EthSecurity
5.22K subscribers
112 photos
20 files
759 links
Download Telegram
Easy transferfrom(victim,Hacker,3.3 m $)
Bungee Exploit
@EthSecurity1
๐Ÿ”ฅ2๐Ÿ‘1
Forwarded from Investigations by ZachXBT
It appears a Ripple insider was hacked for ~213M XRP ($112.5M)

Source address
rJNLz3A1qPKfWCtJLPhmMZAfBkutC2Qojm

So far the stolen funds have been laundered through MEXC, Gate, Binance, Kraken, OKX, HTX, HitBTC, etc

Update: Confirmation of the hack from Chris Larsen (Ripple Co-Founder & Executive Chairman)

Theft addresses
rGhR13XyM43WdDaSMznHd5rZ4cJatybvEg
rHQVKntyfkDCPhEBL2ctryuEAkDZgckmmV
rLsUemhuBZtF44rqqzneb2F9JgyrRYYd4t
rKPERax7t9iFvT3RHXn5nifyNpzp9a4hBa
rpjs4HLX1gJoEenH69PsQmXaXY22QhCYAT
rLRhugR4ysNa2xkt4E6fKN8krs9jatCp6w
rnCyeUNvfDbtTagGEPjBfTCBz6EqJjf2Uj
rHVjfYzTaB8MzSoQGqpzH9barZr85QsZW7
๐Ÿ˜3๐Ÿคฏ2
Forwarded from Crypto Goodreads
Vitalik wrote about risks of restaking in this article from May 2023.

Good to take a step back sometimes and look at the safety too

๐Ÿ‘‡

https://vitalik.eth.limo/general/2023/05/21/dont_overload.html
Warpcast is strange! Get approves account keys onchain and store eth keys on it's server :(
Eth keys : hold asset(EOA)

@Ethsecurity1
๐Ÿ˜10๐Ÿคฌ2
- PlayDapp Heist: Attackers minted 200M PLA tokens, valuing a massive $31M loss. A significant portion, $5.9M worth, found its way to the Gate platform. The exploit was due to a security vulnerability. @EthSecurity1
๐Ÿ”ฅ3๐Ÿ˜2๐Ÿ˜ฑ2
#Scam
1- Create Github PR with scam massage
2- Tag targets
3- Scam message will be emailed to targets from Github
@Ethsecurity1
๐Ÿ‘5
Seneca Protocol has a critical approval exploit (open external call). $6m+ lost so far across eth/arb ADDRESSES TO REVOKE: 0xbc83f2711d0749d7454e4a9d53d8594df0377c05 (MAINNET)

0x2d99e1116e73110b88c468189aa6af8bb4675ec9 (ARBITRUM)

NOTE: contract was pausable but written in internal functions there is no way to call them.
@EthSecurity1
๐Ÿ˜จ4๐Ÿ”ฅ1๐Ÿ‘1
the "EVM from scratch" book. https://evm-from-scratch.xyz/intro.html ZK proofs ELI5. A fun way to understand circuits and even play with them directly in your browser. eli5.zksync.io @EthSecurity1
โค6๐Ÿ‘1
some smartcontract Red Flags: -out of scope vulnerability -more comments than code -require(msg.sender == tx.origin); -Lot of typos => Lot of Criticals -Itโ€™s a minimal proxy but deployed straight from the command line with injected state. -Over complicated -Most of it being admin restricted -Uniswap v2 with 0 min amount -NO Test -safeMath & Division you can add too @EthSecurity1
โค10๐Ÿ”ฅ3๐Ÿ’ฏ2
WOOFi
got taken for a $8.5 Million ride, after a flash loan attack on Arbitrum.
The attacker exploited Woofiโ€™s novel oracle design and low liquidity.

https://rekt.news/woo-rekt/ @EthSecurity1
Happy noroz and new year 2583 achaemenid
To all kurdish and persians
โค4๐Ÿพ4๐Ÿ”ฅ3๐ŸŽ‰3๐Ÿคฌ1๐Ÿคฎ1
GJNRFZtWYAA7Au0.jpg
22.5 KB
SSS Hacked on Blast. a kid wrote it. @EthSecurity1
๐Ÿ˜ข3
Forwarded from Vladimir S. | Officer's Channel (officercia)
๐Ÿ”“โ˜๏ธ unizen_io, a crypto exchange and trading platform, experienced a security breach on March 8 that resulted in the loss of more than $2.1 million.

The attack technique involved authorizing a trading aggregator running on the Ethereum ( $ETH ) blockchain network. The hacker exploited an open external challenge vulnerability in the contract.

Detailed analysis: https://x.com/amlbothq/status/1770102963521867916

#offtopic #security #investigations
๐Ÿ’ฏ4๐Ÿ‘1