Dear bros, recently the team has been working on something that we can share with everyone. After reading this, everyone must protect their private keys.

A friend of mine received an airdrop, but because he used an insecure airdrop script from GitHub, the private key of the airdrop wallet was intercepted by hackers and wrote into a malicious contract. Many may not know much about malicious contracts, so I will briefly introduce it.

A malicious contract monitors wallets, and as long as a little ETH is transferred in as Gas, it will be instantly transferred away by hackers. It’s the kind that only goes out and doesn’t come in.

However, due to the large airdrop about to be opened for collection, one cannot receive it without adding Gas, and if you add Gas, it gets stolen. So, they contacted us, and after discussions with the security team and web2 offensive and defensive red team experts, we wrote a set of plans and tools.

We built a special transaction package that bypasses the public memory pool (Mempool) and communicates directly with miners.

In 0.1 seconds, we complete a three-hit combo:

Bribe the miner -> Receive the airdrop -> Transfer assets to a secure wallet.

When this isn't the result we want, what we want is to completely overwrite the malicious contract and remove it, which is how we ended up with the content in the image.

While the hacker's script is still waiting for Gas to arrive, we have already canceled the malicious contract. Successfully reclaimed 100% of the airdrop share for the client!

⚠️ A private key leak does not mean the end. Do not operate blindly on your own; leave professional matters to professional technology.

👇 Have similar troubles? DM me, maybe I can help.

#Web3安全 #空投救援 #MEV #被盗恢复 #LayerZero #ZkSync #AssetSnatching