311 hack event(s)
Description of the event: Decentralized Finance (DCF) was attacked on the BSC chain, resulting in a loss of approximately $8,800.
Amount of loss: $ 8,800 Attack method: Flash Loan Attack
Description of the event: A suspicious attack involving JHY (JHY) occurred on the BSC chain, resulting in a loss of approximately $11,200.
Amount of loss: $ 11,200 Attack method: Contract Vulnerability
Description of the event: A suspicious reentrancy attack involving bnbs (bnbs) occurred on the BSC chain, resulting in a loss of approximately $20,300.
Amount of loss: $ 20,300 Attack method: Reentrancy Attack
Description of the event: A suspicious attack involving LABUBU (LABUBU) occurred on the BSC chain, resulting in a loss of approximately $11,900.
Amount of loss: $ 11,900 Attack method: Contract Vulnerability
Description of the event: According to the SlowMist security team’s monitoring, RunWay (BYC) appears to have been attacked on BSC, resulting in a loss of approximately $100K.
Amount of loss: $ 100,000 Attack method: Contract Vulnerability
Description of the event: The GAGAW (GAGAW) on BSC is suspected to have been attacked, resulting in a loss of approximately $70K.
Amount of loss: $ 70,000 Attack method: Contract Vulnerability
Description of the event: On November 25, DCF on the BNB Chain was attacked, resulting in a loss of approximately $440,000. The root cause of the vulnerability was an error in the logic implemented by the project team in the transfer function of DCF.
Amount of loss: $ 440,000 Attack method: Flash Loan Attack
Description of the event: The Akashalife (AK1111) on BSC was suspected to have been attacked, resulting in a loss of approximately $31.5K.
Amount of loss: $ 31,500 Attack method: Contract Vulnerability
Description of the event: The Matez (MATEZ) on BSC is suspected to have been attacked, resulting in a loss of at least $80K.
Amount of loss: $ 80,000 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist Security Team, the BSCGem (BSCGem) on BSC is suspected to have been attacked, resulting in a loss of approximately $17.3K.
Amount of loss: $ 17,300 Attack method: Contract Vulnerability
Description of the event: The MFT (MFT) on BSC is suspected to have been attacked, resulting in a loss of approximately $33.7K.
Amount of loss: $ 33,700 Attack method: Contract Vulnerability
Description of the event: The BGM token on BSC was attacked, resulting in losses exceeding $450K, with the attacker profiting through price manipulation.
Amount of loss: $ 450,000 Attack method: Price Manipulation
Description of the event: Radiant Capital posted on X acknowledging issues with its lending markets on BNB Chain and Arbitrum. Trading on Base and Mainnet markets has been paused. According to SlowMist’s security team analysis, the incident occurred after the Radiant attacker illegally gained control of 3 multisig permissions and upgraded to a malicious contract to steal funds. The incident analysis report released by Radiant reveals that the attackers successfully compromised the devices of at least three core contributors through sophisticated malware injection techniques. These compromised devices were then used to sign malicious transactions.
Amount of loss: $ 50,000,000 Attack method: Multisignature Theft
Description of the event: A suspicious attack involving HYDT tokens has occurred on BSC, resulting in a loss of approximately $58,000.
Amount of loss: $ 58,000 Attack method: Price Manipulation
Description of the event: On September 22, Bankroll Network on BNB was attacked due to a contract vulnerability, resulting in a loss of approximately $230,000.
Amount of loss: $ 230,000 Attack method: Contract Vulnerability
Description of the event: Caterpillar Coin suffered a flashloan attack resulting in a loss of ~$1.4M and causing a 99% slippage on the token. The attack exploited vulnerabilities in the "price protection mechanisms", which led to the manipulation of token reserves and rewards.
Amount of loss: $ 1,400,000 Attack method: Flash Loan Attack
Description of the event: According to monitoring by the SlowMist security team, the staking and lending protocol HFLH on BNB Chain has been attacked. Users are advised to stay vigilant.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: HFLH (HFLH) was suspected to have been attacked on BNB, resulting in a loss of approximately $5,300.
Amount of loss: $ 5,300 Attack method: Price Manipulation
Description of the event: iVest DAO was attacked due to a smart contract vulnerability, resulting in a loss of approximately $172,000.
Amount of loss: $ 172,000 Attack method: Contract Vulnerability
Description of the event: UPS on BNBChain was attacked again, losing about $521K. On April 8th, UPS was previously attacked on BNBChain, losing about $30K.
Amount of loss: $ 521,000 Attack method: Unknown