69 hack event(s)
Description of the event: The privacy coin project Firo stated on Twitter that it is currently under 51% attacks and it is recommended that users do not trade during this period until the network returns to normal.
Amount of loss: - Attack method: 51% attack
Description of the event: Aeternity (AE) was attacked by 51% yesterday. According to core members of the Aeternity community, the 51% attack caused a loss of more than 39 million AE tokens. The official team is solving the problem. The main damages are exchanges and mining pools. Exchanges are concentrated in OKEx, Gate, and Binance. In this regard, Aeternity Chaohua Community Moderator "February Honghong" said that 51% attacks will not create new tokens. He can understand it as copying a fake token from the attacker and sending it to Exchange withdrawals are often the unlucky ones, and mining pools are the same. Therefore, 51% attacks are not technical vulnerabilities. POW itself is such an operating mechanism, so the team will not settle claims.
Amount of loss: $ 5,201,240 Attack method: 51% attack
Description of the event: According to reports, the Grin network has recently suffered 51% attacks. An unknown entity controlled more than 57% of network computing power on Saturday. According to the Grin website, the team advises people to wait for "additional confirmation on payment finality." According to a reminder announcement issued on the Grin website on November 9, "Important notice: Grin's network computing power has increased significantly in a short period of time. It is worth noting that this coincides with the time when the Nicehash rate doubled. Currently, more than 50% of the network computing The power is outside the known pool. Considering these circumstances, it is wise to wait for additional confirmation of the transaction to ensure the finality of the payment.” According to previous reports, on November 8, 2Miners tweeted that Grin Network is receiving 51 % Attacked, payment has stopped. Please do so at your own risk, as new blocks may be rejected.
Amount of loss: - Attack method: 51% attack
Description of the event: Bitfly tweeted that another massive 51% attack on ETC today resulted in the restructuring of more than 7,000 blocks, equivalent to about two days of mining time. All missing blocks are removed from balances that have never expired, and all expenditures are checked for missing transactions.
Amount of loss: - Attack method: 51% attack
Description of the event: The Filecoin space race started, and the CDSI alliance node "t02398" suffered a large number of malicious and illegal attacks. The attacker sent a large number of messages through the filtered whitelist to block the node, consuming a lot of calculations on the Lotus node, making the node unable to complete the task normally and eventually losing computing power.
Amount of loss: - Attack method: DDoS Attack
Description of the event: Two small-scale token projects, NUGS and NEXE, appeared to have committed "travel fraud" shortly after being launched on Uniswap. The NUGS project blamed this move on a "smart contract vulnerability". On its official telegram channel, NUGS stated that its smart contract is now "unfixable." Another project, NEXE, is also suspected to have gone, and the social media account of this project has been deleted.
Amount of loss: - Attack method: Rug Pull
Description of the event: Bitfly officially tweeted that ETC encountered another large-scale 51% attack today. The attack has resulted in the reorganization of more than 4000 blocks. Bitfly reminded that unless the official notified further, the current mining pool payment is invalid. At the same time, the government encourages all miners to switch ETH pools on the official website. Blockchain data analysis company Bitquery released an investigation report on the second 51% attack of ETC. The report shows that the initiator of this attack and the initiator of the first attack were the same miner. The attackers profited at least 1.68 million US dollars from this attack.
Amount of loss: $ 1,680,000 Attack method: 51% attack
Description of the event: Bitfly tweeted that today, the ETC blockchain has undergone a chain reorganization of 3693 blocks at a block height of 10904146. This causes all state construction nodes to stop synchronizing. The ETC blockchain did not produce blocks for nearly 6 hours, and then the block production returned to normal.
Amount of loss: - Attack method: The miner using the old software
Description of the event: YFII's hard fork project YYFI has completely become an "exit scam" in the early morning of August 1. From the very beginning, this project seems to be determined to prepare for its own run.
Amount of loss: - Attack method: Scam
Description of the event: The team that developed Bitcoin Gold (BTG), a bifurcated project, has announced a 51% attack. According to the official disclosure, THE BTG network has been hit by 51% attacks lasting nearly 10 days. However, on July 2, the BTG team had issued an attack alert to the mine pool and the exchange and issued version 0.17.2, which included checkpoints at 640,650 blocks. The BTG team reminds all BTG Core nodes to upgrade to version 0.17.2.
