The analysis of the Zerogoki attack

Code analysis

Attack Analysis

0x0d93A21b4A971dF713CfC057e43F5D230E76261C
0x3054e19707447800f0666ba274a249fc9a67aa4a
0x4448993f493b1d8d9ed51f22f1d30b9b4377dfd2

--

--

--

A Blockchain Security and Data Company.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

FSB opened a criminal case on the production of unmarked products

FSB opened a criminal case on the production of unmarked products

{UPDATE} KRNKR Hack Free Resources Generator

HackTheBox Writeup — Academy

COVID-19 Lockdown: In lieu of help, cybercriminals trying to loot people in Kashmir

COVID-19 Lockdown: In lieu of help, cybercriminals trying to loot people in Kashmir

Encryption and confidentiality of user keys

Disadvantages To Using Cloud Computing

Intranet of Things

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
BlockSec

BlockSec

A Blockchain Security and Data Company.

More from Medium

How to Make the BlockChain Attack “Blockable”

Math behind Uniswap — swap ( part2 )

Why does Olympus DAO work

Beosin’s Analysis: DEGO is Hacked Due to Suspected Private Key Compromise