SlowMist Zone | 中文

The total amount of money lost by blockchain hackers is about

$ 13,387,097,203.64

Total hack events 323

  • 2020-09-20

    Hacked target: Soda

    Description of the event: The financial blogger "Super Bitcoin" stated on Weibo that Mr. Huai (weibo username "crash X") participated in the liquidity mining project Soda, and suddenly discovered a loophole in which 20,000 ETH can be directly liquidated Drop. But he chose to tell the development team, but the development team did not pay attention. He had no choice but to liquidate an ETH, and sent a Weibo warning to inform the developers of the existence of this bug. One hour later, the parties to the Soda agreement responded by prompting the borrower to repay and the mortgager to withdraw, and at the same time indicated that they would fix the loopholes and suspend the front-end borrowing function. But as of the early morning of September 21st, more than 400 ETH in Soda's mortgage loan pool were still maliciously liquidated. In the morning of the same day, the agreement officially stated on Twitter that the vulnerability has been fixed, and the newly deployed smart contract is expected to take effect at 21:00 on September 22.

    Amount of loss: 446 ETH Attack method: Unknown

  • 2020-09-20

    Hacked target: LV Finance

    Description of the event: According to the intelligence of SlowMist Zone, the Ethereum mining project LV Finance project is suspected to be off the road. Unlike previous projects, the project used fake audit websites and provided false audit information to trick investors into making investments. After a period of time, the amount in the fund pool was large enough Run away from time to time. Currently, the project website lv.finance is no longer accessible. In this morning’s news, according to users’ reports, LV Finance is suspected of running away, and 4 million have been transferred in less than an hour. Currently its website is no longer accessible. It is said that some users have directly lost 80% of their assets.

    Amount of loss: $ 4,000,000 Attack method: Ponzi

  • 2020-09-19

    Hacked target: Bantiample

    Description of the event: The Bantiample team, a project on the Binance Smart Chain, has cashed out 3000 BNB to run away. At present, the main developer of the team has deleted the Telegram account, and the project token BMAP has fallen by more than 90% in a single day. According to the project's description, BMAP is a kind of AMPL-like imitation. Every time a user participates in a transaction, the total amount is reduced by 1%. However, it is actually just a common token, and it does not have the functions described by the project party. It just uses the AMPL project hotspot to commit fraud.

    Amount of loss: 3,000 BNB Attack method: Fraud

  • 2020-09-16

    Hacked target: Arbistar

    Description of the event: The team of crypto company Arbistar announced that it will close the trading tool Community Bot. The operator said that all funds on the platform are currently frozen and prevent users from withdrawing funds. The financial forensic company Tulip Research has repeatedly warned users that Arbistar is a multi-billion-dollar encrypted Ponzi scam. Arbistar CEO stated that it will return investors' funds from September 15th. If users resort to law, they will freeze the funds and wait for judicial settlement.

    Amount of loss: 0 Attack method: Encrypted Ponzi Scam

  • 2020-09-14

    Hacked target: bZx

    Description of the event: bZx officially tweeted that at 3:28 am Eastern time (15:30, September 13th, Beijing time), we began to study the decline in TVL of the agreement. By 6:18 AM EST (18:30, September 13th, Beijing time), we confirmed that several iTokens had repeated incidents. Lending is temporarily suspended. The duplicate method has been patched from the iToken contract code, and the agreement has resumed normal operation. According to the information of the founder of Compound, there are a total of US$2.6 million in LINK, US$1.6 million in ETH, and US$3.8 million in stablecoins, with a total of US$8 million in assets affected. 1inch co-founder Anton Bukov tweeted that the attacker had stolen about 4,700 ETH in this incident and attached the address of the stolen funds. In response, bZx said that the funds are currently not at risk. The funds listed have been deducted from our insurance fund. On September 16, bZx released an iToken repeat incident report, and the attacker has returned all funds.

