120 hack event(s)
Description of the event: Tracking the blacklist account gm3dcnqgenes found that its associated account newdexmobapp received 2.09 million EOS, and has now transferred 50,000 EOS to its associated account guagddoefdqu. And in batches of hundreds to thousands of EOS each time, transferred to the stock exchange account (huobideposit), and the remaining 2.04 million EOS, has been dispersed to ftsqfgjoscma, hpbcc4k42nxy, 3qyty1khhkhv, xzr2fbvxwtgt, myqdqdj4qbge, Shprzailrazt, qkwrmqowelyu, lmfsopxpr324, lhjuy3gdkpq4, lcxunh51a1gt, geydddsfkk5e, pnsdiia1pcuy, kwmvzswquqpb, etc., there is the possibility of further turning to the exchange.
Amount of loss: 2,090,000 EOS Attack method: Unknown
Description of the event: Gameboy, a EOS game was attacked. Attacker cont****inop deployed a contract and attacked by calling launch function. According to the analysis of SlowMist security team and confirmed with project side by communication.The project side wrongly add a controlled seed in random algorithm which lead the attack.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched an attack on the EOS game EOSPlaystation.
Amount of loss: ~20000 EOS Attack method: Unknown
Description of the event: The attacker deploys the attack contract rep******net to attack the project party contract windiceadmin.
Amount of loss: ~300 EOS Attack method: Roll back attack
Description of the event: The attacker deploys the attack contract con******nop and combines multiple accounts to attack the project contract eosreeladmin.
Amount of loss: 2046 EOS Attack method: Unknown
Description of the event: The attacker deployed multiple attack contracts to attack the EOS game FASTWIN.
Amount of loss: - Attack method: Roll back attack
Description of the event: The attacker launched continuous attacks on the EOS game EOSlots.
Amount of loss: - Attack method: Fake EOS Vulnerability Attack
Description of the event: The attacker is the same batch of accounts that previously attacked BETX.
Amount of loss: 2000 EOS Attack method: Unknown
Description of the event: This is the third attack on the contract, not a transaction congestion attack, but the real purpose of the attack is the transaction rollback attack.
Amount of loss: - Attack method: Roll back attack
Description of the event: Similar to the way EOSABC was attacked two days ago, the problem has not been fixed.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker launched continuously attacks on the TGON.
Amount of loss: - Attack method: Unknown
Description of the event: The attacker controlled multiple accounts to launch continuously attacks on the EOSlots.
Amount of loss: Unknown Attack method: Replay attack
Description of the event: It is consistent with the previous principles of attacking EOS.Win, FarmEOS, etc., but the technique has changed.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: It is consistent with the previous principles of attacking EOS.Win, FarmEOS, etc., but the method has changed. The attacker controls multiple accounts to cooperate to complete the transaction congestion attack.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker is targeting the game's random number algorithm, and his winning percentage is much higher than other ordinary players.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched continuously attacks on idicefungame and has already made a profit, and transferred to the bitfinex exchange.
Amount of loss: - Attack method: Fake EOS Vulnerability Attack
Description of the event: The attacker used the transaction congestion attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker uses the trade crowding attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The game playgames has been continuously attacked by malicious user niyoubudou33. It has been attacked 295 times as of press time, which is consistent with the previous attacks on EOS.Win, FarmEOS, idice, LuckBet, GameBet, EOSDice, STACK DICE and many other games.
Amount of loss: 2158 EOS Attack method: Transaction congestion attack
Description of the event: The attacker uses the trade crowding attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack