SectorH (SOLD OUT)

1.5K posts

SectorH (SOLD OUT) banner
SectorH (SOLD OUT)

SectorH (SOLD OUT)

@SectorHSecurity

A series of NFT collections! A collaboration of security professionals building security tools for #solana Discord: https://t.co/ADuilBMsjF

https://sectorh.io Katılım Mart 2022
203 Takip Edilen626 Takipçiler
Sabitlenmiş Tweet
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
The world is changing and Agents are coming to help combat scammers. This is a view of an investigation kicked off by an AI based agent on a social media account. In this example we are showing how it works with our main account. #infosecurity #LLMs #aiagents 1/2
SectorH (SOLD OUT) tweet media
English
3
1
4
276
SectorH (SOLD OUT) retweetledi
S◎L Big Brain
S◎L Big Brain@SOLBigBrain·
Use Solana? Don't forget to reclaim $SOL from closed Token/NFT accounts, etc... It's simple: - visit @solincinerator - connect Wallet - click "Cleanup" tab - confirm the burn - get $SOL Here is one my main wallets I will be getting back 5.8 SOL. Nothing major, but free $$
S◎L Big Brain tweet media
English
105
100
951
102.2K
SectorH (SOLD OUT) retweetledi
00_Hackers ✌️
00_Hackers ✌️@HackersAgents·
Pig Butchering Scam! There are previous posts on an Asian lady pig butchering scam, but here is an updated version a friend shared with me. Be safe! This is similar to the previous romance scam, but this example the lady was met in a dating app. 1/6
English
1
2
7
375
SectorH (SOLD OUT) retweetledi
Jupiter
Jupiter@JupiterExchange·
Identification Of Malicious Extension Over the last week, we received reports that a small number of users using Solana DeFi got drained. After extensive investigation, we have identified a malicious Chrome extension called “Bull Checker” that had targeted users on several Solana-related subreddits. Users with this extension would interact with the dApps as per normal, have the simulation show up as normal, but have the possibility of their tokens being maliciously transferred to another wallet upon transaction completion. If you have this extension (or similar extensions with extensive permissions you cannot trust), please remove it immediately. Note that there is no vulnerability found in any of the dapps or wallets. A report with all the key technical details, including why the simulation looked normal, is available at: jupresear.ch/t/identificati… For the report, we collaborated with @0xslipper from @Offside_Labs who was extremely helpful for much of the technical analysis. Much thanks to @blowfishxyz, @RaydiumProtocol and @phantom who also reviewed this post too. Example Transactions Here are 2 examples of transactions that have interacted with the malicious program 5UMucMksJweA1AtgyxrK8DJeBXr3DQGEGRs5Kkq2pZjr solana.fm/tx/5krgaq2FTZA… solana.fm/tx/3wbxDWWzoHt… In both cases, malicious instructions were added to regular Jupiter and Raydium instructions, and the resulting transaction was signed by the user as per normal, but had their tokens and authority transferred to the malicious address. The Suspected Extension: Bull Checker Upon further investigation of several affected users who have been drained by the same program, we have identified an extension called “Bull Checker”, which has the permissions to read and change all the data on the website, as a potential cause. Raydium has confirmed that their affected user has the same extension installed. Bull Checker is supposed to be a read-only extension that allows you to view the holders of memecoins. There should be no need for an extension like this to read or write data on all websites. This should have been a major red flag for users, but apparently several users continued to install and use the extension. After installing Bull Checker, it will wait till a user interacts with a regular dApp on the official domain, before modifying the transaction sent to the wallet to sign. After modification, the simulation result will still be “normal” and not appear to be a drainer. Technical Analysis For a full technical analysis, including why the simulation check looked normal, how the drainer tx worked, and what the extension code did, please refer to the jupresearch post here: jupresear.ch/t/identificati… Targeting Memecoin Traders In addition to the above information, while researching “Bull Checker” we discovered that it was publicised by an anonymous Reddit account, “Solana_OG”. This person appeared to target users looking to trade memecoins, and lured them to download the extension. Links: reddit.com/r/solana/comme… reddit.com/r/solana/comme… Key Safety Habits While we have identified one malicious extension, there might still be other malicious extensions out there. 1. If you suspect an extension contains malware, particularly if they have both “read” and “change” permissions, uninstall it immediately. 2. Do not trust something just because someone mentioned it on Reddit or other media and it has many upvotes. Astroturfing and social engineering for the purpose of scamming are very real. 3. Extensions that request for extensive permissions are highly suspicious. An extension like Bull Checker should not need to read and modify all your website data. You should have an extremely high degree of confidence in an extension before you start using it. 4. In addition, Blowfish has released a new guard instruction feature called SafeGuard that prevents all simulation spoofing attacks. It’s currently being adopted by multiple Solana wallets and will likely be useful in prevent such future attacks. Conclusion Stay safe out there, and don’t install extensions that can read/write data unless you are really sure. Many thanks to Siji from Offside Labs, Blowfish, Raydium and Phantom for assisting in this investigation.
Jupiter tweet mediaJupiter tweet mediaJupiter tweet mediaJupiter tweet media
English
97
393
1.3K
225.3K
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
Secrets are within. Share your latest scams and it may feel rewarding.
English
0
0
1
45
Ilia
Ilia@Iliatrades·
Worst day of my crypto life - hacked/drained out of >$230k (while on vacation). NFTs (Madlads, various gone). Don't think it can't ever happen to you because it can. Hacker's address - EFcFyBgnMpqkJ5vwPjjei6vScneV5BKcqzTM6HuvLNZF Reminder to safeguard yourself.
Ilia tweet mediaIlia tweet media
English
749
128
1.6K
732.4K
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
Watching the AI Agent as it takes us through its thought process and continues to expand the investigation. The tooling is here. Soon it will be in our users hands. 2/2
SectorH (SOLD OUT) tweet media
English
0
0
2
58
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
The world is changing and Agents are coming to help combat scammers. This is a view of an investigation kicked off by an AI based agent on a social media account. In this example we are showing how it works with our main account. #infosecurity #LLMs #aiagents 1/2
SectorH (SOLD OUT) tweet media
English
3
1
4
276
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
🚀 Share your top AI and blockchain security tips using #AISecurityTip for a chance to be featured and win a prize! 🏆 Best tips will be highlighted in our upcoming posts. #SolanaSecurity
English
0
1
3
63
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
Its another SectorH Saturday #Giveaway Get your warrior on! 1. Retweet 2. Tag 2 friends Monday we will pick a winner for this warrior.
SectorH (SOLD OUT) tweet media
English
11
1
6
228
SectorH (SOLD OUT)
SectorH (SOLD OUT)@SectorHSecurity·
Its Saturday.. Send those scams to sectorh.sol
English
0
0
1
71
SectorH (SOLD OUT) retweetledi
Bernhard Mueller
Bernhard Mueller@muellerberndt·
Inferno Drainer is a widely used piece of JavaScript malware in web3 phishing campaigns. In this article, I explore some de-obfuscation and debugging techniques to help understand its functionality. link.medium.com/etjQcaxyRIb
English
11
41
164
13.1K