According to BlockBeats, on May 9, the Linux kernel “Copy Fail” vulnerability was added to CISA’s Known Exploited Vulnerabilities (KEV) catalog. The flaw affects major Linux distributions since 2017 and allows attackers with regular user permissions to escalate to root access using approximately 10 lines of Python code.
Since numerous cryptocurrency infrastructure components rely on Linux—including exchanges, validator nodes, mining pools, custodial wallets, and cloud trading systems—the vulnerability poses potential risks to the crypto industry. If exploited, attackers could potentially steal private keys, compromise validator nodes, obtain administrative access, or launch ransomware attacks on affected servers.
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to
Disclaimer.
Related Articles
LayerZero Issues Public Apology for Kelp DAO Exploit, Admits Single-Verifier Setup Was Mistake
According to LayerZero's official blog post on Friday, the protocol issued a public apology for its handling of the April 18 exploit that drained $292 million in rsETH from Kelp DAO's cross-chain bridge. LayerZero admitted it made a mistake by allowing its Decentralized Verifier Network to serve
GateNews5h ago
Crypto Wrench Attacks Surge 41% in 2026, Targeting Family Members
Crypto security firm CertiK estimates that cryptocurrency holders have lost approximately $101 million from wrench attacks in the first four months of 2026, according to the firm's analysis. If the trend continues at this rate, that equates to hundreds of millions of dollars lost for the full
CryptoFrontier6h ago
LayerZero Issues Public Apology on May 8, Admits Fault in Single-Verifier Setup for Kelp DAO Exploit
According to The Block, LayerZero issued a public apology on Friday for its handling of the April 18 exploit that drained roughly $292 million in rsETH from Kelp DAO's cross-chain bridge. The protocol acknowledged it made a mistake by allowing its Decentralized Verifier Network (DVN) to serve as the
GateNews11h ago
Crypto Wrench Attacks Rise: Victims Lose $101M in First Four Months of 2026, Families Increasingly Targeted
According to CertiK, crypto wrench attack victims lost approximately $101 million in the first four months of 2026, with the trend projected to reach hundreds of millions for the full year. The security firm verified 34 incidents globally, representing a 41% increase from the same period in 2025, wi
GateNews12h ago
Tether's USDT0 Unveils 3/3 Verification Mechanism, Launches $6M Bug Bounty Program After Kelp Incident
According to ChainCatcher, Tether's USDT0 protocol unveiled its security architecture following the Kelp incident, implementing a 3/3 verification consensus mechanism requiring three independent validators using separate codebases. Current validator nodes include USDT0's proprietary DVN,
GateNews14h ago
Malaysian Police Seized 50,000 USDT from Chinese Nationals in February; Investigation Stalls After Three Months
According to ChainCatcher, eight Chinese nationals were forced to transfer approximately 50,000 USDT after a police raid on a rented villa in Kajang, Malaysia in February. Police claimed the suspects were involved in fraud and subsequently arrested 12 officers involved in the incident, removing
GateNews15h ago