LABScon25 Replay | Your Apps May Be Gone, But the Hackers Made $9 Billion and They’re Still Here
嗯,用户让我总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读文章,抓住主要信息。 文章主要讲的是Andrew MacPherson在LABScon 25上的演讲,主题是加密犯罪的现状和攻击手段。他提到加密犯罪已经积累了大约90亿美元的非法资金。演讲内容包括区块链、钱包和智能合约的基本概念,以及攻击者如何利用这些技术漏洞进行犯罪。 接着,文章详细描述了最大的加密盗窃案之一,Bybit损失了15亿美元,攻击者通过感染开发者的机器来获取代码权限。还有供应链风险、个人服务器被黑、以及“服务式”洗钱手段等。 最后,演讲还讨论了洗钱的挑战和追踪资金的困难。Andrew的背景也很重要,他有丰富的安全经验,在多家知名公司工作过。 总结的时候,我需要把这些关键点浓缩到100字以内。要确保涵盖演讲的主题、主要案例、攻击手段以及追踪资金的难点。同时,保持语言简洁明了。 </think> Andrew MacPherson在LABScon 25上探讨了加密犯罪的现状与技术手段,揭示了DeFi领域的安全威胁及攻击方式,并以Bybit事件为例分析了大规模资金盗窃的技术细节与洗钱手法。 2026-3-17 13:0:2 Author: www.sentinelone.com(查看原文) 阅读量:5 收藏

In this LABScon 25 talk, Andrew MacPherson dives deep into the high-stakes world of crypto crime, which has amassed approximately $9 billion in illicit funds. Andrew demystifies the technical landscape and exposes the sophisticated attack vectors plaguing the decentralized finance (DeFi) space.

The talk begins with an explanation of the core concepts necessary to understand crypto-related security threats, including definitions of blockchains, wallets, and smart contracts. Andrew explains that a key point in the architectural difference of many crypto applications is that they typically rely solely on frontends, with all interactions happening in the browser via the wallet extension.

The talk then moves on to focus on attack patterns. Crypto thieves target every weak point, from applications and code to the developers and executives themselves. The speaker details the largest crypto heist to date, the $1.5 billion loss from Bybit. This attack involved infecting a developer’s machine, gaining access to production JavaScript code, and modifying it to authorize a full wallet drain during a multi-signature transaction. The talk also covers supply chain risks like typo-squatting, exploitation of personal servers like Plex to compromise GitHub accounts, and the rise of “drainers as a service” that simplify crypto theft.

Andrew also covers the challenges attackers face in laundering stolen funds, and how they leverage techniques such as cross-chain swaps, using mixers like Tornado Cash, and non-KYC platforms for conversion to cash. Despite the fact that all blockchain logs are public and permanent, the presentation also discusses the challenges threat intel analysts face in tracking these rapidly moving funds.

Andrew’s presentation is essential viewing for anyone interested in cryptocurrency and cybersecurity, especially those looking to understand the technical realities of financial crime in the decentralized era.

About the Author

Starting at Paterva, Andrew Macpherson spent more than 10 years creating Maltego before moving to the US for security roles at BitMEX (IR), Robinhood (IR/D&R), Uniswap (Head of Security), and now Privy (Principal Security Engineer). He’s spoken at Black Hat, DEF CON, DSS, EthCC and countless others, teaching courses and drinking malibu on the way.

About LABScon

This presentation was featured live at LABScon 2025, an immersive 3-day conference bringing together the world’s top cybersecurity minds, hosted by SentinelOne’s research arm, SentinelLABS.

Keep up with all the latest on LABScon here.


文章来源: https://www.sentinelone.com/labs/labscon25-replay-your-apps-may-be-gone-but-the-hackers-made-9-billion-and-theyre-still-here/
如有侵权请联系:admin#unsafe.sh