1815 hack event(s)
Description of the event: The attacker uses the replay attack to obtain multiple winnings in one go.
Amount of loss: 5,000 EOS Attack method: Replay attack
Description of the event: The law of the random number generated by DEOSBET was cracked by hackers.
Amount of loss: 4,000 EOS Attack method: Random number attack
Description of the event: On September 2, 2018, the EOS WIN random number was cracked and 2000 EOS was lost, this attack was not disclosed to the public.
Amount of loss: 2,000 EOS Attack method: Random number attack
Description of the event: The law of the random number generated by Lucky's rock-paper-scissors game was cracked by hackers, and the attacker won the prize by continuing to use rock at the specified time, which has a 38% chance of winning.
Amount of loss: - Attack method: Random number attack
Description of the event: RAM was swallowed up by the malicious contract, and the game party failed to check the caller of transfer action, which led to the exchange of real token with fake token and "Transfer Error Prompt" vulnerability
Amount of loss: - Attack method: Fake Transfer Notification
Description of the event: Ethereum Fomo 3D was hacked and hacker used special attack techniques to take the bonus.
Amount of loss: 10,469.66 ETH Attack method: Transaction congestion attack
Description of the event: Ethereum Fomo 3D was hacked, Fomo 3D website 24-hour access reduced 21.95 percent, 24-hour flow decreased 38.32%
Amount of loss: - Attack method: DDoS Attack
Description of the event: KICKICO has experienced a security breach, which resulted in the attackers gaining access to the account of the KICK smart contract — tokens of the KICKICO platform. The team learned about this incident after the complaints of several victims, who did not find tokens worth 800 thousand dollars in their wallets. During the investigation, it was found that the total amount of stolen funds is 70,000,000 KICK, which at the current exchange rate is equivalent to $ 7.7 million.
Amount of loss: 7,000 KICK Attack method: Private Key Leakage
Description of the event: The EOS Fomo3D game contract suffered an overflow attack and the cash pooling became negative.
Amount of loss: 60,686 EOS Attack method: Overflow vulnerability
Description of the event: The Bancor platform theft was related to the BancorConverter contract, and the attacker (hacker/mole) is very likely to get the private key of the 0x009bb5e9fcf28e5e601b7d0e9e821da6365d0a9c.
Amount of loss: 24,984 ETH,3,236,967 BNT,229,356,645 NPXS, Attack method: Private Key Leakage
Description of the event: The attacker stole $30 million worth of cryptocurrency from Bithumb, Korea's largest cryptocurrency exchange. According to Japanese Cointelegraph, the attackers hijacked Bithumb's popular (online) wallet.
Amount of loss: 30,000,000 USD Attack method: Wallet Stolen
Description of the event: Coinrail acknowledged the existence of “network intrusion” in its system and estimated that 40 billion won ($37.2 million) worth of coins were stolen. The police are investigating violations but have not announced further details.
Amount of loss: 37,200,000 USD Attack method: Network intrusion
Description of the event: According to the official news of Litecoin Cash (LCC), LCC has been attacked by 51% recently. The LCC team has contacted the exchange and increased the number of confirmed blocks to 100 to prevent attacks.
Amount of loss: - Attack method: 51% attack
Description of the event: The ZenCash encountered a 51% cyber attack or double-spend attack at around 8:26 PM on June 2nd (June 3rd 00:26 UTC). This attack resulted in the loss of Zen encrypted tokens worth approximately US $550,000. The ZenCash team responded immediately and implemented preventive mitigation measures, which greatly increased the difficulty of future cyber attacks.
Amount of loss: $ 550,000 Attack method: 51% attack
Description of the event: The last repair was bypassed, resulting in another 51% attack and a loss of approximately US$4.82 million.
Amount of loss: $ 4,820,000 Attack method: 51% attack
Description of the event: EDU smart contract has critical vulnerability , and can transfer the EDU Token in any account.
Amount of loss: - Attack method: Logic Vulnerability
Description of the event: According to the SlowMist Zone disclosure, the BAI smart contract has the same vulnerabilities as the EDU, and can transfer the BAI Token in any account. There are also a large number of robbery.
Amount of loss: - Attack method: Logic Vulnerability
Description of the event: The attacker discovers and manipulates errors in the Verge code, causing false timestamps to be set on the block and then dig out new blocks quickly. The protocol of Verge is uses five mining algorithms in turn, and the attacker increases control over two of them: scrypt and lyra2re. The attack should be between block 2155850 and block 2206272. Within a few hours of the attack, the 35 million XVGs, which cost about $1.75 million, were stolen at the prevailing exchange rate.
Amount of loss: 35,000,000 XVG Attack method: 51% attack
Description of the event: TAYLOR’ve been hacked and all of our funds have been stolen. Not only the balance in ETH (2,578.98 ETH), but also the TAY tokens from the Team and Bounty pools. The only tokens that were not stolen are the ones from the Founders’ and Advisors’ pools, because there’s a vesting contract making them inaccessible for now.
Amount of loss: 2,578.98 ETH Attack method: 1Password file stolen
Description of the event: On May 18, a Reddit netizen posted that Monacoin suffered a 51% computing power attack, a selfish mining attack, and a time stamp attack. The exact time occurred from May 13 to May 15. Some exchanges that support Monacoin trading, such as Bittrex, Livecoin have closed Monacoin recharge.
Amount of loss: $ 90,000 Attack method: 51% attack