Connect with us
DAPA Banner

Crypto World

Ethereum Foundation Launches Audit Subsidy Program for Builders

Published

on

Ethereum Foundation Launches Audit Subsidy Program for Builders

The Ethereum Foundation announced a joint initiative with audit providers to subsidize security audit costs for Ethereum builders.

The Ethereum Foundation announced an audit subsidy program on Tuesday designed to reduce the cost of security audits for Ethereum builders. The joint initiative with audit providers aims to make security audits more accessible to projects within the ecosystem while strengthening overall security standards.

Security audits are considered a best practice in the Ethereum ecosystem but remain expensive, creating a barrier for many builders. The subsidy program directly addresses this friction point by making professional security reviews more affordable for developers building on Ethereum.

Sources: Ethereum Foundation

Advertisement

This article was generated automatically by The Defiant’s AI news system from publicly available sources.

Source link

Continue Reading
Click to comment

You must be logged in to post a comment Login

Leave a Reply

Crypto World

Tether Introduces Multichain Self-Custodial Wallet

Published

on

Tether Introduces Multichain Self-Custodial Wallet

Self-custodial wallet tether.wallet supports Bitcoin, USDT, USAT and XAUT across multiple blockchains at launch.

Tether today unveiled its self-custodial crypto wallet using the open-source Wallet Development Kit (WDK) developed by the firm. According to an announcement from the firm, tether.wallet supports USDT, USAT, Bitcoin and XAUT, what the firm says represent “the only assets that truly matter for most of the people.”

Tether says the initiative, which it’s dubbing “the People’s Wallet” aligns with its mission to promote financial inclusion globally, particularly in developing countries and regions with high inflation.

Tether CEO Paolo Ardoino was quoted in the announcement on the firm’s aim of preserving self-custody, without compromising on user experience:

Advertisement

“The objective is to remove the complexity that has prevented broader adoption while preserving the properties that make the digital assets technology valuable. Users should be able to send value as easily as sending a message, without relying on intermediaries and without giving up control of their assets.”

As an example, the firm’s announcement notes that the wallet lets users pay fees in the asset being transferred, instead of needing to acquire or hold separate tokens for gas. The wallet also supports easily readable addresses for sending and receiving that look more like an email address, instead of the typical alphanumeric string.

Tether says at launch, the wallet supports USDT and XAUT on Ethereum, Polygon, Plasma, and Arbitrum, and USAT on Ethereum. It also supports Bitcoin both natively and via the Lightning Network. The firm plans to add support for “several other blockchains” in the future.

Last month, Tether announced that it had engaged a Big Four firm to conduct its first ever “full independent financial statement audit.”

This article was written with the assistance of AI workflows. All our stories are curated, edited and fact-checked by a human.

Advertisement

Source link

Continue Reading

Crypto World

North Korea Used AI to Hack Zerion in Second Crypto Attack

Published

on

North Korea Used AI to Hack Zerion in Second Crypto Attack

Crypto wallet Zerion revealed that North Korean-affiliated hackers used AI in a long-term social engineering attack to steal about $100,000 from the company’s hot wallets last week. 

The Zerion team released a post-mortem on Wednesday, where it confirmed that no user funds, Zerion apps or infrastructure were affected and that it had proactively disabled the web app as a precaution. 

While the amount was relatively small in crypto hacking terms, it is another incident of a crypto worker being targeted for an “AI-enabled social engineering attack linked to a DPRK threat actor,” Zerion said.

It is the second attack of this nature this month, following the $280 million exploit of the Drift Protocol, which was the victim of a “structured intelligence operation” by DPRK-affiliated hackers. The human layer, not smart contract bugs, has now become North Korea’s primary point of entry into crypto firms.  

Advertisement

AI is changing the way cyber threats work

Zerion said the attacker gained access to some team members’ logged-in sessions and credentials, as well as private keys to company hot wallets. 

“This incident showed that AI is changing the way cyber threats work,” the company said. 

It confirmed that the attack was similar to those that had been investigated by the Security Alliance (SEAL) last week.

Related: Researchers discover malicious AI agent routers that can steal crypto

Advertisement

SEAL reported that it had tracked and blocked 164 domains linked to the DPRK group UNC1069 in a two-month window from February to April.

It stated that the group operates “multiweek, low-pressure social engineering campaigns” across Telegram, LinkedIn and Slack. Malicious actors impersonate known contacts or credible brands or leverage access to previously compromised company and individual accounts.

“UNC1069’s social engineering methodology is defined by patience, precision, and the deliberate weaponization of existing trust relationships.”

Google’s cybersecurity unit Mandiant detailed in February the group’s use of fake Zoom meetings and a “known use of AI tools by the threat actor for editing images or videos during the social engineering stage.”

DPRK’s social engineering is evolving

Earlier this month, MetaMask developer and security researcher Taylor Monahan said North Korean IT workers have been embedding themselves in crypto companies and decentralized finance projects for at least seven years.

Advertisement

“The evolution of the DPRK’s social engineering techniques, combined with the increasing availability of AI to refine and perfect these methods, means the threat extends well beyond exchanges,” blockchain security firm Elliptic said in a blog post earlier this year. 

“Individual developers, project contributors, and anyone with access to cryptoasset infrastructure is a potential target.”

There are two types of DPRK attack vectors, one more sophisticated than the other. Source: ZachXBT

Magazine: How AI just dramatically sped up the quantum risk for Bitcoin