安全团队Journey of awakening项目遭受闪电贷攻击,攻击者获取大量ATK代币
据相关报道,据Beosin EagleEye Web3安全预警与监控平台监测显示,闪电贷攻击者已经从攻击合约中窃取了大量ATK代币。攻击步骤1攻击者从LP 0
据相关报道,据Beosin EagleEye Web3安全预警与监控平台监测显示,闪电贷攻击者已经从攻击合约中窃取了大量ATK代币。攻击步骤1攻击者从LP 0x00000000000000000000000000000000000000000067934210epSIAD(0x2ad3)窃取约700个USDC。这是首次攻击闪电贷交易,利用后一个地址为一个0xeF8A8C3B5971FBbA3BcBcBcBeC3A3B64B3B92Saa8A65C36向交易池存入流动性,导致交易池被冻结。该攻击使得攻击者通过闪电贷借取大量ATOM代币,并将两个地址的通地址添加到LP 0x000000614034C3B6c86A3F512C6E84a65C584Cc0B7Fbe259a081向交易池存入安全ATOM代币,并将流动性提供者提交的交易来铸造ATOM代币并出售。
This article and pictures are from the Internet and do not represent 96Coin's position. If you infringe, please contact us to delete:https://www.96coin.com/4688.html
It is strongly recommended that you study, review, analyze and verify the content independently, use the relevant data and content carefully, and bear all risks arising therefrom.