Founder of Slow Mist:Emergency Treatment after Stolen:what should you do when you get stolen?
Especially with NFT being so hot these days, security awareness will only be established if tokens are stolen. Of course I don’t want everyone to be stolen, it’s just that many times I see many people who are very nervous, confused, and maybe even anxious after being stolen leading to a second injury. link: ![]() Stop loss firstA stop is a way to stop a loss from magnifying it, and there are at least two stages: 1. the immediate rush stage. What is happening now is the most urgent, for example, you have seen that hackers are transferring your assets one after another, what should you do? Hurry up and get the rest of the assets out of here. If you have experience in jumping the gun, just do it. Depending on the type of asset, if it is the kind that can be frozen on the chain, contact as much as possible to freeze. Those who have the ability to do on-chain tracking analysis and find that funds are transferred to a centralized platform can be contacted to do the necessary risk control. 2. After the situation control stage. After the situation is stabilized, the focus should be on figuring out how not to have secondary and tertiary damage. Protect the sceneIf you find that your assets have been stolen, be calm, take a deep breath for three times and protect the scene. There are a few experiences for reference: 1. For computers, servers and other networked devices, once these are the main site of the accident, immediately cut off the network, but do not shut down (the power supply continues). Some people say that if it is a destructive virus, do not shut down, the local system files are destroyed by the virus. You are right, if you can react faster than the virus… 2. Unless you can do it yourself, wait for a security professional to intervene. This is critical, we encountered quite a few situations: when we intervene to do the analysis, the scene is already in disarray, and even key evidence (such as logs, virus files) appear to be cleaned up. The absence of a well-preserved crime scene can cause great interference to the subsequent analysis and traceability. Analyze the causesThe purpose of analyzing the cause is to understand the adversary and output a hacker portrait. This time the incident report is very important, also called Post Mortem Report. We have met many people who came to consult us after their coins were stolen, and it is very difficult for many of them to express themselves clearly, let alone produce a clear accident report. But I think expression can be practiced or drawn out from a gourd. For example, at least the following points should be explained. 1. Summary 1: Who, when, what happened, and how much total damage? 2. summary 2: Wallet address, hacker wallet address, coin type, quantity, a table is clearer. 3. Process description: This point is the most difficult, here you need to describe all aspects of the details of this accident process points, which will even analyze the various traces related to the hacker, the final output of the hacker portrait (which includes the motive for evil) We are specifically in the docking, the template will be much more complex, step by step. Sometimes human memory is also problematic, and there is even a deliberate concealment of key information leading to wasted time or delayed excellent timing. So in the actual docking, the consumption is really big and we need to use our experience to guide the work well. Eventually issue an incident report with the person who lost the coins or the project, and keep this incident report updated. Trace back to the sourceAccording to Rocca’s law: any invasion will leave traces. As long as we check carefully, we will always find something. The process of investigation is actually forensic analysis and traceability. We will do traceability according to the hacker’s portrait from forensic analysis and continuously enrich this hacker’s portrait, which is a dynamic and iterative process. Traceability consists of two major parts. 1. On-chain intelligence: Analyze the direction of funds for wallet addresses, such as into centralized exchanges, mixed coin platforms, etc., and monitor and warn of new transfers. 2. Off-chain intelligence: The hacker’s IP, device information, email and richer information from the collision of these points, including behavioral information. Based on this intelligence, the tracking and tracing work will be very much, and even require the intervention of law enforcement units. Closing the caseOf course, we all want to have a good ending, and there are public events in history that we’ve been heavily involved in that have a good ending, just to name a few: 1. Lendf.Me, valued at $25 million SIL Finance, valued at $12.15 million Poly Network, valued at $610 million There are many more that we have personally experienced that are unannounced good endings, okay endings. But most of them are bad endings, which is a shame. We have accumulated a lot of valuable experience in these processes and hope to improve the ratio of good outcomes by another step in the future. I’m not going to elaborate on it in detail because it requires a huge amount of knowledge, some of which I’m not good at. According to different scenarios, we need to master the following skills: Smart contract security analysis and forensics On — chain fund transfer analysis and evidence collection Web security analysis and forensics Linux server security analysis and forensics Windows security analysis and forensics MacOS security analysis and forensics Mobile phone security analysis and forensics Malicious code analysis and forensics Network equipment or platform security analysis and evidence collection Personnel safety analysis and forensics… Almost everything. If you’re familiar with this, you’ll know that I mentioned all of this in the black manual that I published a little while ago. In particular, I want to emphasize it again. Welcome to refer to more security knowledge for Web3 users: CH:https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook/blob/main/README_CN.md#%E8%A2%AB%E7%9B%97%E4%BA%86%E6%80%8E%E4%B9%88%E5%8A%9E EN:https://github.com/slowmist/Blockchain-dark-forest-selfguard-handbook#what-to-do-when-you-get-hacked If you liked this post from Wu Blockchain, why not share it? |
Older messages
WuBlockchain Weekly:$OP & Rate Hike & Taper & Top News & Insights
Saturday, June 4, 2022
1、The probability of the Fed raising rates by 50 basis points by June is 96.8% and tapering is on US Treasury Secretary Yellen will meet with Federal Reserve Chairman Powell to discuss inflation issues
VC Monthly Report:$4.219 billion in May, down 38.2% from April 2022 and up 97.8% from May 2021
Wednesday, June 1, 2022
According to Dove Metrics, there were 169 open investment projects of crypto VC this month, including 170 rounds, down 24.2% from the previous month (224 rounds in April 2022), and 28.8% from the
TSE Sponsored:Global Crypto Mining News (May 23 to May 29)
Monday, May 30, 2022
1. Ethereum Core developers seem to be in consensus that ETH's difficulty bomb should be delayed by two to four months. Furthermore, Ethereum developers are keen on not delaying the difficulty bomb
Conflux co-founder How did StepN on BNBchain collapse?
