303 hack event(s)
Description of the event: On November 25, DCF on the BNB Chain was attacked, resulting in a loss of approximately $440,000. The root cause of the vulnerability was an error in the logic implemented by the project team in the transfer function of DCF.
Amount of loss: $ 440,000 Attack method: Flash Loan Attack
Description of the event: The Akashalife (AK1111) on BSC was suspected to have been attacked, resulting in a loss of approximately $31.5K.
Amount of loss: $ 31,500 Attack method: Contract Vulnerability
Description of the event: The Matez (MATEZ) on BSC is suspected to have been attacked, resulting in a loss of at least $80K.
Amount of loss: $ 80,000 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist Security Team, the BSCGem (BSCGem) on BSC is suspected to have been attacked, resulting in a loss of approximately $17.3K.
Amount of loss: $ 17,300 Attack method: Contract Vulnerability
Description of the event: The MFT (MFT) on BSC is suspected to have been attacked, resulting in a loss of approximately $33.7K.
Amount of loss: $ 33,700 Attack method: Contract Vulnerability
Description of the event: The BGM token on BSC was attacked, resulting in losses exceeding $450K, with the attacker profiting through price manipulation.
Amount of loss: $ 450,000 Attack method: Price Manipulation
Description of the event: Radiant Capital posted on X acknowledging issues with its lending markets on BNB Chain and Arbitrum. Trading on Base and Mainnet markets has been paused. According to SlowMist’s security team analysis, the incident occurred after the Radiant attacker illegally gained control of 3 multisig permissions and upgraded to a malicious contract to steal funds. The incident analysis report released by Radiant reveals that the attackers successfully compromised the devices of at least three core contributors through sophisticated malware injection techniques. These compromised devices were then used to sign malicious transactions.
Amount of loss: $ 50,000,000 Attack method: Multisignature Theft
Description of the event: A suspicious attack involving HYDT tokens has occurred on BSC, resulting in a loss of approximately $58,000.
Amount of loss: $ 58,000 Attack method: Price Manipulation
Description of the event: On September 22, Bankroll Network on BNB was attacked due to a contract vulnerability, resulting in a loss of approximately $230,000.
Amount of loss: $ 230,000 Attack method: Contract Vulnerability
Description of the event: Caterpillar Coin suffered a flashloan attack resulting in a loss of ~$1.4M and causing a 99% slippage on the token. The attack exploited vulnerabilities in the "price protection mechanisms", which led to the manipulation of token reserves and rewards.
Amount of loss: $ 1,400,000 Attack method: Flash Loan Attack
Description of the event: According to monitoring by the SlowMist security team, the staking and lending protocol HFLH on BNB Chain has been attacked. Users are advised to stay vigilant.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: iVest DAO was attacked due to a smart contract vulnerability, resulting in a loss of approximately $172,000.
Amount of loss: $ 172,000 Attack method: Contract Vulnerability
Description of the event: UPS on BNBChain was attacked again, losing about $521K. On April 8th, UPS was previously attacked on BNBChain, losing about $30K.
Amount of loss: $ 521,000 Attack method: Unknown
Description of the event: On BNB Chain, the MALOU (NEVER) token experienced over 99% slippage. The address 0xd7c358b8337d3116f5765060f48C1C71B9908B84 used a backdoor to sell NEVER tokens, obtaining 428 BNB (approximately $240,000), which were then transferred into Tornado.
Amount of loss: $ 240,000 Attack method: Rug Pull
Description of the event: The Smart Bank Token (SBT) contract on BNBChain was attacked, resulting in a loss of approximately $56,000.
Amount of loss: $ 56,000 Attack method: Unknown
Description of the event: According to monitoring by the SlowMist security team, Linking The World (LW) was attacked on BNBChain due to a contract vulnerability, losing approximately $80,000.
Amount of loss: $ 80,000 Attack method: Contract Vulnerability
Description of the event: The Fake TRUMP (MAGA) on BNBChain is suspected of a rug pull, and the current token price has dropped by 100%.
Amount of loss: $ 957,552 Attack method: Rug Pull
Description of the event: MintRisesPrices on BNBChain suffered a reentrancy attack, resulting in a loss of approximately $59,000.
Amount of loss: $ 59,000 Attack method: Reentrancy Attack
Description of the event: The Fake CGPT on BNBChain is suspected of a rug pull, and the current token price has dropped by 100%.
Amount of loss: $ 19,550 Attack method: Rug Pull
Description of the event: According to monitoring by the SlowMist security team, Dyson on BNBChain was attacked, resulting in a loss of approximately $31,000.
Amount of loss: $ 31,000 Attack method: Contract Vulnerability