Crypto Hack Weekly Summary: Uncovering the Latest Incidents
Dear Crypto Enthusiast, welcome to our weekly summary of crypto hack incidents and exploits that have impacted various projects in the blockchain space. The crypto industry continues to face challenges from advanced attacks and security vulnerabilities as companies strive to enhance their security measures.
1. Bloom from Base Network Hacked
Date: May 09, 2024
– Traders suffered losses due to a deficiency in yield re-basing
– Nearly $600,000 lost from the protocol
– A flaw allowed a trader to exploit funds, but most were recovered
– $406,000 currently held in the smart contract for distribution to liquidity providers
2. Gnus. AI Discord Hack
Date: May 06, 2024
– Gnus. AI Discord channel breached, resulting in $1.27 million in damages
– Hacker accessed team members’ wallet details through encrypted messages
– Minted 100 million fake tokens linked to Ethereum, causing price crash
– Team revamping GNUS token to minimize impact and cautioning against buying devalued tokens
3. Galaxy Fox Contract Vulnerability
Date: May 10, 2024
– Galaxy Fox’s web3 platform exploited due to smart contract vulnerability
– Over 108 ETH (approximately $330,000) lost
– Emphasizes the need for robust security measures and access controls in smart contracts
4. Tsuru Token Vulnerability
Date: May 10, 2024
– Tsuru faced issues with the TRUSU Wrapper contract
– Contract prevented approvals, allowing users to bypass control mechanisms
– High data input in contract read functions led to out-of-gas errors affecting transactions
– Collaboration among projects, security experts, and participants crucial for maintaining a secure blockchain environment
Hot Take: Protecting Your Crypto Assets
As a crypto investor, staying informed about recent hacks and exploits is crucial to safeguarding your assets. Be vigilant, follow best security practices, and choose platforms with robust security measures. Remember, protecting your investments in the crypto space requires constant vigilance and a proactive approach to security.