329 hack event(s)
Description of the event: Fake ElonTroll on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 92,000 Attack method: Rug Pull
Description of the event: The liquidity mining project Narwhal’s token experienced two considerable drops within a two day period leading to an overall slippage of approximately 99%. The project’s official X account @Narwhal_fyi, announced that they had experienced an exploit, but did not give any specific details. On-chain links suggest this incident was an exit scam. Approximately $1 million worth of funds were deposited into Tornado Cash with a further $410,000 sitting in two wallets.
Amount of loss: $ 1,500,000 Attack method: Rug Pull
Description of the event: NFPrompt announced on its social media platform that the team detected issues with Web2 wallet service. They assured users about the security of their funds and recommended using self-custodied Web3 wallets. For users facing issues, they were advised to open a ticket in the project's Discord channel to mitigate the problem.
Amount of loss: - Attack method: Unknown
Description of the event: ChannelsFinance on BSC was attacked, resulting in losses of over $320K. The contract uses an old Compound v2 protocol which has a known vulnerability.
Amount of loss: $ 320,000 Attack method: Price Manipulation
Description of the event: Fake FomoFi (FOMO) on BNB Chain is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 189,600 Attack method: Rug Pull
Description of the event: NebulaNode (NNNN) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 335,900 Attack method: Rug Pull
Description of the event: Fake NFPrompt (NFP) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 173,193 Attack method: Rug Pull
Description of the event: According to on-chain data, a user deposited 0.5 BNB into Venus and borrowed a series of assets, including stkBNB, ankrBNB, etc. The user then exchanged them for 116.45 ETH assets and transferred them to another account. In response to the attack on Venus, official personnel from the Venus Protocol addressed the issue on Telegram, stating, "The core pool and XVS are not affected. The attack occurred due to a price malfunction in Binance's oracle, involving the BNB price in a small independent pool. The snBNB team is currently addressing this issue. The cause has been identified, and it has been reported to the Binance oracle team."
Amount of loss: $ 270,000 Attack method: Oracle Attack
Description of the event: CKD Token (CKD) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 539,000 Attack method: Rug Pull
Description of the event: The FCN-TRUST (FCN) token On BSC was exploited for over $504k in a flash loan attack. The attack caused the token price to crash by 99%.
Amount of loss: $ 504,000 Attack method: Flash Loan Attack
Description of the event: Fake TrustPad (TPAD) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 240,006 Attack method: Rug Pull
Description of the event: DarkProtocol (DARK) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 230,833 Attack method: Rug Pull
Description of the event: Dor (DOR) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 240,270 Attack method: Rug Pull
Description of the event: Web (WEB) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 217,791 Attack method: Rug Pull
Description of the event: Creso (CRE) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 233,693 Attack method: Rug Pull
Description of the event: IPMB (IPMB) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 232,074 Attack method: Rug Pull
Description of the event: DigiFund (DFUND) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 237,894 Attack method: Rug Pull
Description of the event: RepubliK (RPK) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 235,995 Attack method: Rug Pull
Description of the event: PAPABEAR (PAPA) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 235,249 Attack method: Rug Pull
Description of the event: Changpeng Zhao (CZ) on BSC is suspected of a rug pull, with the deployer removing substantial liquidity, causing a 100% price decline.
Amount of loss: $ 302,028 Attack method: Rug Pull