Latest Post

RSS feed generator to create RSS feeds from URLs Tekken 8 or Tekken Remake teased at EVO 2022


Layer 1 blockchain Near Protocol notified users of a vulnerability it discovered in June that leaked sensitive information to third parties.

The network announced the news blog post The Aug. 4 release said it was able to correct the problem the same day.

According to the post, “Nevertheless, the code change resulted in the collection of sensitive data some users had recovered using email or text messages in their wallets.”

Fortunately, blockchain security firm Hacxyk noticed the vulnerability and reported it to the team, which quickly fixed it. Additionally, Hacxyk received a bounty for the alert.

The network claims that its wallet team immediately dealt with the situation by cleaning up “all sensitive data” and identifying those who may have accessed it.

“To date, we have found no signs of compromise related to the accidental collection of this data, and we have no reason to believe that this data will persist anywhere,” it added.

The announcement comes amid a flurry of exploits and hacks that rocked the cryptocurrency space in August.

Nomad Bridge lost more than $190 million to “decentralized robbery.”

Celsius has announced that a malicious third party may have leaked user data through employees of its messaging partner Customer.io.

Additionally, thousands of Solana wallets were drained in an attack that lasted for hours, costing more than $5 million.

Since the speed of exploits is almost astonishing, Near Protocol also shares its experience and reminds users so that they can be extra careful and take all necessary steps to prevent exploits.

Therefore, it requires users who use SMS or email for account recovery to rotate their keys to be more secure. They can do this at wallet.near.org.

At the same time, the network said it will no longer allow users to recover using text messages or emails when creating an account.

It also recommends users to opt for a cold wallet like Ledger that offers higher security. Additionally, users should not reveal their private or recovery keys.

What do you think about this topic? Write to tell us!

Disclaimer

All information contained on our website is published in good faith and for general information purposes only. Any action that readers take with respect to the information on our site is entirely at their own risk.





Source link

Leave a Reply

Your email address will not be published.