, ACI proposes closing underperforming networks. The DAO should invest in key networks with significant differentiators. Second, ACI is pushing for a complete overhaul of the “friendly fork” framework, as most have been unimpressive regarding TVL and revenue. In some cases, attackers have exploited them to Aave’s detriment, as seen with Spark. Sponsored Sponsored “The friendly fork model had a good intention but bad execution where the DAO was too friendly towards these forks, allowing the DAO only little upside,” the report states. Third, the instance model, once a smart…
Paylaş
BitcoinEthereumNews2025/09/18 02:28
Xinjiang Mining Shutdown Sparks Network Security Concerns

Xinjiang Mining Shutdown Sparks Network Security Concerns

The post Xinjiang Mining Shutdown Sparks Network Security Concerns appeared on BitcoinEthereumNews.com. Bitcoin Hashrate Plummets 8%: Xinjiang Mining Shutdown Sparks
Paylaş
BitcoinEthereumNews2025/12/15 16:50