1949 hack event(s)
Description of the event: It is consistent with the previous principles of attacking EOS.Win, FarmEOS, etc., but the method has changed. The attacker controls multiple accounts to cooperate to complete the transaction congestion attack.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker is targeting the game's random number algorithm, and his winning percentage is much higher than other ordinary players.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched continuously attacks on idicefungame and has already made a profit, and transferred to the bitfinex exchange.
Amount of loss: - Attack method: Fake EOS Vulnerability Attack
Description of the event: The attacker used the transaction congestion attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker uses the trade crowding attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The game playgames has been continuously attacked by malicious user niyoubudou33. It has been attacked 295 times as of press time, which is consistent with the previous attacks on EOS.Win, FarmEOS, idice, LuckBet, GameBet, EOSDice, STACK DICE and many other games.
Amount of loss: 2158 EOS Attack method: Transaction congestion attack
Description of the event: The attacker uses the trade crowding attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker useed the transaction congestion attack to attack the game contract and ultimately profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: This time the attacker is the same person as the last time. Both flo******now and sil******day are the account of the hacker. The two attack methods are also the same. The attacker points to FarmEOS. After placing a bet, and when the attacking contract receives a transfer notification, a large number of defer transactions are initiated, which delays the subsequent lottery draw of FarmEOS, which is the "transaction crowding attack".
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker made a profit of nearly 2000 EOS through the Dice game by deploying the attack contract flo*****now in just a few minutes.
Amount of loss: 2,000 EOS Attack method: Transaction congestion attack
Description of the event: The attacker used transaction congestion attack to exploit vulnerability in the old-version BP nodeos.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker used transaction congestion attack to exploit vulnerability in the old-version BP nodeos.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The attacker used deferBomb to exploit vulnerability in the old-version BP nodeos.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: After the attack contract sil******day places a bet on FarmEOS, and when the attack contract receives a transfer notification, it initiates a large number of defer transactions, which delays the subsequent lottery draw of FarmEOS. The SlowMist security team first two days (1 November 11) disclosed EOS.WIN was attacked in the same way
Amount of loss: 5,000 EOS Attack method: Transaction congestion attack
Description of the event: From January 13th to 14th, a huge amount of unauthorized cryptocurrency transfer occurred in Cryptopia, which was suspected of being stolen. On January 15, the exchange posted a tweet claiming that it was hacked and 28,773 ETH was stolen. After that, on January 30th, the exchange experienced another security breach, stolen 1,675 ETH. On May 15, Cryptopia announced that it would enter the liquidation process.
Amount of loss: 17,500,000 Attack method: Security vulnerabilities
Description of the event: A former employee of the now-defunct Cryptopia exchange allegedly stole more than 250,000 New Zealand dollars (US$182,300) of cryptocurrency and customer data from Cryptopia. However, the New Zealand authorities managed to recover the stolen funds and return them to Cryptopia's liquidator Grant Thornton. The man explained in detail how he stole the funds. He said that he unauthorizedly copied the private keys belonging to Cryptopia's many wallets and saved the data on a USB storage device. Then he uploaded the data to his personal computer at home. This allows him to use thousands of wallets and more than 100 million U.S. dollars in various cryptocurrencies.
Amount of loss: - Attack method: Private Key Leakage
Description of the event: The attacker launched continuous attacks on the EOS game BetDoge and has successfully profited hundreds of EOS.
Amount of loss: - Attack method: Unknown
Description of the event: The attacker loveforlover launched an attack on EOS.WIN and has already made a profit.
Amount of loss: - Attack method: Transaction congestion attack
Description of the event: The random number was cracked.
Amount of loss: - Attack method: Random number attack
Description of the event: The attacker launched a 51% attack through the rental power, and the exchanges such as Gate.io, Yobit, and Bitrue were affected, and after a week, the attacker returned all the ETC.
Amount of loss: 219,500 ETC Attack method: 51% attack