Blockchain total loss money by hacked is about

$ 46,350,054.52

Blockchain : 28 hack event(s)

  • 2020-09-05

    Hacked target: Chainlink

    Description of the event: At least nine Chainlink node operators were attacked last Sunday, depleting about 700 ETH in their wallets. The attack allegedly exploited the way the nodes responded to queries and involved the use of tokens related to the cost of network transactions.

    Amount of loss: 700 ETH Attack method: Exploited the way the nodes responded to queries
  • 2020-08-30

    Hacked target: ETC

    Description of the event: Bitfly tweeted that another massive 51% attack on ETC today resulted in the restructuring of more than 7,000 blocks, equivalent to about two days of mining time. All missing blocks are removed from balances that have never expired, and all expenditures are checked for missing transactions.

    Amount of loss: 0 Attack method: 51% attack
  • 2020-08-25

    Hacked target: Filecoin

    Description of the event: The Filecoin space race started, and the CDSI alliance node "t02398" suffered a large number of malicious and illegal attacks. The attacker sent a large number of messages through the filtered whitelist to block the node, consuming a lot of calculations on the Lotus node, making the node unable to complete the task normally and eventually losing computing power.

    Amount of loss: 0 Attack method: Sent a large number of messages through the filtered whitelist to block the node.
  • 2020-08-06

    Hacked target: ETC

    Description of the event: Bitfly officially tweeted that ETC encountered another large-scale 51% attack today. The attack has resulted in the reorganization of more than 4000 blocks. Bitfly reminded that unless the official notified further, the current mining pool payment is invalid. At the same time, the government encourages all miners to switch ETH pools on the official website. Blockchain data analysis company Bitquery released an investigation report on the second 51% attack of ETC. The report shows that the initiator of this attack and the initiator of the first attack were the same miner. The attackers profited at least 1.68 million US dollars from this attack.

    Amount of loss: $ 1,680,000 Attack method: 51% attack
  • 2020-08-01

    Hacked target: ETC

    Description of the event: Bitfly tweeted that today, the ETC blockchain has undergone a chain reorganization of 3693 blocks at a block height of 10904146. This causes all state construction nodes to stop synchronizing. The ETC blockchain did not produce blocks for nearly 6 hours, and then the block production returned to normal.

    Amount of loss: 0 Attack method: the miner using the old software
  • 2020-07-10

    Hacked target: 俄罗斯区块链投票平台

    Description of the event: In the recent referendum on constitutional reform, 1.14 million Russians voted through the blockchain platform, but their data has been made public on the Internet and can be accessed directly from state-owned servers. Election officials Shared a ZIP file containing id card information, passport Numbers and other passport information of people who voted on the blockchain platform, sources said. The ZIP file is stored on a government website. The files are free and can be downloaded by anyone at any given time. In addition, the files are password-protected, though the passwords are not very strong. Meanwhile, there are other problems with the blockchain voting platform, such as a loophole for partial repeat votes.

    Amount of loss: 0 Attack method: Unknown
  • 2020-07-03

    Hacked target: Ravencoin

    Description of the event: Ravencoin's community member CryptoScope team discovered that there are vulnerabilities in the Ravencoin blockchain, which has been cast by unknown people. 1.5% of the total RVN is 21 billion. Tron Black, the developer of Ravencoin, said that these tokens may have been sold to the market after being mined, so the economic losses have been absorbed by the Ravencoin ecosystem. The official reminds all miners, mining pools or exchanges to upgrade the client to the latest version, just use the latest version. The community is also considering various options to reduce the subsequent impact of the incident, such as halving the time in advance to restore the total to the original planned 21 billion.

    Amount of loss: 0 Attack method: -
  • 2020-05-28

    Hacked target: Filecoin

    Description of the event: 6Block technical staff found a serious vulnerability in the Filecoin code, through which the unlimited issuance of Filecoin can be achieved. The 6Block stated that, for proving the effectiveness of the vulnerability, the three miner accounts t01043, t027999, and t0234783 of 6Block had completed an additional issuance of 1.6 billion Filecoin using the vulnerability, taking the top three places in the Filecoin rich list. The 6Block team independently discovered and reported the vulnerability to Filecoin official, and is currently actively assisting the Filecoin to complete the vulnerability fixing.

    Amount of loss: - Attack method: Unknown
  • 2020-04-03

    Hacked target: Cocos-BCX

    Description of the event: Cocos-BCX has verified with the exchange, conducted internal investigations and concluded that asset loss and malicious selling that occurred are due to the malicious theft of the mapping wallet information. After verifying and confirming with the exchange, the total amount of stolen tokens this time was 1,087,522,819.2 COCOS, and the exchange confirmed that this total amount has been sold.

    Amount of loss: 1,087,522,819.2 COCOS Attack method: Unknown
  • 2020-01-28

    Hacked target: Bitcoin Gold

    Description of the event: Bitcoin Gold hit by 51% attacks, $90K in cryptocurrency double-spent

    Amount of loss: 7167 BTG Attack method: 51% attack
  • 2019-12-23

    Hacked target: NULS

    Description of the event: The NULS team account was hacked, and the hackers transferred 2,000,000 NULS from the NULS team account

    Amount of loss: 2,000,000 NULS Attack method: Unknown
  • 2019-12-14

    Hacked target: VeChain

    Description of the event: Approximately 1.1 billion VET tokens in this address were transferred into 0xD802A148f38aBa4759879c33E8d04deb00cFB92b, this individual address.

