Binance Square

attack

47,155 skatījumi
64 piedalās diskusijā
PhoenixTraderpro
·
--
ATTACK WAVE IS HERE! 72 SIMPS GONE IN 2025! 75% surge in attacks. Over $40.9 million DRAINED. This is just the tip of the iceberg. Europe is the new warzone. France leads the charge. Physical violence is EXPLODING. Kidnappings of crypto whales are REAL. The danger is IMMINENT. Protect your assets NOW. Disclaimer: This is not financial advice. #CryptoSecurity #SimpSwap #Attack #FOMO 🚨
ATTACK WAVE IS HERE! 72 SIMPS GONE IN 2025!

75% surge in attacks. Over $40.9 million DRAINED. This is just the tip of the iceberg. Europe is the new warzone. France leads the charge. Physical violence is EXPLODING. Kidnappings of crypto whales are REAL. The danger is IMMINENT. Protect your assets NOW.

Disclaimer: This is not financial advice.

#CryptoSecurity #SimpSwap #Attack #FOMO 🚨
What Is a 51% Attack?Before diving into the 51% attack, it is crucial to have a good understanding of mining and blockchain-based systems. One of the key strengths of Bitcoin and its underlying blockchain technology is the distributed nature of building and verifying data. The decentralized work of the nodes ensures that the protocol rules are being followed and that all network participants agree on the current state of the blockchain. This means that the majority of nodes need to regularly reach consensus in regards to the process of mining, to the version of the software being used, to the validity of transactions, and so forth. The Bitcoin consensus algorithm (Proof of Work) is what assures that miners are only able to validate a new block of transactions if the network nodes collectively agree that the block hash provided by the miner is accurate (i.e. the block hash proves that the miner did enough work and found a valid solution for that block’s problem).  The blockchain infrastructure - as a decentralized ledger and distributed system - prevents any centralized entity from making use of the network for its own purposes, which is the reason why there is no single authority on the Bitcoin network. Since the process of mining (in PoW-based systems) involves the investment of huge amounts of electricity and computational resources, a miner’s performance is based on the amount of computational power he has, and this is usually referred to as hash power or hash rate. There are many mining nodes in various locations and they compete to be the next to find a valid block hash and be rewarded with newly generated bitcoins. In such a context, the mining power is distributed over different nodes across the world, which means the hash rate is not in the hands of a single entity. At least it is not supposed to be. But what happens when the hash rate is no longer distributed well enough? What happens if, for example, one single entity or organization is able to obtain more than 50% of the hashing power? One possible consequence of that is what we call a 51% attack, also known as a majority attack. What Is a 51% Attack? A 51% attack is a potential attack on a blockchain network, where a single entity or organization is able to control the majority of the hash rate, potentially causing network disruption. In such a scenario, the attacker would have enough mining power to intentionally exclude or modify the ordering of transactions. They could also reverse transactions they made while being in control - leading to a double-spending problem. A successful majority attack would also allow the attacker to prevent some or all transactions from being confirmed (transaction denial of service) or to prevent some or all other miners from mining, resulting in what is known as a mining monopoly. On the other hand, a majority attack would not allow the attacker to reverse transactions from other users nor to prevent transactions from being created and broadcasted to the network. Changing the block’s reward, creating coins out of thin air, or stealing coins that never belonged to the attacker are also deemed impossible events. How Likely Is a 51% Attack?  Since a blockchain is maintained by a distributed network of nodes, all participants cooperate in the process of reaching consensus. This is one of the reasons they tend to be highly secure. The bigger the network, the stronger the protection against attacks and data corruption. When it comes to Proof of Work blockchains, the more hash rate a miner has, the higher the chances of finding a valid solution for the next block. This is true because mining involves a myriad of hashing attempts and more computational power means more trials per second. Several early miners joined the Bitcoin network to contribute to its growth and security. With the rising price of Bitcoin as a currency, numerous new miners entered the system aiming to compete for the block rewards (currently set as 6.25 BTC per block). Such a competitive scenario is one of the reasons why Bitcoin is secure. Miners have no incentive to invest large amounts of resources if it is not for acting honestly and striving to receive the block reward. Therefore, a 51% attack on Bitcoin is rather unlikely due to the magnitude of the network. Once a blockchain grows large enough, the likelihood of a single person or group obtaining enough computing power to overwhelm all the other participants rapidly drops to very low levels. Moreover, changing the previously confirmed blocks gets more and more difficult as the chain grows, because the blocks are all linked through cryptographic proofs. For the same reason, the more confirmations a block have, the higher the costs for altering or reverting transactions therein. Hence, a successful attack would probably only be able to modify the transactions of a few recent blocks, for a short period of time. Going further, let’s imagine a scenario where a malicious entity is not motivated by profit and decides to attack the Bitcoin network only to destroy it, no matter the costs. Even if the attacker manages to disrupt the network, the Bitcoin software and protocol would be quickly modified and adapted as a response to that attack. This would require the other network nodes to reach consensus and agree on these changes, but that would probably happen very quickly during an emergency situation. Bitcoin is very resilient to attacks and is considered the most secure and reliable cryptocurrency in existence. Although it is quite difficult for an attacker to obtain more computational power than the rest of the Bitcoin network, that is not so challenging to achieve on smaller cryptocurrencies. When compared to Bitcoin, altcoins have a relatively low amount of hashing power securing their blockchain. Low enough to make it possible for 51% attacks to actually happen. A few notable examples of cryptocurrencies that were victims of majority attacks include Monacoin, Bitcoin Gold and ZenCash. $BNB #Attack

