HACKDEFI

63 posts

HACKDEFI banner
HACKDEFI

HACKDEFI

@hackthedefi

เข้าร่วม Şubat 2024
34 กำลังติดตาม42 ผู้ติดตาม
HACKDEFI รีทวีตแล้ว
MistTrack🕵️
MistTrack🕵️@MistTrack_io·
🚨Update on @lifiprotocol Exploiter Activity🚨 According to MistTrack's monitoring, the LIFI Exploiter transferred another 720 $ETH to Tornado Cash a few hours ago. As of now, the LIFI Exploiter has transferred 2006 $ETH to Tornado Cash, with ~847 $ETH still untransferred. (By the way, does this guy think this is peeling chain?😓) Click the link to view the fund tracking process⬇️ misttrack.io/s/lynf4
MistTrack🕵️ tweet mediaMistTrack🕵️ tweet media
MistTrack🕵️@MistTrack_io

The @lifiprotocol exploiter started with 1 ETH from Tornado Cash and 9 hops later, back to Tornado Cash with 1 ETH🤭

English
0
5
21
4.8K
HACKDEFI รีทวีตแล้ว
SlowMist
SlowMist@SlowMist_Team·
🚨SlowMist Security Alert🚨 We detected potential suspicious activity related to @Bedrock_DeFi due to mistakenly supporting the minting of uniBTC at a 1:1 exchange rate with the native token. As always, stay vigilant!
SlowMist tweet media
English
3
7
36
39.4K
HACKDEFI รีทวีตแล้ว
Scam Sniffer | Web3 Anti-Scam
Scam Sniffer | Web3 Anti-Scam@realScamSniffer·
🚨 Phishing Alert: @Polymarket users targeted on Google search! 🔍 Protect your assets—avoid simple mistakes. Get our security extension now! 🛡️✨ Stay safe and alert! ⚠️
Scam Sniffer | Web3 Anti-Scam tweet media
English
7
24
78
22.6K
HACKDEFI รีทวีตแล้ว
Shieldify Security
Shieldify Security@ShieldifySec·
How to become a Better Smart Contract Auditor? It's simple, put maximum time into it and do it willingly, every single day, no Excuses First is learning, then the first letter of the word Learn is removed LEARN -> EARN
English
7
10
122
5.5K
HACKDEFI รีทวีตแล้ว
Jeff Security
Jeff Security@jeffsecurity·
Writing Multi-Fuzzer Invariant Tests Using Chimera: Fuzz smart contracts using the same code with Echidna, Medusa & Foundry! dacian.me/writing-multi-…
English
1
11
60
2.7K
HACKDEFI รีทวีตแล้ว
BlockSec MetaSleuth
BlockSec MetaSleuth@MetaSleuth·
「⚠️ @OnyxDAO Exploit: $4M Loss」 🔗metasleuth.io/result/eth/0x6… @OnyxDAO was hit by a $4M attack due to unverified inputs in the liquidation process. The attacker used the liquidateWithSingleRepay function to manipulate liquidation parameters, liquidating all collateral with just 1 token. 🕵️‍♂️ #MetaSleuth has tracked that two addresses (0xfd47f6 and 0x680910), belonging to the same attacker, profited $2.7M. The funds are distributed across three addresses: the two attacker addresses and 0x2d334f, with most profits swapped to ETH. The starting funds originated from @ChangeNOW_io 🛡️ Simplify your on-chain investigations with #MetaSleuth
English
0
3
6
2.5K
HACKDEFI รีทวีตแล้ว
BlockSec Phalcon
BlockSec Phalcon@Phalcon_xyz·
ALERT! Our system has detected hundreds of suspicious transactions targeting an unknown, non-open-sourced contract on #BSC (0xff2481) over the past few hours, suggesting a possible reentrancy attack. The total loss has reached ~$140K. Interestingly, after the first attack transaction (with a profit of ~$78K), the deployer (0x7baa94) invoked the victim contract's 'emergencyWithdrawUSDT' function multiple times, each for a small amount rather than withdrawing all the funds at once. This allowed the attacker to make small, repeated profits, ultimately accumulating to $140K. First attack TX: app.blocksec.com/explorer/tx/bs… Subscribe to BlockSec Phalcon today to get alerted in realtime and take automatic actions to protect your assets. blocksec.com/phalcon
English
0
6
8
4K
HACKDEFI รีทวีตแล้ว
BlockSec
BlockSec@BlockSecTeam·
.@OnyxDAO was attacked, resulting in a loss of nearly $4M. The root cause was unverified user input during the liquidation process. Specifically, key parameters of the liquidateWithSingleRepay function in the NFTLiquidation contract were controllable by the attacker, allowing manipulation of the extraRepayAmount variable through the repayAmount parameter. By exploiting this, the attacker was able to liquidate all collateral with just one token. The key attack steps are summarized as follows: 1. The attacker first deposited oETH and borrowed various assets to reach the liquidation threshold. Simultaneously, they created a new contract that, through a donation attack and precision loss (inherent from the Compound V2 fork), reduced the oETH exchange rate, making the attacker's position eligible for liquidation. 2. The attacker then performed the liquidation. Due to insufficient parameter validation, the attacker manipulated the extraRepayAmount variable, which was added to the calculation of how many tokens needed to be liquidated. This allowed the attacker to obtain more oETH through liquidation, leading to a profit. Attack Tx: app.blocksec.com/explorer/tx/et…
BlockSec tweet mediaBlockSec tweet media
English
3
17
53
8K
HACKDEFI รีทวีตแล้ว
𝕗𝕦𝕫𝕫𝕝𝕒𝕟𝕕
📢Announcement Time 📢 We're very excited to be working with @chainlinklabs to bring our on-chain security solutions to #ChainlinkBUILD members to help Web3 #builders safeguard dApps and innovate with a peace of mind. Read more in our blog here: medium.com/fuzzland-blog/…
Chainlink@chainlink

FuzzLand (@hackthedefi) has established a strategic alliance with @chainlinklabs. This alliance helps #ChainlinkBUILD members access FuzzLand's all-in-one onchain contract security platform, enabling projects to move faster while staying secure. medium.com/fuzzland-blog/…

English
4
11
48
5.8K
HACKDEFI รีทวีตแล้ว
XOX Labs ⛓
XOX Labs ⛓@Xox_Labs·
Excited to announce our collaboration with the brilliant minds at @hackthedefi to fortify our Staking SC's security 🤖 Stay tuned for the final results, paving the way for the much-anticipated "XOX Native Staking" event ⚖️
𝕗𝕦𝕫𝕫𝕝𝕒𝕟𝕕@fuzzland_

We're honored to be selected by @xox_labs to safeguard their staking contracts where users stake to earn rewards.  By onboarding with Blaz+, they get access to an in-depth security snapshot of potential vulnerabilities and 24/7 real-time smart contract analytics triggered by each state change.  If you want to learn more about how Blaz+ can elevate your smart contract security, see our solutions here: fuzz.land.

English
7
28
48
3.8K
HACKDEFI รีทวีตแล้ว
HACKDEFI รีทวีตแล้ว
PeckShieldAlert
PeckShieldAlert@PeckShieldAlert·
#PeckShieldAlert The exploiter-labeled #WazirX address has moved the 11th batch of 5K $ETH (worth ~$13.2M) to a new intermediary address, 0x0641...7b4a
PeckShieldAlert tweet media
English
3
5
18
6.5K