Jan 30 to Feb 5
SECURITY HACKS:
- SoDeadNFT Announces Hack on Discord
On 1 Feb, SoDeadNFT (@SoDeadNFT) announced on Twitter that their discord had encountered a hack. The account later made an announcement that their Discord server and funds were both safe and that the team has handled the situation effectively.
- Hacker Attacks Realm Hunter’s Discord Server
On 1 Feb, a hacker attacked Realm Hunter’s discord server. Realm Hunter is a game project.
- Squishiverse Founder Announce Discord Account Compromised
On 1 Feb, Ethereum-based NFT project Squishiverse’s founder mooney.eth (@mooneynft) announced on Twitter that their Discord had been compromised. The user apologized and expressed their hope that no one had clicked the link posted by the hacker.
The user also indicated their suspicion that tit was “a Twitter account with a Gold Badge wanting to interview” them to be the culprit.
Later, mooney.eth had reported that no one was affected by the hack and urged users to be wary of scammers.
- Hacker Exploits TellorFlex Oracle Issue to Attack BonqDAO
On 2 Feb, a hacker attacked BonqDAO, a DeFi application deployed on Polygon.
The root cause was that its oracle TellorFlex had an issue in its price feeder(staker)’s registration.
For more details, refer to: https://twitter.com/FairyproofT/status/1622448436053430272
Crypto assets worth around US $1.7 million were exploited in this incident.
Additional Details:
– Attacker’s Address: 0xcacf2d28b2a5309e099f0c6e8c60ec3ddf656642
– Attacking Contract: 0xed596991ac5f1aa1858da66c67f7cfa76e54b5f1
– Attacked Contract: 0x8f55D884CAD66B79e1a131f6bCB0e66f4fD84d5B
Hash Values of Attacking Transactions:
– 0x31957ecc43774d19f54d9968e95c69c882468b46860f921668f2c55fadd51b19
– 0xa02d0c3d16d6ee0e0b6a42c3cc91997c2b40c87d777136dedebe8ee0f47f32b1
- Hacker Attacks Orion Protocol Through Re-Entrancy Vulnerability
On 3 Feb, a hacker attacked Orion Protocol, a DeFi application deployed on both Ethereum and the BNB chain.
The root cause of this issue was that the implementation had a re-entrancy vulnerability.
In its implementation, the ExchangeWithAtomic contract acted as a marketplace where users could deposit or exchange assets. However, the contract’s exchange function did not have protection to prevent re-entrancy attacks.
Crypto assets worth around US $ 3 million were exploited in this incident.
Additional Details:
– Attacker’s Address: 0x837962b686fd5a407fb4e5f92e8be86a230484bd
– Attacking Contracts:
0x5061F7e6dfc1a867D945d0ec39Ea2A33f772380A (on Ethereum)
0x84452042cb7be650be4eb641025ac3c8a0079b67 (on BNB Chain)
– Attacked Contracts:
0xb5599f568D3f3e6113B286d010d2BCa40A7745AA (on Ethereum)
0xe9d1d2a27458378dd6c6f0b2c390807aed2217ca (on BNB Chain)
– Hash Values of Attacking Transactions:
0xa6f63fcb6bec8818864d96a5b1bb19e8bd85ee37b2cc916412e720988440b2aa (on Ethereum)
0xfb153c572e304093023b4f9694ef39135b6ed5b2515453173e81ec02df2e2104 (on BNB Chain)
- Hacker Attacks Superordinary Friends’ Discord Server
On 3 Feb, a hacker attacked Superordinary Friends’ discord server. Superordinary Friends is an NFT project deployed on Ethereum.
- OogaVerse Announces Discord Server Attacked
On 3 Feb, Ethereum-based NFT project OogaVerse (@OogaVerse) announced on Twitter that their Discord server had been hacked. The account later made an announcement that their Discord server had been “thoroughly cleaned and is now working as usual”. The project also offered users who had “missing Oogas” to approach support in their Discord server.
- Attacker Exploits SperaxUSD Through Token Balance Manipulation
On 4 Feb, a hacker attacked SperaxUSD, a DeFi application deployed on Arbitrum.
An exploiter had increased the token balance for their address to 9.7 billion tokens without providing required collateral and liquidated them before the operation was stopped by joint actions of the Sperax team and Arbitrum ecosystem partners.
All $USDs transactions and the smart contract were blocked on Feb 4, 03:11 AM UTC. The liquidated amount will be recapitalized by the Sperax team before relaunching the protocol.
Crypto assets worth around US $300,000 were exploited in this incident.
Additional Details:
– Attacker’s Address: 0x4AfcD19bB978Eaf4F993814298504eD285df1181
– Hash Value of Attacking Transaction:
0xe74641b4b7e9c9eb7ab46082f322efbc510b8d39af609d934f41c41d7057fe49
- Hacker Attacks Live Crypto Party by Exploiting Validation Vulnerability
On 5 Feb, a hacker attacked Live Crypto Party, a DeFi application deployed on the BNB Chain.
The _transferOwnership function had a vulnerability in its validation and this was exploited by the hacker to steal 10 BNBs worth around US $3000.
Additional Details:
– Attacker’s Address: 0x52D65a9F6d6CC83143B83b4E692Cc338325b4d60
– Attacked Contracts:
Proxy Contract: 0x38b0EF754Aec7aCB1d180eeA902a71B14e34b352
Implementation Contract: 0xFB2A9B3EEE6376F7095663B4D6ea8c39B634132A
– Hash Value of Attacking Transaction:
0x7ca8b3f04ba3947acbfccf21c6394e5f90d66e7141134fa6d2d3ca7c7d3f2b34
CONCLUSION-
9 notable security incidents have occurred in the past week. 5 of 9 security incidents involve social media accounts and 4 were attacks against smart contracts.
A Reminder for Project Teams: Always test thoroughly. Do smart contract audits before deploying smart contracts on-chain. Be alert to any anomalies happening in the various social media accounts you manage.
A Reminder for Crypto Users: Be cautious about suspicious links, emails, websites, and projects launched by teams without established reputations.
It is important for everyone in the crypto community to gain understanding and practice sufficient levels of cybersecurity.
To stay updated on notable security incidents in the world of Web3.0, subscribe to our newsletter: https://fairyproof.substack.com/
For a better understanding of all things Web3.0: https://medium.com/@FairyproofT
Looking to strengthen the security of your project or looking for an audit? Contact us at