Amount of loss: - Attack method: 51% attack
Description of the event: Ravencoin's community member CryptoScope team discovered that there are vulnerabilities in the Ravencoin blockchain, which has been cast by unknown people. 1.5% of the total RVN is 21 billion. Tron Black, the developer of Ravencoin, said that these tokens may have been sold to the market after being mined, so the economic losses have been absorbed by the Ravencoin ecosystem. The official reminds all miners, mining pools or exchanges to upgrade the client to the latest version, just use the latest version. The community is also considering various options to reduce the subsequent impact of the incident, such as halving the time in advance to restore the total to the original planned 21 billion.
Amount of loss: $ 40,000,000 Attack method: Minting Attack
Description of the event: 6Block technical staff found a serious vulnerability in the Filecoin code, through which the unlimited issuance of Filecoin can be achieved. The 6Block stated that, for proving the effectiveness of the vulnerability, the three miner accounts t01043, t027999, and t0234783 of 6Block had completed an additional issuance of 1.6 billion Filecoin using the vulnerability, taking the top three places in the Filecoin rich list. The 6Block team independently discovered and reported the vulnerability to Filecoin official, and is currently actively assisting the Filecoin to complete the vulnerability fixing.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: Cocos-BCX has verified with the exchange, conducted internal investigations and concluded that asset loss and malicious selling that occurred are due to the malicious theft of the mapping wallet information. After verifying and confirming with the exchange, the total amount of stolen tokens this time was 1,087,522,819.2 COCOS, and the exchange confirmed that this total amount has been sold.
Amount of loss: 1,087,522,819.2 COCOS Attack method: Wallet Stolen
Description of the event: Last week, BTG encountered two 51% computing power attacks, and both recharge transactions to exchanges were cancelled, involving about 1,900 BTG and 5267 BTG, which was close to 90,000 US dollars.
Amount of loss: $ 90,000 Attack method: 51% attack
Description of the event: The well-known public chain NULS suffered a hacker attack and lost nearly $480,000 worth of NULS tokens. The SlowMist security team analyzed and found that the reason for the attack was that there was a loophole in the NULS transaction signature verification algorithm. The hacker bypassed the signature verification by using a carefully constructed transaction, transferred the tokens of the team account, and then some tokens were thrown into the market. , At present, major exchanges have suspended the deposit and withdrawal of NULS. After the attack, the official urgently checked the problem, carried out problem repair and code testing, and then released a new version of the program, and scheduled a hard fork at the height of 878000 (about noon on December 25th, Beijing time) to freeze other tokens that have not flowed into the market.
Amount of loss: $ 480,000 Attack method: Vulnerability in transaction signature verification algorithm
Description of the event: The VeChain Foundation, a non-profit organization supporting the VeChain public blockchain platform, announced that their repurchase address was leaked at 12:27 PM Eastern Time on Friday (ie 1:27 AM Beijing time) . The company stated in the announcement: “The security breach is most likely due to the improper behavior of a member of our finance team who created a repurchase account without fully complying with the standard procedures approved by the foundation, and due to human error. , Our audit team did not find such inappropriate behavior. We want to emphasize that the incident has nothing to do with the actual standard process or the effectiveness of VeChain’s hardware wallet solution."
Amount of loss: $ 6,500,000 Attack method: Human error
Description of the event: The chief maintainer of Vertcoin James Lovejoy revealed in an attack report on December 2 that a malicious entity targeted the cryptocurrency exchange Bittrex to manipulate the Vertcoin blockchain. The hacker paid at least $440 to attack VTC, but fortunately Vertcoin was not affected.
Amount of loss: - Attack method: 51% attack
Description of the event: The mainnet of Waltonchain was suffered coordinated attack, and the problem has been solved through the upgrade of the mainnet.
Amount of loss: - Attack method: Coordinated Attack
Description of the event: The attacker launched a 51% attack through the rental power, and the exchanges such as Gate.io, Yobit, and Bitrue were affected, and after a week, the attacker returned all the ETC.
Amount of loss: 219,500 ETC Attack method: 51% attack
Description of the event: Vertcoin suffered a major attack in which hackers stole funds worth $100,000.
Amount of loss: $ 100,000 Attack method: 51% attack