📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
The public chain project was attacked by hackers, resulting in a loss of 16.96 million dollars, raising security concerns.
Recently, the Blockchain security monitoring platform observed a significant security incident. On the evening of November 13th, a project on a certain public platform was attacked by a Hacker, resulting in a loss of approximately 16.96 million dollars.
It is reported that the attacker exploited a smart contract vulnerability to carry out this attack. Some of the stolen funds have been transferred through mixing services in an attempt to conceal the flow of funds. Another portion of the funds is stored in two specific addresses.
Security experts have locked onto the attacker's address by analyzing on-chain data and tracked down two key attack transactions. This information is crucial for subsequent tracking and potential asset recovery efforts.
It is worth noting that the latest on-chain data indicates that the attackers seem to have started attempting to communicate with the project team. This trend has sparked speculation in the industry about possible negotiations.
Such security incidents remind blockchain projects of the importance of strengthening security audits. At the same time, it highlights the vulnerability of cross-chain protocols in the face of complex attacks. With the rapid development of decentralized finance, finding a balance between innovation and security has become an important issue facing the entire industry.
Insiders call for relevant project parties to disclose event details in a timely manner and take necessary measures to protect user rights. At the same time, the entire industry also needs to continuously improve security mechanisms and enhance its defense capabilities against various types of attacks.