289 hack event(s)
Description of the event: UPS on BNBChain was attacked again, losing about $521K. On April 8th, UPS was previously attacked on BNBChain, losing about $30K.
Amount of loss: $ 521,000 Attack method: Unknown
Description of the event: According to monitoring by the SlowMist security team, Linking The World (LW) was attacked on BNBChain due to a contract vulnerability, losing approximately $80,000.
Amount of loss: $ 80,000 Attack method: Contract Vulnerability
Description of the event: The Fake TRUMP (MAGA) on BNBChain is suspected of a rug pull, and the current token price has dropped by 100%.
Amount of loss: $ 957,552 Attack method: Rug Pull
Description of the event: MintRisesPrices on BNBChain suffered a reentrancy attack, resulting in a loss of approximately $59,000.
Amount of loss: $ 59,000 Attack method: Reentrancy Attack
Description of the event: The Fake CGPT on BNBChain is suspected of a rug pull, and the current token price has dropped by 100%.
Amount of loss: $ 19,550 Attack method: Rug Pull
Description of the event: According to monitoring by the SlowMist security team, Dyson on BNBChain was attacked, resulting in a loss of approximately $31,000.
Amount of loss: $ 31,000 Attack method: Contract Vulnerability
Description of the event: AutoChain Global's contract on BNBChain was suspected to be attacked, with a loss of approximately $113,000.
Amount of loss: $ 113,000 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist security team, the TLN Protocol on BNBChain has been attacked again. On May 31, TLN Protocol suffered a loss of approximately $280,000 due to a contract vulnerability exploited by hackers.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist security team, SteamSwap(STM) on BNBChain was attacked, resulting in a loss of approximately $105K.
Amount of loss: $ 105,000 Attack method: Price Manipulation
Description of the event: According to monitoring by the SlowMist security team, NCD on BNBChain was attacked, resulting in a loss of approximately $20,000.
Amount of loss: $ 20,000 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist security team, the TLN Protocol on BNBChain was attacked, resulting in a loss of approximately $280,000.
Amount of loss: $ 280,000 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist security team, EXcommunity on BNBChain is suspected of being attacked, resulting in a loss of approximately $37,000.
Amount of loss: $ 37,000 Attack method: Contract Vulnerability
Description of the event: According to the SlowMist security team, the liquidity aggregator protocol Orion's contract was attacked, resulting in a loss of approximately $616,000.
Amount of loss: $ 616,000 Attack method: Contract Vulnerability
Description of the event: According to the SlowMist security team, RedKeysGame on BNBChain was attacked, resulting in a loss of approximately $10,000.
Amount of loss: $ 10,584 Attack method: Contract Vulnerability
Description of the event: YON on BNBChain was exploited and lost 190 BNB (~$118K) as a result. The vulnerability in the transferFrom function of the target contract (YON) allowed the attacking contract to directly transfer YON to the LP contract.
Amount of loss: $ 118,000 Attack method: Contract Vulnerability
Description of the event: According to the SlowMist security team's monitoring, the TCH token on the BNBChain has been continuously attacked due to a malleability issue, resulting in a loss of approximately $19,000.
Amount of loss: $ 19,000 Attack method: Contract Vulnerability
Description of the event: GPU on BNBChain was attacked, with a loss of about $32,000. There is a logic vulnerability in the _transfer function of the contract. When transferring money to yourself, the balance will increase by the amount of the transfer.
Amount of loss: $ 32,000 Attack method: Contract Vulnerability
Description of the event: OSN on BNBChain is suspected to have been attacked. The attacker initiated multiple attack transactions, resulting in a loss of ~$110K. The attacker took advantage of the OSNLpDividendTracker contract which sells its own tokens as a reward for users adding liquidity.
Amount of loss: $ 110,000 Attack method: Contract Vulnerability
Description of the event: Saturn, the new token issuance protocol, was exploited on the BNB chain, which resulted in a loss of 14.16 BNB, worth approximately $8,343. The protocol would reportedly burn and sync the asset amount before any prior token transfers, which led to a price manipulation attack that caused their SATURN/WBNB pool to be entirely empty.
Amount of loss: $ 8,343 Attack method: Price Manipulation
Description of the event: According to intelligence from the SlowMist Security Team, the YIEDL project on the BSC chain was attacked, with the attacker stealing approximately $300,000. In this incident, the reason lies in the contract’s failure to adequately validate the external parameter(dataList) provided by the user during the processing of the redeem function call. This parameter is critical data for controlling asset exchanges, typically containing specific transaction instructions or routing information. The attacker maliciously constructed this external parameter, enabling unauthorized asset transfers.
Amount of loss: $ 300,000 Attack method: Contract Vulnerability