255 hack event(s)
Description of the event: The CST deployer sold tokens, resulting in a roughly 99% drop in the token price. Contract address: 0x0a92285241b0ea93Eff4195Db4530AF1a4bcfE0c. Deployer address: 0xabE6BC5Ca4Ae76251F0cB647F9817E3566EC3D0b.
Amount of loss: - Attack method: Rug Pull
Description of the event: FSL project is suspected of being a Rug Pull, with a loss of approximately $1.68 million. FSL token plummeted 99.8%.
Amount of loss: $ 1,680,000 Attack method: Rug Pull
Description of the event: On Oct 10, a fake Bitcoin BSC Token (BTCBSC) on BSC was rugged for ~$48.7K. The deployer removed 235.871 WBNB and 4,271,589.56 BTCBSC token from the LP. Contract Address: 0x48747d325d139b1F9cD29d9381Fb73228B9AFfec. Deployer Address: 0xA51EA8e037e0a1A391A39Bc8b5CE1EC6533780Df.
Amount of loss: $ 48,700 Attack method: Rug Pull
Description of the event: Lucky star Currency Token on Binance Smart Chain has rugged for ~$1.11 million, down 98%.
Amount of loss: $ 1,110,000 Attack method: Rug Pull
Description of the event: There is a large liquidity removal on a fake CommEx token. Deployer removed ~$154k from the LP. BSC: 0xD1C3ee0f845bCc38a8cB9Dc5337dFd5a372Bb8Ed.
Amount of loss: $ 154,000 Attack method: Rug Pull
Description of the event: There is an exit scam on a fake EigenLayer token. The deployer profited ~$300k. BSC: 0x14ac066ac2CD24CBdE31f78659c11F13aB61E4e7.
Amount of loss: $ 300,000 Attack method: Rug Pull
Description of the event: There was a large liquidity removal on DKP resulting in losses of approximately $204,000 USDT. The token contract is 0xd06fa1BA7c80F8e113c2dc669A23A9524775cF19.
Amount of loss: $ 204,000 Attack method: Rug Pull
Description of the event: On September 26th, XSDWETHpool On BSC was exploited for ~$12.1k in a flash loan attack. The attacker created a malicious contract to interact with the pool contract and gained 56.96 WBNB. Pool Contract: 0xbfBcB8BDE20cc6886877DD551b337833F3e0d96d.
Amount of loss: $ 12,100 Attack method: Flash Loan Attack
Description of the event: There is an exit scam on a fake Justus Token associated with fake Twitter Justusztoken. Deployer dumped 302 WBNB for a profit of ~$59k. BSC: 0xae7607dE0F0665220E77b76E18d94965076e684c.
Amount of loss: $ 59,000 Attack method: Rug Pull
Description of the event: There was a flash loan exploit on Kub/Kub-split. The attacker gained ~$78.4k via pool manipulation. Contract: 0xc98E183D2e975F0567115CB13AF893F0E3c0d0bD.
Amount of loss: $ 78,400 Attack method: Flash Loan Attack
Description of the event: There was a large liquidity removal on DUO. The Deployer removed $352.6K WBNB of LP in 3 transactions over a 4 day period. BSC: 0x1ED990bdcAEf4B13b01F4996dDe59EcD04F1343A .
Amount of loss: $ 352,698 Attack method: Rug Pull
Description of the event: There was a large liquidity removal on Unleashed Beast (BEAST). Deployer removed ~$55.3k from the LP. BSC:0x626b596dd10467ea969179235123f884e133074a.
Amount of loss: $ 55,300 Attack method: Rug Pull
Description of the event: There was a large liquidity removal on BNBpay. Deployer profited ~$114k from this liquidity removal. BSC: 0xaDD62696db2c2fb7DE8e0f07F422e03BF69646A2.
Amount of loss: $ 114,000 Attack method: Rug Pull
Description of the event: On September 21st, the Linear stable coin $LUSD appears to be under an exploit attack. While the team investigates, do not buy LUSD, do not trade $LUSD. Liquidations are paused and users accounts are not at risk.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: There is a slippage on Baka Casino (BAKAC) caused by EOA 0x9e5C8 who dumped tokens for ~$57k. The price has dropped 80%. BSC:0x0e9c0f8fcc8e60f8daeb569448a41514eb321471
Amount of loss: $ 57,000 Attack method: Rug Pull
Description of the event: A fake BitGo token on BSC rugged for ~$194.3k WBNB from the honeypot and has moved 909.2 BNB through TornadoCash. BSC: 0xddd00e04cd2e26221cc3c2c7f4781a87e4c79818. Deployer Address: 0xaf85ef92dc34593e2a1d6c65c2a857ad36f1a4d6。
Amount of loss: $ 194,300 Attack method: Rug Pull
Description of the event: There is a large liquidity removal on the fake Base token. BSC: 0x2025273c4B985a00bc60E871a9031a12FF216F9B. Deployer 0x6d3503d16Bb93a7d9b47F510C7568868F2BFcCEf has profited ~$71.6k.
Amount of loss: $ 71,600 Attack method: Rug Pull
Description of the event: BFCToken suffered from a flash loan attack, resulting in losses of ~$38k. BSC: 0x595eac4a0ce9b7175a99094680fbe55a774b5464. The attacker was able to burn BFCTokens from the pool at no expense by exploiting the "_transfer" function.
Amount of loss: $ 38,000 Attack method: Flash Loan Attack
Description of the event: We have seen a large liquidity removal on a fake Patex token. BSC: 0xbFDf31187Ea84651414545eDEA0a27104D514a70. Deployer gained ~$97.5k from removing liquidity on a honeypot token.
Amount of loss: $ 97,500 Attack method: Rug Pull
Description of the event: We have detected a malicious flash loan on HCT token. BSC: 0x0FDfcfc398Ccc90124a0a41d920d6e2d0bD8CcF5. Approximately 30.5 BNB was lost. 30 BNB has been deposited into Tornado Cash by EOA 0xC89.
Amount of loss: 30.5 BNB Attack method: Flash Loan Attack