356 hack event(s)
Description of the event: Saber DAO, the automated market maker for stablecoins on Solana, tweeted that its Discord had been attacked and that it had blocked the attackers.
Amount of loss: - Attack method: Account Compromise
Description of the event: A Brazilian YouTuber, Ivan Bianco, accidentally leaked the mnemonic of his cryptocurrency wallet during a live stream on his Fraternidade Crypto channel, resulting in the theft of nearly $60,000 worth of cryptocurrency and a batch of NFTs. Fraternidade Crypto has around 34,000 subscribers on YouTube. During the live broadcast, Bianco opened a file recording the mnemonic phrase, which allowed an unknown person to take control of his wallet and steal its funds. Bianco reported the incident to police after missing the funds. He also claimed that an unidentified man contacted him on Discord after the funds were stolen. The anonymous person identified himself as the money thief and expressed regret for his actions before hanging up and leaving. After the call ended, the wallet that stole most of the funds returned a total of approximately $50,000 worth of crypto assets to Bianco.
Amount of loss: $ 10,000 Attack method: Mnemonic Leakage
Description of the event: On September 1, community users discovered that Gitcoin’s official twitter account was suspected to have been stolen. The thief had used the account to post some phishing information. On September 9, Gitcoin tweeted that it had regained access to the official Twitter account. In the details of the incident later released by the official, Gitcoin stated that it still did not know how the thief bypassed the 2FA verification, but it would continue to investigate and implement stricter security measures in the future.
Amount of loss: - Attack method: Account Compromise
Description of the event: The private key of the BitBrowser browser user was suspected to be leaked, and many members of the encryption community reported that the private key was stolen. BitBrowser issued a notice, admitting that the cached data of the server may have been invaded, and the case has been reported. Users whose wallets have enabled extended data synchronization are at risk of being stolen. It is recommended to take immediate measures to transfer wallet assets. Cos, the founder of SlowMist, said on Twitter that the leakage of the private key of BitBrowser users has caused at least $520,000 in losses.
Amount of loss: $ 520,000 Attack method: Private Key Leakage
Description of the event: NFT collector SOL Big Brain lost about $1.5 million. Attackers compromised the Telegram account of a portfolio company founder and used it to send messages to SOL Big Brain, which double-checked that the sender was indeed the company founder and followed instructions. However, the attackers have set up a contract that uses wallets that allow phishing to drain SOL Big Brain. He lost $740,000 in stablecoins, $550,000 in ETH, and $200,000 in GEAR tokens.
Amount of loss: $ 1,500,000 Attack method: Phishing Attack
Description of the event: Bankruptcy claims agency Kroll experienced a cybersecurity incident that resulted in the disclosure of non-sensitive customer data of certain claimants in pending bankruptcy cases, FTX said on Twitter. FTX's own system is not affected by this incident. BlockFi claimant data was also compromised in the incident. On August 26, FTX issued a document stating that in response to the Kroll cybersecurity incident, FTX has taken precautionary measures to temporarily freeze the affected user accounts in the customer claims portal.
Amount of loss: - Attack method: Information Leakage
Description of the event: Harbor Protocol, the Cosmos ecological cross-chain stablecoin protocol, tweeted that Harbor Protocol was exploited, causing stablecoin minting and part of the funds in stOSMO, LUNA and WMATIC vaults to be depleted. From the information gathered so far, the attackers used the following address to perform all operations: comdex1sma0ntw7fq3fpux8suxkm9h8y642fuqt0ujwt5. Harbor Protocol lost 42,261 LUNA, 1,533 CMDX, 1,571 stOSMO, and 18,600,000,000,000,000 WMATIC-WEI in the attack.
Amount of loss: $ 20,000 Attack method: Contract Vulnerability
Description of the event: The official Sei Network Discord server has been compromised, please do not click on any links until the team confirms that they have regained control of the server.
Amount of loss: - Attack method: Discord was hacked
Description of the event: The official Twitter account of Ethereum expansion solution Metis was stolen. According to officials, team members fell victim to a Sim Swap attack, resulting in malicious actors being able to take over the account for approximately 30 hours.
Amount of loss: - Attack method: Account Compromise
Description of the event: An admin on the Fetch discord server showing the username "Atari_buzz1kLL" has had their @discord account compromised. Please do not interact with any posts on our Discord until the issue has been resolved. There is no Fetch airdrop happening right now.