What Is a 51% Attack?

Before diving into the 51% attack, it is crucial to have a good understanding of mining and blockchain-based systems.
One of the key strengths of Bitcoin and its underlying blockchain technology is the distributed nature of building and verifying data. The decentralized work of the nodes ensures that the protocol rules are being followed and that all network participants agree on the current state of the blockchain. This means that the majority of nodes need to regularly reach consensus in regards to the process of mining, to the version of the software being used, to the validity of transactions, and so forth.
The Bitcoin consensus algorithm (Proof of Work) is what assures that miners are only able to validate a new block of transactions if the network nodes collectively agree that the block hash provided by the miner is accurate (i.e. the block hash proves that the miner did enough work and found a valid solution for that block’s problem). 
The blockchain infrastructure - as a decentralized ledger and distributed system - prevents any centralized entity from making use of the network for its own purposes, which is the reason why there is no single authority on the Bitcoin network.
Since the process of mining (in PoW-based systems) involves the investment of huge amounts of electricity and computational resources, a miner’s performance is based on the amount of computational power he has, and this is usually referred to as hash power or hash rate. There are many mining nodes in various locations and they compete to be the next to find a valid block hash and be rewarded with newly generated bitcoins.
In such a context, the mining power is distributed over different nodes across the world, which means the hash rate is not in the hands of a single entity. At least it is not supposed to be.
But what happens when the hash rate is no longer distributed well enough? What happens if, for example, one single entity or organization is able to obtain more than 50% of the hashing power? One possible consequence of that is what we call a 51% attack, also known as a majority attack.
What Is a 51% Attack?
A 51% attack is a potential attack on a blockchain network, where a single entity or organization is able to control the majority of the hash rate, potentially causing network disruption. In such a scenario, the attacker would have enough mining power to intentionally exclude or modify the ordering of transactions. They could also reverse transactions they made while being in control - leading to a double-spending problem.
A successful majority attack would also allow the attacker to prevent some or all transactions from being confirmed (transaction denial of service) or to prevent some or all other miners from mining, resulting in what is known as a mining monopoly.
On the other hand, a majority attack would not allow the attacker to reverse transactions from other users nor to prevent transactions from being created and broadcasted to the network. Changing the block’s reward, creating coins out of thin air, or stealing coins that never belonged to the attacker are also deemed impossible events.
How Likely Is a 51% Attack? 
Since a blockchain is maintained by a distributed network of nodes, all participants cooperate in the process of reaching consensus. This is one of the reasons they tend to be highly secure. The bigger the network, the stronger the protection against attacks and data corruption.
When it comes to Proof of Work blockchains, the more hash rate a miner has, the higher the chances of finding a valid solution for the next block. This is true because mining involves a myriad of hashing attempts and more computational power means more trials per second. Several early miners joined the Bitcoin network to contribute to its growth and security. With the rising price of Bitcoin as a currency, numerous new miners entered the system aiming to compete for the block rewards (currently set as 6.25 BTC per block). Such a competitive scenario is one of the reasons why Bitcoin is secure. Miners have no incentive to invest large amounts of resources if it is not for acting honestly and striving to receive the block reward.
