1987 hack event(s)
Description of the event: On October 6th, MCT issued an announcement stating that in the past two days, some users had reported cases of their MCT wallets being compromised. After investigation today, it was discovered that due to the DNS domain hijacking, under certain specific conditions, private keys could potentially be uploaded to a fraudulent domain. MCT advises users who have entered their private keys into MCT since September 15, 2023, to transfer their wallet balances as a precautionary measure as soon as possible.
Amount of loss: - Attack method: Domain Hijacking
Description of the event: There is a large liquidity removal on a fake CommEx token. Deployer removed ~$154k from the LP. BSC: 0xD1C3ee0f845bCc38a8cB9Dc5337dFd5a372Bb8Ed.
Amount of loss: $ 154,000 Attack method: Rug Pull
Description of the event: On October 5th, blockchain detective ZachXBT posted on social media, stating that a hacker had made a profit of 234 ETH (~$385,000) in the past 24 hours by conducting SIM card swap attacks on four different friend.tech users.
Amount of loss: $ 385,000 Attack method: SIM Card Attack
Description of the event: According to SlowMist, Stars Arena appeared to have been stolen due to a major security breach in its smart contract. Currently, the hacker has transferred 266,103 AVAX to the address (0xa2Eb...ad7A). The address (0xa2Eb...ad7A) transferred 50.32 AVAX to FixedFloat on October 6. On October 12, Stars Arena tweeted that they have recovered approximately 90% of the lost funds. An agreement has been reached with the hacker to return the funds, with a 10 percent bounty and 1,000 AVAX lost in the cross-chain bridge. 266,104 AVAX were lost, and the hacker returned 239,493 AVAX in two transactions. 27,610 AVAX were paid as a bounty.
Amount of loss: $ 2,900,000 Attack method: Reentrancy Attack
Description of the event: There is a flashloan attack on the DePay platform that resulted in the theft of 827 USDC. The exploiter used a security issue with DePay router to steal the USDC.
Amount of loss: $ 827 Attack method: Flash Loan Attack
Description of the event: Metropolis World announced that their Discord server was compromised.
Amount of loss: - Attack method: Account Compromise
Description of the event: The GEMIE Discord server was hacked and the attackers posted phishing links in the announcement channel. Please do not interact with hxxps://gemie.site/.
Amount of loss: - Attack method: Account Compromise
Description of the event: VendX Discord server was compromised.
Amount of loss: - Attack method: Account Compromise
Description of the event: There is an exit scam on a fake EigenLayer token. The deployer profited ~$300k. BSC: 0x14ac066ac2CD24CBdE31f78659c11F13aB61E4e7.
Amount of loss: $ 300,000 Attack method: Rug Pull
Description of the event: There was a large liquidity removal on DKP resulting in losses of approximately $204,000 USDT. The token contract is 0xd06fa1BA7c80F8e113c2dc669A23A9524775cF19.
Amount of loss: $ 204,000 Attack method: Rug Pull
Description of the event: A phishing link has been posted in the factory-updates channel of LuckyFactoryNFT. Do not interact with the malicious link.
Amount of loss: - Attack method: Phishing Attack
Description of the event: Mode Discord was hacked. A phishing link was posted in the announcements channel of the Mode Network Discord server.
Amount of loss: - Attack method: Account Compromise
Description of the event: On September 27th, Venom Bears‘ Discord server was compromised.
Amount of loss: - Attack method: Account Compromise
Description of the event: SpaceChain Discord was hacked. A phishing link was posted in the announcements channel of SpaceChain Discord server.
Amount of loss: - Attack method: Account Compromise
Description of the event: On September 26th, XSDWETHpool On BSC was exploited for ~$12.1k in a flash loan attack. The attacker created a malicious contract to interact with the pool contract and gained 56.96 WBNB. Pool Contract: 0xbfBcB8BDE20cc6886877DD551b337833F3e0d96d.
Amount of loss: $ 12,100 Attack method: Flash Loan Attack
Description of the event: There is an exit scam on a fake Justus Token associated with fake Twitter Justusztoken. Deployer dumped 302 WBNB for a profit of ~$59k. BSC: 0xae7607dE0F0665220E77b76E18d94965076e684c.
Amount of loss: $ 59,000 Attack method: Rug Pull
Description of the event: On September 24th, according to Definalist on Twitter, scammers had deposited fake APT tokens into South Korea's largest exchange, Upbit. After these fake tokens were deposited into numerous user accounts, many users proceeded to directly sell them. The only explanation for this situation is that Upbit's wallet system only checked the type and data and processed deposits and withdrawals.
Amount of loss: - Attack method: False top-up
Description of the event: On September 25th, Cyvers Alerts tweeted that a certain EOA address received 5000 ETH from HTX yesterday, and this morning, they noticed that HTX had conducted a hot wallet migration. It has been confirmed that one of HTX's hot wallets was compromised, resulting in a loss of 8.2 million USD, and the hacker's address has been disclosed. HTX has issued a public statement on the blockchain, addressing the hacker and offering a 5% white hat bonus if the stolen funds are returned by October 2nd; otherwise, they will transfer the information to law enforcement authorities for further action and to prosecute the hacker. Justin Sun also stated that HTX has fully covered the losses incurred from the attack and has successfully resolved all related issues. All user assets are safe and the platform is operating completely normally. On October 7, the HTX attackers returned 4,999 ETH (about $8.2 million) of the stolen funds.
Amount of loss: $ 8,200,000 Attack method: Unknown
Description of the event: There was a flash loan exploit on Kub/Kub-split. The attacker gained ~$78.4k via pool manipulation. Contract: 0xc98E183D2e975F0567115CB13AF893F0E3c0d0bD.
Amount of loss: $ 78,400 Attack method: Flash Loan Attack
Description of the event: On September 23, the Mixin Network cloud service provider database was attacked, the amount of funds involved was ~$200M.
Amount of loss: $ 200,000,000 Attack method: Unknown