Blockchain security team explains Ethereum JSON-RPC multiple attack details
A JSON-RPC interface security research report was released on Wednesday by the Chuangyu 404 blockchain security research team. They gave a detailed analysis of the underlying principles and processes of the Ethereum “Stolen Vulnerabilities” (also known as the “Black Valentine’s Day” event).
Also, the report disclosed for the first time the three types of stolen coins that exposed the Ethereum RPC interface. The report mentions that by deploying global node honeypot capture, the hackers are still using the JSON-RPC of Ethereum to steal the RPC nodes open to Etherfang in the world.
At the end of the report, the corresponding repair suggestions for the “post-smuggling era” attack method were given. The author of the report believes that only by understanding the relevant principles from the bottom, prevention of possible attacks can be done in the security defense of the blockchain.
For the current mainstream Ethereum application, Chuangyu can provide professional and authoritative intelligent contract auditing services to avoid property damage caused by contract security problems, and can secure the Ethereum platform.
The relevant report has been published in the essence of the Paper security technology of the Seebug.org vulnerability community that knows the operation of Chuangyu.
Image via Shutterstock
Join our Telegram group