• English
  • 简体中文
  • 繁體中文
  • Tiếng Việt
  • ไทย
  • Indonesia
Subscribe
Real-time News
On May 10th, Canadian Prime Minister Mark Carney stated at a political conference in Toronto on Saturday that Canada is willing to establish closer trade ties with the United States and Mexico in specific industries to boost the North American economy. He mentioned the "North American Fortress" initiative but did not specify any particular sectors. Carney indicated that if this approach fails, Canada will invest heavily in new markets and new products. The United States, Mexico, and Canada are scheduled to begin reviewing a trade agreement this year. Trump has already imposed tariffs on products such as automobiles and steel, disrupting the closely intertwined supply chains among the three countries. Carney had previously set a goal of doubling exports to countries outside the United States within ten years.The Bahraini Foreign Minister demanded that Iran cease its aggressive and provocative actions against Bahrain and other countries in the region, as well as its egregious interference in their internal affairs.Bahrains Foreign Minister: Bahrain condemns and strongly condemns Irans continued interference in its internal affairs and its actions that threaten the security and stability of the Gulf states.Commander of the Aerospace Force of the Iranian Islamic Revolutionary Guard Corps: The Aerospace Forces missiles and drones have locked onto the enemy, and we are awaiting the order to launch.On May 10th, local time, the final vote count for the 136th Local Council of England was released, completing the election results for the English Local Council, as well as the Scottish and Welsh Parliaments. In this election, both of Britains traditional two major parties, the Labour Party and the Conservative Party, suffered significant setbacks, while the Reform Party, the Green Party, and other parties saw a marked increase in strength, further highlighting the trend of "fragmentation" in British politics. Data shows that in the English Local Council elections, the Reform Party won 1453 seats, becoming one of the biggest winners; the Labour Party won 1063 seats; and the Conservative Party won 801 seats. Analysts believe that this British local election demonstrates that the traditional two-party (Labour and Conservative) dominance in Britain is being significantly challenged. British politics is further developing towards multi-party competition and political fragmentation.

$1.2 Billion Lost From Hacks on DeFi Platforms: Immunefi

Cameron Murphy

Apr 06, 2022 11:01


微信截图_20220406105327.png


In the first quarter of this year, DeFi hacking cost the company $1.2 billion.

New, poorly constructed DeFi Dapps are also blamed for these attacks.


The total value of DeFi protocols equals 10.6% of the total crypto market cap.


Decentralized Finance use rose in 2021 and 2022. But hackers and exploiters have taken more money this year than ever before from these dapps.

Affluent DeFi Hackers

According to Immunefi, the DeFi crypto market lost $1.22 billion in the first three months of 2022.


Last year, all DeFi hacks combined only cost the market $154 million. That's a 692 percent increase in money lost.


However, the Ronin hack last week is accountable for over half of the $1.22 billion damages.


The exploiter managed to steal private keys to authorise fraudulent transactions.


But, according to Immunefi CEO and Founder Mitchell Amador, this is just the start of things becoming worse. 


“We may expect more [advanced] attacks as more criminal groups develop DeFi-hacking expertise in-house. Also, as DeFi grows, these attacks become more lucrative.”

The Last Three Months' Hacks

The Wormhole attack, which resulted in a $320 million heist after 120k coins were stolen from the site, was the second most major hack this quarter.


Another important attack was the Qubit Finance protocol exploit, when $80 million was stolen by abusing the smart contract that created xETH, which the hacker used as collateral.


This shows that no matter how safe or thorough a protocol is developed, hackers will always look for a single flaw that may be exploited.