Back to Blog

BlockSec 九月商务差旅计划

September 7, 2023

随着秋意渐浓,天气转凉,BlockSec 很激动地与大家分享我们九月份的出行计划。快来与我们见面吧:🙌

🇸🇬 新加坡

在 Token 2049(9 月 10-15 日)期间,BlockSec 将拜访狮城,与探索加密新领域的 Web3 构建者们进行交流。

📍 9 月 11 日,下午 2 点 — OGBC

BlockSec 首席执行官 周亚瑾教授将在 Cobo 的 “新加坡 DeFi 日” 活动上发表演讲,分享 BlockSec 如何利用其独有的攻击拦截技术(BlockSec Phalcon)帮助 LP 在事件发生时及时提取资金。

这将支持我们近期与 Cobo 合作推出的**“DeFi 紧急机器人”**。[查看更多详情]

🔗https://lu.ma/singaporedefiday

📍 9 月 13 日,下午 2 点 — 新加坡管理大学

BlockSec CMO Ruby Xu 将在ZDAO(浙江大学校友会)活动上发表演讲,讨论 BlockSec 如何将一线技术产品化,以加强 Web3 的安全性和可用性。

🔗 https://lu.ma/wf8emipn

🇩🇪 柏林

📍 9 月 15 日,柏林

周亚瑾教授受邀参加 ETH Berlin 的旗舰技术会议 Protocol Berg,分享关于“以太坊的运行级别并发交易执行”的最新研究。

🔗 https://protocol.berlin/

🇨🇳 上海

📍 9 月 17 日,下午 2 点 — 上海苏宁宝丽嘉酒店

BlockSec 产品总监 Raymond 将在 KNN3、AWS、复旦大学 DAO 联合举办的**“Web3 & AI 融合”**活动上发表演讲,探讨如何将 GPT 能力整合到 BlockSec 产品中,以降低入门门槛,帮助用户更安全地在 web3 中进行操作。

📍 9 月 19 日,下午 4 点 — W 酒店

周教授将参加由万向区块链主办的**第九届全球区块链峰会**,与 SharkTeam 等安全公司一同参与关于“Web3 基石:安全与隐私”的圆桌讨论。

新加坡、柏林、上海见!🙌

关于 BlockSec

BlockSec 是一家由一群全球顶尖安全专家于 2021 年创立的先锋区块链安全公司。公司致力于提升新兴 Web3 世界的安全性和可用性,以促进其大规模采用。为此,BlockSec 提供智能合约和 EVM 链的安全审计服务,用于主动开发和阻止威胁的Phalcon平台,用于资金追踪和调查的MetaSleuth平台,以及为 Web3 构建者在加密世界高效冲浪的MetaSuites扩展。

迄今为止,公司已服务超过 300 位尊贵的客户,如 MetaMask、Uniswap Foundation、Compound、Forta 和 PancakeSwap,并在两轮融资中获得 Matrix Partners、Vitalbridge Capital 和 Fenbushi Capital 等杰出投资者的数千万美元投资。

官方网站:https://blocksec.com/

官方 Twitter 账号:https://twitter.com/BlockSecTeam

Sign up for the latest updates
Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure
Case Studies

Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure

An on-chain investigation into VerilyHK, a fraudulent platform that moved $1.6B in TRON USDT through a multi-layered fund-routing infrastructure of rotating wallets, paired payout channels, and exchange exit funnels, with traced connections to the FinCEN-sanctioned Huione Group.

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026

This BlockSec weekly security report covers nine DeFi attack incidents detected between March 30 and April 5, 2026, across Solana, BNB Chain, Arbitrum, and Polygon, with total estimated losses of approximately $287M. The week was dominated by the $285.3M Drift Protocol exploit on Solana, where attackers combined multisig signer social engineering with Solana's durable nonce mechanism to bypass a zero-timelock 2-of-5 Security Council, alongside notable incidents including a $950K flash loan TWAP manipulation against the LML staking protocol, a $359K Silo Finance vault inflation via an external `wstUSR` market donation exploiting a depegged-asset oracle and `totalAssets()` accounting flaw, and an EIP-7702 delegated-code access control failure. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident, covering flawed business logic, access control, price manipulation, phishing, and misconfiguration attack types.

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.