Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy
BTCBTC
💲74383.88
-
1.33%
ETHETH
💲2336.49
-
0.92%
SOLSOL
💲95.10
-
0.45%
WLDWLD
💲0.3975
-
0.33%
USDCUSDC
💲0.9996
-
0.03%
XRPXRP
💲1.53
-
4.38%

CertiK Alert
CertiK Alert|2月 24, 2025 14:43
#CertiKAIAgent Our alert system is running smoother than ever, now supercharged with AI! From exploit detection to incident analysis & report generation, the progress is undeniable. Dive into the 0xinfini attack analysis—powered by our AI assistant. Stay tuned for more AI-powered insights and our journey working with AI models! 🚨 Attack on 0xInfini Contract 🚨 On Feb 24, 2025, an attacker exploited the 0x9a79f4105a4e1a050ba0b42f25351d394fa7e1dc contract, draining ~50M. The admin account 0xc49b5e5b9da66b9126c1a62e9761e6b2147de3e1 was compromised, enabling unauthorized token redemptions. 🔑 Exploited Vulnerability: Admin role misused to add attacker to whitelist Attacker invoked the 0xcfda09ef() function to drain vault tokens Admin role created a single point of failure 💰 Funds Laundered: 11.3M Resolv USDC → 11.4M USDC 35.6M USUALUSDC+ → 35.6M USDC Swapped for 17,696 ETH 🛑 Root Cause: Lack of role-based access control Inadequate validation for token redemption 📊 Key Transactions: Role granting to attacker (0xdb3a507855abc229610f443b06d0f0896e47e2654a76c6f3e37c6e265d1f42cd) Whitelisting attacker address (0xb12b32f4543ff0df4a4024affc51b81b773fa9f6d0fd52f2b1f65d99f105bd86) Token draining (0xacf84c5944f662a4fcf783806993d713a150994932008e72e4e47a58d6665f7f, 0xecb31ff694c0e6c5e5b225c261854c0749ecf5d53c698fcda61f2d8e3db8f9fc) ⚠️ Conclusion: The attack exploited admin privileges & improper access control. Security improvements needed!
+4
Mentioned
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Timeline

3月 26, 03:20【Real case of oracle being attacked by governance】
3月 25, 17:40【Currently under hacker attack】
3月 25, 15:01【Turing complete LEGO bricks open up a large ecosystem】
3月 24, 07:00【Address poisoning refers to attackers manipulating encrypted addresses】
3月 24, 01:56【OKX introduces its network security defense department】
3月 23, 07:48【GitHub Actions CI/CD Mechanism Supply Chain Attack Coinbase】
3月 22, 18:31【Artificial intelligence is your ultimate guarantee】
3月 22, 09:28【Jupiter solves sandwich attack on Solana chain】
3月 22, 04:32【Malicious software scams use fake captcha pages】
3月 21, 14:19【Zoth has been hacked approximately 8.4 million times】

HotFlash

|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink

Hot Reads