Therefore, a 51% attack on Bitcoin is rather unlikely due to the magnitude of the network. Once a blockchain grows large enough, the likelihood of a single person or group obtaining enough computing power to overwhelm all the other participants rapidly drops to very low levels.
Moreover, changing the previously confirmed blocks gets more and more difficult as the chain grows, because the blocks are all linked through cryptographic proofs. For the same reason, the more confirmations a block have, the higher the costs for altering or reverting transactions therein. Hence, a successful attack would probably only be able to modify the transactions of a few recent blocks, for a short period of time.
Going further, let’s imagine a scenario where a malicious entity is not motivated by profit and decides to attack the Bitcoin network only to destroy it, no matter the costs. Even if the attacker manages to disrupt the network, the Bitcoin software and protocol would be quickly modified and adapted as a response to that attack. This would require the other network nodes to reach consensus and agree on these changes, but that would probably happen very quickly during an emergency situation. Bitcoin is very resilient to attacks and is considered the most secure and reliable cryptocurrency in existence.
Although it is quite difficult for an attacker to obtain more computational power than the rest of the Bitcoin network, that is not so challenging to achieve on smaller cryptocurrencies. When compared to Bitcoin, altcoins have a relatively low amount of hashing power securing their blockchain. Low enough to make it possible for 51% attacks to actually happen. A few notable examples of cryptocurrencies that were victims of majority attacks include Monacoin, Bitcoin Gold and ZenCash.
$BNB
#Attack
·
--
Pozitīvs
·
--
#BREAKING "Terors Vašingtonā" Divi Izraēlas vēstniecības darbinieki tika nogalināti ārpus Kapitola Ebreju muzeja Vašingtonā, DC. Uzbrucējs, kuru identificēja kā Eliju Rodrigesu, kliedza "Brīvu Palestīnu" pirms atklāja uguni un nogalināja ebreju pāri. #Washington #DC #TRUMP #attack
#BREAKING "Terors Vašingtonā" Divi Izraēlas vēstniecības darbinieki tika nogalināti ārpus Kapitola Ebreju muzeja Vašingtonā, DC.
Uzbrucējs, kuru identificēja kā Eliju Rodrigesu, kliedza "Brīvu Palestīnu" pirms atklāja uguni un nogalināja ebreju pāri.
#Washington #DC #TRUMP #attack
SAGA EXPLODES. 7 MILLION GONE. Entry: 0.75 🟩 Target 1: 0.90 🎯 Stop Loss: 0.60 🛑 SagaEVM is DOWN. A massive attack drained 7 million USD. Saga Dollar collapsed to 0.75. Stablecoins Colt and Mustang are also hit. The Saga team paused the chain. They are locking funds and working with exchanges. The mainnet is secure but TVL tanked 55%. Security audit incoming. This is your chance. Disclaimer: Trading is risky. DYOR. #Saga #Crypto #DeFi #Attack #FOMO 🚨
SAGA EXPLODES. 7 MILLION GONE.

Entry: 0.75 🟩
Target 1: 0.90 🎯
Stop Loss: 0.60 🛑

SagaEVM is DOWN. A massive attack drained 7 million USD. Saga Dollar collapsed to 0.75. Stablecoins Colt and Mustang are also hit. The Saga team paused the chain. They are locking funds and working with exchanges. The mainnet is secure but TVL tanked 55%. Security audit incoming. This is your chance.

Disclaimer: Trading is risky. DYOR.

#Saga #Crypto #DeFi #Attack #FOMO 🚨
```BRĪDINĀJUMS: #Pakistan arī ir kiberuzbrukuma upuris. Pakistānas Islāma Bahavulpuras Universitāte ir pārkāpta (150 tūkst. + ieraksti nopludināti) Neklikšķiniet uz nejaušiem saites, kas tiek izplatītas, īpaši uz tām, kas lūdz atvērt tīmekļa lapas. Tas ir slazds. Palieciet viedi, palieciet modri un izplatiet ziņu.``` #CYBER #attack
```BRĪDINĀJUMS: #Pakistan arī ir kiberuzbrukuma upuris. Pakistānas Islāma Bahavulpuras Universitāte ir pārkāpta (150 tūkst. + ieraksti nopludināti)

Neklikšķiniet uz nejaušiem saites, kas tiek izplatītas, īpaši uz tām, kas lūdz atvērt tīmekļa lapas. Tas ir slazds.

