GetChain News
中简 中繁 EN
GetChain News
Toggle sidebar

Security/Hacker

News linked to this event type.

Adam Back Advocates Optional Quantum-Resistant Upgrades, Diverging from BIP-361’s Mandatory Freeze Proposal

According to Decrypt, Blockstream CEO Adam Back stated at Paris Blockchain Week that he supports advancing Bitcoin’s quantum resistance upgrade on an opt-in basis, opposing proposals to forcibly freeze quantum-vulnerable addresses. He emphasized that “preparation well in advance is far safer than scrambling to respond during a crisis,” and noted that the Bitcoin community possesses strong coordination capabilities to rapidly address critical vulnerabilities. Previously, developer Jameson Lopp and five others proposed BIP-361 (“Post-Quantum Migration and Legacy Signature Sunset”), which advocates phasing out quantum-vulnerable addresses over five years and ultimately freezing coins held in unmigrated addresses—including approximately 1.7 million bitcoins held by Satoshi Nakamoto.

French Minister: New Measures to Address Frequent Crypto-Related Kidnappings

According to Cointelegraph, Jean-Didier Berger, representative of France’s Minister of the Interior, stated at Paris Blockchain Week that France is preparing new measures to protect cryptocurrency holders. He revealed that authorities have launched a preventive platform, which has already attracted thousands of registrants, and are jointly developing a more robust response plan with Interior Minister Laurent Nuñez—expected to be implemented within the coming weeks. Against this backdrop, 41 crypto-related kidnappings have occurred in France in 2026—averaging one every 2.5 days. Globally, such “wrench attacks” rose 75% year-on-year in 2025, with France being the most severely affected country worldwide, accounting for approximately 40% of all such incidents in Europe.

Adam Back advocates for Bitcoin to promptly advance optional post-quantum upgrades and opposes pre-emptively freezing vulnerable addresses.

According to CoinDesk, Adam Back, CEO of Blockstream, stated at Paris Blockchain Week that Bitcoin developers should move forward early with optional post-quantum upgrades—even though practical quantum computers remain far from realization. He noted that Taproot’s flexible design supports integrating new post-quantum signature schemes without affecting existing users. Previously, Jameson Lopp and others proposed BIP-361, aiming to phase out quantum-vulnerable addresses over five years and freeze bitcoins in addresses that fail to complete the migration. Adam Back believes the Bitcoin community can rapidly coordinate a response in an emergency—without needing to predefine freezing arrangements.

Fed Chair Nominee Warsh May Struggle to Secure Congressional Approval by May 15

Odaily News U.S. President Trump and Federal Reserve Chair Powell are set to face off over a key question: whether the incumbent Powell has the right to remain in his position if Trump fails to secure timely confirmation for his chosen successor, Kevin Warsh. Warsh is scheduled to appear before the Senate Banking Committee hearing next Tuesday, but he may struggle to obtain congressional approval before Powell's term as Chair expires on May 15.Trump stated on Wednesday that he would fire Powell if the Fed Chair does not step down "on time," and the likelihood of a direct confrontation between Trump and Powell will increase if Warsh cannot be confirmed soon. This controversy arises as Trump has repeatedly criticized Powell for not yielding to his demands for interest rate cuts, calling the Fed Chair an "idiot" and a "stubborn mule" for refusing to lower borrowing costs.Analysts suggest that as the possibility of Powell remaining as a Fed Governor rises following Trump's latest attack, Trump's strategy could potentially undermine Warsh's efforts to reshape the central bank. (Financial Times)

BitMEX Research Proposes Bitcoin “Canary Fund” Scheme

BitMEX Research published an article proposing an alternative soft fork to BIP-361, suggesting that dormant bitcoins vulnerable to quantum attacks be frozen only upon confirmed existence of a quantum computer capable of stealing bitcoins. The proposal introduces a “canary fund” mechanism: a special bitcoin address whose private key is unknown but theoretically crackable by a sufficiently powerful quantum computer; users may donate BTC to this address as a bounty. If funds are spent from this address, it signals confirmed quantum threat and automatically triggers the freezing mechanism. BitMEX Research states that this proposal serves as a less contentious alternative to the more controversial BIP-361.

