1895 hack event(s)
Description of the event: The attacker adopted a "card position" rollback betting method for the game mechanics: the first gameplay investment of the game is profitable early, and the "player" deploys the contract to invest at the beginning of each round, thereby making the investment The return is maximized, so far the attacker has made a total of 102,652 TRX.
Amount of loss: 102,652 TRX Attack method: Rule Exploitation
Description of the event: The attackers launched a roll back attack on the contracts, which so far has yielded a total of 67,695 TRX.
Amount of loss: 67,695 TRX Attack method: Roll back attack
Description of the event: The cryptocurrency lending company YouHodler was affected by a data leak that contained information about users on its platform. Some of the data that was released to the market includes bank accounts, passport numbers, card numbers and many other things.
Amount of loss: - Attack method: Information Leakage
Description of the event: The attackers launched a trade rollback attack on the contracts, which so far has yielded a total of 113,913 TRX.
Amount of loss: 113,913 TRX Attack method: Roll back attack
Description of the event: According to QuickBit, the breach resulted in data of users such as names, emails, physical addresses and even card information was exposed. The exchange has said it has estimated about 2% user data was left unprotected. The exchange has claimed that although data was bare and accessible to anyone who had the knowledge on how to access it, none of the data has been affected or copied.
Amount of loss: - Attack method: Information Leakage
Description of the event: There was an unusually large transaction in the game contract of the TronCity project. The total balance of 257,112 TRX in the game contract was emptied at one time.
Amount of loss: 257,112 TRX Attack method: Rug Pull
Description of the event: Hackers launched a series of attacks on TronChip, earning a total of 61,867 TRX.
Amount of loss: 61,867 TRX Attack method: Random number attack
Description of the event: On July 12, Japan's BitPoint Japan (BPJ) exchange was hacked, and 3.5 billion yen (32 million U.S. dollars) worth of cryptocurrency in the hot wallet was stolen. After that, BPJ shut down all services of the exchange. On the 14th, BPJ announced the recovery of some stolen cryptocurrencies from overseas trading systems, reducing the total loss to 3.02 billion yen (customer funds 2.06 billion, BPJ own funds 960 million).
Amount of loss: $ 27,610,000 Attack method: Wallet Stolen
Description of the event: My Dash Wallet has been embedded with a malicious script, the malicious script will upload the user's DASH currency account balance, keystore, private key, seed and other key information to https://api.dashcoinanalytics.com/stats.php.
Amount of loss: - Attack method: Malicious Code Injection Attack
Description of the event: An attacker with a stolen device can extract the seed from the device. It takes less than 5 minutes and the necessary materials cost around 100$. This vulnerability affects Trezor One, Trezor T, Keepkey and all other Trezor clones. Unfortunately, this vulnerability cannot be patched.
Amount of loss: - Attack method: Wallet Vulnerability
Description of the event: On July 8, the Polish-based exchange Bitmarket abruptly shut down due to liquidity issues. The shutdown allegedly cost users a total of 2300 bitcoin (approximately $23 million) according to Polish prosecutors. The exchange’s official site was replaced with the following message: “We regret to inform you that due to the loss of liquidity, from 08/07/2019, Bitmarket.pl/net was forced to cease its operations. We will inform you about further steps.” Two weeks later, one of the exchange's co-owners was found shot dead
Amount of loss: 2,300 BTC Attack method: Insufficient liquidity
Description of the event: Soxex exchange has been exposed to abscond with the funds. At present, the website of the exchange has been unable to open, and hundreds of millions of funds of investors have been swept away, involving BTC, ETH, HT, OKB and other mainstream currencies. Over 1 million USDT has been flowing into other exchanges.
Amount of loss: - Attack method: Rug Pull
Description of the event: The hackers launched an attack by rolling back the transaction, and so far, the attack has been profitable.
Amount of loss: - Attack method: Roll back attack
Description of the event: The hacker launched a continuous attack on the HiGold Game and realized the profit.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched multiple roll back attacks on the DApp contract address beginning with TLGUt5. So far, it has gained 45,200 TRX, and the contract balance of the attacked contract is almost zero.
Amount of loss: 45,200 TRX Attack method: Roll back attack
Description of the event: The mainnet of Waltonchain was suffered coordinated attack, and the problem has been solved through the upgrade of the mainnet.
Amount of loss: - Attack method: Coordinated Attack
Description of the event: At 1:00 am on June 30, the App of Torrent super community was shut down. All of the wallet assets were moved out two weeks ago, and investors are currently unable to cash out.
Amount of loss: - Attack method: Rug Pull
Description of the event: PlusToken collapsed. Currently, PlusToken wallets can only be transferred in and cannot be withdrawn. Some investors said that 35 hours after the withdrawal of the coin, the account has not yet arrived. It is suspected that the reason given by the PlusToken promotion team is that the recent Bitcoin network transactions are busy, and the time for confirmation of the account has become longer, so you need to wait patiently. The largest MLM project in the currency circle has since collapsed.
Amount of loss: 2,900,000,000 Attack method: Ponzi
Description of the event: Hackers have made a profit of 50,845 TRX by creating multiple contracts to launch a trade rollback attack on SPOKpark, a Tron DApp game. The SPOKpark website is no longer accessible.
Amount of loss: 50,845 TRX Attack method: Roll back attack
Description of the event: At approximately 1am June 27 (GMT+8), a hacker exploited a vulnerability in Bitrue's Risk Control team's 2nd review process to access the personal funds of about 90 Bitrue users. The hacker used what they learned from this breach to then access the Bitrue hot wallet and move 9.3 million XRP and 2.5 million ADA to different exchanges.
Amount of loss: 4520500 Attack method: Wallet Stolen