緊急:在過去 60 天內,駭客入侵了 Hyperliquid 上的 1200+ 個位址 該駭客使用單個簽名,將 EOA 升級為 1 of 1 多重簽名,駭客是唯一的簽名者 升級是立即進行的,並且使駭客能夠完全訪問他們在HyperCore上的所有資產(包括取消質押HYPE和7天后提款) Multsigs是一個HyperCore原語,因此駭客無法訪問HyperEVM上的資產(只有HyperCore) 在下一條推文中放置一個被駭客入侵地址的電子表格(@_Syavel_ 獲取資料)
Ciro¹⁷™️
Ciro¹⁷™️2025年6月6日
———🚨🚨URGENT🚨🚨 ——— @HyperliquidX Requesting Immediate Help from Hyperliquid Team, My Hyperliquid account has been compromised and was converted into a multi-sig account without my consent. The attacker added their own wallet as the sole authorized signer, effectively locking me out of my account. all my $HYPE tokens have been unstaked, and the 7-day unstaking period has started. As of today, there are 6 days left until the funds become withdrawable and at risk of being drained by the attacker Here are the relevant details: - Compromised HyperCore account: 0xeB97f37e7065A50a46f5DDEfc49e0419aBb931Bd - Attacker's wallet (current sole authorized signer): 0x768f2ebd51176ad3783602dc86cca7c8355cdf94 - Threshold: 1 - Authorized signers: only the attacker hacker - I still have full control over the original EVM wallet linked to the account. I am the legitimate owner and can sign any message using my original EVM wallet to prove identity. I am requesting immediate assistance to: - Freeze or lock the account temporarily to prevent further actions - Remove the unauthorized multi-sig setup - Or transfer the assets to a new wallet I control Please let me know what proofs or verifications you need from me. I am ready to cooperate fully and provide any signatures or identity verifications required. This is urgent, as my assets are at risk. Thank you for your understanding and prompt support. If you're reading this and can't help directly, please push like or react to this message to help bring it to the attention of the right people on the team. Even just one like or comment could make the difference in getting this noticed by the right people. Thank you so much. my Discord name: ciro.hl @chameleon_jeff @Valinorae @xulian_hl @iliensinc @HyperFND @Hyperintern @hypurr_co @HypioHL @0xHyperBeat @nansen_ai @infinitefieldx @HyperStakeX @HypurrScan @validaoxyz @asxn_r @bharvest_intern @hyperpc_ @luganodes @HyBridgeHL @PiPonHL #HYPE #HYPERLIQUID
1200+ 洩露地址清單: 如果您的位址在此清單中,請私信您記得訪問過或簽署 txns 的任何 HyperEVM 應用程式或網站,以便我們儘快確定來源
如果您的位址在此清單中,那麼您在HyperEVM上的資產是安全的,並且可以轉移到新的位址。 “黑客”(技術上是網络釣魚簽名)只能通過駭客的簽名或 Hyperliquid 團隊/驗證者對 multsig 原語的某種升級來逆轉 強烈建議將熱錢包和冷錢包分開(尤其是在嘗試新應用程式時) 此外,您絕不應對非人類可讀文本的簽名進行簽名。如有疑問,請啟動一個新的錢包並使用那個。
在此處刪除原始推文並重新發佈正確的版本
Luke Cannon
Luke Cannon2025年6月7日
[已刪除並重新發佈以澄清這是網络釣魚攻擊,而不是駭客攻擊] 在過去 60 天內,網路釣魚攻擊已破壞 Hyperliquid 上的 1200+ 個位址 網路釣魚攻擊使用單個簽名,該簽名將 EOA 升級為 1 of 1 多重簽名,攻擊者是唯一的簽名者 升級是立即進行的,並且使駭客能夠完全訪問他們在HyperCore上的所有資產(包括取消質押HYPE和7天后提款) Multsigs是一個HyperCore原語,因此攻擊者無法獲得HyperEVM上的資產訪問許可權(只有HyperCore) 在下一條推文中放置一個洩露地址的電子表格(@_Syavel_ 獲取資料)
89.56K