EOS DApp total loss money by hacked is about

$ 10,807,676.74

EOS DApp : 112 hack event(s)

  • 2019-10-12

    Hacked target: BitDice

    Description of the event: Hackers launched a "fake EOS" attack on BitDice, a guessing game, earning more than 4,000 EOS and transferring it to EXMO, ChangeNOW and other exchanges.

    Amount of loss: 4,000 EOS Attack method: Fake EOS token attack
  • 2019-09-02

    Hacked target: skreosladder

    Description of the event: "skreosladder" has been attacked again by hackers, who have earned thousands of EOS. The hacker has attacked the game several times and has been blacklisted by the project side, but the hacker still used the trumpet to circumvent the restrictions.

    Amount of loss: - Attack method: Unknown
  • 2019-08-13

    Hacked target: SKR EOS

    Description of the event: SKR EOS games have again been attacked by hackers, who have now earned about 4,000 EOS. After analysis, hackers still use the transaction congestion attack, operating multiple trumpet attacks on the game in turn.

    Amount of loss: 4,000 EOS Attack method: Transaction Congestion Attack
  • 2019-08-10

    Hacked target: SKReos

    Description of the event: SKReos have been hacked again, and hackers are now earning thousands of EOS. After a preliminary analysis, hackers are still using transaction congestion attack.

    Amount of loss: - Attack method: Transaction Congestion Attack
  • 2019-08-04

    Hacked target: Royale

    Description of the event: EOS Royale has been attacked by hackers, who have gained around 18,000 EOS.

    Amount of loss: 18000 EOS Attack method: Unknown
  • 2019-08-02

    Hacked target: LuckyClover

    Description of the event: Multiple hackers have launched a series of attacks on the EOS game LuckyClover, earning thousands of EOS.

    Amount of loss: Unknown Attack method: Hard_fail attack
  • 2019-08-02

    Hacked target: UnicornBet

    Description of the event: Multiple hackers have launched a series of attacks on the EOS game UnicornBet, earning thousands of EOS.

    Amount of loss: - Attack method: Fake EOS token attack
  • 2019-07-03

    Hacked target: HiGold Game

    Description of the event: The hacker launched a continuous attack on the HiGold Game and realized the profit.

    Amount of loss: - Attack method: Random number attack
  • 2019-06-24

    Hacked target: yizeslotsbet

    Description of the event: EOS contract yizeslotsbet suffers transfer error prompt, the attacker has already obtained 10000FB token.

    Amount of loss: 10000 FB Attack method: Transfer error prompt
  • 2019-06-14

    Hacked target: SKR EOS

    Description of the event: Continuous attack by hackers to SKR EOS, earning thousands of EOS.

    Amount of loss: - Attack method: Random number attack
  • 2019-06-11

    Hacked target: BETX

    Description of the event: The 600 million BETX tokens held by BETX managers were stolen by hacker and sold on the Newdex exchange. Preliminary analysis shows that the cause of this attack is that the private key of BETX project is stolen, and the hacker gains the owner privilege and transfers all the existing tokens of the contract. The selloff caused the BETX token to fluctuate sharply and close to zero.

    Amount of loss: 600,000,000 BETX Attack method: The private key is stolen
  • 2019-05-24

    Hacked target: Poker EOS

    Description of the event: EOS game Poker EOS appears abnormal, which is confirmed to be caused by the disclosure of the private key of the game. The hackers made more than 20,000 EOS in total, and more than 10,000 of them have been transferred to the exchanges.

    Amount of loss: 26992.2297 EOS Attack method: private key-exposure
  • 2019-04-29

    Hacked target: eosblue.one

    Description of the event: The attacker constructed the malicious memo, which caused the eosblue.one server parsing exceptions, thus continuously winning prizes or leading to unusually large refunds.

    Amount of loss: 12,883 EOS Attack method: Memo attack
  • 2019-04-03

    Hacked target: DEOS Games

    Description of the event: The attacker creates new accounts in batches, and then makes a small bet in exchange for a large return, and the bet return rate is abnormally high.

    Amount of loss: 2090 EOS Attack method: Automatically attack lucky draw system
  • 2019-04-03

    Hacked target: EOSlots

    Description of the event: The attacker launched continuously attacks and profit from the EOSlots, and the game has been suspended operations.

