PeckShield Inc.

1.6K posts

PeckShield Inc. banner
PeckShield Inc.

PeckShield Inc.

@peckshield

A blockchain security and data analytics company (telegram: https://t.co/x72dANZur3)

参加日 Ocak 2018
604 フォロー中81.7K フォロワー
固定されたツイート
PeckShield Inc.
PeckShield Inc.@peckshield·
1/ We are thrilled to announce a self-service SaaS platform-#KillSwitch, which aims to detect exploitation TXs before their block inclusion and take contingency measures to block the attack or prevent assets from being stolen. It is in-essence a frontrunning-based DeFi protection
PeckShield Inc. tweet media
English
133
444
1.2K
0
PeckShield Inc.
PeckShield Inc.@peckshield·
After liquidating the KelpDAO exploiter's aave position, previously-affected ethereum:0xc02aaa39b223fe8d0a0e5c4f27ead9083c756cc2 core market on Ethereum now has available liquidity of ~$177m ! x.com/aave/status/20…
PeckShield Inc. tweet media
PeckShieldAlert@PeckShieldAlert

It seems the 0x1f4c_Kelp DAO Exploiter on ethereum is being liquidated (w/ ~$123m debt) in @aave Here is the related tx: etherscan.io/tx/0xe2391ea41… The arbitrum position is also liquidated: arbiscan.io/tx/0x78b41623c…

English
3
11
91
18.6K
PeckShield Inc.
PeckShield Inc.@peckshield·
It seems the admin key of @wasabi_protocol has been compromised with the estimated loss of $5.5m across multiple chains, including ETH, BASE, BLAST, and BERA chains. Here is the related tx to add the malicious admin: etherscan.io/tx/0x11ff84ffb…
PeckShield Inc. tweet mediaPeckShield Inc. tweet media
Wasabi Protocol 🟢@wasabi_protocol

We're aware of an issue and are actively investigating. As a precaution, please do not interact with Wasabi contracts until further notice. We'll share an update as soon as we have more information. Thanks for your patience.

English
8
13
72
31K
banteg
banteg@banteg·
not a yearn bug either. it's the victim's personal automation contract that was seemingly meant to convert yvweth to eur on another platform. unfortunately, the execute() method lacked owner check, allowing the attacker to withdraw the approved tokens. i reconstructed what happened here, including the victim and exploit contracts. gist.github.com/banteg/a7e2503…
banteg tweet media
scoopy trooples@scupytrooples

idk why peckshield is being so reckless in their messaging here, but to be clear, this is the yearn v2 WETH vault, and it is not connected to Alchemix in any way whatsoever. Since the v2 -> v3 migration was completed almost two weeks ago, we have not had any funds deployed to it.

English
8
9
106
41.3K
scoopy trooples
scoopy trooples@scupytrooples·
idk why peckshield is being so reckless in their messaging here, but to be clear, this is the yearn v2 WETH vault, and it is not connected to Alchemix in any way whatsoever. Since the v2 -> v3 migration was completed almost two weeks ago, we have not had any funds deployed to it.
PeckShield Inc.@peckshield

A victim just lost a Alchemix Yearn yvVault position $yvWETH (estimated $~1m), from an earlier approval to an unverified contract (etherscan.io/address/0x143a…). This unverified contract, created 10 days ago, turns out to be buggy and can be exploited for arbitrary call execution. Here is the vulnerable logic from the decompiled contract, affected in the following exploit tx: etherscan.io/tx/0xebaaab69b…

English
11
10
118
28.3K
PeckShield Inc.
PeckShield Inc.@peckshield·
@cryptobyrde The victim trusted a buggy contract (to manage its position in Alchemix Yearn yvVault - $yvWETH), which was exploited to redeem the position to steal underlying ETH.
English
2
0
2
1.5K
PeckShield Inc.
PeckShield Inc.@peckshield·
A victim just lost a Alchemix Yearn yvVault position $yvWETH (estimated $~1m), from an earlier approval to an unverified contract (etherscan.io/address/0x143a…). This unverified contract, created 10 days ago, turns out to be buggy and can be exploited for arbitrary call execution. Here is the vulnerable logic from the decompiled contract, affected in the following exploit tx: etherscan.io/tx/0xebaaab69b…
PeckShield Inc. tweet media
English
12
14
86
29.8K
PeckShield Inc.
PeckShield Inc.@peckshield·
It seems the @KelpDAO exploiter moved stolen funds via @LayerZero_Core to Tron for laundering. Related steps: 1: Transfers on Ethereum: Kelp DAO Exploiter1 -> 0xF9802c5EB6b972Ba686aFa7CA615910Ea8310b85 -> 0x42a71A7ED12582378d4A4567A1af6Bad4f03dF84 -> 0x0BA9e88059c85fBD76b0C025F00C8B8Ebb0AddDf 2: Cross-chain: Ethereum -> Arbitrum: 0x0BA9e88059c85fBD76b0C025F00C8B8Ebb0AddDf (Ethereum) -> 0x4D5A08A96D644d7CA7F4541E1512a53D55aA5842 (Arbitrum) 3: Swap on Arbitrum from ETH -> USDT 4: Cross-chain: Arbitrum -> Tron 0x4D5A08A96D644d7CA7F4541E1512a53D55aA5842 (Arbitrum) -> TLTCf565jGgSeCsUhBpWuPhrrHcGGX9ekT (Tron)
PeckShieldAlert@PeckShieldAlert

#PeckShieldAlert The @KelpDAO exploiter bridged $ETH from #Ethereum to #Arbitrum via @AcrossProtocol, swapped for $USDT0, and subsequently routed funds to @trondao via @LayerZero_Core

English
7
8
86
37.2K
banteg
banteg@banteg·
guys you wouldn't believe it
banteg tweet media
English
23
7
280
39.5K
PeckShield Inc.
PeckShield Inc.@peckshield·
Hi @AethirCloud @AethirEco, you may want to take a look at your AethirOFTAdapter The stolen funds are currently held in the following address: #tokentxns" target="_blank" rel="nofollow noopener">bscscan.com/address/0xd5fa…
PeckShield Inc. tweet media
English
5
10
61
29.6K