flash loan
-
The Impact of the vGHST Price Manipulation Attack on 0VIX Protocol
On April 29, it was reported that the Polygon Ecological Project 0VIX Protocol tweeted that at present, it has issued a ultimatum to the attackers on the chain, asking them to retu
-
Investigating the Yearn Finance Attack: What You Need to Know
On April 14th, it was reported that Yearn Finance posted on Twitter the progress of the investigation into the attack, stating that as previously stated, the root cause of the atta
-
Cream Finance Attacked: Attackers Exchange 1 Million DAIs to ETH
According to reports, according to PeckShield monitoring, Cream Finance attackers exchanged 1 million DAIs for approximately 529 Ethereum and transferred them to addresses starting
-
Aave V3 on Ethereum Reaches $1 Billion in Total Market Size: What You Need to Know
On April 1st, it was announced that the total market size of Aave V3 on Ethereum has now exceeded $1 billion. It was previously reported that on January 27, Aave V3 had been deploy
-
Cream Finance Update: Hacker makes a Comeback in Cryptocurrency Attacks
According to reports, according to CertiK monitoring, the Cream Finance Flash Loan attacker 0x70747df6AC244979A2ae9CA1e1A82899d02bbea4 has replaced an additional 500000 DAIs with E
-
Cream Finance Flash Loan Attacker Replaces 500,000 DAIs with ETHs, Reports Say
According to reports, according to CertiK monitoring, the Cream Finance Flash Loan attacker 0x70747df6AC244979A2ae9CA1e1A82899d02bbea4 has replaced an additional 500000 DAIs with E
-
FastSwap (FAST) project was attacked by flash loan
According to reports, according to CertiK monitoring, the FastSwap (FAST) project was attacked by a flash loan, resulting in a loss of 26.77 BNBs (approximately $8812). BSC contract address: 0x3cf0fc9920102CCC2EB4df5E1B3471D555AFb361. Interpretation of this information: The world of cryptocurrencies has always been plagued by security issues, and unfortunately, the FastSwap (FAST) project has become the latest victim of a flash loan attack. According to CertiK monitoring, the project suffered a significant loss of 26.77 Binance coins (BNBs), which amounts to approximately $8812. A flash loan attack is a type of exploit…
-
MechMinds: use flash loan to promote the birth of the most expensive NFT in history
It is reported that Mech Minds, the AI concept NFT project, admitted to help coordinate the transaction of MechMind # 7689 NFT with 125000 ETH. Mech Minds said that this was done to attract users’ attention. This purchase was completed using flash loan. Interpretation of this information: Mech Minds, an AI concept NFT project, has reportedly facilitated the transaction of MechMind #7689 NFT with 125000 ETH. The project has admitted to doing this to attract users’ attention. The transaction was completed using flash loan, which is a type of loan…
-
Platypusdefi was attacked by flash loan, and now it has lost about $8.5 million
According to reports, according to CertiK monitoring, Platypusdefi was attacked by flash loan, and currently lost about 8.5 million dollars. Interpretation of this information: The recent news about Platypusdefi being attacked by flash loan and losing approximately 8.5 million dollars has sent shockwaves throughout the cryptocurrency community. This attack has once again highlighted the inherent vulnerabilities in the cryptocurrency space and the need for better security measures to prevent such attacks. Flash loans are a relatively new phenomenon in the cryptocurrency world that allows users to borrow and repay money…
-
Beosin: Analysis of the attack event that the Platypus project on Avalanche chain lost US $8.5 million
On February 17, according to the monitoring of Beosin EagleEye security risk monitoring, early warning and blocking platform of Beosin, a blockchain security audit company, the Platypus project contract on the Avalanche chain was attacked by a flash loan. The analysis of Beosin’s security team found that the attacker first lent USD44 million through the flash loan and then called the deposit function of the Platypus Finance contract to pledge, which would cast an equal amount of LP-USDC for the attacker, Then the attacker pledged all LP-USDC into pool 4…