紧急:在过去的60天里,一名黑客已攻破1200多个Hyperliquid地址 该黑客通过单一签名将EOA升级为1 of 1多重签名,黑客是唯一的签署者 升级是即时的,并且给予黑客对HyperCore上所有资产的完全访问权限(包括解除质押HYPE并在7天后提取) 多重签名是HyperCore的基本功能,因此黑客无法访问HyperEVM上的资产(仅限HyperCore) 将在下一条推文中放出被黑地址的电子表格(感谢@_Syavel_提供数据)
Ciro¹⁷™️
Ciro¹⁷™️2025年6月6日
———🚨🚨URGENT🚨🚨 ——— @HyperliquidX Requesting Immediate Help from Hyperliquid Team, My Hyperliquid account has been compromised and was converted into a multi-sig account without my consent. The attacker added their own wallet as the sole authorized signer, effectively locking me out of my account. all my $HYPE tokens have been unstaked, and the 7-day unstaking period has started. As of today, there are 6 days left until the funds become withdrawable and at risk of being drained by the attacker Here are the relevant details: - Compromised HyperCore account: 0xeB97f37e7065A50a46f5DDEfc49e0419aBb931Bd - Attacker's wallet (current sole authorized signer): 0x768f2ebd51176ad3783602dc86cca7c8355cdf94 - Threshold: 1 - Authorized signers: only the attacker hacker - I still have full control over the original EVM wallet linked to the account. I am the legitimate owner and can sign any message using my original EVM wallet to prove identity. I am requesting immediate assistance to: - Freeze or lock the account temporarily to prevent further actions - Remove the unauthorized multi-sig setup - Or transfer the assets to a new wallet I control Please let me know what proofs or verifications you need from me. I am ready to cooperate fully and provide any signatures or identity verifications required. This is urgent, as my assets are at risk. Thank you for your understanding and prompt support. If you're reading this and can't help directly, please push like or react to this message to help bring it to the attention of the right people on the team. Even just one like or comment could make the difference in getting this noticed by the right people. Thank you so much. my Discord name: ciro.hl @chameleon_jeff @Valinorae @xulian_hl @iliensinc @HyperFND @Hyperintern @hypurr_co @HypioHL @0xHyperBeat @nansen_ai @infinitefieldx @HyperStakeX @HypurrScan @validaoxyz @asxn_r @bharvest_intern @hyperpc_ @luganodes @HyBridgeHL @PiPonHL #HYPE #HYPERLIQUID
1200多个被泄露地址的列表: 如果您的地址在此列表中,请私信任何您记得访问或签署交易的HyperEVM应用程序或网站,以便我们尽快识别来源。
如果您的地址在此列表中,您在 HyperEVM 上的资产是安全的,可以转移到新地址。 这个“黑客攻击”(技术上是一个钓鱼签名)只有在黑客的签名或 Hyperliquid 团队/验证者对多重签名原语进行某种升级的情况下才能逆转。 强烈建议将热钱包和冷钱包分开(特别是在尝试新应用时)。 此外,您绝对不应该签署不是人类可读文本的签名。如果有疑问,请创建一个新钱包并使用那个。
在此处删除原始推文并重新发布正确的版本
Luke Cannon
Luke Cannon2025年6月7日
[deleted & reposted to clarify it's a phishing attack, NOT a hack] In the last 60 days, a phishing attack has compromised 1200+ addresses on Hyperliquid The phishing attack works with a single signature that upgrades the EOA to a 1 of 1 multisig with the attacker as the only signer The upgrade is immediate & gives the hacker full access to all of their assets on HyperCore (including unstaking HYPE & withdrawing after 7 days) Multsigs are a HyperCore primitive & so the attacker does not gain access to assets on HyperEVM (only HyperCore) Putting a spreadsheet of compromised addresses in the next tweet (ty @_Syavel_ for data)
1.1K