Sunday, May 29, 2022
Author: @forgivenever Stepn is currently in a recession, where the Solana chain is still maintaining the economic cycle, but the Bsc chain has completely burst the bubble. This article is a brief
WuBlockchain Weekly:Terra2.0、STEPN CHINA BAN、Winter is coming and Top10 News
Friday, May 27, 2022
1、Terra releases airdrop details, 2.0 is coming, and everything seems to be settling down link Terra officials have now confirmed that Terra 2.0 is expected to on May 28th, 2022 at around 06:00 AM UTC,
You Might Also Like
Texas doubles down on crypto with new $250 million Bitcoin reserve bill
Tuesday, March 11, 2025
Texas' second crypto bill seeks to enhance state and local government participation in digital asset investments. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏
How-ey Can Get Out of Here
Tuesday, March 11, 2025
How On-Chain Data Can Clarify the Regulation of Cryptoassets ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏
February CEX Data Report: Significant Decline in Trading Volume Across Major CEXs - Spot Down 21%, Derivatives Dow…
Tuesday, March 11, 2025
In February 2025, the spot trading volume of major CEXs decreased by 21% compared to January. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏
El Salvador defies IMF, continues Bitcoin purchases amid market downtrend
Monday, March 10, 2025
El Salvador's Bitcoin holdings grow to $504 million, challenging IMF directives amid sharp price declines. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏
🖊️ Trump signed an Executive Order for a US Strategic Bitcoin Reserve; Cronos proposed to reissue 70 billion CRO …
Monday, March 10, 2025
Trump signed an Executive Order for a US Strategic Bitcoin Reserve; Cronos proposed to reissue 70 billion CRO for a Cronos Strategic Reserve; Texas's Senate passed bitcoin reserve bill SB-21 ͏ ͏ ͏
Vitalik TAKO AMA: ETH Positioning, Sequencer Centralization, L1 vs L2, Governance, and Success Metrics
Monday, March 10, 2025
On the evening of February 19th at 12 PM UTC and lasting until 12 PM UTC on February 20th, Vitalik Buterin, the founder of Ethereum, was invited to participate in a flash text interview on Tako (a
Donald Trump Creates U.S. Bitcoin Reserve
Monday, March 10, 2025
March 10th, 2025 Sign Up Your Weekly Update On All Things Crypto TL;DR Donald Trump Creates US Bitcoin Reserve Diddy Shows 'Kindness' To Sam Bankman-Fried Robinhood Conducts $1M Crypto Trivia
Bitcoin’s realized volatility surges in as traders face extreme price swings
Sunday, March 9, 2025
Volatility clustering in Bitcoin reveals the impact of turbulent rallies and sharp pullbacks. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏
Asia's weekly TOP10 crypto news (Mar 3 to Mar 9)
Sunday, March 9, 2025
Ms. Sun Xueling, Minister of State, Ministry of Home Affairs of Singapore, said that cryptocurrency fraud cases accounted for a quarter of the total loss amount involved in fraud last year. ͏ ͏ ͏ ͏ ͏ ͏
Trump declares end to ‘war on crypto,’ vows to propel America to Bitcoin supremacy
Saturday, March 8, 2025
Trump brands the Biden era as a crypto setback, .President Trump vows to make America the Bitcoin leader, ending Operation Chokepoint 2.0 and bolstering crypto strategies. ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