
慢雾科技
1543Followers28Articles
The whole story of the collapse of the Xinkangjia DGCX scam: Where did the 13 billion yuan of funds go?
On-chain behavior shows that the project may have built a complex multi-level funding structure, with funds flowing in from a centralized entrance and then flowing out after multiple transfers, initially possessing the on-chain operation characteristics common to Ponzi schemes.
慢雾科技2025-07-13 06:53
As the value of crypto assets continues to rise, wrench attacks against crypto users are becoming more frequent. This article will analyze this type of attack method in depth, review typical cases, sort out the criminal chain behind it, and put forward practical prevention and response suggestions.
慢雾科技2025-07-08 05:00
UNODC releases fraud report in Southeast Asia: Cryptocurrency becomes a tool for crime, and all parties need to strengthen international cooperation
This article will analyze the following four dimensions: Southeast Asia’s criminal ecosystem, global expansion beyond Southeast Asia, emerging illegal network markets and money laundering services, and transnational criminal networks and global law enforcement collaboration.
慢雾科技2025-05-08 11:00
Another risk incident with Google plug-ins: SwitchyOmega was exposed to steal private keys. How to prevent plug-ins from being tampered with?
This article will analyze the situation of SwitchyOmega plug-in tampering and explore how to prevent plug-in tampering and deal with malicious plug-ins.
慢雾科技2025-03-13 08:00
On-chain analysis shows that the attacker obtained multi-signature permissions through sophisticated social engineering attacks, implanted malicious logic using the delegatecall function of the Safe contract, and ultimately bypassed the multi-signature verification mechanism to transfer funds to an anonymous address.
慢雾科技2025-02-27 05:00
