120 hack event(s)
Description of the event: The attacker useed the transaction congestion attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: This time the attacker is the same person as the last time. Both flo******now and sil******day are the account of the hacker. The two attack methods are also the same. The attacker points to FarmEOS. After placing a bet, and when the attacking contract receives a transfer notification, a large number of defer transactions are initiated, which delays the subsequent lottery draw of FarmEOS, which is the "transaction crowding attack".
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker made a profit of nearly 2000 EOS through the Dice game by deploying the attack contract flo*****now in just a few minutes.
Amount of loss: 2,000 EOS Attack method: Transaction congestion attack
Description of the event: The attacker used transaction congestion attack to exploit vulnerability in the old-version BP nodeos.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker used transaction congestion attack to exploit vulnerability in the old-version BP nodeos.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker used deferBomb to exploit vulnerability in the old-version BP nodeos.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: After the attack contract sil******day places a bet on FarmEOS, and when the attack contract receives a transfer notification, it initiates a large number of defer transactions, which delays the subsequent lottery draw of FarmEOS. The SlowMist security team first two days (1 November 11) disclosed EOS.WIN was attacked in the same way
Amount of loss: 5,000 EOS Attack method: Transaction congestion attack
Description of the event: The attacker launched continuous attacks on the EOS game BetDoge and has successfully profited hundreds of EOS.
Amount of loss: - Attack method: Unknown
Description of the event: The attacker loveforlover launched an attack on EOS.WIN and has already made a profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The random number was cracked.
Amount of loss: - Attack method: Random number attack
Description of the event: Developers have not been able to effectively detect, block, and isolate accounts which is contract high risk or marked as blacklisted.
Amount of loss: 1,262.74 eos Attack method: transaction congestion attack
Description of the event: The attacker launched continuous attacks on the EOS BUFF and has successfully profited hundreds of EOS.
Amount of loss: - Attack method: Unknown
Description of the event: The contract was attacked by a transaction rollback.
Amount of loss: - Attack method: Roll back attack
Description of the event: The random number was attacked by the attacker for the second time.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched an attack on the GameBet game contract gamebetdices, and transfer most of the acquired EOS to the FreeWallet wallet account.
Amount of loss: - Attack method: Roll back attack
Description of the event: The attacker continued to attack the LuckyMe game contract luckymedice1 and had benefited thousands of EOS.
Amount of loss: - Attack method: Roll back attack
Description of the event: The attacker continued to attack the Lucky Nuts game contract nutsgambling and continues to profit from it. Eventually most of the stolen EOS was transferred to the Binance exchange account binancecleos.
Amount of loss: - Attack method: Random number attack
Description of the event: The hacker mastered and modified FAST's token contract, deliberately created a vulnerability that can be used for multiple "additional" tokens for free.
Amount of loss: 10,000 EOS Attack method: Minting Attack
Description of the event: "Transfer Error Prompt", as the game contract does not filter the false notifications provided by the game player.
Amount of loss: - Attack method: Transfer error prompt
Description of the event: The attacker snowredgreen attacked the LuckBet game contract luckbetadmin and transfers most of the acquired EOS to the Huobi exchange account huobideposit
Amount of loss: - Attack method: Random number attack