    Amount of loss: $ 8,000,000 Attack method: Duplicate funding acquisition

  • 2020-09-20

    Hacked target: Soda

    Description of the event: The financial blogger "Super Bitcoin" stated on Weibo that Mr. Huai (weibo username "crash X") participated in the liquidity mining project Soda, and suddenly discovered a loophole in which 20,000 ETH can be directly liquidated Drop. But he chose to tell the development team, but the development team did not pay attention. He had no choice but to liquidate an ETH, and sent a Weibo warning to inform the developers of the existence of this bug. One hour later, the parties to the Soda agreement responded by prompting the borrower to repay and the mortgager to withdraw, and at the same time indicated that they would fix the loopholes and suspend the front-end borrowing function. But as of the early morning of September 21st, more than 400 ETH in Soda's mortgage loan pool were still maliciously liquidated. In the morning of the same day, the agreement officially stated on Twitter that the vulnerability has been fixed, and the newly deployed smart contract is expected to take effect at 21:00 on September 22.

    Amount of loss: 446 ETH Attack method: Unknown

  • 2020-09-20

    Hacked target: LV Finance

    Description of the event: According to the intelligence of SlowMist Zone, the Ethereum mining project LV Finance project is suspected to be off the road. Unlike previous projects, the project used fake audit websites and provided false audit information to trick investors into making investments. After a period of time, the amount in the fund pool was large enough Run away from time to time. Currently, the project website lv.finance is no longer accessible. In this morning’s news, according to users’ reports, LV Finance is suspected of running away, and 4 million have been transferred in less than an hour. Currently its website is no longer accessible. It is said that some users have directly lost 80% of their assets.

    Amount of loss: $ 4,000,000 Attack method: Ponzi

  • 2020-09-19

    Hacked target: Bantiample

    Description of the event: The Bantiample team, a project on the Binance Smart Chain, has cashed out 3000 BNB to run away. At present, the main developer of the team has deleted the Telegram account, and the project token BMAP has fallen by more than 90% in a single day. According to the project's description, BMAP is a kind of AMPL-like imitation. Every time a user participates in a transaction, the total amount is reduced by 1%. However, it is actually just a common token, and it does not have the functions described by the project party. It just uses the AMPL project hotspot to commit fraud.

    Amount of loss: 3,000 BNB Attack method: Fraud

  • 2020-09-16

    Hacked target: Arbistar

    Description of the event: The team of crypto company Arbistar announced that it will close the trading tool Community Bot. The operator said that all funds on the platform are currently frozen and prevent users from withdrawing funds. The financial forensic company Tulip Research has repeatedly warned users that Arbistar is a multi-billion-dollar encrypted Ponzi scam. Arbistar CEO stated that it will return investors' funds from September 15th. If users resort to law, they will freeze the funds and wait for judicial settlement.

    Amount of loss: 0 Attack method: Encrypted Ponzi Scam

  • 2020-09-14

    Hacked target: bZx

    Description of the event: bZx officially tweeted that at 3:28 am Eastern time (15:30, September 13th, Beijing time), we began to study the decline in TVL of the agreement. By 6:18 AM EST (18:30, September 13th, Beijing time), we confirmed that several iTokens had repeated incidents. Lending is temporarily suspended. The duplicate method has been patched from the iToken contract code, and the agreement has resumed normal operation. According to the information of the founder of Compound, there are a total of US$2.6 million in LINK, US$1.6 million in ETH, and US$3.8 million in stablecoins, with a total of US$8 million in assets affected. 1inch co-founder Anton Bukov tweeted that the attacker had stolen about 4,700 ETH in this incident and attached the address of the stolen funds. In response, bZx said that the funds are currently not at risk. The funds listed have been deducted from our insurance fund. On September 16, bZx released an iToken repeat incident report, and the attacker has returned all funds.

    Amount of loss: $ 8,000,000 Attack method: Duplicate funding acquisition

  • 2020-09-10

    Hacked target: SYFI

    Description of the event: Amplify, a user of DeFi, discovered a bug in SYFI, a smart contract for DeFi, and made 747 ETH on a single transaction, but from other users. The project crashed.

