Review the BEC theft incident, UDomain teaches you to avoid a repeat of the tragedy

On April 22, 2018, a hacker attacked BEC by exploiting a smart contract vulnerability, and successfully transferred a large amount of BEC tokens, which led to the sell-off of BEC tokens in the market. zero. Meitu responded quickly and issued a statement announcing the termination of its overseas promotion cooperation with BEC. At present, the BEC official team and OKEx have suspended all transactions and transfers.

A smart contract is an agreement that promises digitally defined promises to ensure that contract participants execute those promises.

Since the birth of Bitcoin, people have realized that the underlying technology of Bitcoin, the blockchain, can inherently provide a trusted execution environment for smart contracts. Since then, the Ethereum ERC20 standard has been vying to distribute tokens. A programmer just takes a few minutes to copy some smart contract code from the Internet, and can issue tokens with slight modifications. Find someone to write a white paper, and let a few well-known financial people stand on the platform, and you can issue tens of millions or even hundreds of millions of projects on the digital currency exchange.

This BEC theft incident was the negligence of the programmers, which allowed the hackers to take advantage of the loopholes. However, it also issued a warning to other financial websites and e-commerce platforms involved in online transactions, and should effectively strengthen the review of internal development codes, avoid omissions, and improve security. For the above enterprises, UDomain can help you:

1. UDomain's penetration testing service

Able to try to invade the company's website, server and network equipment with a hacker's thinking, actively find various potential loopholes, verify whether the equipment can be stolen or destroyed, and then improve and deploy the weak points. You can let go of your worries and focus on business.

2. UDomain's anti-DDoS high defense server solution

*Professional resistance to domestic attacks, high-quality return route

1) The computer room defense system monitors and automatically identifies attack traffic in real time;

2) The cleaning center is located in Asia, with domestic route optimization, which is specially designed to resist domestic large-traffic attacks.

*BGP multi-line access, intelligent switching and assigning to the best line

1) Integrate PCCW Global, NTT, Hutchison, China Telecom CN2, HKIX, HKBN, iCable, 3HK, WTT HK Limited and Google Hong Kong top lines;

2) The system intelligently monitors the line status and automatically switches to the current best line to ensure that the server connectivity reaches 99.99%.

UDomain will gossip about the Internet for you from time to time, add WeChat udomain or QQ1265813086 to get our first-hand information.


Guess you like

Origin http://43.154.161.224:23101/article/api/json?id=325152739&siteId=291194637