1708 hack event(s)
Description of the event: The attacker launched continuous attacks on the EOS BUFF and has successfully profited hundreds of EOS.
Amount of loss: - Attack method: Unknown
Description of the event: The contract was attacked by a transaction rollback.
Amount of loss: - Attack method: Roll back attack
Description of the event: Tron DApp Tronwin is hacked because of overflow and 2 million TRX were stolen.
Amount of loss: 2,000,000 TRX Attack method: Overflow
Description of the event: The random number was attacked by the attacker for the second time.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched an attack on the GameBet game contract gamebetdices, and transfer most of the acquired EOS to the FreeWallet wallet account.
Amount of loss: - Attack method: Roll back attack
Description of the event: The attacker continued to attack the LuckyMe game contract luckymedice1 and had benefited thousands of EOS.
Amount of loss: - Attack method: Roll back attack
Description of the event: Fountain (FTN) has an overflow vulnerability, the attacker performs an overflow attack by calling batchTransfers.
Amount of loss: - Attack method: Overflow
Description of the event: The attacker continued to attack the Lucky Nuts game contract nutsgambling and continues to profit from it. Eventually most of the stolen EOS was transferred to the Binance exchange account binancecleos.
Amount of loss: - Attack method: Random number attack
Description of the event: The hacker mastered and modified FAST's token contract, deliberately created a vulnerability that can be used for multiple "additional" tokens for free.
Amount of loss: 10,000 EOS Attack method: Minting Attack
Description of the event: "Transfer Error Prompt", as the game contract does not filter the false notifications provided by the game player.
Amount of loss: - Attack method: Transfer error prompt
Description of the event: The attacker snowredgreen attacked the LuckBet game contract luckbetadmin and transfers most of the acquired EOS to the Huobi exchange account huobideposit
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker binaryfunxxx attacked the EosDice's game contract bocai.game and transfers most of the acquired EOS to the Binance exchange account binancecleos.
Amount of loss: - Attack method: Roll back attack
Description of the event: The attacker (panming12345) launched an attack on the EOS quiz game TRUSTBET game contract (trustbetgame), profiting a total of 11,501 EOS, and then transferred the EOS obtained from the attack to the Huobideposit account in two times. The attacker took advantage of the replay attack vulnerability. This is a form of attack that first appeared in the early days of the EOS DApp ecosystem. Due to the serious flaws in the random lottery algorithm designed by the developer, the attacker can use the contract vulnerabilities to draw the lottery repeatedly. Lower-level errors.
Amount of loss: 11,501 EOS Attack method: Replay attack
Description of the event: Rollback transaction attack.
Amount of loss: 200,000 EOS Attack method: Roll back attack
Description of the event: Big.game is suspected of being attacked by hacker eykkxszdrnnc. Big.game officially stated that the actual loss was about 8,000 EOS, and the balance of the dice prize pool has been transferred to a secure account.
Amount of loss: 8,000 EOS Attack method: Roll back attack
Description of the event: The attacker rolls back the transaction when placing a bet. From the time the bet is placed until the transaction is rolled back, the betting data will temporarily exist in the database of the current node; and Tobet queries the betting by polling the node database outside the contract. The lottery will be drawn outside the contract and the result will be passed to the lottery action; when the attacker keeps betting and rolls back the transaction, because the betting and Tobet polling use the same node, the Tobet lottery polling can query the database betting information for a short time and draw the lottery. . However, the attacker's bet was not successful, and the contract would continue to draw prizes for him, resulting in no capital arbitrage.
Amount of loss: 22,403.69 EOS Attack method: Roll back attack
Description of the event: The attacker (eykkxszdrnnc) launched an attack on the EOS MAX game contract (eosmaxiodice), an EOS quiz game, earning a total of 55,526.05 EOS. The game party has suspended the game operation at 6:40 am on the 19th, and issued an announcement saying that it was caused by a loophole in EOS Node, not a loophole in the game contract.
Amount of loss: 55,526 EOS Attack method: Roll back attack
Description of the event: The attacker helookitiqas launched attacks on the EOS game kittyfishing, which launched a total of 91 attacks in two hours.
Amount of loss: 558.85 EOS Attack method: Roll back attack
Description of the event: Vertcoin suffered a major attack in which hackers stole funds worth $100,000.
Amount of loss: $ 100,000 Attack method: 51% attack
Description of the event: The attacker ha4tsojigyge launched 124 attacks on the Fastwin game contract fastwindice3.
Amount of loss: 1,929.17 EOS Attack method: Unknown