hacked.slowmist.io Open in urlscan Pro
13.248.167.223  Public Scan

Submitted URL: http://hacked.slowmist.io/
Effective URL: https://hacked.slowmist.io/
Submission: On February 17 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST /search/

<form method="post" action="/search/">
  <input type="hidden" name="csrfmiddlewaretoken" value="ESLV9D9hvqMH55415ZNzePXanqbNoF2okWMIyPe59TmsJsW5yP8I4Spv9RZJHxaN">
  <input type="search" name="q" class="input-search" placeholder="Keywords" required="">
</form>

Text Content

 * Home
 * Statistics
 * SlowMist
 * SlowMist Zone


中文

The total amount of money lost by blockchain hackers is about

$ 31,641,109,814.24

Total hack events 1435


All Blockchain Exchange Wallet ETH Ecosystem BSC Ecosystem Tron Ecosystem EOS
Ecosystem Polygon Ecosystem HECO Ecosystem Fantom Ecosystem Solana Ecosystem
Avalanche Ecosystem Polkadot Ecosystem Arbitrum Ecosystem Optimism Ecosystem
zkSync Ecosystem Base Ecosystem NFT Bridge Other

1435 hack event(s)

 * 2024-02-10
   
   
   HACKED TARGET: PLAYDAPP
   
   Description of the event: The blockchain gaming platform PlayDapp was hacked,
   with the attacker's address added as a minter, minting 200 million PLA tokens
   (valued at $31 million). Currently, these PLA tokens have been distributed to
   various addresses, with a portion worth $5.9 million of stolen PLA tokens
   transferred to the Gate platform.
   
   Amount of loss: $ 31,000,000 Attack method: Security Vulnerability
   
   View Reference Sources

 * 2024-02-09
   
   
   HACKED TARGET: KEITH GROSSMAN
   
   Description of the event: Keith Grossman, the president of MoonPay, currently
   has a compromised X account distributing wallet drainer links.
   
   Amount of loss: - Attack method: Twitter was hacked
   
   View Reference Sources

 * 2024-02-09
   
   
   HACKED TARGET: NOT FOUND (404)
   
   Description of the event: The Not Found (404) project on ETH is suspected to
   have exited with losses of approximately $156,000, as the deployer withdrew a
   large amount of liquidity.
   
   Amount of loss: $ 156,000 Attack method: Rug Pull
   
   View Reference Sources

 * 2024-02-08
   
   
   HACKED TARGET: BABYREFUND (BABYRFD)
   
   Description of the event: BABYREFUND (BABYRFD) on ETH is suspected of a rug
   pull, with the deployer removing substantial liquidity, causing a 100% price
   decline.
   
   Amount of loss: - Attack method: Rug Pull
   
   View Reference Sources

 * 2024-02-06
   
   
   HACKED TARGET: SOLANA
   
   Description of the event: Solana validator operator Laine tweeted, "Solana
   Mainnet-Beta is experiencing a performance degradatation, block progression
   is currently halted, core engineers & validators are actively investigating."
   According to SolanaFM data, the last block appears to have been processed at
   UTC time 09:52. Solana Status tweeted, "Block production on Solana mainnet
   beta resumed at 14:57 UTC, following a successful upgrade to v1.17.20 and a
   restart of the cluster by validator operators. Engineers will continue to
   monitor performance as network operations are restored.The outage began at
   approximately 09:53 UTC, lasting 5 hours. Core contributors are working on a
   root cause report, which will be made available once complete."
   
   Amount of loss: - Attack method: Downtime
   
   View Reference Sources

 * 2024-02-02
   
   
   HACKED TARGET: PHANTOM
   
   Description of the event: The user-friendly crypto wallet designed for DeFi
   and NFTs, Phantom, reported a DDoS attack on its platform. Someone attempted
   to overload its systems, causing potential temporary interruptions in some
   services. User assets are secure.
   
   Amount of loss: - Attack method: DDoS Attack
   
   View Reference Sources

 * 2024-01-31
   
   
   HACKED TARGET: ABRACADABRA MONEY
   
   Description of the event: The DeFi protocol Abracadabra Money (MIM_Spell) has
   fallen victim to an attack, resulting in approximately $6.5 million in
   losses. Following the attack, Abracadabra.Money (MIM_Spell) provided an
   update on the situation via Twitter, stating that their technical team
   identified the vulnerability. Preliminary findings indicate the exploit
   targeted specific Cauldrons V3 & V4, allowing unauthorized MIM borrowing.
   They’ve mitigated the issue by setting borrowing limits to zero for these
   cauldrons.
   
   Amount of loss: $ 6,500,000 Attack method: Security Vulnerability
   
   View Reference Sources

 * 2024-01-31
   
   
   HACKED TARGET: KLAYTN
   
   Description of the event: Klaytn, the South Korean public blockchain, tweeted
   a reminder to users that its official Discord server has been attacked. Until
   further notice, please refrain from clicking on any links or interacting with
   any posts. The team is currently working to remove malicious bots and regain
   control.
   