    Amount of loss: 2468.92 EOS Attack method: Random number attack
  • 2019-04-01

    Hacked target: EosNow

    Description of the event: The attacker controlled multiple accounts to launch continuously attacks and profit from the E EosNow again. It was still transaction congestion attack.

    Amount of loss: 200 EOS Attack method: Transaction congestion attack
  • 2019-03-29

    Hacked target: EosNow

    Description of the event: The attacker controlled multiple accounts to launch continuously attacks and profit from the EosNow, and the game has been suspended operations.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-03-28

    Hacked target: ZION

    Description of the event: ZION.games sustained attack by malicious users ggggggggggxx, profits of more than 2849 EOS, and transferred to the Binance Exchange. The attack is similar to the attack on TGON, suspected to be the same group.

    Amount of loss: 2849 EOS Attack method: Unknown
  • 2019-03-27

    Hacked target: TGON

    Description of the event: The attacker controlled multiple accounts to launch continuously attacks on the TGON, made thousands of EOS in profit from the TGON, and transferred to the Binance Exchange.

    Amount of loss: 1606.8268 EOS Attack method: Roll back attack
  • 2019-03-20

    Hacked target: dBet Games

    Description of the event: The attacker launch continuously attacks and profit from the dBet Games.

    Amount of loss: 24.8 EOS Attack method: Transaction congestion attack
  • 2019-03-18

    Hacked target: EOS Cube

    Description of the event: The attacker justjiezhan1 launched an attack on the EOS game "cubecontract" and has already made a profit. Prior to this, the attacker justjiezhan1 started deploying the attack contract at around 12:00:41 on the same day. The analysts preliminary analyzed that the attacker was, still the same as the previous attack mean, transaction congestion attack.

    Amount of loss: 49.6 EOS Attack method: Transaction congestion attack
  • 2019-03-18

    Hacked target: EOSVegas

    Description of the event: The attacker launched continuously attacks and profit from the EOSVegas. The analysis found that the attack mean used by the attacker was transaction congestion attack. The account is extremely active. It just attacked the quiz game EOS Cube and its related account has been marked as high risk.

    Amount of loss: 39 EOS Attack method: Transaction congestion attack
  • 2019-03-15

    Hacked target: YUM.games

    Description of the event: The attacker justjiezhan1 launched an attack on the EOS game "YUM.games" and has already made a profit. After analysis, it is suspected that the attacker calls "gamestart" and draws the prize directly without betting the game.

    Amount of loss: 113 EOS Attack method: call gamestart
  • 2019-03-14

    Hacked target: LuckyGo

    Description of the event: The attacker launched continuously attacks on the LuckyGo, profiting hundreds of EOS.

    Amount of loss: 200 EOS Attack method: Transaction congestion attack
  • 2019-03-12

    Hacked target: dBet Games

    Description of the event: The attacker launched continuously attacks on the dBet Games, profiting hundreds of EUSD which stablecoins issued on EOS. And has sold through the decentralized exchange Newdex.

    Amount of loss: 685 EUSD Attack method: Transaction congestion attack
  • 2019-03-11

    Hacked target: nkpaymentcap

    Description of the event: The attacker launched continuously attacks on the EOS DApp nkpaymentcap, profiting 50,000 EOS.

    Amount of loss: 50,000 EOS Attack method: Transfer error prompt
  • 2019-03-10

    Hacked target: Vegas Town

    Description of the event: The attacker launched continuously attacks on the Vegas Town, profiting hundreds of EOS and transferred to the ZB exchange.

    Amount of loss: 2219 EOS Attack method: Hard_fail status attack
  • 2019-03-09

    Hacked target: Gamble EOS

    Description of the event: The attacker launched continuously attacks on the Gamble EOS, profiting thousands of EOS.

    Amount of loss: 2043.6 EOS Attack method: Transfer error prompt
  • 2019-03-08

    Hacked target: Fishing Joy

    Description of the event: The attacker launched continuously attacks on the Fishing Joy, profiting hundreds of EOS.