Palieciet viedi, palieciet modri un izplatiet ziņu.```
#CYBER
#attack
Binance News
·
--
UXLINK Piedzīvo Ievērojamu Kritumu Pēc Aizdomīga Uzbrukuma
Saskaņā ar BlockBeats, UXLINK tirgus vērtība piedzīvoja strauju kritumu, samazinoties par vairāk nekā 44% īsā laika posmā. Šis kritums, kā zi reportedots, ir saistīts ar ziņām par aizdomīgu uzbrukumu UXLINK, kas radījis zaudējumus, kas pārsniedz $11 million. Tādējādi tirgus kapitalizācija samazinājās līdz $86 million.
🚨🚨 Drošības ievainojamības uzbrukums Loopring viedmakiem. Loopring viedie maki, īpaši tie, kas izmanto #Loopring's Guardian, kuru mērķauditorija ir hakeris. Hakeris atiestatīja īpašumtiesības un izņem līdzekļus, uzdodoties par maka īpašnieku. #CyberSafety #attack #Loopring #HackerNews
🚨🚨 Drošības ievainojamības uzbrukums Loopring viedmakiem.

Loopring viedie maki, īpaši tie, kas izmanto #Loopring's Guardian, kuru mērķauditorija ir hakeris. Hakeris atiestatīja īpašumtiesības un izņem līdzekļus, uzdodoties par maka īpašnieku.

#CyberSafety #attack #Loopring #HackerNews
Vai kādreiz esi domājis par to, kāpēc kriptovalūtu tirgū notiek masveida pārdošana uzbrukumu laikā? Kari ietekmē kriptovalūtas, jo rada nenoteiktību un bailes tirgū. Kad notiek konflikti, piemēram, Izraēlas-Hezbola uzbrukumi vai Krievijas-Ukraiņas eskalācija, investori parasti pārvieto savus līdzekļus uz stabilākiem aktīviem, piemēram, zeltu vai tradicionālām valūtām, kas izraisa kriptovalūtu tirgus kritumu. Šis kritums notiek, jo cilvēki cenšas aizsargāt savus ieguldījumus krīzes laikā, kas noved pie pieprasījuma samazināšanās pēc kriptovalūtām un cenu krituma. #CryptoNewss #attack #MarketDownturn
Vai kādreiz esi domājis par to, kāpēc kriptovalūtu tirgū notiek masveida pārdošana uzbrukumu laikā?

