1815 hack event(s)
Description of the event: IPC was suspected to have been attacked on BSC, resulting in an approximate loss of $590K.
Amount of loss: $ 590,000 Attack method: Contract Vulnerability
Description of the event: Mosca was reportedly attacked on BSC, resulting in an approximate loss of $19,500.
Amount of loss: $ 19,500 Attack method: Contract Vulnerability
Description of the event: The official X account of Solv Protocol has been compromised. Users are advised not to click on any suspicious links.
Amount of loss: - Attack method: Account Compromise
Description of the event: The official X account of the Babylon was compromised, and the hacker used it to post tweets containing phishing links.
Amount of loss: - Attack method: Account Compromise
Description of the event: Sorra was suspected to have been attacked on ETH, resulting in an approximate loss of $43K.
Amount of loss: $ 43,000 Attack method: Contract Vulnerability
Description of the event: lmk.fun (formerly Scopescan) issued an alert on the X platform, warning that the X account of the Web3 knowledge graph protocol 0xScope (@ScopeProtocol) has been hacked. Users are advised not to click on any links or trust any content posted by the account. An investigation and recovery are currently in progress.
Amount of loss: - Attack method: Account Compromise
Description of the event: The official X account of the RWA lending protocol Centrifuge was compromised, and fake information was posted.
Amount of loss: - Attack method: Account Compromise
Description of the event: LAURA was suspected to have been attacked on ETH, resulting in an approximate loss of $48.2K.
Amount of loss: $ 48,200 Attack method: Contract Vulnerability
Description of the event: According to monitoring by Scam Sniffer, the X account of Superchain Eco (@SuperchainEco) was compromised and used to post phishing links.
Amount of loss: - Attack method: Account Compromise
Description of the event: The FEG project suffered an attack resulting in a loss of approximately $1 million. Analysis suggests that the root cause of the incident appears to be a composability issue arising from the integration with the underlying Wormhole cross-chain bridge, which facilitates cross-chain message and token transfers.
Amount of loss: $ 1,000,000 Attack method: Security Vulnerability
Description of the event: Standing on Bizness (BIZNESS) appears to have been subjected to a reentrancy attack on Base, resulting in an estimated loss of $15,700.
Amount of loss: $ 15,700 Attack method: Reentrancy Attack
Description of the event: Animoca Brands tweeted that @ysiu social media account has been compromised. There is no official token or NFT launch from Animoca Brands. The token launch on Solana as claimed in a post was made by the hacker. Please do not engage with the account and stay vigilant.
Amount of loss: - Attack method: Account Compromise
Description of the event: The Moonhacker contract suffered a flash loan attack, resulting in a loss of approximately $320,000.
Amount of loss: $ 320,000 Attack method: Flash Loan Attack
Description of the event: According to Scam Sniffer's monitoring, the privacy-preserving data verification protocol zkPass's X account was compromised and used to post phishing tweets.
Amount of loss: - Attack method: Account Compromise
Description of the event: Regarding rumors about the collaboration between DOGE and USUAL, Azoria CEO James Fishback clarified that he had contacted DOGE's head of department, Vivek Ramaswamy, whose account was compromised.
Amount of loss: - Attack method: Account Compromise
Description of the event: Slurpycoin on BSC suffered a flash loan attack. The attacker exploited the buyback mechanism to manipulate the token price and profited ~$3K from sandwich arbitrage.
Amount of loss: $ 3,000 Attack method: Flash Loan Attack
Description of the event: A series of exploiting transactions on Ethereum targeting the liquidity pool of the HarryPotterObamaSonic10Inu 2.0 token. The attacker profited approximately $243K and deposited the funds into Tornado.
Amount of loss: $ 243,000 Attack method: Price Manipulation
Description of the event: The official X account of AI startup Anthropic, backed by Amazon, appears to have been compromised, posting an unknown token contract address related to AI Agents.
Amount of loss: - Attack method: Account Compromise
Description of the event: The lock contract of the DeFi platform GemPad was exploited on the BSC, ETH, Base, and Polygon networks, resulting in a loss of approximately $2 million.
Amount of loss: $ 2,000,000 Attack method: Contract Vulnerability
Description of the event: BTC24H (BTC24H) is suspected to have been attacked on Polygon, with an estimated loss of $85,700.
Amount of loss: $ 85,700 Attack method: Contract Vulnerability