熱門話題
#
Bonk 生態迷因幣展現強韌勢頭
#
有消息稱 Pump.fun 計劃 40 億估值發幣,引發市場猜測
#
Solana 新代幣發射平臺 Boop.Fun 風頭正勁
緊急:在過去 60 天內,駭客入侵了 Hyperliquid 上的 1200+ 個位址
該駭客使用單個簽名,將 EOA 升級為 1 of 1 多重簽名,駭客是唯一的簽名者
升級是立即進行的,並且使駭客能夠完全訪問他們在HyperCore上的所有資產(包括取消質押HYPE和7天后提款)
Multsigs是一個HyperCore原語,因此駭客無法訪問HyperEVM上的資產(只有HyperCore)
在下一條推文中放置一個被駭客入侵地址的電子表格(@_Syavel_ 獲取資料)


2025年6月6日
———🚨🚨URGENT🚨🚨 ——— @HyperliquidX
Requesting Immediate Help from Hyperliquid Team,
My Hyperliquid account has been compromised and was converted into a multi-sig account without my consent. The attacker added their own wallet as the sole authorized signer, effectively locking me out of my account.
all my $HYPE tokens have been unstaked, and the 7-day unstaking period has started.
As of today, there are 6 days left until the funds become withdrawable and at risk of being drained by the attacker
Here are the relevant details:
- Compromised HyperCore account: 0xeB97f37e7065A50a46f5DDEfc49e0419aBb931Bd
- Attacker's wallet (current sole authorized signer): 0x768f2ebd51176ad3783602dc86cca7c8355cdf94
- Threshold: 1
- Authorized signers: only the attacker hacker
- I still have full control over the original EVM wallet linked to the account.
I am the legitimate owner and can sign any message using my original EVM wallet to prove identity. I am requesting immediate assistance to:
- Freeze or lock the account temporarily to prevent further actions
- Remove the unauthorized multi-sig setup
- Or transfer the assets to a new wallet I control
Please let me know what proofs or verifications you need from me. I am ready to cooperate fully and provide any signatures or identity verifications required.
This is urgent, as my assets are at risk. Thank you for your understanding and prompt support.
If you're reading this and can't help directly, please push like or react to this message to help bring it to the attention of the right people on the team.
Even just one like or comment could make the difference in getting this noticed by the right people. Thank you so much.
my Discord name: ciro.hl
@chameleon_jeff @Valinorae @xulian_hl @iliensinc @HyperFND @Hyperintern @hypurr_co @HypioHL @0xHyperBeat @nansen_ai @infinitefieldx @HyperStakeX @HypurrScan @validaoxyz @asxn_r @bharvest_intern @hyperpc_ @luganodes @HyBridgeHL @PiPonHL
#HYPE #HYPERLIQUID
1200+ 洩露地址清單:
如果您的位址在此清單中,請私信您記得訪問過或簽署 txns 的任何 HyperEVM 應用程式或網站,以便我們儘快確定來源
如果您的位址在此清單中,那麼您在HyperEVM上的資產是安全的,並且可以轉移到新的位址。
“黑客”(技術上是網络釣魚簽名)只能通過駭客的簽名或 Hyperliquid 團隊/驗證者對 multsig 原語的某種升級來逆轉
強烈建議將熱錢包和冷錢包分開(尤其是在嘗試新應用程式時)
此外,您絕不應對非人類可讀文本的簽名進行簽名。如有疑問,請啟動一個新的錢包並使用那個。
在此處刪除原始推文並重新發佈正確的版本

2025年6月7日
[deleted & reposted to clarify it's a phishing attack, NOT a hack]
In the last 60 days, a phishing attack has compromised 1200+ addresses on Hyperliquid
The phishing attack works with a single signature that upgrades the EOA to a 1 of 1 multisig with the attacker as the only signer
The upgrade is immediate & gives the hacker full access to all of their assets on HyperCore (including unstaking HYPE & withdrawing after 7 days)
Multsigs are a HyperCore primitive & so the attacker does not gain access to assets on HyperEVM (only HyperCore)
Putting a spreadsheet of compromised addresses in the next tweet (ty @_Syavel_ for data)

1.1K
熱門
排行
收藏