Discover more from Fairyproof Official Newsletter
Weekly Blockchain Security Watch
Jan 16 to Jan 22
From 16 January 2023 to 22 January 2023, all security incidents that have occurred were all Security Hacks.
1. Hacker Attacks 520 on BNB Chain
On 16 Jan, 520, a dApp deployed on the BNB chain was flash-loan attacked.
The root cause was that the contract’s procBack function had a vulnerability.
Crypto assets worth around US $16000 were exploited in this incident.
- Attacker’s Address: 0x286e09932b8d096cba3423d12965042736b8f850
- Attacked Contract: 0x5200f3418B55E814315242a903A1d7C2d0d0B520
- Hash Value of Attack Transaction:
2. Hacker Attacks OMNI Real Estate Token
On 17 Jan, the OMNI Real Estate token that was deployed on the BNB chain was attacked.
More than 236 BNBs worth around US $70705 were exploited in this incident.
For more details please refer to Fairyproof’s report at :
3. Hacker Attacks MEV Bot on BNB Chain
On 18 Jan, a hacker attacked an MEV Bot deployed on the BNB chain.
Crypto assets worth around US $ 108,000 were exploited in this incident.
- Attacker’s Address: 0xa7F5B4A43B6AaED120f8e3C70e65B662d3352c05
- Attacking Contract: 0xF0BE9805fe8E393e8F768Fe8fE4D8b8531D2f61e
- Attacked Contract (MEV bot): 0x5f3239AA0553A5c496e1AEc831f1E41847faA3D0
- Hash Values of Attack Transactions:
4. Hacker Attacks Quaternion
On 18 Jan, a hacker attacked an B2B and B2C service provider Quaternion.
The root cause was that there was a wrong conditional check in the QTN token. The hacker acquired its gas from Ankr Exploiter on the BNB chain to launch the attack.
2.546 WETHs worth around US $3800 were exploited in this incident.
- Attacker’s Address: 0x88a2386e7ec97ad1e7a72176a66b6d0711ae3527
- Attacking Contract: 0xa33c965ca6d3bdc42bdb23a79081757090eb7700
5. Hacker Attacks UpSwing Finance
On 18 Jan, a hacker leveraged a flash-loan to attack UpSwing Finance, a dApp deployed on Ethereum.
The dApp had been inactive since Oct 2020.
22 ETHs worth around US $ 35500 were exploited in this incident.
- Attacker’s Address: 0x8a2d94ea342cbdd6d57db614b24f20cae286cac6
- Hash Value of Attacking Transaction:
6. Hacker Attacks Thoreum Finance
On 19 Jan, a hacker attacked Thoreum Finance, a dApp deployed on the BNB chain.
The root cause was that if a wallet sent tokens to itself the number of tokens it held would increase.
In addition it was suspected that the contract deployer’s private key was leaked allowing the hacker to deploy a new contract before upgrading the proxy contract to the malicious contract.
The attacker deposited BNBs to acquire WBNBs, leveraged the vulnerability to mint the THOREUM token and exchanged all the minted tokens on BiSwap to WBNBs and sent the assets back to himself.
2260 BNBs worth around US $580,000 were exploited in this incident.
- Attacker’s Address: 0x1ae2dc57399b2f4597366c5bf4fe39859c006f99
- Hash Value of Attacking Transaction:
7. Kraken Freezes Solaris’ BTC Wallet
On 22 Jan, it was reported that a BTC wallet of Solaris was frozen by Kraken. Solaris is a darknet platform for illegal products and drugs. Before this Solaris occupied one fifth of all the darknet’s illegal transactions.
Kraken not only has frozen its BTC wallet but also has taken control of its infrastructure, Gitlab Repo and source code.
7 notable security incidents have occurred in the past week. Most of them were attacks against smart contracts.
A Reminder for Project Teams: Always test thoroughly. Do smart contract audits before deploying smart contracts on-chain.
A Reminder for Crypto Users: Be cautious about suspicious links, emails, websites, and projects launched by teams without established reputations.
It is important for everyone in the crypto community to gain understanding and practice sufficient levels of cybersecurity.
To stay updated on notable security incidents in the world of Web3.0, subscribe to our newsletter:
To stay updated on notable security incidents in the world of Web3.0
For a better understanding of all things Web3.0: https://medium.com/@FairyproofT
Looking to strengthen the security of your project or looking for an audit? Contact us at https://www.fairyproof.com/