• InfernoBullWin drained $440k through hundreds of transactions

    Since 09/11/2024, Blocksec monitored hundreds of suspicious tx targeting InfernoBullWin, each tx gained about $1.5k. Victim contract has “swapTitanXForInfernoAndBurn” function which exchanges its “Titan” tokens to “Inferno” tokens, and then burns “Inferno” tokens. Anyone can call this function. This function was used for sandwich attack. Drainers swapped large amount of “Titan” to “Blaze”, and then…

  • Bankroll Network hacked

    Victim contract is a token sale contract, there’re functions for buying and selling tokens. To buy tokens, users need to send WBNB to the pool, and some of that WBNB is used as fee(like reward to Liquid Providers). This means “profitPerShare_” is increased when user buys tokens. Root cause of this hacking is in “buyFor”…

  • WXETA token exploit

    Awful “initialize” function. It didn’t set “initialized” to true, anyone can call “initialize” function. Hacker called “initialize” and then minted WXETA tokens to pair, and then drained USDT, gained $65k.

  • MintStakeShare hacked

    MSS pancake lp token drained $180k, but luckily $130k sent to MSS deployer. Root cause is in “buyWithMint” function of MSS token. “buyWithMint” function gets some bnb and mint MSS tokens and add some liquidity to pancake lp. Token price is calculated by “calculatePrice()” function. But “calculatePrice()” doesn’t consider pool state. If someone manipulate pool…

  • OTSea Staking hacked

    A staking contract named “OTSeaStaking” exploited, lost $26k. Hacker called “withdraw” several times, got much more OTSea tokens than he staked. In “withdraw” function, deposit.amount is not decreased. Anyone can deposit once and withdraw multiple times.

  • CUT token hacking

    We have seen a flashloan exploit involving CUT token. Here, in “burn” function, only 60, 652 CUT tokens are transferred to 0x34b…e98, but after “burn”, balance of that address was 269, 661. Why? As you can see from call stack, when remove liquidity, (leftAmount – amount) is added to recipient balance, and leftAmount is calculated…

  • Penpie hacked

    Penpie lost over $20m because of reentrancy attack. Reward amount is calculated using token balance before and after redeeming rewards. If someone can deposit tokens in “redeemRewards” function, reward amount is deposited token amount. Hacker deployed his own market before attack. https://app.blocksec.com/explorer/tx/eth/0x7e75…21d1 Then, hacker called “batchHarvestMarketRewards” function with his own market. As you can see…

  • iVest token hacking

    In “transfer” function, if to address is 0x0, balance of sender is reduced 2 times, wrong logic. Hacker transferred some iVest tokens to uniswap pair, called skim(0x0), sync(). Because of wrong transfer, balance of pair was very small after repeating this step 3 times. Then, he could get almost all WBNB using a few iVest…

  • Vowcurrency hacked

    Root cause is bad exchange rate of VOW and vUSD token. Maybe this is due to mistake of team. Before hacking exchange rate was 5. Hacking happened in block 20519309, and exchange rate was set to 100 in block 20519307. https://t.co/HQX1ivaC8u After hacking, in block 20519316, they changed exchange rate to 5 again. https://t.co/um2qfNgJdq Hacker…