1980 hack event(s)
Description of the event: The attacker exchanged true EOS token with fake token within the vulnerability in the code,winning without betting
Amount of loss: 4,000 EOS Attack method: Code Vulnerability
Description of the event: The game contract does not check the transfer action must initiated by eosio.token or token contract of the game itself.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: Hackers with unauthorized access to the exchange’s hot wallets had stolen roughly $60 million in bitcoin, bitcoin cash, and MonaCoin. That being said, the exact amount of bitcoin cash stolen remains unknown.
Amount of loss: $ 59,000,000 Attack method: Wallet Stolen
Description of the event: the attacker exchanged true EOS token with fake token within the vulnerability in the code, winning without betting.
Amount of loss: 42,000 EOS Attack method: Code Vulnerability
Description of the event: Because of its random algorithm associated with the time, the same bet will yield different results at different times. Hackers use this feature to reject failed lottery results.
Amount of loss: 4,000 EOS Attack method: Replay attack
Description of the event: The attacker uses the replay attack to obtain multiple winnings in one go.
Amount of loss: 5,000 EOS Attack method: Replay attack
Description of the event: The law of the random number generated by DEOSBET was cracked by hackers.
Amount of loss: 4,000 EOS Attack method: Random number attack
Description of the event: On September 2, 2018, the EOS WIN random number was cracked and 2000 EOS was lost, this attack was not disclosed to the public.
Amount of loss: 2,000 EOS Attack method: Random number attack
Description of the event: The law of the random number generated by Lucky's rock-paper-scissors game was cracked by hackers, and the attacker won the prize by continuing to use rock at the specified time, which has a 38% chance of winning.
Amount of loss: - Attack method: Random number attack
Description of the event: RAM was swallowed up by the malicious contract, and the game party failed to check the caller of transfer action, which led to the exchange of real token with fake token and "Transfer Error Prompt" vulnerability
Amount of loss: - Attack method: Fake Transfer Notification
Description of the event: Ethereum Fomo 3D was hacked and hacker used special attack techniques to take the bonus.
Amount of loss: 10,469.66 ETH Attack method: Transaction congestion attack
Description of the event: Ethereum Fomo 3D was hacked, Fomo 3D website 24-hour access reduced 21.95 percent, 24-hour flow decreased 38.32%
Amount of loss: - Attack method: DDoS Attack
Description of the event: KICKICO has experienced a security breach, which resulted in the attackers gaining access to the account of the KICK smart contract — tokens of the KICKICO platform. The team learned about this incident after the complaints of several victims, who did not find tokens worth 800 thousand dollars in their wallets. During the investigation, it was found that the total amount of stolen funds is 70,000,000 KICK, which at the current exchange rate is equivalent to $ 7.7 million.
Amount of loss: 7,000 KICK Attack method: Private Key Leakage
Description of the event: The EOS Fomo3D game contract suffered an overflow attack and the cash pooling became negative.
Amount of loss: 60,686 EOS Attack method: Overflow vulnerability
Description of the event: The Bancor platform theft was related to the BancorConverter contract, and the attacker (hacker/mole) is very likely to get the private key of the 0x009bb5e9fcf28e5e601b7d0e9e821da6365d0a9c.
Amount of loss: 24,984 ETH,3,236,967 BNT,229,356,645 NPXS, Attack method: Private Key Leakage
Description of the event: The attacker stole $30 million worth of cryptocurrency from Bithumb, Korea's largest cryptocurrency exchange. According to Japanese Cointelegraph, the attackers hijacked Bithumb's popular (online) wallet.
Amount of loss: 30,000,000 USD Attack method: Wallet Stolen
Description of the event: Coinrail acknowledged the existence of “network intrusion” in its system and estimated that 40 billion won ($37.2 million) worth of coins were stolen. The police are investigating violations but have not announced further details.
Amount of loss: 37,200,000 USD Attack method: Network intrusion
Description of the event: According to the official news of Litecoin Cash (LCC), LCC has been attacked by 51% recently. The LCC team has contacted the exchange and increased the number of confirmed blocks to 100 to prevent attacks.
Amount of loss: - Attack method: 51% attack
Description of the event: The ZenCash encountered a 51% cyber attack or double-spend attack at around 8:26 PM on June 2nd (June 3rd 00:26 UTC). This attack resulted in the loss of Zen encrypted tokens worth approximately US $550,000. The ZenCash team responded immediately and implemented preventive mitigation measures, which greatly increased the difficulty of future cyber attacks.
Amount of loss: $ 550,000 Attack method: 51% attack
Description of the event: The last repair was bypassed, resulting in another 51% attack and a loss of approximately US$4.82 million.
Amount of loss: $ 4,820,000 Attack method: 51% attack