    Amount of loss: 109.33 EOS Attack method: Transaction congestion attack
  • 2019-03-06

    Hacked target: ExtremeLoto

    Description of the event: The attacker co****op launched continuously attacks on the contract xlo*****io, profiting hundreds of EOS.

    Amount of loss: 42 EOS Attack method: Call transfer
  • 2019-03-05

    Hacked target: OnePlay

    Description of the event: The attacker launched continuously attacks on the OnePlay, getting almost all EOS of the game contract. And use the same attack mean to bet the game token ONE, profit nearly one million game tokens, and then transfer to the newdex exchange for sale.

    Amount of loss: 449 EOS Attack method: Random number attack
  • 2019-03-04

    Hacked target: EOS 欢乐谷(Happy Pool)

    Description of the event: The attacker launched continuously attacks on the EOS Happy Pool, profiting hundreds of EOS, the official has transferred the account balance. The way the attacker commits the attack is still the transaction congestion attack.

    Amount of loss: 419 EOS Attack method: Transaction congestion attack
  • 2019-02-22

    Hacked target: 超级节点(BP)games.eos

    Description of the event: Tracking the blacklist account gm3dcnqgenes found that its associated account newdexmobapp received 2.09 million EOS, and has now transferred 50,000 EOS to its associated account guagddoefdqu. And in batches of hundreds to thousands of EOS each time, transferred to the stock exchange account (huobideposit), and the remaining 2.04 million EOS, has been dispersed to ftsqfgjoscma, hpbcc4k42nxy, 3qyty1khhkhv, xzr2fbvxwtgt, myqdqdj4qbge, Shprzailrazt, qkwrmqowelyu, lmfsopxpr324, lhjuy3gdkpq4, lcxunh51a1gt, geydddsfkk5e, pnsdiia1pcuy, kwmvzswquqpb, etc., there is the possibility of further turning to the exchange.

    Amount of loss: 2,090,000 EOS Attack method: Unknown
  • 2019-02-15

    Hacked target: Gameboy

    Description of the event: Gameboy, a EOS game was attacked. Attacker cont****inop deployed a contract and attacked by calling launch function. According to the analysis of SlowMist security team and confirmed with project side by communication.The project side wrongly add a controlled seed in random algorithm which lead the attack.

    Amount of loss: - Attack method: Random number attack
  • 2019-02-05

    Hacked target: EOSPlaystation

    Description of the event: The attacker launched an attack on the EOS game EOSPlaystation.

    Amount of loss: ~20000 EOS Attack method: Unknown
  • 2019-02-04

    Hacked target: WinDice

    Description of the event: The attacker deploys the attack contract rep******net to attack the project party contract windiceadmin.

    Amount of loss: ~300 EOS Attack method: Roll back attack
  • 2019-02-04

    Hacked target: EOSreel

    Description of the event: The attacker deploys the attack contract con******nop and combines multiple accounts to attack the project contract eosreeladmin.

    Amount of loss: 2046 EOS Attack method: Unknown
  • 2019-01-31

    Hacked target: FASTWIN

    Description of the event: The attacker deployed multiple attack contracts to attack the EOS game FASTWIN.

    Amount of loss: - Attack method: Roll back attack
  • 2019-01-31

    Hacked target: EOSlots

    Description of the event: The attacker launched continuous attacks on the EOS game EOSlots.

    Amount of loss: - Attack method: Fake EOS token attack
  • 2019-01-31

    Hacked target: Fastwin

    Description of the event: The attacker is the same batch of accounts that previously attacked BETX.

    Amount of loss: 2000 EOS Attack method: Unknown
  • 2019-01-30

    Hacked target: EOSABC

    Description of the event: This is the third attack on the contract, not a transaction congestion attack, but the real purpose of the attack is the transaction rollback attack.

    Amount of loss: - Attack method: Roll back attack
  • 2019-01-28

    Hacked target: EOSABC

    Description of the event: Similar to the way EOSABC was attacked two days ago, the problem has not been fixed.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-28

    Hacked target: BETX

    Description of the event: The attacker launched continuously attacks on the TGON.

    Amount of loss: - Attack method: Unknown
  • 2019-01-27

    Hacked target: EOSlots

    Description of the event: The attacker controlled multiple accounts to launch continuously attacks on the EOSlots.

