Free Airdrop Season 7 is LIVE! Answer fun questions or do simple tasks to earn rewards from the $30K BitDegree prize pool. Participate Now ! 🔥
Key Takeaways
Free Airdrop Season 7 is LIVE! Answer fun questions or do simple tasks to earn rewards from the $30K BitDegree prize pool. Participate Now ! 🔥
On March 30, SIR.trading, an Ethereum
The service, also known as Synthetics Implemented Right, was targeted in a way that allowed the attacker to move all funds out of the system.
Two blockchain security firms, Decurity and TenArmorAlert, noticed the issue and posted alerts on X to explain how the attacker used a weakness in the platform’s contract system to carry out the theft.
Did you know?
Subscribe - We publish new crypto explainer videos every week!
What is a Crypto Bull Run? (Animated Explainer + Prediction)
The problem came from a feature inside SIR.trading’s vault contract that used Ethereum’s temporary storage method, according to Decurity. This feature included a callback function, which was meant to connect with a Uniswap
Once that change was made, they could redirect funds from the vault straight to their own account by repeatedly calling this same function.
TenArmorAlert reported that the stolen funds were later transferred to an address linked to Railgun
Xatarrer called it “the worst news a protocol could receive” but said the team would try to continue with the project despite the loss.
On March 25, around $13 million in ETH was lost after an exploit targeted GMX-token-based pools on Abracadabra.Money. How did the hackers pull it off? Read the full story.
To ensure the highest level of accuracy & most up-to-date information, BitDegree.org is regularly audited & fact-checked by following strict editorial guidelines & review methodology.
Carefully selected industry experts contribute their real-life experience & expertise to BitDegree's content. Our extensive Web3 Expert Network is compiled of professionals from leading companies, research organizations and academia.