352 hack event(s)
Description of the event: The X account of former Brazilian President Jair Messias Bolsonaro was hacked and used to promote the token. The original post has since been deleted.
Amount of loss: - Attack method: Account Compromise
Description of the event: The AdsPower security team discovered a breach in which hackers distributed malicious code, resulting in the compromise of some third-party browser extensions.
Amount of loss: $ 4,700,000 Attack method: Supply Chain Attack
Description of the event: According to monitoring by the SlowMist security team, due to a lack of input validation in @odosprotocol, the vulnerability has been exploited across multiple chains, resulting in approximately $100,000 in losses. ODOS stated in a post that the attack exploited a vulnerability in its audited executor contract, allowing the theft of revenue stored within the contract but not affecting any user funds.
Amount of loss: $ 100,000 Attack method: Contract Vulnerability
Description of the event: According to The Block, Nasdaq's official X account was hacked, and the attackers used it to promote fraudulent meme coins.
Amount of loss: - Attack method: Account Compromise
Description of the event: MetaMask posted on X: “This morning, our co-founder Dan Finlay's Farcaster account was compromised and used to promote a memecoin. We are in touch with the Farcaster team to help investigate the incident."
Amount of loss: - Attack method: Account Compromise
Description of the event: Stability AI's official X account posted information related to the STAI token contract, which appears to have been compromised. Be cautious to avoid falling victim to a scam.
Amount of loss: - Attack method: Account Compromise
Description of the event: The CAT Protocol within the Bitcoin ecosystem posted on Platform X, stating that they recently detected and mitigated an attempted attack on the CAT Protocol, confirming that no user funds were lost. On January 18, CAT Protocol updated on Platform X that the recent security incident had been amicably resolved and classified it as a white-hat action.
Amount of loss: - Attack method: Contract Vulnerability
Description of the event: According to Foresight News, the Foresight Ventures X account was hacked and is currently in the process of being recovered. Please do not click or trust any links or token information posted by this account.
Amount of loss: - Attack method: Account Compromise
Description of the event: The X account of Ryan Zarick, co-founder and CTO of LayerZero Labs, was briefly compromised and used to post a fraudulent airdrop claim along with a phishing link.
Amount of loss: - Attack method: Account Compromise
Description of the event: The official X account of the blockchain AI project Aizel Network was hacked at noon on January 11 and is currently in the process of being recovered. The official reminder to users is to be cautious of the content posted by this account, do not trust any token information, and avoid clicking on any suspicious links or participating in any suspicious activities.
Amount of loss: - Attack method: Account Compromise
Description of the event: The official X account of Solv Protocol has been compromised. Users are advised not to click on any suspicious links.
Amount of loss: - Attack method: Account Compromise
Description of the event: lmk.fun (formerly Scopescan) issued an alert on the X platform, warning that the X account of the Web3 knowledge graph protocol 0xScope (@ScopeProtocol) has been hacked. Users are advised not to click on any links or trust any content posted by the account. An investigation and recovery are currently in progress.
Amount of loss: - Attack method: Account Compromise
Description of the event: The official X account of the RWA lending protocol Centrifuge was compromised, and fake information was posted.
Amount of loss: - Attack method: Account Compromise
Description of the event: According to monitoring by Scam Sniffer, the X account of Superchain Eco (@SuperchainEco) was compromised and used to post phishing links.
Amount of loss: - Attack method: Account Compromise
Description of the event: Animoca Brands tweeted that @ysiu social media account has been compromised. There is no official token or NFT launch from Animoca Brands. The token launch on Solana as claimed in a post was made by the hacker. Please do not engage with the account and stay vigilant.
Amount of loss: - Attack method: Account Compromise
Description of the event: According to Scam Sniffer's monitoring, the privacy-preserving data verification protocol zkPass's X account was compromised and used to post phishing tweets.
Amount of loss: - Attack method: Account Compromise
Description of the event: Regarding rumors about the collaboration between DOGE and USUAL, Azoria CEO James Fishback clarified that he had contacted DOGE's head of department, Vivek Ramaswamy, whose account was compromised.
Amount of loss: - Attack method: Account Compromise
Description of the event: The official X account of AI startup Anthropic, backed by Amazon, appears to have been compromised, posting an unknown token contract address related to AI Agents.
Amount of loss: - Attack method: Account Compromise
Description of the event: Canadian rapper Drake's X account (with over 39 million followers) was allegedly compromised on Saturday evening, promoting a Solana meme coin based on his cartoon "alter ego" character. The coin's trading volume reached $5 million at one point, but it was later confirmed to be a scam, and the related posts have been deleted.
Amount of loss: - Attack method: Account Compromise
Description of the event: The algorithmic stablecoin protocol Haven Protocol has issued a warning about a hack exploiting a vulnerability in "range proof validation." This flaw allows attackers to mint illicit XHV undetected. According to reports from exchanges, the amount of XHV exceeds 500 million tokens, while audit data indicates a current supply of only 263 million tokens. The surplus is likely generated through this exploit. The team found a weakness in the "range proof validation", which was introduced after the Haven 3.2 rebase to Monero and has advised exchanges to halt trading on all pairs.
Amount of loss: - Attack method: Contract Vulnerability