CoW Swap Announces Attack Incident: Domain Subject to Social Engineering Attack; Control of cow.fi Domain Has Been Regained

CoW Swap announced on X that it has regained control of the cow.fi domain and has been operating normally on cow.finance for some time, with a gradual transition back to the original domain now underway. The official statement explained that on April 14, attackers deceived the DNS registrar with forged documents to seize control of the cow.fi domain. They then deployed a highly realistic phishing site in two stages: first, luring users into signing malicious transactions via a wallet drainer; second, stealing seed phrases and passwords through fake wallet pop-ups. This attack targeted the domain registrar—not CoW Swap’s own infrastructure or private key security. Affected users should revoke all approvals using tools such as Revoke.cash and consider transferring funds to a new wallet.

Anthropic Restricts Mythos Model Release, Citing National Security Risks

Odaily News Anthropic has decided to restrict the public release of its Mythos model due to its highly automated cyber attack capabilities. Reports indicate that during internal testing, the model was already capable of independently completing vulnerability discovery and exploitation processes, and generating multi-step attack plans.Informed sources stated that in early testing, Mythos could autonomously build intrusion tools targeting Linux systems and, with guidance, execute complex vulnerability chain attacks. These capabilities were assessed as potentially posing risks to global infrastructure.Anthropic's management ultimately positioned Mythos as a cyber defense tool and opened it for testing to select institutions in a restricted manner. Industry insiders pointed out that similar models could significantly enhance the efficiency of cyber offense and defense, while also potentially introducing new security challenges. (Bloomberg)

Bitcoin Core Developer: Would Rather Freeze 5.6 Million BTC Than Let Them Fall into the Hands of Quantum Hackers

Odaily News Bitcoin Core developer Jameson Lopp stated that compared to potential future quantum computing attacks, he would prefer to "freeze" approximately 5.6 million long-dormant BTC from the network rather than letting them be acquired by attackers. These bitcoins have not moved for over 10 years and may be permanently lost, valued at around $420 billion at current prices. If future breakthroughs in quantum computing lead to the private keys of old addresses being cracked, these assets could be transferred again, potentially triggering severe market volatility or even a crisis of confidence. Although the community recently proposed BIP-361, the proposal is still in its early stages and is not a formally promoted solution, but rather more like a contingency plan for an "extreme risk." (CoinDesk)

OpenClaw Maintainer Responds to Negative Controversy: Upholding Neutral Open Source, Not for Profit or Pumping

Odaily News Open source AI agent project OpenClaw maintainer Onur Solmaz publicly posted a strong response to various external negative controversies. He stated that the project has been continuously subjected to public opinion attacks, with the core reason being that OpenClaw adheres to a neutral public welfare nature, does not participate in token pumping, does not pursue commercial profits, differentiating itself from profit-driven AI agent products in the industry.The project maintains neutrality in both industry and geopolitics. It is precisely because its own development has touched upon the interests of peers that it has been deliberately smeared. Meanwhile, the official team refuted various accusations one by one, including being bloated, lacking security, and being acquired by OpenAI. They also introduced facts such as architectural optimization, rapid vulnerability fixes, and the team's unpaid open-source operation and maintenance. The project is defined as the people's AI, calling on the community to jointly build an open-source AI ecosystem.

eToro Announces Acquisition of Self-Custody Wallet Zengo to Accelerate Expansion into On-Chain Financial Ecosystem

According to GlobeNewswire, eToro, a trading and investment platform, announced it has signed an agreement to acquire Zengo, a leading self-custodial crypto wallet provider. This acquisition aims to deepen eToro’s digital asset capabilities and accelerate its strategic initiative to bridge traditional finance with on-chain infrastructure. Founded in 2018, Zengo builds its keyless wallet architecture on Multi-Party Computation (MPC) cryptographic technology. It currently serves over 2 million users across more than 180 countries and regions, and has never experienced a wallet breach since its inception. Following the acquisition, eToro will leverage Zengo’s technological expertise to further support decentralized trading use cases—including tokenized assets, prediction markets, and perpetual contracts. The transaction is subject to customary closing conditions.