    Amount of loss: Unknown Attack method: Replay attack
  • 2019-01-26

    Hacked target: EOSABC

    Description of the event: It is consistent with the previous principles of attacking EOS.Win, FarmEOS, etc., but the technique has changed.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-23

    Hacked target: Crazy Dice

    Description of the event: It is consistent with the previous principles of attacking EOS.Win, FarmEOS, etc., but the method has changed. The attacker controls multiple accounts to cooperate to complete the transaction congestion attack.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-22

    Hacked target: EOSLuck

    Description of the event: The attacker is targeting the game's random number algorithm, and his winning percentage is much higher than other ordinary players.

    Amount of loss: - Attack method: Random number attack
  • 2019-01-21

    Hacked target: idicefungame

    Description of the event: The attacker launched continuously attacks on idicefungame and has already made a profit, and transferred to the bitfinex exchange.

    Amount of loss: - Attack method: Fake EOS token attack
  • 2019-01-17

    Hacked target: 21Dice

    Description of the event: The attacker used the transaction congestion attack to attack the game contract and ultimately profit.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-17

    Hacked target: SuperMonopoly

    Description of the event: The attacker uses the trade crowding attack to attack the game contract and ultimately profit.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-16

    Hacked target: playgames

    Description of the event: The game playgames has been continuously attacked by malicious user niyoubudou33. It has been attacked 295 times as of press time, which is consistent with the previous attacks on EOS.Win, FarmEOS, idice, LuckBet, GameBet, EOSDice, STACK DICE and many other games.

    Amount of loss: 2158 EOS Attack method: Transaction congestion attack
  • 2019-01-16

    Hacked target: LuckBet

    Description of the event: The attacker uses the trade crowding attack to attack the game contract and ultimately profit.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-16

    Hacked target: 影骰(idice)

    Description of the event: The attacker useed the transaction congestion attack to attack the game contract and ultimately profit.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-15

    Hacked target: FarmEOS

    Description of the event: The attacker and the last one are the same person, flo******now and sil******day both are the hacker's account. The same attack is the same.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-15

    Hacked target: FarmEOS

    Description of the event: The attacker made a profit of nearly 2000 EOS through the Dice game by deploying the attack contract flo*****now in just a few minutes.

    Amount of loss: ~2000 EOS Attack method: Transaction congestion attack
  • 2019-01-14

    Hacked target: GameBet

    Description of the event: The attacker used transaction congestion attack to exploit vulnerability in the old-version BP nodeos.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-13

    Hacked target: Fishing

    Description of the event: The attacker used transaction congestion attack to exploit vulnerability in the old-version BP nodeos.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-13

    Hacked target: STACK DICE

    Description of the event: The attacker used deferBomb to exploit vulnerability in the old-version BP nodeos.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-13

    Hacked target: FarmEOS

    Description of the event: The attacker justjiezhan1 launched an attack on the EOS game "cubecontract" and has already made a profit.

    Amount of loss: 5000 EOS Attack method: Transaction congestion attack
  • 2019-01-12

    Hacked target: BetDoge

    Description of the event: The attacker launched continuous attacks on the EOS game BetDoge and has successfully profited hundreds of EOS.

    Amount of loss: - Attack method: Unknown
  • 2019-01-12

    Hacked target: EOS.WIN

    Description of the event: The attacker loveforlover launched an attack on EOS.WIN and has already made a profit.

    Amount of loss: - Attack method: Transaction congestion attack
  • 2019-01-10

    Hacked target: uugame

    Description of the event: The random number was cracked.

    Amount of loss: - Attack method: Random number attack
  • 2019-01-04

    Hacked target: HotDice

    Description of the event: Developers have not been able to effectively detect, block, and isolate accounts which is contract high risk or marked as blacklisted.

    Amount of loss: - Attack method: Unknown
  • 2019-01-01

    Hacked target: EOS BUFF

    Description of the event: The attacker launched continuous attacks on the EOS BUFF and has successfully profited hundreds of EOS.

    Amount of loss: - Attack method: Unknown
  • 2019-01-01

    Hacked target: ggeos

    Description of the event: The contract was attacked by a transaction rollback.

