EthSecurity – Telegram
Seems yesterday privileged emergencyWithdraw() function was used to withdraw ~520k OG tokens (~$516k) to 0x617E8e3C07bEF319F26C1682270A19e89Ea2bf75
@OG_labs
@EthSecurity1
The old contract of @ribbonfinance has been drained for a total of $2.7M.

Exploit contract: 0x3c212A044760DE5a529B3Ba59363ddeCcc2210bE
Rootcause : oracle manipulation

Theft addresses:
0x354ad0816de79E72452C14001F564e5fDf9a355e
0x2Cfea8EfAb822778E4e109E8f9BCdc3e9E22CCC9
0x255b29642d1B125a0Ce8529aae61Ad19EE636DDf
0x537dee211543CC9CdEcB8690c5Be248D5b287558
0x46300aA369A59139E70F8Ec75ee9B921e5fdfC6F
0x816f6c6cc941364e3d2DA79442310e385043B479
0xB4f7eD0d3eA5256fA5Dfb2C73a1661ffb7f7beDb
0x40B31Ae97468e9Abd56965D1a3e28DDE1c79d0A3
0xDaDfe088422335C7A49D1de2B439e29Cb90EA5Ca
0x936457bEE1366e0bf05Eb52BB4a9FFFe2e7eF465
0x936457bEE1366e0bf05Eb52BB4a9FFFe2e7eF465
0x49CC128345bCF31A02b1B2B81f836f72E24c97bC
0x354ad0816de79E72452C14001F564e5fDf9a355e
0xCf5DF51A10c097140FB3a367281A4f5313725b1F
0x4c0dc529C4252e7Be0Db8D00592e04f878e4F397
@EthSecurity1
😢5
On Oct. 25, El Dorado Exchange
@ede_finance
(https://bscscan.com/address/0xf1d7e3f06af6ee68e22bafd37e6a67b1757c35a9), a GMX fork, lost ~$80k
rootcause: an ELP (LP token) accounting bug. Attacker exploited a mismatch between LP valuation and position accounting, minting ELP from thin air.
@EthSecurity1
9.4 million dollars’ worth of assets on Gnosis Chain were recovered via the December hard fork from the Balancer exploit. Gnosis Chain force other nodes to imply new chain.Rekt
@EthSecurity1
😁9
JFIN Bridge (LCBridgev2Token) hacked for $13.4K

Type: Logic Error (Reward Calculation)

The staking reward calculation allows claiming rewards greater than the contract balance by exploiting the claimReward function which pays out based on accumulated totalReward rather than actual available funds, draining all staked JFIN tokens.

TX: https://etherscan.io/tx/0xf867d1d7164ac9178d81696c989f65e817b8cab14850345ab3a1f99bbe547210
Victim: https://etherscan.io/address/0x3EbFd0EFC49a27fb633bd56013E4220EBC2c3C6d
CoinGecko: https://www.coingecko.com/en/coins/jfin-coin
@EthSecurity1
4🤔2
Seems trust wallet extension been compromised. If you enter pass phrase on web move your assets ASAP
@EthSecurity1
😢10
do not use proton mail service. seems they deliver all customers data to government
@EthSecurity1
👍12😢12👨‍💻3🤬1
Unleash Protocol hacked for $3.9M

RootCause : seems EOA compromised
@EthSecurity1
🔥31😱1
Flow blockchain Drops Rollback after $3.9M Exploit

RootCause: unathorized minting wFLOW,wETH,wBTC but validators Halted network no funds loss
@EthSecurity1
🙉4
I can not focus on work until persian revolution is going on
Ahoramazda save iran
🫡11😁43🙉3👍1💯1
TMXTribe hacked for $1.5M
@EthSecurity1
🔥3
yesterday Ipor hacked ~ $300K


RootCause :
underlying contract delegated by the EOA account controlled by the project team through EIP-7702 contains a vulnerability that allows arbitrary external calls
@EthSecurity1
😢4🔥3😁3😱3
Why fixed-rate lending never took off on-chain - link

Our main goal is to share tips from some well-known bughunters. -
link

awesome Checklist -
link

@EthSecurity1
🔥4
Zcash developers quit after board clash as ZEC drops 17% in 24H

The entire Electric Coin Company team behind Zcash resigned on January 7 after what CEO Josh Swihart described as a constructive discharge by the Bootstrap board.

“Yesterday, the entire ECC team left after being constructively discharged by ZCAM. In short, the terms of our employment were changed in ways that made it impossible for us to perform our duties effectively and with integrity.”


According to the U.S. Department of Labor, constructive discharge refers to a situation where an employee's resignation is not considered voluntary due to an employer creating a hostile work environment or applying pressure that forces the quit.
@EthSecurity1
😱5🙉3😁2