Bridged Polkadot Vulnerability Attacker Transfers $269,000 in Stolen Funds to Tornado Cash

According to on-chain analytics platform Arkham (@arkham), the attacker who exploited the Bridged Polkadot vulnerability has transferred all stolen funds to Tornado Cash, amounting to approximately $269,000.

Hackers Spread PHANTOMPULSE Trojan via Obsidian Plugin

According to Elastic Security Labs, threat actors impersonated venture capital firms and lured targets into opening malicious Obsidian note vaults via LinkedIn and Telegram. This attack leveraged Obsidian’s Shell Commands plugin to execute malicious payloads without exploiting any vulnerabilities when victims opened the note vaults. The PHANTOMPULSE malware discovered in this campaign is a previously undocumented Windows Remote Access Trojan (RAT) that uses Ethereum transaction data to achieve blockchain-based C2 communication. The macOS payload employs an obfuscated AppleScript dropper and uses a Telegram channel as a fallback C2. Elastic Defend detected and blocked the PHANTOMPULSE execution before it could run.

North Korean hackers use AI technology to conduct social engineering attacks against Zerion hot wallets

Zerion disclosed that some of its corporate hot wallets were recently targeted by an AI-driven social engineering attack linked to North Korean hackers, resulting in losses of approximately $100,000. Zerion stated that user funds, applications, and infrastructure remain unaffected and proactively disabled its web application to mitigate risk. This incident marks the second such attack this month, following the $280 million breach of Drift Protocol, underscoring how North Korean hackers are leveraging AI to refine social engineering tactics—primarily targeting employees and developers at crypto firms. The Security Alliance (SEAL) tracked the hacker group UNC1069, which conducts low-pressure, multi-week social engineering campaigns across platforms including Telegram, LinkedIn, and Slack, using AI tools to edit images and videos to enhance attack efficiency.

Bitcoin Developers Propose BIP-361 to Counter Future Potential Quantum Attack Risks

Odaily News Bitcoin contributor Jameson Loop and other cryptographers have proposed an initiative that could force Bitcoin holders to migrate their tokens to new quantum-resistant addresses, otherwise their tokens would be permanently frozen by the network itself. In this scenario, holders would technically still "own" the coins but would lose the ability to transfer them. This is known as Bitcoin Improvement Proposal BIP-361, which was updated in Bitcoin's official proposal repository on Tuesday under the title "Post-Quantum Migration and Legacy Signature Deprecation".BIP-361 builds upon the BIP-360 proposal introduced in February. BIP-360 introduced a soft fork (a network upgrade) designed to enable a new transaction type called "Pay-to-Merkle-Root" (P2MR). This method draws from Bitcoin's Taproot (P2TR) framework but removes the key-based spending path, thereby eliminating an element widely considered to be at risk in the quantum era.The BIP-361 proposal divides the migration into three phases. Phase A begins three years after activation, prohibiting anyone from sending new Bitcoin to legacy, quantum-vulnerable addresses. You can still spend from these addresses but cannot receive any coins.Phase B begins five years after activation, rendering legacy signatures (ECDSA and Schnorr) completely invalid. The network will reject any attempts to spend coins from quantum-vulnerable wallets. Essentially, your coins will be frozen.Finally, there is Phase C, a still-under-research rescue plan: holders of frozen wallets may be able to prove ownership via zero-knowledge proofs (a method of proving knowledge of a secret without revealing the secret itself). If successful, coins frozen in Phase B could be recovered. (CoinDesk)

Bitcoin proposal BIP-361 sparks community controversy by suggesting freezing quantum-vulnerable addresses

