319 hack event(s)
Description of the event: According to monitoring by the SlowMist security team, AST was allegedly attacked on BSC.
Amount of loss: $ 64,700 Attack method: Contract Vulnerability
Description of the event: BUIDL was suspected to have been attacked on BSC, resulting in an approximate loss of $8K.
Amount of loss: $ 8,000 Attack method: Contract Vulnerability
Description of the event: FortuneWheel was suspected to have been attacked on BSC, resulting in an approximate loss of $21.6K.
Amount of loss: $ 21,600 Attack method: Price Manipulation
Description of the event: HORS was suspected to have been attacked on BSC, resulting in an approximate loss of $10.3K.
Amount of loss: $ 10,300 Attack method: Contract Vulnerability
Description of the event: IPC was suspected to have been attacked on BSC, resulting in an approximate loss of $590K.
Amount of loss: $ 590,000 Attack method: Contract Vulnerability
Description of the event: Mosca was reportedly attacked on BSC, resulting in an approximate loss of $19,500.
Amount of loss: $ 19,500 Attack method: Contract Vulnerability
Description of the event: Slurpycoin on BSC suffered a flash loan attack. The attacker exploited the buyback mechanism to manipulate the token price and profited ~$3K from sandwich arbitrage.
Amount of loss: $ 3,000 Attack method: Flash Loan Attack
Description of the event: The lock contract of the DeFi platform GemPad was exploited on the BSC, ETH, Base, and Polygon networks, resulting in a loss of approximately $2 million.
Amount of loss: $ 2,000,000 Attack method: Contract Vulnerability
Description of the event: Decentralized Finance (DCF) was attacked on the BSC chain, resulting in a loss of approximately $8,800.
Amount of loss: $ 8,800 Attack method: Flash Loan Attack
Description of the event: A suspicious attack involving JHY (JHY) occurred on the BSC chain, resulting in a loss of approximately $11,200.
Amount of loss: $ 11,200 Attack method: Contract Vulnerability
Description of the event: A suspicious reentrancy attack involving bnbs (bnbs) occurred on the BSC chain, resulting in a loss of approximately $20,300.
Amount of loss: $ 20,300 Attack method: Reentrancy Attack
Description of the event: A suspicious attack involving LABUBU (LABUBU) occurred on the BSC chain, resulting in a loss of approximately $11,900.
Amount of loss: $ 11,900 Attack method: Contract Vulnerability
Description of the event: According to the SlowMist security team’s monitoring, RunWay (BYC) appears to have been attacked on BSC, resulting in a loss of approximately $100K.
Amount of loss: $ 100,000 Attack method: Contract Vulnerability
Description of the event: The GAGAW (GAGAW) on BSC is suspected to have been attacked, resulting in a loss of approximately $70K.
Amount of loss: $ 70,000 Attack method: Contract Vulnerability
Description of the event: On November 25, DCF on the BNB Chain was attacked, resulting in a loss of approximately $440,000. The root cause of the vulnerability was an error in the logic implemented by the project team in the transfer function of DCF.
Amount of loss: $ 440,000 Attack method: Flash Loan Attack
Description of the event: The Akashalife (AK1111) on BSC was suspected to have been attacked, resulting in a loss of approximately $31.5K.
Amount of loss: $ 31,500 Attack method: Contract Vulnerability
Description of the event: The Matez (MATEZ) on BSC is suspected to have been attacked, resulting in a loss of at least $80K.
Amount of loss: $ 80,000 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist Security Team, the BSCGem (BSCGem) on BSC is suspected to have been attacked, resulting in a loss of approximately $17.3K.
Amount of loss: $ 17,300 Attack method: Contract Vulnerability
Description of the event: The MFT (MFT) on BSC is suspected to have been attacked, resulting in a loss of approximately $33.7K.
Amount of loss: $ 33,700 Attack method: Contract Vulnerability
Description of the event: The BGM token on BSC was attacked, resulting in losses exceeding $450K, with the attacker profiting through price manipulation.
Amount of loss: $ 450,000 Attack method: Price Manipulation