https://x.com/PLS2Eio,
Loss ~ $4k
Exploit:https://bscscan.com/address/0x15d72bf2c7e3f6573f84ae82eef58809fd34dabc
Exploit tx:https://app.blocksec.com/explorer/tx/bsc/0xa04b660dd280f1f32461a8c550b9ee7e2912c11ff6cdd7d17be9cb9bee3f4e41 Audited by certik
@EthSecurity1
claim() function does not check duplicate tokens when distributing rewardsLoss ~ $4k
Exploit:https://bscscan.com/address/0x15d72bf2c7e3f6573f84ae82eef58809fd34dabc
Exploit tx:https://app.blocksec.com/explorer/tx/bsc/0xa04b660dd280f1f32461a8c550b9ee7e2912c11ff6cdd7d17be9cb9bee3f4e41 Audited by certik
@EthSecurity1
BNB Smart Chain Explorer
Address: 0x15d72bf2...9fd34dabc | BscScan
Contract: Unverified | Balance: $0 across 0 Chains | Transactions: 0 | As at Feb-18-2026 10:16:04 PM (UTC)
😱3❤1
Pythia staking contract was drained in suspicious claimRewards() calls by
eth:0xd861e6F1760d014D6EE6428cF7F7d732563c74c0
The profit was swapped for 21 ETH (~$53K) and has been deposited to Tornado Cash. @ethsecurity1
eth:0xd861e6F1760d014D6EE6428cF7F7d732563c74c0
The profit was swapped for 21 ETH (~$53K) and has been deposited to Tornado Cash. @ethsecurity1
👍2
Forwarded from zilayo
Rough overview ignoring the flashloan stuff. Have barely looked at penpie/pendle contracts previously so a lot of context is missing.
Step 1:
> create YT/PT yield contract where the underlying asset is attacker controlled contract
> Create new pendle market with the PT
> Mint a bunch of PT - PT uses the underlying (attacker contract) for balance/exchange rate logic
> Mint a bunch of YT
> Transfer PT to pendle market
> Mint LP via the pendle market. Again, uses the attacker contract for rewards logic.
> Deposit LP into penpie
Step 2:
> Batch harvest penpie rewards. This uses the attacker's contract for reward logic.
> Penpie calls
> During the re-entrancy, attacker contract adds a bunch of single sided pendle liquidity using legit PT tokens + deposits LPs into penpie
> Penpie grants approval on a bunch of legit LP tokens to a second attacker contract and then calls this attacker contract to
> Attacker then calls MasterPenie to multiclaim rewards. Again this uses the attacker's second contract for reward logic and hands over control mid execution. Attacker transfers LPs from contract 2 -> contract 1 during this step.
> Attacker withdraws legit LPs from penpie and removes single sided pendle liquidity for them. At this stage, they receive more of the underlying than was originally used to create the LPs.
Step 1:
> create YT/PT yield contract where the underlying asset is attacker controlled contract
> Create new pendle market with the PT
> Mint a bunch of PT - PT uses the underlying (attacker contract) for balance/exchange rate logic
> Mint a bunch of YT
> Transfer PT to pendle market
> Mint LP via the pendle market. Again, uses the attacker contract for rewards logic.
> Deposit LP into penpie
Step 2:
> Batch harvest penpie rewards. This uses the attacker's contract for reward logic.
> Penpie calls
claimRewards on the attacker contract which hands over control mid execution> During the re-entrancy, attacker contract adds a bunch of single sided pendle liquidity using legit PT tokens + deposits LPs into penpie
> Penpie grants approval on a bunch of legit LP tokens to a second attacker contract and then calls this attacker contract to
queueNewRewards. During the reentrancy, the attacker transfers previously approved LPs from the penpie staking contract -> attacker contract 2.> Attacker then calls MasterPenie to multiclaim rewards. Again this uses the attacker's second contract for reward logic and hands over control mid execution. Attacker transfers LPs from contract 2 -> contract 1 during this step.
> Attacker withdraws legit LPs from penpie and removes single sided pendle liquidity for them. At this stage, they receive more of the underlying than was originally used to create the LPs.
🆒4
Solidity signature verification checklist : - Check if the returned public key matches expected public key.
- Check if the Signature has not already been used (use nonce) - Check if the signature is intended for the specific blockchain you are executing the smart contract on. This can be checked using the chainId (Relevant only for contracts deployed on multiple EVM chains) - Check if the Signature is used from the right person (if not everyone should be able to use it)
- Check if the deadline is not expired (if it is not needed that the signature is working forever)
Here is a good article that teaches about signatures: https://medium.com/coinmonks/ethereum-signatures-for-hackers-and-auditors-101-4da766cd6344 @EthSecurity1
- Check if the Signature has not already been used (use nonce) - Check if the signature is intended for the specific blockchain you are executing the smart contract on. This can be checked using the chainId (Relevant only for contracts deployed on multiple EVM chains) - Check if the Signature is used from the right person (if not everyone should be able to use it)
- Check if the deadline is not expired (if it is not needed that the signature is working forever)
Here is a good article that teaches about signatures: https://medium.com/coinmonks/ethereum-signatures-for-hackers-and-auditors-101-4da766cd6344 @EthSecurity1
Medium
Ethereum signatures for hackers and auditors 101
In real world you can sign documents using your personal signature, which is assumed to be unique and proves that you support, acknowledge…
🔥6⚡2👏1
- On September 4th, 2024, (CUT token) was exploited and lost ~$1.4 million.
