Skip to main content

19 posts tagged with "Security Events"

Upcoming and past security events

View All Tags
ResolvLabs Exploited: Total Losses Reach $25 Million

ResolvLabs Exploited: Total Losses Reach $25 Million

According to monitoring by PeckShieldAlert, ResolvLabs recently fell victim to a severe exploit. The attacker utilized 200,000 $USDC to manipulate the protocol's mechanisms, illicitly minting 80 million $USR.

SECURITY EVENTS
Keom Protocol Suffers Full-Drain Redemption Attack, Resulting in $94k Loss

Keom Protocol Suffers Full-Drain Redemption Attack, Resulting in $94k Loss

Based on Defimon Alerts monitoring,lending platform deployed on Polygon zkEVM, recently fell victim to an exploit. The incident resulted in a loss of approximately $94,000 due to a critical logic error within the contract’s asset redemption process.

SECURITY EVENTS
dTRINITY Suffers ~$260k Loss in Logic Vulnerability

dTRINITY Suffers ~$260k Loss in Logic Vulnerability

The dLEND module, under the DeFi protocol dTRINITY, has incurred approximately $257,000 in bad debt** due to a Logic Vulnerability The attacker executed a precise exploit against the cbBTC liquidity pool, which had been deployed for only six days and suffered from severe liquidity fragmentation.

SECURITY EVENTS
Venus Protocol Suffers $3.7M Loss Following Security Breach in $THE Pool

Venus Protocol Suffers $3.7M Loss Following Security Breach in $THE Pool

Venus Protocol, a lending protocol on BNB Chain, has experienced an anomaly in its $THE pool. The attacker utilized a large amount of low-liquidity $THE tokens as collateral to drain approximately $3.7 million in mainstream assets (including BTC, CAKE, and BNB) through price manipulation.

SECURITY EVENTS
The DBXen protocol was hit by an ERC-2771 identity obfuscation attack, resulting in a loss of approximately $150,000.

The DBXen protocol was hit by an ERC-2771 identity obfuscation attack, resulting in a loss of approximately $150,000.

According to monitoring by BlockSec Phalcon, the DBXen protocol suffered from an identity verification inconsistency due to the mixed use of _msgSender() and msg.sender during meta-transaction processing. The attacker exploited this logic vulnerability to manipulate reward settlements, illicitly extracting approximately $150,000 in assets from contracts on both the Ethereum and BSC chains.

SECURITY EVENTS