

Bybit hackers use Pump.fun to send Meme coins to clean! Currently, it still holds more than 460,000 ETH stolen money
The hacking incident of Bybit exchange continued to ferment, and the attackers' money laundering methods attracted widespread attention from the cryptocurrency community. According to Solscan data, hackers are suspected of issuing Meme coins through the pump.fun platform to launder money, issuing Meme coins named "QinShihuang". The transaction volume has exceeded US$26 million, the market value has reached US$2.2 million, but the liquidity is only US$200,000.
Bybit hacker used Pump.fun to issue Meme coins to launder money, and still held huge amounts of ETH
Analysis shows that the hacker transferred about 60 SOL to a specific address and then issued the "QinShihuang" Meme coins. The pump.fun platform has removed Meme coins that may be related to Lazarus Group, but this move reveals that the platform is questionable in its decentralization, and its control over listed assets is contrary to the propaganda decentralization concept. How to balance the victim's need to recover assets with the principle of decentralization of platforms is an issue that needs to be discussed in depth in the future of the cryptocurrency industry.
Bybit hacker funds flow and cross-chain money laundering tracking
BeosinTrace tracking shows that since February 23, hackers have transferred huge amounts of funds (11,693.48 ETH, about US$160 million) to 115 addresses, and cross-chain transfers through decentralized exchanges such as Okx Dex and Thorchain, trying to disperse funds and increase the difficulty of tracking. The specific flow is as follows:
- Okx Dex.AggregationRouter: 6,624.25 ETH
- Thorchain: Router: 7,662.8 ETH
- Exch Exchange: 3,570.62 ETH
- Okx Dex.Xbridge: 2,541.56 ETH
Hackers still control huge amounts of ETH
On-chain analyst data shows that hackers have converted about 37,900 ETH (valued over US$106 million) into other assets, including Bitcoin, etc. through platforms such as Chainflip, THORChain, and LiFi. But it still holds about 461,491 ETH (worth approximately US$1.29 billion), and stole a total of about 499,395 ETH (worth approximately US$1.4 billion).
The above is the detailed content of Bybit hackers use Pump.fun to send Meme coins to clean! Currently, it still holds more than 460,000 ETH stolen money. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics



Creating an Oracle database is not easy, you need to understand the underlying mechanism. 1. You need to understand the concepts of database and Oracle DBMS; 2. Master the core concepts such as SID, CDB (container database), PDB (pluggable database); 3. Use SQL*Plus to create CDB, and then create PDB, you need to specify parameters such as size, number of data files, and paths; 4. Advanced applications need to adjust the character set, memory and other parameters, and perform performance tuning; 5. Pay attention to disk space, permissions and parameter settings, and continuously monitor and optimize database performance. Only by mastering it skillfully requires continuous practice can you truly understand the creation and management of Oracle databases.

To create an Oracle database, the common method is to use the dbca graphical tool. The steps are as follows: 1. Use the dbca tool to set the dbName to specify the database name; 2. Set sysPassword and systemPassword to strong passwords; 3. Set characterSet and nationalCharacterSet to AL32UTF8; 4. Set memorySize and tablespaceSize to adjust according to actual needs; 5. Specify the logFile path. Advanced methods are created manually using SQL commands, but are more complex and prone to errors. Pay attention to password strength, character set selection, tablespace size and memory

The core of Oracle SQL statements is SELECT, INSERT, UPDATE and DELETE, as well as the flexible application of various clauses. It is crucial to understand the execution mechanism behind the statement, such as index optimization. Advanced usages include subqueries, connection queries, analysis functions, and PL/SQL. Common errors include syntax errors, performance issues, and data consistency issues. Performance optimization best practices involve using appropriate indexes, avoiding SELECT *, optimizing WHERE clauses, and using bound variables. Mastering Oracle SQL requires practice, including code writing, debugging, thinking and understanding the underlying mechanisms.

Field operation guide in MySQL: Add, modify, and delete fields. Add field: ALTER TABLE table_name ADD column_name data_type [NOT NULL] [DEFAULT default_value] [PRIMARY KEY] [AUTO_INCREMENT] Modify field: ALTER TABLE table_name MODIFY column_name data_type [NOT NULL] [DEFAULT default_value] [PRIMARY KEY]

Nested queries are a way to include another query in one query. They are mainly used to retrieve data that meets complex conditions, associate multiple tables, and calculate summary values or statistical information. Examples include finding employees above average wages, finding orders for a specific category, and calculating the total order volume for each product. When writing nested queries, you need to follow: write subqueries, write their results to outer queries (referenced with alias or AS clauses), and optimize query performance (using indexes).

The integrity constraints of Oracle databases can ensure data accuracy, including: NOT NULL: null values are prohibited; UNIQUE: guarantee uniqueness, allowing a single NULL value; PRIMARY KEY: primary key constraint, strengthen UNIQUE, and prohibit NULL values; FOREIGN KEY: maintain relationships between tables, foreign keys refer to primary table primary keys; CHECK: limit column values according to conditions.

Oracle is the world's largest database management system (DBMS) software company. Its main products include the following functions: relational database management system (Oracle database) development tools (Oracle APEX, Oracle Visual Builder) middleware (Oracle WebLogic Server, Oracle SOA Suite) cloud service (Oracle Cloud Infrastructure) analysis and business intelligence (Oracle Analytics Cloud, Oracle Essbase) blockchain (Oracle Blockchain Pla

Tomcat logs are the key to diagnosing memory leak problems. By analyzing Tomcat logs, you can gain insight into memory usage and garbage collection (GC) behavior, effectively locate and resolve memory leaks. Here is how to troubleshoot memory leaks using Tomcat logs: 1. GC log analysis First, enable detailed GC logging. Add the following JVM options to the Tomcat startup parameters: -XX: PrintGCDetails-XX: PrintGCDateStamps-Xloggc:gc.log These parameters will generate a detailed GC log (gc.log), including information such as GC type, recycling object size and time. Analysis gc.log