    Amount of loss: - Attack method: Roll back attack
  • 2018-12-29

    Hacked target: LuckBet

    Description of the event: The random number was attacked by the attacker for the second time.

    Amount of loss: - Attack method: Random number attack
  • 2018-12-28

    Hacked target: GameBet

    Description of the event: The attacker launched an attack on the GameBet game contract gamebetdices, and transfer most of the acquired EOS to the FreeWallet wallet account.

    Amount of loss: - Attack method: Roll back attack
  • 2018-12-28

    Hacked target: LuckyMe

    Description of the event: The attacker continued to attack the LuckyMe game contract luckymedice1 and had benefited thousands of EOS.

    Amount of loss: - Attack method: Roll back attack
  • 2018-12-26

    Hacked target: Lucky Nuts

    Description of the event: The attacker continued to attack the Lucky Nuts game contract nutsgambling and continues to profit from it. Eventually most of the stolen EOS was transferred to the Binance exchange account binancecleos.

    Amount of loss: - Attack method: Random number attack
  • 2018-12-25

    Hacked target: FastWin

    Description of the event: The hacker mastered and modified FAST's token contract, deliberately created a vulnerability that can be used for multiple "additional" tokens for free.

    Amount of loss: 10000 EOS Attack method: Unknown
  • 2018-12-23

    Hacked target: Pickown

    Description of the event: "Transfer Error Prompt", as the game contract does not filter the false notifications provided by the game player.

    Amount of loss: - Attack method: Transfer error prompt
  • 2018-12-22

    Hacked target: LuckBet

    Description of the event: The attacker snowredgreen attacked the LuckBet game contract luckbetadmin and transfers most of the acquired EOS to the Huobi exchange account huobideposit

    Amount of loss: - Attack method: Random number attack
  • 2018-12-21

    Hacked target: EosDice

    Description of the event: The attacker binaryfunxxx attacked the EosDice's game contract bocai.game and transfers most of the acquired EOS to the Binance exchange account binancecleos.

    Amount of loss: - Attack method: Roll back attack
  • 2018-12-19

    Hacked target: TRUSTBET

    Description of the event: The attacker panming12345 launched attack on the TRUSTBET game contract trustbetgame, which total profit 11,501 EOS.

    Amount of loss: 11501 EOS Attack method: Replay attack
  • 2018-12-19

    Hacked target: BetDice

    Description of the event: Rollback transaction attack

    Amount of loss: 200000 EOS Attack method: Roll back attack
  • 2018-12-19

    Hacked target: Big.game

    Description of the event: Encounter rollback attack

    Amount of loss: 8000 EOS Attack method: Roll back attack
  • 2018-12-19

    Hacked target: ToBet

    Description of the event: The attacker keeps betting and rolls back the transaction, because the bet and Tobet polling use the same node, it allows the attacker to benefit without spending money.

    Amount of loss: 22403.69 EOS Attack method: Roll back attack
  • 2018-12-19

    Hacked target: EOS Max

    Description of the event: The attacker eykkxszdrnnc attacked the EOS game EOS MAX's contract eosmaxiodice with a total profit of 55,526.05 EOS.

    Amount of loss: 55526 EOS Attack method: Roll back attack
  • 2018-12-12

    Hacked target: 钓鱼高手(kittyfishing)

    Description of the event: The attacker helookitiqas launched attacks on the EOS game kittyfishing, which launched a total of 91 attacks in two hours.

    Amount of loss: 558.85 EOS Attack method: Roll back attack
  • 2018-12-05

    Hacked target: Fastwin

    Description of the event: The attacker ha4tsojigyge launched 124 attacks on the Fastwin game contract fastwindice3.

    Amount of loss: 1929.17 EOS Attack method: Unknown
  • 2018-12-03

    Hacked target: Dice3D

    Description of the event: Similar to the attack on EOS.WIN on November 11

    Amount of loss: 10569 EOS Attack method: Unknown
  • 2018-12-01

    Hacked target: Dice3D

    Description of the event: Use multiple accounts to simultaneously send transaction requests for attack, so that the last attacker account gets the highest winning rate.

