Hackers Strike Suddenly Unibot Hacked, Highlighting Security Risks of Telegram Bots
Unibot Hacked by Hackers, Exposing Security Vulnerabilities in Telegram BotsOn October 31st, according to Beosin’s EagleEye security risk monitoring and detection platform, the previously popular Unibot was suddenly attacked by hackers and caused a stir in the market.
EagleEye attack-related address: https://eagleeye.sLianGuaice/address/0x413e4Fb75c300B92fEc12D7c44e4c0b4FAAB4d04
Hackers showed no mercy and continued with their attacks and transferred stolen assets even after the attack was exposed. This attack caused the related tokens to drop to approximately 33.02 USDT, with a 24-hour drop of over 35%.
Unibot, what is it? In a previous article, we introduced UNIBOT – How to prevent phishing and scams related to Telegram bots?
- ChatGPT can now help fix bicycles by looking at pictures.
- Bittrex Bankruptcy US Crypto Exchange to Exit Market with Court Approval
- Hacked and Crashed Unibot, the Telegram-Based Crypto Trading Bot, Suffers 40% Token Dive
In simple terms, Unibot is a Telegram trading bot that allows users to interact with the bot to monitor liquidity pools, trade tokens, and replicate other people’s trades.
In August, the market value of $UNIBOT skyrocketed from $30 million to over $100 million, attracting market attention. However, security issues remained overlooked.
For example, in today’s security incident, Beosin’s security team discovered that the root cause of the attack on Unibot was CAll injection, resulting in a loss of $640,000.
Beosin also reminds users to revoke authorization on Revoke to avoid further financial losses. Link: https://revoke.cash/
Beosin Trace traced the stolen funds and found that the hacker has transferred the stolen funds to the mixer platform Tornado Cash for money laundering.
The security risks of Telegram bots being hacked:
1. Centralization:
The risks of Telegram bots are similar to those of centralized exchanges. If users want to use Telegram bots, they need to import their private keys into these bots. During this process, other software may read the user’s private keys from the clipboard. Furthermore, once users import their private keys into the telegram bot, their encrypted assets are no longer under their control.
2. Security risk:
Most Telegram bots are not open source and do not undergo third-party code audits. Potential vulnerabilities in the bots may result in asset losses. If a user’s Telegram account is compromised (phishing attacks on Telegram accounts do happen), the assets on the Telegram bot will also be under the control of hackers.
During the Telegram bot frenzy, phishing and scams related to Telegram bots have been constantly appearing. These bots claim to be automated trading or front-running bots, enticing users to import their private keys and then transferring their funds without their permission.
Why is contract auditing so important? How can users ensure safety?
Contract auditing is crucial in the Web3 ecosystem. For example, the Banana Gun incident previously analyzed by Beosin involved issues with smart contracts.
Vulnerabilities and security issues in smart contracts can lead to fund losses, data leaks, or contract manipulation. Auditing helps identify and fix these potential vulnerabilities and weaknesses, ensuring the security and reliability of contracts. Conducting a comprehensive review of contracts can prevent potential attacks in advance and ensure the safety of users’ funds and data.
At the same time, users need to pay attention when choosing projects:
1. Conduct thorough research on projects. Users should have sufficient understanding of the project’s operational logic and potential risks through project websites, documentation, community channels, code auditing reports, etc., to avoid falling into scams.
2. Stay updated on the latest progress of projects. Users should timely learn about the project’s development through official Twitter accounts, Telegram groups, Discord communities, etc., in order to react quickly to rug pulls, contract vulnerabilities, or hacking attacks.
3. On the EagleEye platform, users can enter the contract address of a token, and EagleEye will check its contract code and provide relevant risk reminders.
We will continue to update Blocking; if you have any questions or suggestions, please contact us!
Was this article helpful?
93 out of 132 found this helpful
Related articles
- UK Treasury announces major updates in cryptocurrency regulation to pave the way for innovation
- Hong Kong Rolls the Dice with Phase 2 of e-HKD Trials, Nearing CBDC Pilot Success
- Japanese Government Takes a Stance Crypto Exchange Linked to Hamas Gets Sanctioned
- SBF returns to the witness stand admitting mistakes but refusing to plead guilty, Binance, ex-girlfriend, and Three Arrows caused FTX to collapse.
- Twitter’s Value Takes a Tumble Elon Musk’s $44B Investment Now Halved
- South Korea’s Crypto Crime Busters Overloaded before They Even Begin!
- Hong Kong Cryptocurrency New Policy’s One-Year Anniversary A Year of Major Leaps and Key Milestone Review