    Amount of loss: 1.1 billion VET Attack method: Unknown
  • 2019-12-01

    Hacked target: Vertcoin

    Description of the event: Vertcoin (VTC) was attacked by 51%

    Amount of loss: 0.44 BTC Attack method: 51% attack
  • 2019-06-30

    Hacked target: Waltonchain

    Description of the event: The mainnet of Waltonchain was suffered coordinated attack, and the problem has been solved through the upgrade of the mainnet.

    Amount of loss: - Attack method: Coordinated Attack
  • 2019-01-06

    Hacked target: ETC

    Description of the event: The attacker launched a 51% attack through the rental power, and the exchanges such as Gate.io, Yobit, and Bitrue were affected, and after a week, the attacker returned all the ETC.

    Amount of loss: 219,500 ETC Attack method: 51% attack
  • 2018-11-10

    Hacked target: Aurumcoin

    Description of the event: The attacker has a large amount of computing power to launch 51% attack

    Amount of loss: 16,000 AU Attack method: 51% attack
  • 2018-10-12

    Hacked target: Vertcoin

    Description of the event: The attacker has a large amount of computing power to launch 51% attack

    Amount of loss: ~100,000 USD Attack method: 51% attack
  • 2018-06-08

    Hacked target: Litecoin Cash

    Description of the event: According to the official news of Litecoin Cash (LCC), LCC has been attacked by 51% recently. The LCC team has contacted the exchange and increased the number of confirmed blocks to 100 to prevent attacks.

    Amount of loss: - Attack method: 51% attack
  • 2018-06-02

    Hacked target: ZenCash

    Description of the event: The ZenCash network encountered a 51% cyber attack or double-spend attack at around 8:26 PM on June 2nd (June 3rd 00:26 UTC). This attack resulted in the loss of Zen encrypted tokens worth approximately US $550,000. The ZenCash team responded immediately and implemented preventive mitigation measures, which greatly increased the difficulty of future cyber attacks.

    Amount of loss: $ 550,000 Attack method: 51% attack
  • 2018-05-29

    Hacked target: Verge

    Description of the event: The last repair was bypassed, resulting in another 51% attack and a loss of approximately US$4.82 million.

    Amount of loss: $ 4,820,000 Attack method: 51% attack
  • 2018-05-22

    Hacked target: Verge

    Description of the event: The attacker discovers and manipulates errors in the Verge code, causing false timestamps to be set on the block and then dig out new blocks quickly. The protocol of Verge is uses five mining algorithms in turn, and the attacker increases control over two of them: scrypt and lyra2re. The attack should be between block 2155850 and block 2206272. Within a few hours of the attack, the 35 million XVGs, which cost about $1.75 million, were stolen at the prevailing exchange rate.

    Amount of loss: 35,000,000 XVG Attack method: 51% attack
  • 2018-05-18

    Hacked target: Monacoin

    Description of the event: On May 18, a Reddit netizen posted that Monacoin suffered a 51% computing power attack, a selfish mining attack, and a time stamp attack. The exact time occurred from May 13 to May 15. Some exchanges that support Monacoin trading, such as Bittrex, Livecoin have closed Monacoin recharge.

    Amount of loss: ~90,000 USD Attack method: 51% attack
  • 2018-05-16

    Hacked target: Bitcoin Gold

    Description of the event: Bitcoin Gold was 51% attacked by an unknown attacker. This type of attack allows an attacker to manipulate the blockchain ledger that records transactions. During the attack, 388,000 BTG (worth approximately US$18 million) was stolen from several cryptocurrency exchanges. After the team refused to help pay for some of the losses, Bitcoin Gold was subsequently delisted from Bittrex.

    Amount of loss: 388,201 BTG Attack method: 51% attack
  • 2018-04-04

    Hacked target: Verge

    Description of the event: The Verge network was attacked by 51% for the first time. According to Bitcointalk forum user ocminer, a malicious miner can use forged timestamps to mine blocks, thereby tricking the network into thinking that the new block was mined one hour ago, so that when the next mined block is immediately added to the network, it also added to the blockchain. This allowed the attacker to mine one block per second, which is said to have mined 250,000 XVG.

    Amount of loss: 250,000 XVG Attack method: 51% attack
  • 2018-04-02

    Hacked target: Electroneum

    Description of the event: The attacker has a large amount of computing power to launch 51% attack

    Amount of loss: - Attack method: 51% attack
  • 2017-04-01

    Hacked target: Stellar

    Description of the event: Messari, a cryptocurrency research organization, announced on the 27th that Stellar's blockchain protocol had an inflation loophole in April 2017. An attacker used the loophole to create 2.25 million XLM (worth about 10 million US dollars). This bug was discovered by the Stellar Development Foundation (SDF) and patched after the accident.

    Amount of loss: 10,000,000 Attack method: Inflation
  • 2013-06-08

    Hacked target: Feathercoin

    Description of the event: On June 8, Feathercoin was attacked by 51%. Before the attack, Feathercoin's total computing power was 0.2GH/s, and during the time of the attack, the computing power doubled 7 times to 1.5GH/s. Thirty-one hours later, an investigation revealed that the attacker took away 580,000 Feathercoin through a double-spending attack on the exchange, at a current price of $63,800.

    Amount of loss: $ 63,800 Attack method: 51% attack
  • 2012-01-06

    Hacked target: Coiledcoin

    Description of the event: The attacker has a large amount of computing power to launch 51% attack.

    Amount of loss: - Attack method: 51% attack