Litecoin Executes Deep Chain Reorganization to Undo MWEB Privacy Layer Exploit

LTC1.52%

Gate News message, April 27 — Litecoin underwent a deep chain reorganization on Saturday (April 26) after attackers exploited a zero-day vulnerability in its MimbleWimble Extension Block (MWEB) privacy layer, the Litecoin Foundation announced. The reorg spanned blocks 3,095,930 to 3,095,943 and took over three hours to complete.

The vulnerability allowed mining nodes running outdated software to validate unauthorized MWEB transactions, enabling attackers to extract coins from the privacy extension and route them to cross-chain swapping protocols via peg-out transactions. Mining pools were simultaneously targeted with denial-of-service attacks exploiting the same flaw. During the reorganization window, attackers executed double-spend attacks against multiple protocols, including NEAR Intents, which suffered approximately $600,000 in losses.

The Litecoin Foundation confirmed that all offending transactions were erased from the network’s history, with valid transactions during that period unaffected. The vulnerability has been fully patched. LTC traded near $56.00 at the time of disclosure, down roughly 1% on the day and 25% year-to-date, with no immediate sharp market reaction reported.

Saturday’s incident marks the first known attack targeting MWEB since Litecoin activated the privacy extension via soft fork in May 2022. MWEB enables users to move LTC from the transparent base chain into a confidential side-chain through peg-in and peg-out transactions. The Foundation did not disclose the total amount of unauthorized LTC created or name the affected mining pools. The attack underscores ongoing security challenges across the crypto industry, with DeFi protocols suffering over $750 million in losses through mid-April 2026, including the $292 million Kelp DAO bridge exploit and the $285 million Drift attack.

免责声明:本页面信息可能来自第三方,不代表 Gate 的观点或意见。页面显示的内容仅供参考,不构成任何财务、投资或法律建议。Gate 对信息的准确性、完整性不作保证,对因使用本信息而产生的任何损失不承担责任。虚拟资产投资属高风险行为,价格波动剧烈,您可能损失全部投资本金。请充分了解相关风险,并根据自身财务状况和风险承受能力谨慎决策。具体内容详见声明

相关文章

研究揭:Polymarket 3% 玩家赚走 30% 利润,逾七成玩家吸收全部亏损

一项新研究分析 Polymarket 2023–2025 的交易记录,显示仅 3.14% 的熟练赢家掌握超过 30% 的收益,群众贡献并不足以解释整体准确度;同时追踪到 1,950 名高度可疑的内线交易账户,尽管未主导预测,但放大了价格波动。个案表明在美国公布委内瑞拉动向之前就大额押注并获利。研究质疑群众智慧,并强调日益严格监管的必要。

鏈新聞abmedia17 分钟前

法国 2026 年加密投资者遭绑架逾 40 起,涉税务资料泄露

据 Market Forces Africa 于 4 月 27 日报道,法国针对加密货币投资者的绑架及暴力攻击事件急剧增加。Telegram 创办人帕维尔·杜罗夫(Pavel Durov)在 X 平台称,自 2026 年初以来已记录 41 起加密投资者绑架案,平均每 2.5 天发生一起,且与法国税务资料泄露关联。

Market Whisper34 分钟前

链分析:欧盟对俄罗斯实施的新制裁标志着“加密执法新时代”

区块链情报机构指出,最近针对俄罗斯发布的制裁方案或许是欧盟迄今为止最全面的、面向加密货币的行动,目标是整个俄罗斯加密货币行业,而不是针对单个行为者;该方案包括完整的数字卢布以及

Coinpedia37 分钟前

湖北网安民警获二等功,70 天破全省首起“亿元”虚拟币盗窃案

根据湖北日报 4 月 27 日报道,武汉市公安局青山区分局网安大队民警郭庭宇近日获授个人二等功。郭庭宇毕业于华中科技大学计算机专业,2023 年通过公务员考试入警,2024 年初接手湖北全省首起虚拟币盗窃案,历近 70 天侦破,涉案资金超亿元,5 名嫌疑人全部受到法律制裁。

Market Whisper52 分钟前

中国破获一宗涉案金额超 $140 百万 的加密货币盗窃案,逮捕5名嫌疑人

Gate News 新闻快讯,4月27日——中国湖北省武汉市的一个网络犯罪专案组已捣毁一个涉及假冒钱包应用的加密货币盗窃团伙,调查显示,涉案非法所得超过1亿元人民币 (约 $14 百万)。已有5名嫌疑人

GateNews1小时前

研究发现:只有 3% 的 Polymarket 交易者具备技能,捕获了超过 30% 的收益

Gate News 消息,4月26日——一项新的学术论文分析了 Polymarket 在 2023 年至 2025 年期间的交易,结论认为,该平台的准确性体现的是“知情少数的智慧,而不是群众的智慧”。该研究于 4月25 日由来自伦敦商学院和

GateNews4小时前
评论
0/400
暂无评论