Kari ietekmē kriptovalūtas, jo rada nenoteiktību un bailes tirgū.
Kad notiek konflikti, piemēram, Izraēlas-Hezbola uzbrukumi vai Krievijas-Ukraiņas eskalācija, investori parasti pārvieto savus līdzekļus uz stabilākiem aktīviem, piemēram, zeltu vai tradicionālām valūtām, kas izraisa kriptovalūtu tirgus kritumu.
Šis kritums notiek, jo cilvēki cenšas aizsargāt savus ieguldījumus krīzes laikā, kas noved pie pieprasījuma samazināšanās pēc kriptovalūtām un cenu krituma. #CryptoNewss #attack #MarketDownturn
·
--
Negatīvs
Akadēmiskais dokuments liecina, ka valsts dalībnieki var mērķēt uz privātumu vērstiem blokķēdes tīkliem, piemēram, #Monero un #Zcash , jo tie spēj slēpt darījumu informāciju. Tas rada bažas, ka valdības varētu uzbrukt šīm privātuma ķēdēm, lai kavētu noziedzīgas darbības, piemēram, naudas atmazgāšanu, vienlaikus radot risku likumīgiem lietotājiem, kuri meklē finanšu privātumu. Dokuments atbalsta līdzsvaru starp privātumu un regulējošiem pasākumiem, lai izvairītos no ļaunprātīgas izmantošanas, neapdraudot personas brīvības. #PrivacyfocusedBlockchain #attack #TrendingTopic
Akadēmiskais dokuments liecina, ka valsts dalībnieki var mērķēt uz privātumu vērstiem blokķēdes tīkliem, piemēram, #Monero un #Zcash , jo tie spēj slēpt darījumu informāciju.
Tas rada bažas, ka valdības varētu uzbrukt šīm privātuma ķēdēm, lai kavētu noziedzīgas darbības, piemēram, naudas atmazgāšanu, vienlaikus radot risku likumīgiem lietotājiem, kuri meklē finanšu privātumu.
Dokuments atbalsta līdzsvaru starp privātumu un regulējošiem pasākumiem, lai izvairītos no ļaunprātīgas izmantošanas, neapdraudot personas brīvības.
#PrivacyfocusedBlockchain #attack #TrendingTopic
ASV uzbrukums Venecuēlai2026. gada janvārī Amerikas Savienotās Valstis veica plaša mēroga militāro operāciju Venecuēlā, kā rezultātā tika notverts Venecuēlas prezidents Nikolass Maduro un viņa sieva Cilia Flores. Operācija ietvēra gaisa triecienus uz militāriem mērķiem un ASV speciālo spēku izmantošanu, lai izvestu viņus uz Amerikas Savienotajām Valstīm, lai saskartos ar federālajiem narkotiku tirdzniecības un ieroču apsūdzībām. $OL #attack #US #venezuela

ASV uzbrukums Venecuēlai

2026. gada janvārī Amerikas Savienotās Valstis veica plaša mēroga militāro operāciju Venecuēlā, kā rezultātā tika notverts Venecuēlas prezidents Nikolass Maduro un viņa sieva Cilia Flores. Operācija ietvēra gaisa triecienus uz militāriem mērķiem un ASV speciālo spēku izmantošanu, lai izvestu viņus uz Amerikas Savienotajām Valstīm, lai saskartos ar federālajiem narkotiku tirdzniecības un ieroču apsūdzībām. $OL #attack #US #venezuela
Tiešraides kriptovalūtu ziņas - 24. novembris Aerodroma priekšējā daļa tika nolaupīta, novirzot lietotājus uz pikšķerēšanas vietnēm, taču viedie līgumi palika droši. Izvairieties no vecajiem domēniem, izmantojiet ENS saiti un atsauciet nesenās apstiprināšanas. Priekšējā daļa uzbrukumi joprojām ir viens no kriptovalūtu lielākajiem vājajiem punktiem. Esi uzmanīgs. #CryptoNews #Aerodrome #attack #DNS #ENS #Venodrome #Base #coinbase #DEX
Tiešraides kriptovalūtu ziņas - 24. novembris

Aerodroma priekšējā daļa tika nolaupīta, novirzot lietotājus uz pikšķerēšanas vietnēm, taču viedie līgumi palika droši.
Izvairieties no vecajiem domēniem, izmantojiet ENS saiti un atsauciet nesenās apstiprināšanas. Priekšējā daļa uzbrukumi joprojām ir viens no kriptovalūtu lielākajiem vājajiem punktiem. Esi uzmanīgs.
#CryptoNews #Aerodrome #attack #DNS #ENS #Venodrome #Base #coinbase #DEX
Kāds #unlucky puisis! Viņam tika nozagti 275 700 86395135282 (4,42 miljoni ASV dolāru), izmantojot tālruni #phishing #attack . Šis puisis no 2022. gada 7. jūnija līdz 2023. gada 14. oktobrim uzkrāja 290 750 #LINK (2,26 miljonus USD) par 7,8 ASV dolāriem. Diemžēl viņš nejauši noklikšķināja uz pikšķerēšanas saites un tika maldināts, parakstot apstiprinājuma darījumu. Galu galā viņš zaudēja peļņu USD 2,4 miljonu apmērā un izmaksas USD 2,26 miljonu apmērā, kopā zaudējot 4,66 miljonus USD!
Kāds #unlucky puisis!

Viņam tika nozagti 275 700 86395135282 (4,42 miljoni ASV dolāru), izmantojot tālruni #phishing #attack .