According to Cointelegraph, Cypherpunk Jameson Lopp and several other Bitcoin quantum-security experts have proposed Bitcoin Improvement Proposal BIP-361, recommending the freezing of quantum-vulnerable addresses—including the Satoshi Nakamoto reserve—to prevent future quantum computers from stealing approximately 1.7 million bitcoins. The proposal proceeds in three phases: first, prohibiting transfers to legacy addresses; second, invalidating legacy signatures and freezing unmigrated assets after five years; and third, enabling partial users to recover frozen funds via zero-knowledge proof mechanisms. The proposal aims to drive the entire network’s migration to quantum-resistant addresses, but has drawn opposition from some community members who argue it violates Bitcoin’s decentralization principles and carries authoritarian and confiscatory characteristics.

CoWSwap frontend access restored; official reminder to verify approved contract addresses

Felix Leupold, Technical Lead of CoWSwap, posted an update on X stating that the CoWSwap frontend has been restored and users can now access it at swap.cow.finance. The official notice reminds users to authorize only the address 0xc92e8bdf79f0507f65a392b0ab4667716bfe0110 (i.e., the original GPv2VaultRelayer contract). Earlier, Blockaid reported that its system had detected an attack on the frontend of the decentralized exchange CowSwap; CoW Swap subsequently issued an announcement confirming a frontend outage and advising users not to transact on the platform temporarily.

Aave: CowSwap Frontend Attack Incident Has Not Affected Aave Interface or Underlying Protocol Security

Odaily News Aave posted on the X platform stating that it has taken note of the attack on the CowSwap frontend, but this incident has not affected the security of the Aave interface or the underlying protocol. As a precautionary measure, the CowSwap team has temporarily disabled the swap endpoints for integrators. Within the Aave interface, transactions have been switched to the ParaSwap routing where available to ensure continuity of user transactions.

Cowswap Frontend Attacked—Do Not Interact

According to official reports, the Blockaid system has detected a front-end attack targeting Cowswap, and the website COW[.]FI has been flagged as malicious. If your wallet is connected, immediately revoke permissions and avoid any interaction with this DApp.

In Q1 2026, Web3 projects lost over $460 million due to hacking and scams, with phishing attacks dominating.

According to Cointelegraph, Hacken, a blockchain security firm, released its Q1 2026 report revealing that Web3 projects suffered $464.5 million in losses due to hacking and scams during the quarter. Phishing and social engineering attacks accounted for $306 million—making them the primary source of losses. A hardware wallet scam in January alone caused $282 million in losses, representing 81% of the quarter’s total losses. Smart contract vulnerabilities led to $86.2 million in losses, while failures in access control—including compromised private keys and cloud services—resulted in $71.9 million in losses. The report notes that the largest security incidents predominantly occurred in off-chain operations and infrastructure layers—areas typically beyond the scope of traditional audits. Europe’s regulatory frameworks, MiCA and DORA, are increasingly imposing stricter requirements on security monitoring and incident response, and global regulators are also raising standards for real-time monitoring and emergency response.

Kraken Extorted by Criminal Group; Refuses to Comply and Cooperates with Law Enforcement Investigation

According to CoinDesk, cryptocurrency exchange Kraken was extorted by a criminal group that threatened to publicly release videos of its internal systems. Kraken stated that it had previously identified and addressed two incidents involving unauthorized access by internal personnel, affecting limited customer data from approximately 2,000 accounts—0.02% of its total user base—but emphasized that its systems were never breached and customer funds remained secure at all times. Nick Percoco, Kraken’s Chief Security Officer, explicitly affirmed the company would not capitulate to criminals. Kraken has notified affected users, enhanced security controls, and is cooperating with law enforcement authorities to advance the investigation; it believes existing evidence is sufficient to identify and apprehend those responsible. Separately, Galaxy Digital recently experienced a similar cybersecurity incident, though it likewise resulted in no loss of customer funds or data.