    Amount of loss: 747 ETH Attack method: Unknown

  • 2020-09-10

    Hacked target: 珊瑚

    Description of the event: The wRAM of the EOS ecological DeFi liquidity mining project Coral was attacked by hackers and lost more than 120,000 EOS.

    Amount of loss: 120,000 EOS Attack method: Reentry attack

  • 2020-09-10

    Hacked target: K-Electric

    Description of the event: Pakistan’s largest electricity producer K-Electric suffered a ransomware attack this week, and hackers demanded a ransom of $7.7 million in Bitcoin.

    Amount of loss: $ 7,700,000 Attack method: Ransomware

  • 2020-09-09

    Hacked target: EMD

    Description of the event: According to SlowMist Zone intelligence, EOS project EMD is suspected to be on the run. To date, EmeraldMine1 has transferred 780,000 USDT, 490,000 EOS and 56,000 DFS to Account SJI111111111, and 121,000 EOS has been transferred to Changenow coin Laundering. Current lost MARKET value: US $2,468,838 =17,281,866 RMB. The project was upgraded to a contract after its release, according to the master network deployment records. SlowMist Security team to remind, do not continue to send funds to this project.

    Amount of loss: ¥ 17,281,866 Attack method: Unknown

  • 2020-09-09

    Hacked target: Soft Finance

    Description of the event: A user with a Twitter account named Amplify revealed that he made a profit of US$250,000 from a system vulnerability in the new DeFi project Soft Finance.

    Amount of loss: $ 250,000 Attack method: Unknown

  • 2020-09-08

    Hacked target: ETERBASE

    Description of the event: European encrypted exchange ETERBASE has been hacked, resulting in the theft of some hot wallets and the loss of more than $5 million in assets.

    Amount of loss: $ 5,000,000 Attack method: Unknown

  • 2020-09-08

    Hacked target: Banco Estado

    Description of the event: Banco Estado Bank, one of the three largest banks in Chile, had to shut down its nationwide business on the 7th due to a cyber attack by REvil ransomware.

    Amount of loss: 0 Attack method: REvil ransomware

  • 2020-09-07

    Hacked target: 阿根廷国家移民局

    Description of the event: It is said that hackers used the encrypted virus NetWalker to enter the database and steal information from federal agencies. The dark web payment page linked in the ransomware description shows that the hacker initially paid $2 million worth of bitcoin to unlock the file. Within a week, this number had increased to 355 BTC, which is approximately $3.62 million.The Argentine government refused to pay the ransom.

    Amount of loss: $ 3,620,000 Attack method: used the encrypted virus NetWalker to enter the database

  • 2020-09-07

    Hacked target: TSEM

    Description of the event: Hackers carried out ransomware attacks against Tower Semiconductor Ltd (TSEM), a maker of wireless chips and camera sensors listed on the Israeli Nasdaq, and demanded hundreds of thousands of dollars in bitcoin ransoms. For safety reasons, TSEM shut down some running servers and suspended production in some factories.

    Amount of loss: 0 Attack method: Unknown

  • 2020-09-06

    Hacked target: CherryFi

    Description of the event: DeFi project Cherry CherryFi in telegraphic cluster said that USDT contract could not be extracted at this time due to a line of code during the migration process, the team will present a compensation plan, suggesting that users all withdraw TRX. CherryFi code is unaudited.

    Amount of loss: 0 Attack method: Unknown

  • 2020-09-05

    Hacked target: Chainlink

    Description of the event: At least nine Chainlink node operators were attacked last Sunday, depleting about 700 ETH in their wallets. The attack allegedly exploited the way the nodes responded to queries and involved the use of tokens related to the cost of network transactions.

    Amount of loss: 700 ETH Attack method: Exploited the way the nodes responded to queries

Submit Comments