    Amount of loss: 5710 EOS Attack method: Unknown
  • 2018-11-30

    Hacked target: Atidium

    Description of the event: EOS Atidium's official account wwwatidiumio was abnormal. A total of 6 tokens including ATD tokens 337,759,004 were transferred to account b4jmqvvktgjx. The account then transferred 130 million ATD tokens to Newdex Exchange for cash, a total of 3,183.8564 EOS were profitable..

    Amount of loss: 3183 EOS Attack method: The official private key is suspected of being stolen
  • 2018-11-28

    Hacked target: nutsgambling

    Description of the event: The hacker ybdzmtgouwxn launched attacks on the EOS game, nutsgambling, which launched a total of 144 attacks in less than an hour, totaling 1,141.71 EOS.

    Amount of loss: 1141.71 EOS Attack method: Roll back attack
  • 2018-11-21

    Hacked target: vegasgame111

    Description of the event: The attacker launched continuous attacks on the EOS game vegasgame111 and has successfully profited hundreds of EOS.

    Amount of loss: - Attack method: Fake EOS token attack
  • 2018-11-19

    Hacked target: EOS Lelego

    Description of the event: The attacker malisringho continually initiated 35 game requests to the EOS Lelego contract llgcontract1., eventually guessing 27 times, making a total profit of 6,282.5 EOS, and then successfully transferring 6,500 EOS to the Binance Exchange.

    Amount of loss: 6282.5 EOS Attack method: Random number attack
  • 2018-11-15

    Hacked target: LuckyGo

    Description of the event: EOS game contract LuckyGo has been off the line and the attacker iloveloveeos (malicious contract) was exposed in September because of attack on FairDice.

    Amount of loss: - Attack method: Random number attack
  • 2018-11-12

    Hacked target: HireVibes & AirDropsDAC

    Description of the event: A large number of HVTs in the AirDropsDAC contract account were transferred to the sym111111add account under abnormal operation, the account was then exchanged for 2,514 EOS at Newdex, which was subsequently transferred to the gizdkmjvhege account.

    Amount of loss: 2514 EOS Attack method: Private key leak
  • 2018-11-11

    Hacked target: EOS.WIN

    Description of the event: The game contract was attacked by the attacker lockonthecha.

    Amount of loss: 20000 EOS Attack method: Random number attack
  • 2018-11-10

    Hacked target: EOSDice

    Description of the event: The well-known DApp EOSDice was hacked again due to random number issues. The attacker was a hacker who previously attacked EOSDice and FFGame DApp. The project side wrongly add a controlled seed in random algorithm which lead the attack.

    Amount of loss: 4633 EOS Attack method: Random number attack
  • 2018-11-10

    Hacked target: MyEosVegas

    Description of the event: The hacker has launched a total of 700 attacks on the MyEosVegas game contract eosvegasjack.

    Amount of loss: 10000 EOS Attack method: Unknown
  • 2018-11-08

    Hacked target: FFgame

    Description of the event: By deploying the attack contract and using the same algorithm as FFgame to calculate the random number in the contract, the attacker immediately uses the random number attack contract in inline_action after generating the random number, resulting in the winning result being "predicted", thus reaching the super high winning rate.

    Amount of loss: 1331 EOS Attack method: Random number attack
  • 2018-11-07

    Hacked target: CaseGo

    Description of the event: Attacked by the attacker, the specific content is unknown.

    Amount of loss: 200 EOS Attack method: Unknown
  • 2018-11-04

    Hacked target: EOSDice

    Description of the event: Random number was cracked by attacker.

    Amount of loss: 2545 EOS Attack method: Random number attack
  • 2018-11-04

    Hacked target: EOSeven

    Description of the event: EOSeven was transferred 600 million SVN from eosevendice2 to account tuningfinish, then back 450 million to eosevendice2. After that, tuningfinish sold the SVN token on Newdex and finally transferred the resulting EOS to Binance Exchange.

    Amount of loss: - Attack method: Internal members make large transfers
  • 2018-10-31

    Hacked target: EOSCast

    Description of the event: the game contract does not check the transfer action must initiated by eosio.token or token contract of the game itself.

