1708 hack event(s)
Description of the event: KICKICO has experienced a security breach, which resulted in the attackers gaining access to the account of the KICK smart contract — tokens of the KICKICO platform. The team learned about this incident after the complaints of several victims, who did not find tokens worth 800 thousand dollars in their wallets. During the investigation, it was found that the total amount of stolen funds is 70,000,000 KICK, which at the current exchange rate is equivalent to $ 7.7 million.
Amount of loss: 7,000 KICK Attack method: Private Key Leakage
Description of the event: The EOS Fomo3D game contract suffered an overflow attack and the cash pooling became negative.
Amount of loss: 60,686 EOS Attack method: Overflow vulnerability
Description of the event: The Bancor platform theft was related to the BancorConverter contract, and the attacker (hacker/mole) is very likely to get the private key of the 0x009bb5e9fcf28e5e601b7d0e9e821da6365d0a9c.
Amount of loss: 24,984 ETH,3,236,967 BNT,229,356,645 NPXS, Attack method: Private Key Leakage
Description of the event: The attacker stole $30 million worth of cryptocurrency from Bithumb, Korea's largest cryptocurrency exchange. According to Japanese Cointelegraph, the attackers hijacked Bithumb's popular (online) wallet.
Amount of loss: 30,000,000 USD Attack method: Wallet Stolen
Description of the event: Coinrail acknowledged the existence of “network intrusion” in its system and estimated that 40 billion won ($37.2 million) worth of coins were stolen. The police are investigating violations but have not announced further details.
Amount of loss: 37,200,000 USD Attack method: Network intrusion
Description of the event: According to the official news of Litecoin Cash (LCC), LCC has been attacked by 51% recently. The LCC team has contacted the exchange and increased the number of confirmed blocks to 100 to prevent attacks.
Amount of loss: - Attack method: 51% attack
Description of the event: The ZenCash encountered a 51% cyber attack or double-spend attack at around 8:26 PM on June 2nd (June 3rd 00:26 UTC). This attack resulted in the loss of Zen encrypted tokens worth approximately US $550,000. The ZenCash team responded immediately and implemented preventive mitigation measures, which greatly increased the difficulty of future cyber attacks.
Amount of loss: $ 550,000 Attack method: 51% attack
Description of the event: The last repair was bypassed, resulting in another 51% attack and a loss of approximately US$4.82 million.
Amount of loss: $ 4,820,000 Attack method: 51% attack
Description of the event: EDU smart contract has critical vulnerability , and can transfer the EDU Token in any account.
Amount of loss: - Attack method: Logic Vulnerability
Description of the event: According to the SlowMist Zone disclosure, the BAI smart contract has the same vulnerabilities as the EDU, and can transfer the BAI Token in any account. There are also a large number of robbery.
Amount of loss: - Attack method: Logic Vulnerability
Description of the event: The attacker discovers and manipulates errors in the Verge code, causing false timestamps to be set on the block and then dig out new blocks quickly. The protocol of Verge is uses five mining algorithms in turn, and the attacker increases control over two of them: scrypt and lyra2re. The attack should be between block 2155850 and block 2206272. Within a few hours of the attack, the 35 million XVGs, which cost about $1.75 million, were stolen at the prevailing exchange rate.
Amount of loss: 35,000,000 XVG Attack method: 51% attack
Description of the event: TAYLOR’ve been hacked and all of our funds have been stolen. Not only the balance in ETH (2,578.98 ETH), but also the TAY tokens from the Team and Bounty pools. The only tokens that were not stolen are the ones from the Founders’ and Advisors’ pools, because there’s a vesting contract making them inaccessible for now.
Amount of loss: 2,578.98 ETH Attack method: 1Password file stolen
Description of the event: On May 18, a Reddit netizen posted that Monacoin suffered a 51% computing power attack, a selfish mining attack, and a time stamp attack. The exact time occurred from May 13 to May 15. Some exchanges that support Monacoin trading, such as Bittrex, Livecoin have closed Monacoin recharge.
Amount of loss: $ 90,000 Attack method: 51% attack
Description of the event: Bitcoin Gold was 51% attacked by an unknown attacker. This type of attack allows an attacker to manipulate the blockchain ledger that records transactions. During the attack, 388,000 BTG (worth approximately US$18 million) was stolen from several cryptocurrency exchanges. After the team refused to help pay for some of the losses, Bitcoin Gold was subsequently delisted from Bittrex.
Amount of loss: 388,201 BTG Attack method: 51% attack
Description of the event: SmartMesh has a significant security like BEC.
Amount of loss: $ 140,000,000 Attack method: Overflow
Description of the event: After logging in to the website for 10s, the user's wallet is emptied, the hacker hijacks the DNS server, and the user logs in to MyEtherWallet to force a redirect to the malicious website. The user was forced to redirect to a malicious website when logging in to MyEtherWallet.
Amount of loss: $ 13,000,000 Attack method: DNS hijacking
Description of the event: Hacker exploited the data overflow to attack the smart contract of BeautyChain, successfully transferred the BEC token to the two addresses resulted in the massive BEC being sold in the market, and the value of the digital currency was almost zero, which brought a crushing blow to BEC market.
Amount of loss: $ 1,000,000,000 Attack method: Overflow
Description of the event: A failed cold storage restoration exercise seems to have exposed private keys intended for offline storage (effectively making them online). However, the CEO has expressed an insider’s involvement. Police found private keys exposed online for more than 12 hours.
Amount of loss: 438 BTC Attack method: Private Key Leakage
Description of the event: The Verge network was attacked by 51% for the first time. According to Bitcointalk forum user ocminer, a malicious miner can use forged timestamps to mine blocks, thereby tricking the network into thinking that the new block was mined one hour ago, so that when the next mined block is immediately added to the network, it also added to the blockchain. This allowed the attacker to mine one block per second, which is said to have mined 250,000 XVG.
Amount of loss: 250,000 XVG Attack method: 51% attack
Description of the event: The attacker has a large amount of computing power to launch 51% attack
Amount of loss: - Attack method: 51% attack