   Amount of loss: - Attack method: Discord was hacked
   
   View Reference Sources

 * 2024-01-31
   
   
   HACKED TARGET: RIPPLE
   
   Description of the event: On January 31st, according to blockchain
   investigator ZachXBT, Ripple fell victim to a hacking attack resulting in the
   theft of 213 million XRP, valued at approximately $112.5 million. Ripple's
   co-founder, Chris Larsen, tweeted, "Yesterday, there was unauthorized access
   to a few of my personal XRP accounts (not @Ripple) – we were quickly able to
   catch the problem and notify exchanges to freeze the affected addresses. Law
   enforcement is already involved."
   
   Amount of loss: $ 112,500,000 Attack method: Unknown
   
   View Reference Sources

 * 2024-01-31
   
   
   HACKED TARGET: ZEROLEND
   
   Description of the event: The lending market ZeroLend has experienced a DDoS
   attack.
   
   Amount of loss: - Attack method: DDoS Attack
   
   View Reference Sources

 * 2024-01-30
   
   
   HACKED TARGET: MASA
   
   Description of the event: The official Twitter account of zk-data marketplace
   Masa is suspected to be compromised, and fake airdrop links have been posted.
   
   Amount of loss: - Attack method: Twitter was hacked
   
   View Reference Sources

 * 2024-01-29
   
   
   HACKED TARGET: ANDREI GRACHEV
   
   Description of the event: DWF Labs tweeted that the Twitter account of their
   managing partner, Andrei Grachev, has been compromised.
   
   Amount of loss: - Attack method: Twitter was hacked
   
   View Reference Sources

 * 2024-01-29
   
   
   HACKED TARGET: BARLEY FINANCE
   
   Description of the event: Barley Finance tweeted that there has been a
   vulnerability attack on the wBARL pod. The team is working on resolving the
   issue. Details are as follows: 1. The exploiter took more than 10% of the
   total BARL supply in the pod, of which about 9% was the development team's
   collateral, used from Marketing and Dev allocations. Therefore, the damage to
   users is insignificant. 2. The solution is to change the wBARL pod contract
   to remove the functions that cause the exploit.
   
   Amount of loss: - Attack method: Contract Vulnerability
   
   View Reference Sources

 * 2024-01-28
   
   
   HACKED TARGET: GOLEDO FINANCE
   
   Description of the event: GoledoFinance on Conflux was attacked, with a loss
   of 7.9m $CFX ($1.7M). The Goledo team has completed the initial investigation
   of the large borrowings in the lending pool. The team has determined that the
   issue is related to a flash loan.
   
   Amount of loss: $ 1,700,000 Attack method: Flash Loan Attack
   
   View Reference Sources

 * 2024-01-28
   
   
   HACKED TARGET: WALL STREET MEMES
   
   Description of the event: The Wall Street Memes token was subject to a
   coordinated attack. The hackers exploited a vulnerability with their staking
   provider and accessed the $WSM staking contract.
   
   Amount of loss: - Attack method: Coordinated Attack
   
   View Reference Sources

 * 2024-01-27
   
   
   HACKED TARGET: CITADEL.ONE
   
   Description of the event: Portfolio management tool Citadel.one has been
   attacked, resulting in a loss of approximately $93K.
   
   Amount of loss: $ 93,000 Attack method: Unknown
   
   View Reference Sources

 * 2024-01-27
   
   
   HACKED TARGET: SOMESING
   
   Description of the event: South Korean Web3 social music service Somesing
   announced that it fell victim to a security vulnerability attack last
   Saturday, resulting in a loss of 730 million native tokens (SSX), equivalent
   to approximately $11.58 million.
   
   Amount of loss: $ 11,580,000 Attack method: Unknown
   
   View Reference Sources

 * 2024-01-26
   
   
   HACKED TARGET: STACI WARDEN
   
   Description of the event: The Algorand Foundation tweeted that the Twitter
   account of Staci Warden (@StaciW_DC), the CEO of the Foundation, has been
   compromised.
   
   Amount of loss: - Attack method: Twitter was hacked
   
   View Reference Sources

 * 2024-01-26
   
   
   HACKED TARGET: ALTLAYER
   
   Description of the event: AltLayer, a temporary extension layer built on
   Optimistic Rollups, tweeted that early this morning, its Twitter profile was
   not displaying past tweets on the timeline. After approximately 3 hours of
   handling, the account has now been restored to normal. The entire incident
   may have been an organized attack. AltLayer advises users to stay safe and
   cross-check any information and links across multiple channels.
   
   Amount of loss: - Attack method: Twitter was hacked
   
   View Reference Sources

 * 2024-01-25
   
   
   HACKED TARGET: NEBULA REVELATION
   
   Description of the event: On January 25th, the staking contract of the
   space-themed open-world Web3 game Nebula Revelation suffered a reentrancy
   attack. On January 28th, Nebula Revelation announced a compensation plan of
   159,831 USDT. The team promises comprehensive compensation and has decided to
   reimburse users at the price before the theft to ensure fairness.
   
   Amount of loss: $ 320,000 Attack method: Reentrancy Attack
   
   View Reference Sources

 * First
 * «
 * Page 1 of 72
 * »
 * Last

Copyright © 2019-2024 SlowMist Hacked All Rights Reserved.

Submit Comments
TOP