Dilation Effect 膨胀效应
231 posts

Dilation Effect 膨胀效应
@dilationeffect
We are a group of Web3 security enthusiasts from around the world. Share neutral viewpoints of security. 膨胀效应安全社区,专注于分享客观中立的 Web3 安全观点。

We triggered WhatsApp 0-click on iOS/macOS/iPadOS. CVE-2025-55177 arises from missing validation that the [Redacted] message originates from a linked device, enabling specially crafted DNG parsing that triggers CVE-2025-43300. Analysis of Samsung CVE-2025-21043 is also ongoing.

UPDATE 13/09/25 What we know so far about the recent incident 👇 How the exploit was executed: • The attacker used funds from the bridge hack in the same block as the attack to acquire 4.6M BONE to temporarily gain validator voting power, attempting to do it in one transaction like a flash transaction • With this, they were able to sign a malicious state on Shibarium. • The flash loan-like transaction was repaid using assets drained from the bridge: 224.57 ETH & 92.6B SHIB. • Importantly, because the BONE remains delegated to validators, it is currently locked and cannot be withdrawn. Validator compromise: • Evidence indicates 10 of 12 validators’ signing keys were compromised. • Only @K9finance and @UnificationUND validators refused to sign the malicious state. • Without the flash loan, ($1m BONE bought and delegated in 1 transaction using the hacked funds) the attacker would not have achieved the required 2/3 majority. Assets affected: • Bridge assets: 224.57 ETH & 92.6B SHIB. • The attacker attempted to sell ~$700K in KNINE but all attempts failed after @K9finance DAO multisig blacklisted their address. • Additional tokens impacted (LEASH, ROAR, TREAT, BAD, SHIFU) have not been moved or sold at this time. Immediate actions taken: • Paused stake/unstake functions to protect community assets. • Transferred stake manager funds from proxy contracts to a secure 6/9 hardware multisig. • Partnered with Hexens, Seal911, and PeckShield for a full forensic investigation. Next steps: • Secure validator key transfers and confirm full chain integrity. • Restore stake manager funds once security is assured. • Continue coordinating with partners to freeze attacker-linked funds • Publish a full incident report once investigations conclude. Our commitment: The #ShibArmy deserves clarity and accountability. This is a fast-moving investigation, and we are working around the clock with leading security partners. Please bear with us — verified updates will be shared as soon as possible. Attacker address: etherscan.io/address/0x999e…

如何安全的参加线上会议、使用网络会议软件 使用各类会议软件来召开线上会议是Web3行业非常高频的活动,但近期通过线上会议来钓鱼的攻击越来越频繁,攻击方式也出现了很多创新。Dilation Effect总结了几点注意事项供大家参考,都是非常精简的干货:


Cyber criminals bribed and recruited rogue overseas support agents to pull personal data on <1% of Coinbase MTUs. No passwords, private keys, or funds were exposed. Prime accounts are untouched. We will reimburse impacted customers. More here: coinbase.com/blog/protectin…