Amount of loss: - Attack method: Account Compromise
Description of the event: The Twitter account of Blockchain Capital, an encryption venture capital organization, was stolen this morning, and multiple tweets were posted to promote token claim scams. At present, the relevant fraudulent tweets have been deleted, and the Twitter account has now been restored.
Amount of loss: - Attack method: Account Compromise
Description of the event: Legal authorities in the Indian state of Odisha have successfully busted a $120 million (Rs 1,000 crore) cryptocurrency Ponzi scheme. Two central figures in the fraudulent operation have been arrested. The project in question is called The Solar Techno Alliance (STA), using terms like green energy and solar technology. The investigation found that STA, with the assistance of online members, used various persuasive tactics and promises of profits in a short period of time to attract people to participate in the scheme, with more than 10,000 participants in Odisha alone. The investigation revealed that STA was not authorized by RBI, RBI or other regulators to accumulate deposits.
Amount of loss: $ 120,000,000 Attack method: Scam
Description of the event: The Twitter account of Tim Beiko, the core developer of Ethereum, was suspected of being stolen. He posted two tweets about "ETH airdrop" within half an hour with a phishing link(ether.fo). Users are asked not to click on suspicious links to prevent funds from being stolen. According to the analysis of SlowMist, the mastermind behind the scenes is PinkDrainer.
Amount of loss: - Attack method: Account Compromise
Description of the event: A serious flaw in Pond0x, the Pepe the Frog-branded MEME coin launched by Pauly0x, caused traders to lose at least $2.2 million after it was discovered that anyone could transfer tokens belonging to someone else. People quickly started scrambling to steal money from each other. Pauly0x responded by blaming traders who were buying and selling tokens, with various Twitter posts the next day saying he was teaching people a lesson that it wasn’t his fault that people lost money. He wrote to angry traders accusing him of rug pulling. He added a message to the website: "GREED KILLS".
Amount of loss: $ 2,200,000 Attack method: Contract Vulnerability
Description of the event: Cryptocurrency payment service provider Alphapo's hot wallet stolen, $23 million lost. Alphapo client HypeDrop has disabled withdrawals. The stolen funds were first exchanged for ETH on Ethereum and then cross-chained to the Avalanche and BTC networks. Alphapo processes payments for many gaming services such as HypeDrop, Bovada, and Ignition. It is unclear how many bitcoins were stolen from Alphapo. On July 25, on-chain analyst ZachXBT tweeted that in the Alphapo hot wallet theft incident, an additional $37 million stolen on TRON and BTC due to this hack has been found. Now the total stolen from Alphapo has increased to $60 million. The hack was likely carried out by Lazarus.
Amount of loss: $ 60,000,000 Attack method: Wallet Stolen
Description of the event: Recently, Estonian encrypted payment service provider CoinsPaid said it suffered a cyber attack and $37.3 million worth of cryptocurrency was stolen. Although the attack caused significant financial losses to the company and had many adverse effects on the usability of the payment platform, the company stated that customer funds are still safe and the incident will not have a significant impact on the company's business. CoinsPaid said the attack was initiated by the Lazarus hacking group, and their goal was to obtain higher cash. On July 26, SlowMist tweeted that CoinsPaid, Atomic and Alphapo attackers may all be the North Korean hacker organization Lazarus Group.
Amount of loss: $ 37,300,000 Attack method: Unknown
Description of the event: The Twitter account of Uniswap founder Hayden Adams was hacked, and the account sent multiple tweets containing links to scam websites. "Hayden's account has been hacked," the Uniswap Foundation said in a tweet. "Do not click on this link, or one that may appear in similar tweets."
Amount of loss: - Attack method: Account Compromise
Description of the event: Nansen CEO Alex Svanevik tweeted that the Twitter account of PleasrDAO, a decentralized autonomous organization composed of DeFi leaders, early NFT collectors, and digital artists, has been stolen, reminding users not to interact with it. PleasrDAO’s official Twitter account tweeted about the claim of the fake token PLEASR.
Amount of loss: - Attack method: Account Compromise
Description of the event: The Aptos Foundation Twitter account (@Aptos_Network) has been hacked, with hackers directing people to a fraudulent website claiming to participate in a bogus airdrop. Aptos Labs also posted a warning on Twitter, reminding users not to interact with links to fake websites.
Amount of loss: - Attack method: Account Compromise
Description of the event: The cross-chain interoperability protocol LayerZero officially tweeted that its CEO Bryan Pellegrino's Twitter account (@PrimordialAA) was stolen, reminding users not to click on any suspicious links or participate in suspicious activities.
Amount of loss: - Attack method: Account Compromise