TruebitGod

459 posts

TruebitGod banner
TruebitGod

TruebitGod

@TruebitGod

All things verification, programmable trust, and trustless computation | https://t.co/WDB0tOQX22 - credit to @shaneonchain | The Age of Verification Blog | TRUman Show

Somewhere in the Verify Hub... Inscrit le Mayıs 2021
166 Abonnements503 Abonnés
Tweet épinglé
TruebitGod
TruebitGod@TruebitGod·
Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.
Truebit@Truebitprotocol

Today, we became aware of a security incident involving one or more malicious actors. The affected smart contract is 0x764C64b2A09b09Acb100B80d8c505Aa6a0302EF2 and we strongly advise the public not to interact with this contract until further notice. We are in contact with law enforcement and taking all available measures to address the situation. We will share updates through our official channels as they become available.

English
10
8
38
7.1K
TruebitGod retweeté
Truebit
Truebit@Truebitprotocol·
Truebit is continuing to work with US law enforcement and external cybersecurity specialists to investigate the recent attack on the TRU smart contracts. Truebit’s new platform, Truebit Verify, has been in development over the last four years. The recent attack on the TRU smart contracts did not compromise Truebit Verify’s operation. TRU interfaces with Truebit Verify as a staking-based countermeasure intended to protect against Sybil attacks and faulty behavior. These protections remain in effect, including managing Node operator participation, auditable dispute resolution, and deregistration of identified faulty Nodes. Truebit Verify’s API tasks, Dynamic Oracles, and Verified Orchestration features also remain fully functional.
English
123
8
63
23K
Autism Capital 🧩
Autism Capital 🧩@AutismCapital·
If you want to understand what’s going on with AI watch this. It’s 5 minutes but you can watch it in 2x. It’s actually what’s happening.
English
204
710
4.1K
244.2K
TruebitGod
TruebitGod@TruebitGod·
@Truebitist Why don't you just give them time? An incident of this size needs a proper thought-out response. Please be patient.
English
0
0
1
90
Coin Bureau
Coin Bureau@coinbureau·
⚡UPDATE: The Truebit hacker has now fully laundered all 8,535 ETH stolen, worth over $26M, through Tornado Cash.
Coin Bureau tweet mediaCoin Bureau tweet media
English
46
27
253
30.2K
TruebitGod retweeté
Truebit
Truebit@Truebitprotocol·
DO NOT TRUST anything claiming to be from us unless it’s posted by @Truebitprotocol. Any other websites, social posts, or messages are not official unless they come from this account.
English
41
8
63
23K
Krypto Degeneraci.
Krypto Degeneraci.@kryptodegeny·
To był stary smart kontrakt od Truebitu, 5 lat wisiał na Ethereum i nikt go nie ruszał. Wczoraj ktoś znalazł błąd i wyciągnął z niego około 8,5k ETH czyli jakieś $26 milionów. Kod był zamknięty, zero audytu, tylko bajtcode. Co jest możliwe to to, że coraz bardziej wygląda to tak, że AI pewnie z bocikiem w tle przewala stare kontrakty i szuka luk, a jak znajdzie, to robi klik i kasa znika. Closed source + stare kontrakty = tykająca bomba
Krypto Degeneraci. tweet mediaKrypto Degeneraci. tweet media
Polski
8
6
137
30.8K
TruebitGod
TruebitGod@TruebitGod·
@nicoweb3audit Once you have done this can you please message me, thank you.
English
0
0
1
134
nico_security
nico_security@nicoweb3audit·
This is my third day learning about smart contract auditing. Today I looked at some analysis files about the stolen Truebit protocol and learned how to decompile bytecode. Once I successfully decompile it, I'll document the attack process. etherscan.io/tx/0xcd4755645…
nico_security tweet media
English
1
0
0
235
TruebitGod
TruebitGod@TruebitGod·
TruebitGod@TruebitGod

Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.

QME
0
0
1
147
AstraSec
AstraSec@AstraSecAI·
🛡️ Exploit Analysis: Truebit Protocol (~$26M Loss) @Truebitprotocol A reminder that one missed check is all it takes. As shown in the image, the purchase function utilized SafeMath for most operations but missed the final addition step. The Vulnerability: The missing safe-add allowed an integer overflow when a large enough mint amount was passed, resulting in a token cost of zero.
AstraSec tweet media
English
5
0
19
6.2K
TruebitGod
TruebitGod@TruebitGod·
TruebitGod@TruebitGod

Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.

