56 hack event(s)
Description of the event: Last week, BTG encountered two 51% computing power attacks, and both recharge transactions to exchanges were cancelled, involving about 1,900 BTG and 5267 BTG, which was close to 90,000 US dollars.
Amount of loss: $ 90,000 Attack method: 51% attack
Description of the event: The well-known public chain NULS suffered a hacker attack and lost nearly $480,000 worth of NULS tokens. The SlowMist security team analyzed and found that the reason for the attack was that there was a loophole in the NULS transaction signature verification algorithm. The hacker bypassed the signature verification by using a carefully constructed transaction, transferred the tokens of the team account, and then some tokens were thrown into the market. , At present, major exchanges have suspended the deposit and withdrawal of NULS. After the attack, the official urgently checked the problem, carried out problem repair and code testing, and then released a new version of the program, and scheduled a hard fork at the height of 878000 (about noon on December 25th, Beijing time) to freeze other tokens that have not flowed into the market.
Amount of loss: $ 480,000 Attack method: Vulnerability in transaction signature verification algorithm
Description of the event: The VeChain Foundation, a non-profit organization supporting the VeChain public blockchain platform, announced that their repurchase address was leaked at 12:27 PM Eastern Time on Friday (ie 1:27 AM Beijing time) . The company stated in the announcement: “The security breach is most likely due to the improper behavior of a member of our finance team who created a repurchase account without fully complying with the standard procedures approved by the foundation, and due to human error. , Our audit team did not find such inappropriate behavior. We want to emphasize that the incident has nothing to do with the actual standard process or the effectiveness of VeChain’s hardware wallet solution."
Amount of loss: $ 6,500,000 Attack method: Human error
Description of the event: The chief maintainer of Vertcoin James Lovejoy revealed in an attack report on December 2 that a malicious entity targeted the cryptocurrency exchange Bittrex to manipulate the Vertcoin blockchain. The hacker paid at least $440 to attack VTC, but fortunately Vertcoin was not affected.
Amount of loss: - Attack method: 51% attack
Description of the event: The mainnet of Waltonchain was suffered coordinated attack, and the problem has been solved through the upgrade of the mainnet.
Amount of loss: - Attack method: Coordinated Attack
Description of the event: The attacker launched a 51% attack through the rental power, and the exchanges such as Gate.io, Yobit, and Bitrue were affected, and after a week, the attacker returned all the ETC.
Amount of loss: 219,500 ETC Attack method: 51% attack
Description of the event: Vertcoin suffered a major attack in which hackers stole funds worth $100,000.
Amount of loss: $ 100,000 Attack method: 51% attack
Description of the event: According to a report by Finder on November 12, AurumCoin (AU), a new digital currency based on the monetary gold standard system (the US dollar operation method), has recently suffered a 51% attack and lost 15,752.26 Australian dollars (approximately 11,362 US dollars).
Amount of loss: $ 11,362 Attack method: 51% attack
Description of the event: According to the official news of Litecoin Cash (LCC), LCC has been attacked by 51% recently. The LCC team has contacted the exchange and increased the number of confirmed blocks to 100 to prevent attacks.
Amount of loss: - Attack method: 51% attack
Description of the event: The last repair was bypassed, resulting in another 51% attack and a loss of approximately US$4.82 million.
Amount of loss: $ 4,820,000 Attack method: 51% attack
Description of the event: The attacker discovers and manipulates errors in the Verge code, causing false timestamps to be set on the block and then dig out new blocks quickly. The protocol of Verge is uses five mining algorithms in turn, and the attacker increases control over two of them: scrypt and lyra2re. The attack should be between block 2155850 and block 2206272. Within a few hours of the attack, the 35 million XVGs, which cost about $1.75 million, were stolen at the prevailing exchange rate.
Amount of loss: 35,000,000 XVG Attack method: 51% attack
Description of the event: Bitcoin Gold was 51% attacked by an unknown attacker. This type of attack allows an attacker to manipulate the blockchain ledger that records transactions. During the attack, 388,000 BTG (worth approximately US$18 million) was stolen from several cryptocurrency exchanges. After the team refused to help pay for some of the losses, Bitcoin Gold was subsequently delisted from Bittrex.
Amount of loss: 388,201 BTG Attack method: 51% attack
Description of the event: The Verge network was attacked by 51% for the first time. According to Bitcointalk forum user ocminer, a malicious miner can use forged timestamps to mine blocks, thereby tricking the network into thinking that the new block was mined one hour ago, so that when the next mined block is immediately added to the network, it also added to the blockchain. This allowed the attacker to mine one block per second, which is said to have mined 250,000 XVG.
Amount of loss: 250,000 XVG Attack method: 51% attack
Description of the event: The attacker has a large amount of computing power to launch 51% attack
Amount of loss: - Attack method: 51% attack
Description of the event: On June 8, Feathercoin was attacked by 51%. Before the attack, Feathercoin's total computing power was 0.2GH/s, and during the time of the attack, the computing power doubled 7 times to 1.5GH/s. Thirty-one hours later, an investigation revealed that the attacker took away 580,000 Feathercoin through a double-spending attack on the exchange, at a current price of $63,800.
Amount of loss: $ 63,800 Attack method: 51% attack
Description of the event: The attacker has a lot of computing power to launch a 51% attack. The interesting thing about the Coiledcoin attack is that it is not economically driven, but purely political. Although this move has caused some protests in the community, it shows how vulnerable the SHA-256 cryptocurrency with low hashing power is to attack.
Amount of loss: - Attack method: 51% attack