Oct 6 ðOn Oct 6, 2022, the $RES Token on the Binance Smart Chain suffered a flash loan attack, leading to a theft of roughly $290,000. The attacker exploited a …
-
-
Crypto Hacks & ExploitsNewsWeb3 Security
South Korean Crypto Exchange, Upbit Exploited for an Undisclosed Sum
by ImmuneBytesby ImmuneBytesOn Sep 24, Upbit, recognized as the largest cryptocurrency exchange in South Korea was exploited due to a technical glitch in the Upbitâs system. The incident in question pertains to …
-
Crypto Hacks & ExploitsNewsWeb3 Security
Another DeFi Exploited: Mixin Network Suffers a $200M Security Breach
by ImmuneBytesby ImmuneBytesThe Hack Mixin Network has been hit bit a massive security breach on Sep 23, 2023. The losses due to the breach is said to be around $200M. The breach …
-
Smart Contract AuditWeb3 Security
Solidity Security Vulnerability: Unchecked Return Values
by ImmuneBytesby ImmuneBytesThe Underlying Issue In Solidity, developers can perform external calls using various methods, like send(), call(), and transfer(). However, each of these has a different behavior when it comes to …
-
Introduction Airdrops, a mechanism to reward community members with tokens or NFTs, have become a popular strategy for NFT projects to sustain engagement. However, the process is not without vulnerabilities. …
-
Crypto Hacks & ExploitsWeb3 Security
Remitano Crypto Exchange Lost $2.7 Millions in an Alleged Exploit
by ImmuneBytesby ImmuneBytesOn Sept 14, Remitano exchange detected suspicious transactions across Ethereum and TRON blockchains, resulting in a $2.7 million loss. Swiftly, Tether froze the alleged attacker’s addresses, potentially saving 2.7 million …
-
BlockchainSmart Contract AuditWeb3 Security
What is Mining Pool Manipulation in Blockchain Network?
by ImmuneBytesby ImmuneBytesOverview Mining pool manipulation, also known as “pool manipulation,” refers to a scenario in the context of cryptocurrency mining, particularly for proof-of-work (PoW) blockchains like Bitcoin. In PoW-based cryptocurrencies, miners …
-
Smart Contract AuditWeb3 Security
Solidity Vulnerability: Short Address Attack in EVM
by ImmuneBytesby ImmuneBytesOverview Short Address Attack is a vulnerability where attackers exploit the characteristic of address encoding algorithms to ignore the trailing characters of the encoded string. By constructing a specific encoded …
-
Smart Contract AuditWeb3 Security
Solidity Security Vulnerability: Function Default Visibilities
by ImmuneBytesby ImmuneBytesIntroduction Solidity offers four visibility specifiers for functions: public, internal, private, and external. Incorrect use or neglect of these visibilities can lead to devastating vulnerabilities in smart contracts. By default, …
-
Crypto Hacks & ExploitsWeb3 Security
Conic Finance-Detailed Hack Analysis – July 21, 2023
by ImmuneBytesby ImmuneBytesOn July 21, Defi Conic Finance suffered two significant exploits due to vulnerabilities in its smart contracts. These vulnerabilities led to a total loss of approximately $4.2M from its ETH …