PeckShield Inc.
@packshieldnet
A blockchain security and data analytics company (telegram: http://t.me/peckshield)
Dit vind je misschien leuk
Hi @hashflow, you may want to take a look: etherscan.io/tx/0xdedda4932… It appears there is an approve-related issue.
It seems to be white-hat op on the following exploits @hashflow eth: etherscan.io/address/0xddb1… arb: arbiscan.io/address/0x0469… bsc: bscscan.com/address/0x91d0… polygon: polygonscan.com/address/0xbcb8… avanlanche: snowtrace.io/address/0x91d0…
Hi @hashflow, you may want to take a look: etherscan.io/tx/0xdedda4932… It appears there is an approve-related issue.
Hi @MidasCapitalXYZ: you may want to take a look: bscscan.com/address/0xc401…
The loss of today's @MidasCapitalxyz hack is >$600K. The root cause is due to the rounding issue in its lending protocol (forked from the popular @compoundfinance v2 code base ). The same issue has been exploited earlier in @HundredFinance :
The loss of today's @HundredFinance hack is ~$7m. The root cause appears the attacker donates 200 WBTC to inflate hWBTC's exchange rate so that even a tiny amount (2 wei) of hWBTC can basically drain current lending pools. Here comes the hack tx: optimistic.etherscan.io/tx/0x6e9ebcdeb…
#PeckShieldAlert @babydoge is exploited for ~442 $BNB ($100K) bscscan.com/tx/0xbaf3e4841…
Hi @ThemisProtocol, you may want to take a look: arbiscan.io/tx/0xff368294c…
4/ The stolen funds have been cross-chained (via @StargateFinance ) into ETH and parked in the following address: etherscan.io/address/0xdb73…
3/ To illustrate, we use the hack tx: ttps://arbiscan.io/tx/0xff368294ccb3cd6e7e263526b5c820b22dea2b2fd8617119ba5c3ab8417403d8 and show the key steps below:
#PeckShieldAlert PeckShield has detected that @unagiidotcom has been exploited for ~65.7 $ETH (~$123.5K) @peckshield etherscan.io/tx/0xeaed60c62… etherscan.io/tx/0x7da28ce18…
1/ @ThemisProtocol was exploited by a flashloan attack on @arbitrum (tx: arbiscan.io/tx/0xff368294c…), leading to the gain of ~$370k for the exploiter.
Hi @Biswap_Dex you may want to take a look: bscscan.com/address/0xa7a9… The V3 migrator logic needs to validate the caller for the liquidity migration.
Hi @PolyNetwork2 , you may want to take a look: andromeda-explorer.metis.io/tx/0xc9ec56e20… debank.com/profile/0xe0af…
#PeckShieldAlert @PolyNetwork2 exploiter has transferred more than $5M worth of cryptos out on #Ethereum, #BNBChain, and #Polygon, especially 1.5K $ETH ($2.88M) to 0x23f4...c671, 440 $ETH ($844K) to 0xc8Ab...C42F, and 300 $ETH (~$575K) to 0xfD3E...b778 etherscan.io/address/0x23f4…
#PeckShieldAlert In June 2023, ~$2.27M worth of #NFTs were stolen, marking a 23% decrease compared to the previous month. Within a span of 160 minutes, half of the stolen NFTs were promptly sold on various marketplaces. The percentage of stolen NFTs initially sold on @blur_io
Hi @BaoCommunity you may want to take a look: etherscan.io/tx/0xdd7dd68cd…
The lockup assets on the Multichain MPC address have been moved to an unknown address abnormally. The team is not sure what happened and is currently investigating. It is recommended that all users suspend the use of Multichain services and revoke all contract approvals
Is this possibly related? @LayerZero_Labs
Today we are announcing the introduction of $USDC, $USDT, $WETH and $WBTC, built on top of LayerZero, to the Fantom network with the support of @FantomFDN and a vast majority of the ecosystem.
Hi @MultichainOrg you may want to take a look: etherscan.io/tokentxns?a=0x…
It seems the hack is confirmed.
United States Trends
- 1. #UFCHouston N/A
- 2. Javonte Williams N/A
- 3. Willie Colón N/A
- 4. Corey Day N/A
- 5. Kyle Busch N/A
- 6. Paperwork N/A
- 7. Vandy N/A
- 8. Cincinnati N/A
- 9. Kansas N/A
- 10. Newcastle N/A
- 11. Ceballos N/A
- 12. Judice N/A
- 13. Jim Snow N/A
- 14. daniela N/A
- 15. Osasuna N/A
- 16. Hocevar N/A
- 17. Bridgeman N/A
- 18. Semenyo N/A
- 19. Will Benson N/A
- 20. O'Reilly N/A
Something went wrong.
Something went wrong.