EIDOS mining attack analysis: Developers launching CPU payment tools should self-check potential security risks

EIDOS mining attack analysis: Developers launching CPU payment tools should self-check potential security risks

Last night between 19:04 and 23:29, PeckShield risk control platform DAppShield detected that hackers launched continuous attacks on the EOS guessing game BigGame, using its newly launched CPU payment function to conduct malicious mining, causing its CPU resources to be exhausted, and a total of 1,993 EIDOS tokens were obtained.

PeckShield security personnel analyzed and found that BigGame's newly launched CPU payment function has a defect that can hijack the transfer notification to initiate inline operations, making its CPU maliciously controlled. With the continued popularity of EIDOS, many digital wallets or DApps have successively developed one-click mining functions to help users automatically implement transfer operations through intelligent programs. However, once there is a potential security risk, this auxiliary tool will become an accomplice of the attacker, causing damage to the ordinary user experience. PeckShield hereby reminds developers that if the CPU payment function has been launched, they should self-check potential security risks to avoid damage to the ordinary user experience due to malicious attacks. If necessary, they can seek assistance from third-party security companies to help them complete attack testing and basic security defense deployment before the launch of new functions.

<<:  This article compares the characteristics of Facebook Libra and the central bank's DC/EP mechanism

>>:  Major policy adjustment! The National Development and Reform Commission removed "virtual currency mining" from the "eliminate industries" list

Recommend

What does the "川" pattern on the palm mean?

There are "川"-shaped lines not only on ...

Blockchain originated from Bitcoin, but it cannot stop at Bitcoin

The bigwigs of the financial world are throwing m...

What are the characteristics of a poor woman?

The thing people fear most in their life is pover...

Douyu Live, Antbox Mobile Mine Live Show

Long press to scan the code or click "Read o...

Even during the Chinese New Year, I don't visit people.

Generally speaking, visiting each other frequentl...

What are the characteristics of a person who can save money?

Ability to save money 1. People with large forehe...

Face reading diagram Shan Gen Shan Gen physiognomy

Face reading diagram of Shan Gen, Shan Gen physio...

The initiator of the Spanish pyramid scheme has been arrested

The founder of pyramid scheme 'unete' has...

How to tell a man's fortune

Whether a man has a blessed appearance or not, in...

Long nose facial features

The appearance of the nose is often closely relate...

The facial features of those who never go out at night

Some people have a rich nightlife and basically d...