To learn more about the incident, read full analysis here 👇 https://www.certik.com/resources/blog/caterpillar-coin-cut-token-incident-analysis
- On September 11th, 2024,
The exploiter transferred various asset tokens (~$20M) from several hot indodax wallet addresses.
eth/pol: 0x3C02290922a3618A4646E3BbCa65853eA45FE7C6
tron: TWe5pEnPDetzxgJS4uN26VFg15wWtdcTXc
btc: 1JUToCyRL5UwgeucjnFAagKs4v1YqhjT1d
@EthSecurity1
To learn more about the incident, read full analysis here 👇 https://www.certik.com/resources/blog/caterpillar-coin-cut-token-incident-analysis
- On September 11th, 2024,
The exploiter transferred various asset tokens (~$20M) from several hot indodax wallet addresses.
eth/pol: 0x3C02290922a3618A4646E3BbCa65853eA45FE7C6
tron: TWe5pEnPDetzxgJS4uN26VFg15wWtdcTXc
btc: 1JUToCyRL5UwgeucjnFAagKs4v1YqhjT1d
@EthSecurity1
Certik
CUT Token Incident Analysis - CertiK
On 10th September, 2024, Caterpillar Coin ($CUT token) suffered a flashloan attack resulting in a loss of ~$1.4M and causing a 99% slippage on the token. The attack exploited vulnerabilities in the ‘price protection mechanisms’, which led to the manipulation…
👍2
The L2 DAI deployer for DAI vanity addresses has been compromised, as it was generated by the vulnerable Profanity tool. All networks other than Optimism and Arbitrum are at risk, as the attacker can create honeypots with the same address. - 𝕏/@godsflaw
Delta Prime @DeltaPrimeDefi admin private key leaked. All pools are drained. $11M loss already. Withdraw ASAP!
Details of the hack:
A hacker gained control of 0xx40e4ff9e018462ce71fa34abdfa27b8c5e2b1afb, which is the admin of proxies. Then, the hacker upgraded the proxies to point to malicious contract 0xD4CA224a176A59ed1a346FA86C3e921e01659E73.
This malicious contract can inflate the deposited amount of the hacker on all pools.
@EthSecurity1
Details of the hack:
A hacker gained control of 0xx40e4ff9e018462ce71fa34abdfa27b8c5e2b1afb, which is the admin of proxies. Then, the hacker upgraded the proxies to point to malicious contract 0xD4CA224a176A59ed1a346FA86C3e921e01659E73.
This malicious contract can inflate the deposited amount of the hacker on all pools.
@EthSecurity1
🔥6
Basebrosfi rugged users
https://cointelegraph.com/news/basebros-fi-defi-rug-pull-smart-contract-base
@EthSecurity1
https://cointelegraph.com/news/basebros-fi-defi-rug-pull-smart-contract-base
@EthSecurity1
Cointelegraph
Base DeFi project disappears after rug pull
BaseBros Fi, a DeFi protocol on Base blockchain, vanishes after orchestrating a rug pull via an unaudited smart contract, stealing $130,000 of user funds.
🔥4😱1
seems Ethena frontend compromised. Please stay away and do not interact with it
@EthSecurity1
@EthSecurity1
🔥3
- This is the fundamental stuff that you will need on your journey as an auditor. - damn-vulnerable-defi-v4-solutions
Public by sunsec
https://github.com/SunWeb3Sec/damn-vulnerable-defi-v4-solutions @EthSecurity1
Public by sunsec
https://github.com/SunWeb3Sec/damn-vulnerable-defi-v4-solutions @EthSecurity1
❤2🤩2
Banana Gun user wallets have been compromised and drained
@EthSecurity1
@EthSecurity1
🤯4🔥1😢1
-The Hidden Risks of Hash Functions: Length Extension -- Attacks and Server-Side Security Vulnerabilities - Exploring Risks of On-Chain Options Exchanges: Part 1,2 @EthSecurity1
Medium
The Hidden Risks of Hash Functions: Length Extension Attacks and Server-Side Security…
Introduction
🔥5
CharismaBtc hack post-mortem
183k $stx loss https://exvul.com/a-new-attack-on-bitcoin-defi/
@EthSecurity1
183k $stx loss https://exvul.com/a-new-attack-on-bitcoin-defi/
@EthSecurity1
EXVUL
A new attack on bitcoin defi protocol
(CharismaBTC hack incident analysis) 1.BACKGORUND This […]
Binance data leak https://twitter.com/PabloSabbatella/status/1838238994091413994
🔥2😱1
this is old but interesting, if users in berachain blockchain send msg.value less than the amount they set, the MultiSwap contract (the router) will use BERA tokens it holds, which are small and isolated from the pools’ assets. https://x.com/dvzhangtz/status/1815771395328225361 this was patched by a white hat @EthSecurity
X (formerly Twitter)
Frank-Zhang.eth (@dvzhangtz) on X
🚨 Urgent Security Alert for @Berachain 🚨
A critical security vulnerability in Berachain that could potentially drain all liquidity pools !!!
As a dedicated blockchain developer, I've come across a critical security vulnerability in Berachain that could…
A critical security vulnerability in Berachain that could potentially drain all liquidity pools !!!
As a dedicated blockchain developer, I've come across a critical security vulnerability in Berachain that could…
🔥2