Šis puisis no 2022. gada 7. jūnija līdz 2023. gada 14. oktobrim uzkrāja 290 750 #LINK (2,26 miljonus USD) par 7,8 ASV dolāriem.

Diemžēl viņš nejauši noklikšķināja uz pikšķerēšanas saites un tika maldināts, parakstot apstiprinājuma darījumu.

Galu galā viņš zaudēja peļņu USD 2,4 miljonu apmērā un izmaksas USD 2,26 miljonu apmērā, kopā zaudējot 4,66 miljonus USD!
🚨Breaking :Indija & Pakistāna Kara Brīdinājums 🚨 Dažas stundas pirms Indija veica raķešu uzbrukumus Pakistānai dažādās reģionos. Tādas kā 🔷 Bahavalpura 🔷 Kotli 🔷 Murredky 🔷 Azad Kašmira Tas bija augstas intensitātes uzbrukums. Šī uzbrukuma sekas būs smagas. Šis karš var ietekmēt tirgus stratēģiju. Tāpēc esiet uzmanīgi par saviem ieguldījumiem. #Warnig⚠️⚠️ #indiavspakistanwar #attack #FOMCMeeting #uncertainties
🚨Breaking :Indija & Pakistāna Kara Brīdinājums 🚨
Dažas stundas pirms Indija veica raķešu uzbrukumus Pakistānai dažādās reģionos. Tādas kā
🔷 Bahavalpura
🔷 Kotli
🔷 Murredky
🔷 Azad Kašmira
Tas bija augstas intensitātes uzbrukums. Šī uzbrukuma sekas būs smagas. Šis karš var ietekmēt tirgus stratēģiju. Tāpēc esiet uzmanīgi par saviem ieguldījumiem.
#Warnig⚠️⚠️ #indiavspakistanwar #attack #FOMCMeeting #uncertainties
🚨 KRIPTOVALŪTA IZBEIDZ LODI: NPM PIEGĀDES ĶĒDE #ATTACK NETS TIKAI $503 Lielā Node Package Manager (NPM) piegādes ķēdes uzbrukums, kas mērķēja uz kriptovalūtu rīkiem, lielā mērā neizdevās, Ledger CTO Šarls Gijemē apstiprināja. 🔹#Hackers izmantoja krāpnieciskus e-pastus, lai pārņemtu izstrādātāju kontus un publicētu ļaunprātīgus atjauninājumus, kas varēja pārņemt Ethereum un Solana darījumus. 🔹Bet kodēšanas kļūdas izraisīja ātru atklāšanu, ierobežojot zādzību tikai līdz $503, @Arkham ziņoja. Projekti, piemēram, Uniswap, Aave un MetaMask, apstiprināja, ka nav ietekmes, lai gan eksperti brīdina, ka nākotnes piegādes ķēdes ekspluatācijas var būt daudz letālākas. $ETH $BNB $SOL
🚨 KRIPTOVALŪTA IZBEIDZ LODI: NPM PIEGĀDES ĶĒDE #ATTACK NETS TIKAI $503

Lielā Node Package Manager (NPM) piegādes ķēdes uzbrukums, kas mērķēja uz kriptovalūtu rīkiem, lielā mērā neizdevās, Ledger CTO Šarls Gijemē apstiprināja.

🔹#Hackers izmantoja krāpnieciskus e-pastus, lai pārņemtu izstrādātāju kontus un publicētu ļaunprātīgus atjauninājumus, kas varēja pārņemt Ethereum un Solana darījumus.

🔹Bet kodēšanas kļūdas izraisīja ātru atklāšanu, ierobežojot zādzību tikai līdz $503, @Arkham ziņoja. Projekti, piemēram, Uniswap, Aave un MetaMask, apstiprināja, ka nav ietekmes, lai gan eksperti brīdina, ka nākotnes piegādes ķēdes ekspluatācijas var būt daudz letālākas.
$ETH $BNB $SOL
Pieraksties, lai skatītu citu saturu
Uzzini jaunākās kriptovalūtu ziņas
⚡️ Iesaisties jaunākajās diskusijās par kriptovalūtām
💬 Mijiedarbojies ar saviem iemīļotākajiem satura veidotājiem
👍 Apskati tevi interesējošo saturu
E-pasta adrese / tālruņa numurs