362 hack event(s)
Description of the event: The Ethereum modular execution layer Fuel posted on X, stating that their official Discord had been attacked. Users are advised not to click on any suspicious links or provide any personal information.
Amount of loss: - Attack method: Account Compromise
Description of the event: NEAR's official account posted on X, stating that the official X account of NEAR Protocol had been hijacked. The hacker posted a series of messages attacking the Crypto ecosystem.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: The decentralized liquidity yield project Penpie was attacked, resulting in nearly $30 million in losses. According to the analysis by the SlowMist security team, the core issue of this incident lies in Penpie’s erroneous assumption that all markets created by Pendle Finance are legitimate when registering new Pendle markets. However, Pendle Finance’s market creation process is open, allowing anyone to create a market with customizable key parameters such as the SY contract address. Exploiting this, the attacker created a market contract with a malicious SY contract. They leveraged Penpie’s mechanism, which required calls to external SY contracts to claim rewards, and used flash loans to inject a large amount of liquidity into the market and pool, artificially inflating the rewards and profiting from it.
Amount of loss: $ 30,000,000 Attack method: Contract Vulnerability
Description of the event: The stablecoin protocol Usual posted on X to alert users that its official Discord server has been hacked. Please do not click on any links.
Amount of loss: - Attack method: Account Compromise
Description of the event: Australian blockchain energy technology company Powerledger posted on X that its Telegram channel has been hacked. They advise users not to engage with or share any information as they are currently working to resolve the issue.
Amount of loss: - Attack method: Account Compromise
Description of the event: The DeFi lending platform Aave was attacked due to a contract vulnerability. The attack occurred in a smart contract outside of Aave's core protocol, which is used to allow users to repay loans using existing collateral. The attacker exploited an arbitrary call error, successfully stealing around $56,000 from these various contracts. Aave representatives emphasized that the attack posed no risk to user funds and did not affect the security of the core Aave protocol.
Amount of loss: $ 56,000 Attack method: Contract Vulnerability
Description of the event: Vow suffers an attack due to a contract vulnerability, resulting in a loss of approximately $1.2 million.
Amount of loss: $ 1,200,000 Attack method: Contract Vulnerability
Description of the event: The official Discord server of RARI Foundation has been hacked. Please refrain from using the server until the team has regained control.
Amount of loss: - Attack method: Account Compromise
Description of the event: An external attacker gained access to credentials for managing Nexera Fundrs platform's smart contracts. Using these credentials, the attacker transferred NXRA tokens from Fundrs' staking contracts on Ethereum. Out of the 47.24 million NXRA tokens stolen, the attacker was only able to sell 14.75 million tokens (approximately $449,000). Nexera successfully removed the remaining 32.5 million NXRA balance from the attacker's wallet, preventing further loss.
Amount of loss: $ 1,830,000 Attack method: Malicious Software
Description of the event: According to monitoring by the SlowMist security team, SATOSHI (SATS) was attacked on Ethereum on August 3rd.
Amount of loss: $ 5,000 Attack method: Contract Vulnerability
Description of the event: According to an official tweet from Ethereum Layer 2 network Starknet, their Discord server has been compromised. The official team advises users not to click on any links until the situation is fully resolved.
Amount of loss: - Attack method: Account Compromise
Description of the event: Convergence Finance was attacked. 58M CVG have been minted and sold by the hacker for approximately $210,000 ( the whole portion of tokens dedicated to staking emissions); Approximately $2,000 of unclaimed rewards from Convex have also been stolen. A lack of validation in the input given by the user in the function claimMultipleStaking of the reward distribution contract is the root cause of the exploit.
Amount of loss: $ 210,000 Attack method: Contract Vulnerability
Description of the event: DeFi protocol Spectra suffered an attack, resulting in a loss of approximately $550,000. Spectra has disabled the application and terminated the router contract to contain the situation, while the core protocol contract remains unaffected. Security personnel Chaofan Shou indicated that the attack stemmed from an arbitrary call in the router contract, allowing the attacker to drain all tokens approved by the contract. On July 24th, Spectra released a security incident analysis report, stating that the attacker hijacked user transactions on Spectra, affecting a total of 4 wallets and causing a loss of approximately 168 ETH. The core protocol contract of Spectra remains unaffected, with the funds within the contract secure. The application was restored on the morning of July 24th.
Amount of loss: $ 550,000 Attack method: Contract Vulnerability
Description of the event: The Fake Base Dawgz on Ethereum is suspected of a rug pull, resulting in a loss of over $113,000.
Amount of loss: $ 113,000 Attack method: Rug Pull
Description of the event: The liquidity restaking protocol Renzo tweeted that the Renzo Discord server has been compromised by malicious attackers. Please do not click on any links posted in the server.
Amount of loss: - Attack method: Account Compromise
Description of the event: On July 22, 2024, Kelp's DApp began displaying malicious wallet activity transactions aimed at draining funds. Kelp's engineering team evaluated the situation and identified the root cause to be faulty nameservers routing users to different application code that was attempting to trick the users into phishing. The attackers gained access to Kelp’s domain registrar account impersonating Kelp team and successfully convinced GoDaddy’s customer support that they were the legitimate owners of the account bypassing the 2-FA that was in place.
Amount of loss: - Attack method: DNS Hijacking Attack
Description of the event: A misconfiguration in the Rho Markets lending protocol allowed an MEV bot operator to take $7.6 million from the project's users across multiple chains. The MEV bot operator sent an on-chain message indicating their willingness to return all the funds. Subsequently, the MEV bot operator returned the funds as planned.
Amount of loss: $ 7,600,000 Attack method: Oracle Misconfiguration
Description of the event: According to on-chain sleuth ZachXBT, the Ethena Discord server has been hacked. Do not click on any links for the time being.
Amount of loss: - Attack method: Account Compromise
Description of the event: Dough Finance was attacked due to a contract vulnerability. Some unauthorized funds were extracted by hackers, resulting in a loss of approximately $2.1 million. Around 76 ETH (approximately $260,000) has been returned by white hat hackers.
Amount of loss: $ 2,100,000 Attack method: Contract Vulnerability
Description of the event: Compound DAO security advisor Michael Lewellen tweeted that the Compound Finance official website (http://compound.finance) has been compromised and is currently hosting a phishing site. Do not interact with the site until further notice.
Amount of loss: - Attack method: DNS Hijacking Attack