    Amount of loss: 70000 EOS Attack method: -
  • 2018-10-28

    Hacked target: EOS Poker

    Description of the event: The official forgot to put the seed into the database when expanding the server, and no longer record the seed after the 868590 game.

    Amount of loss: 1374.375 EOS Attack method: Official mistake
  • 2018-10-26

    Hacked target: EosRoyale

    Description of the event: Vulnerability of the random number generator, the attacker can try to calculate the future number of random number generator algorithms by using the information of the previous block and stolen $60,000 from the EosRoyale wallet.

    Amount of loss: 11000 EOS Attack method: Random number attack
  • 2018-10-16

    Hacked target: WORLD CONQUEST

    Description of the event: Hackers used the game tax rules to reject subsequent buyers, causing the game to end abnormally. The hackers take all EOS in the pool, leaving only 0.0155 EOS in the final contract.

    Amount of loss: 4555 EOS Attack method: Rule loophole
  • 2018-10-15

    Hacked target: EOSBet

    Description of the event: The attacker exploited the vulnerabilities in the EOSBet contract to falsify the transfer prompt.

    Amount of loss: 145321 EOS Attack method: Transfer error prompt
  • 2018-10-05

    Hacked target: EOSBank(柚资银行)

    Description of the event: The owner permission of the contract account had been modified, after that, 18,000 EOS was transferred to the EOS account fuzl4ta23d1a.

    Amount of loss: 18000 EOS Attack method: The owner permission of the contract account had been modified
  • 2018-09-14

    Hacked target: Newdex

    Description of the event: the attacker exchanged true EOS token with fake token.

    Amount of loss: 11803 EOS Attack method: Fake EOS token attack
  • 2018-09-14

    Hacked target: EOS.Win

    Description of the event: The attacker exchanged true EOS token with fake token within the vulnerability in the code,winning without betting

    Amount of loss: 4000 EOS Attack method: Unknown
  • 2018-09-14

    Hacked target: EOSBet

    Description of the event: The game contract does not check the transfer action must initiated by eosio.token or token contract of the game itself

    Amount of loss: - Attack method: Unknown
  • 2018-09-12

    Hacked target: EOSBet

    Description of the event: the attacker exchanged true EOS token with fake token within the vulnerability in the code, winning without betting.

    Amount of loss: 42000 EOS Attack method: Unknown
  • 2018-09-12

    Hacked target: FairDice

    Description of the event: Because of its random algorithm associated with the time, the same bet will yield different results at different times. Hackers use this feature to reject failed lottery results.

    Amount of loss: 4000 EOS Attack method: Replay attack
  • 2018-09-12

    Hacked target: EOS Happy Slot

    Description of the event: The attacker uses the replay attack to obtain multiple winnings in one go.

    Amount of loss: 5000 EOS Attack method: Replay attack
  • 2018-09-10

    Hacked target: DEOSBET

    Description of the event: The law of the random number generated by DEOSBET was cracked by hackers.

    Amount of loss: 4000 EOS Attack method: Random number attack
  • 2018-09-02

    Hacked target: EOS.Win

    Description of the event: On September 2, 2018, the EOS WIN random number was cracked and 2000 EOS was lost, this attack was not disclosed to the public.

    Amount of loss: 2000 EOS Attack method: Random number attack
  • 2018-08-27

    Hacked target: Luckyos

    Description of the event: The law of the random number generated by Lucky's rock-paper-scissors game was cracked by hackers, and the attacker won the prize by continuing to use rock at the specified time, which has a 38% chance of winning.

    Amount of loss: - Attack method: Random number attack
  • 2018-08-26

    Hacked target: EOSBET

    Description of the event: RAM was swallowed up by the malicious contract, and the game party failed to check the caller of transfer action, which led to the exchange of real token with fake token and "Transfer Error Prompt" vulnerability

    Amount of loss: - Attack method: RAM was swallowed up by the malicious contract, and the game party failed to check the caller of transfer action, which led to the exchange of real token with fake token and "Transfer Error Prompt" vu
  • 2018-07-25

    Hacked target: 狼人游戏(EOS Fomo3D)

    Description of the event: The EOS Fomo3D game contract suffered an overflow attack and the cash pooling became negative.

    Amount of loss: 60686 EOS Attack method: Overflow