QME
0
0
2
151
Evan Luthra
Evan Luthra@EvanLuthra·
WHAT JUST HAPPENED!!!!🤯 $TRU dumped like crazy after a serious smart contract bug. Because of an old flaw in the contract, an attacker was able to buy TRU for $0, sell it again and again, and steal 8,535 ETH about $26.6M. Are you holding $TRU?👇
Evan Luthra tweet media
English
27
14
36
26.1K
pashov
pashov@pashov·
🚨A smart contract exploit from 1hr ago just drained ~8536 ETH, worth around ~$26M The code was live on Ethereum for almost 5 years already. Source code unverified - only bytecode is public.
pashov tweet media
English
142
153
3.1K
357.1K
TruebitGod
TruebitGod@TruebitGod·
@martypartymusic @pashov Can I DM you please? Truebit have always been very secretive about their code, mainly because so many early L2s copied their verification game.
English
0
0
0
57
TruebitGod
TruebitGod@TruebitGod·
TruebitGod@TruebitGod

Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.

QME
0
0
1
210
Money Guru Digital
Money Guru Digital@Moneygurudigi·
🚨 TRUEBIT PROTOCOL EXPLOITED, $26.6M LOST An old smart contract bug let an attacker buy $TRU for free and dump it repeatedly, draining 8,535 $ETH in a single transaction. The exploit even called a function named “Attack.” Funds were split across wallets, with 50% already sent to Tornado Cash to obscure trail $TRU collapsed completely. This wasn’t volatility, it was broken code.
Money Guru Digital tweet mediaMoney Guru Digital tweet media
English
24
12
25
9.3K
pashov
pashov@pashov·
@botdidy Root cause analysis in progress Here is one x.com/hklst4r/status…
Weilin (William) Li@hklst4r

Another 26M hack. @Truebitprtocol I haven't decompiled the vulnerable code yet, but the root cause appears to be a mispriced minting function of its purchase contract that allows anyone to purchase TRU token at a very low price. The first attacker (26M profit): 0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014The second attacker (~250k profit): 0x71496352b02f974a3898c1b743e9fc2befb935e6c2a3e421134ec09b63052f4b@Truebitprotocol This contract has been a very old contract deployed ~5 years ago... It seems old contracts are getting more "popular" among attackers now. btw a friend of mine shared me a screenshot of the second hacker celebrating in his chat group 😂 (not sure if it's genuine) --- Disclaimer: This is my prelminary analysis and I may make mistakes.

English
1
1
22
11.5K
TruebitGod
TruebitGod@TruebitGod·
TruebitGod@TruebitGod

Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.

QME
0
0
0
175
Weilin (William) Li
Weilin (William) Li@hklst4r·
Weilin (William) Li@hklst4r

Another 26M hack. @Truebitprtocol I haven't decompiled the vulnerable code yet, but the root cause appears to be a mispriced minting function of its purchase contract that allows anyone to purchase TRU token at a very low price. The first attacker (26M profit): 0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014The second attacker (~250k profit): 0x71496352b02f974a3898c1b743e9fc2befb935e6c2a3e421134ec09b63052f4b@Truebitprotocol This contract has been a very old contract deployed ~5 years ago... It seems old contracts are getting more "popular" among attackers now. btw a friend of mine shared me a screenshot of the second hacker celebrating in his chat group 😂 (not sure if it's genuine) --- Disclaimer: This is my prelminary analysis and I may make mistakes.

QME
1
0
13
8.3K
Truebit
Truebit@Truebitprotocol·
Today, we became aware of a security incident involving one or more malicious actors. The affected smart contract is 0x764C64b2A09b09Acb100B80d8c505Aa6a0302EF2 and we strongly advise the public not to interact with this contract until further notice. We are in contact with law enforcement and taking all available measures to address the situation. We will share updates through our official channels as they become available.
English
59
21
143
125.4K
TruebitGod
TruebitGod@TruebitGod·
TruebitGod@TruebitGod

Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.

QME
0
0
0
37
TruebitGod
TruebitGod@TruebitGod·
Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.
Truebit@Truebitprotocol

Today, we became aware of a security incident involving one or more malicious actors. The affected smart contract is 0x764C64b2A09b09Acb100B80d8c505Aa6a0302EF2 and we strongly advise the public not to interact with this contract until further notice. We are in contact with law enforcement and taking all available measures to address the situation. We will share updates through our official channels as they become available.

English
10
8
38
7.1K
TruebitGod
TruebitGod@TruebitGod·
TruebitGod@TruebitGod

Attention all Truebit holders. Do not interact with the contract until @Truebitprotocol provide further information. What we know so far: malicious actors have exploited the OS reserve/mint functions and drained 8000+ Ethereum from the reserve. My friend Marcus has added a security incident page to his Tru Watch site: tru.watch/security-incid… Here you can track the flow of the funds and monitor the attacker's wallets. Currently, the 8000+ Eth stolen is sitting in two wallets. Please see the page. I hope you are all okay, this is the worst start to a year I have ever experienced. DM me if I can do anything for you.

English
0
0
0
7
ddimitrov22
ddimitrov22@ddimitrovv22·
First big hack for 2026 🙁 Truebit hacked for ~$27M. No official audits are published in their docs, yet their slogan is "Don't just trust, verify". etherscan.io/tx/0xcd4755645…
English
8
9
99
10.1K