1895 hack event(s)
Description of the event: The memecoin platform Four.Meme was attacked. According to an analysis by the SlowMist security team, the attacker was able to execute a frontrunning attack by pre-creating a liquidity pool on PancakeSwap v3 with an extremely high token price. When the token was integrated into PancakeSwap v3, liquidity was added based on the unbalanced pool set up by the attacker. Since the project team did not verify the pool's price, the added liquidity followed the maliciously set price. As a result, the attacker was able to exploit this mechanism to drain assets from the pool.
Amount of loss: $ 183,000 Attack method: Business Logic Flaw
Description of the event: According to monitoring by the SlowMist security team, Cashverse appears to have been attacked on BSC.
Amount of loss: $ 107,900 Attack method: Contract Vulnerability
Description of the event: According to monitoring by the SlowMist security team, BankX appears to have been attacked on BSC, ETH, and Optimism.
Amount of loss: $ 43,000 Attack method: Contract Vulnerability
Description of the event: The X account of Tanzanian businessman and entrepreneur Mohammed Dewji MO (@moodewji) was compromised. The hacker falsely announced the launch of a TANZANIA token and sold it to investors.
Amount of loss: - Attack method: Account Compromise
Description of the event: JupiterDAO confirmed on X that the official Jupiter X account (@JupiterExchange) has been compromised. Users are advised not to click on any links or copy-paste any contract addresses.
Amount of loss: - Attack method: Account Compromise
Description of the event: According to a post by SlowMist founder Cos on X, the X account of former Malaysian Prime Minister Dr Mahathir Mohamad (@chedetofficial) was compromised and used to promote a fake token. The creator of the associated contract address (CA) has ties to a previously known malicious group.
Amount of loss: - Attack method: Account Compromise
Description of the event: On February 4, 2025, the Ionic protocol suffered a social engineering attack, allowing the attacker to use a forged Lombard Bitcoin Token (LBTC) as collateral. This asset was deployed on the Mode network. The attacker deployed the forged LBTC on January 9, 2025, while Ionic records indicate that the attacker began interacting with the platform as early as December 12, 2024. After several weeks of business development (BD) discussions, the Ionic team approved the fraudulent asset as eligible collateral and provided a Balancer pool with $400,000 in liquidity, along with API3 oracle price feeds. Ultimately, the Ionic Mode main market accepted the forged LBTC as collateral, with a total supply of 250 LBTC. The attacker minted 250 LBTC in their own wallet and deposited them into Ionic as collateral, stealing $12.3 million worth of supplied assets.
Amount of loss: $ 12,300,000 Attack method: Social Engineering
Description of the event: The official TIME Magazine X account was allegedly compromised and posted about the TIME token.
Amount of loss: - Attack method: Account Compromise
Description of the event: The Tor Project X account has been compromised. The hacker is using the account to promote a fake token. Users should stay vigilant.
Amount of loss: - Attack method: Account Compromise
Description of the event: According to DL News, Dean Norris, the actor who played Hank Schrader in Breaking Bad, became the target of a hack on the X platform for the second time in six months. The attack started with a tweet from Norris' account announcing his decision to launch his own cryptocurrency called Dean, along with the contract address. The attackers even shared a manipulated photo of Norris holding a notebook with the token's symbol and date hastily written on it. Within hours, the meme coin's market value surged to $7 million, but after Norris confirmed the scam, its value plummeted by 90%.
Amount of loss: - Attack method: Account Compromise
Description of the event: The X account of former Brazilian President Jair Messias Bolsonaro was hacked and used to promote the token. The original post has since been deleted.
Amount of loss: - Attack method: Account Compromise
Description of the event: The AdsPower security team discovered a breach in which hackers distributed malicious code, resulting in the compromise of some third-party browser extensions.
Amount of loss: $ 4,700,000 Attack method: Supply Chain Attack
Description of the event: According to monitoring by the SlowMist security team, due to a lack of input validation in @odosprotocol, the vulnerability has been exploited across multiple chains, resulting in approximately $100,000 in losses. ODOS stated in a post that the attack exploited a vulnerability in its audited executor contract, allowing the theft of revenue stored within the contract but not affecting any user funds.
Amount of loss: $ 100,000 Attack method: Contract Vulnerability
Description of the event: The Singapore-based Phemex cryptocurrency exchange's hot wallets were hacked, resulting in a loss of approximately $70 million.
Amount of loss: $ 70,000,000 Attack method: Unknown
Description of the event: According to The Block, Nasdaq's official X account was hacked, and the attackers used it to promote fraudulent meme coins.
Amount of loss: - Attack method: Account Compromise
Description of the event: According to monitoring by the SlowMist security team, AST was allegedly attacked on BSC.
Amount of loss: $ 64,700 Attack method: Contract Vulnerability
Description of the event: MetaMask posted on X: “This morning, our co-founder Dan Finlay's Farcaster account was compromised and used to promote a memecoin. We are in touch with the Farcaster team to help investigate the incident."
Amount of loss: - Attack method: Account Compromise
Description of the event: A Twitter account named @TrumpDailyPosts, with over 1.3 million followers, not only automatically crossposts Donald Trump's Truth Social posts to Twitter but also shares Trump-related news and other tweets. This X account promoted at least four meme coins, with the posts being deleted within minutes after sharing, resulting in approximately $1.25 million in losses.
Amount of loss: $ 1,250,000 Attack method: Unknown
Description of the event: Stability AI's official X account posted information related to the STAI token contract, which appears to have been compromised. Be cautious to avoid falling victim to a scam.
Amount of loss: - Attack method: Account Compromise
Description of the event: The ZKsync team tweeted that the @ZKsyncIgnite account has been compromised. Do not interact with the account or click any links. Wait for the @zksync account to confirm when the account has been reclaimed.
Amount of loss: - Attack method: Account Compromise