OKLink (@oklink) 's Twitter Profile Photo

⚠️ #OKLinkSecurity Rho Markets📜 | Rho.scroll , a lending protocol on Scroll , experienced a significant security breach, resulting in a loss ~$7.6M. The root cause was that the oracle was manipulated. Fortunately, the exploit was front-run by a white hat MEV bot which has returned

⚠️ #OKLinkSecurity

<a href="/RhoMarketsHQ/">Rho Markets📜 | Rho.scroll</a> , a lending protocol on <a href="/Scroll_ZKP/">Scroll</a> , experienced a significant security breach, resulting in a loss ~$7.6M. The root cause was that the oracle was manipulated. 

Fortunately, the exploit was front-run by a white hat MEV bot which has returned
OKLink (@oklink) 's Twitter Profile Photo

⚠️ #OKLinkSecurity The WazirX: India Ka Bitcoin Exchange experienced a significant security breach, resulting in a loss of ~$235M. The attack was made possible due to the compromise of their GnosisSafe multi-sig wallet on the #ETH. The attacker hijacked the implementation contract of the

⚠️ #OKLinkSecurity

The <a href="/WazirXIndia/">WazirX: India Ka Bitcoin Exchange</a> experienced a significant security breach, resulting in a loss of ~$235M. 

The attack was made possible due to the compromise of their GnosisSafe multi-sig wallet on the #ETH. 

The attacker hijacked the implementation contract of the
OKLink (@oklink) 's Twitter Profile Photo

⚠️ #OKLinkSecurity The LI.FI experienced a significant security breach, resulting in a loss exceeding $10M. The attack exploited a well-known arbitrary call vulnerability, allowing the attacker to steal user assets approved for the vulnerable contract.

⚠️ #OKLinkSecurity
The <a href="/lifiprotocol/">LI.FI</a> experienced a significant security breach, resulting in a loss exceeding $10M. 

The attack exploited a well-known arbitrary call vulnerability, allowing the attacker to steal user assets approved for the vulnerable contract.
OKLink (@oklink) 's Twitter Profile Photo

⚠️ #OKLinkSecurity The Minterest experienced a significant security breach on Mantle and the resulting loss was ~$1.4M. The protocol has currently been paused by the project team. The attack was made possible because the attacker manipulated the exchange rate through

⚠️ #OKLinkSecurity

The <a href="/Minterest/">Minterest</a>  experienced a significant security breach on Mantle and the resulting loss was ~$1.4M. 

The protocol has currently been paused by the project team. 

The attack was made possible because the attacker manipulated the exchange rate through
OKLink (@oklink) 's Twitter Profile Photo

⚠️The Dough Finance experienced a significant security breach on #Ethereum, and the resulting loss exceeded $1.8M. As of now, all the stolen assets have been deposited into address 0x2913d90D94C9833B11a3E77F136da03075c04a0F. Relevant tx: oklink.com/eth/tx/0x92cdc… #OKLinkSecurity

⚠️The <a href="/DoughFina/">Dough Finance</a>  experienced a significant security breach on #Ethereum, and the resulting loss exceeded $1.8M.  

As of now, all the stolen assets have been deposited into address 0x2913d90D94C9833B11a3E77F136da03075c04a0F.

Relevant tx: oklink.com/eth/tx/0x92cdc…
#OKLinkSecurity
OKLink (@oklink) 's Twitter Profile Photo

The UwU Lend is experiencing a significant security breach resulting in more than $19M in losses. Currently, the attack is still ongoing and the stolen funds are located at the following addresses: oklink.com/eth/address/0x… #OKLinkSecurity #OKXExplorer

OKLink (@oklink) 's Twitter Profile Photo

In May, security incidents led to a loss that increased by 27.27% compared to April. 🧐 Phishing attacks and private key leakage were significant contributors to these incidents. 🎣 Never forget #DYOR before making decisions. oklink.com/?channelId=x00… #OKLinkSecurity

In May, security incidents led to a loss that increased by 27.27% compared to April. 🧐

Phishing attacks and private key leakage were significant contributors to these incidents. 🎣

Never forget #DYOR before making decisions. oklink.com/?channelId=x00…

#OKLinkSecurity
OKLink (@oklink) 's Twitter Profile Photo

#OKLinkSecurity The Velocore | veDEX on zkSync Era / Linea ▪️ experienced a significant security breach on Linea and zkSync resulting in more than $10M in losses. The hacker has deposited all ~1,807 ETH of illicit gains into Tornado. One of the attack txns: oklink.com/linea/tx/0xe4f…

OKLink (@oklink) 's Twitter Profile Photo

#OKLinkSecurity Gala Project on Ethereum Attacked Attack Transaction: Hacker Issues 5 Billion $GALA Tokens Transaction Link oklink.com/eth/tx/0xa6d90… $GALA Token Address (Ethereum): 0xd1d2Eb1B1e90B638588728b4130137D262C87cae GALA Trading Pair on Exchange

#OKLinkSecurity <a href="/poweredbygala/">Gala</a> Project on <a href="/ethereum/">Ethereum</a> Attacked 

Attack Transaction: Hacker Issues 5 Billion $GALA Tokens Transaction Link
oklink.com/eth/tx/0xa6d90…

$GALA Token Address (Ethereum): 0xd1d2Eb1B1e90B638588728b4130137D262C87cae

GALA Trading Pair on Exchange
OKLink (@oklink) 's Twitter Profile Photo

#OKLinkSecurity Similarity address phishing 🎣 User address: 0x1e227979f0b5bc691a70deaed2e0f39a6f538fd5 Legitimate address: 0xd9a1b0b1e1ae382dbdc898ea68012ffcb2853a91 Phishing address: 0xd9a1c3788d81257612e2581a6ea0ada244853a91

OKLink (@oklink) 's Twitter Profile Photo

This month, the total losses represent a decrease of 42.11% compared to March.📉 There were a total of 32 cases of scams and phishing incidents on official social media platforms, accounting for 7.67% of the total losses.🥲 Details👇#OKLinkSecurity medium.com/@OKLinkData/ok…

OKLink (@oklink) 's Twitter Profile Photo

.WOOFi experienced a security breach resulting in a loss of approximately 8 million. The hacker exploited a vulnerability within the coefficient calculation mechanism. #OKLinkSecurity #OKLinkAnalysis 💻🟣 Details👇 medium.com/@OKLinkData/ok…

OKLink (@oklink) 's Twitter Profile Photo

OKLink Security Incident Review | February 2024 🗓️ This month, the cumulative losses across the entire network amounted to approximately $103 million USD. Phishing scams accounted for 11.76% of these losses. Details🔐 #OKLinkSecurity medium.com/@OKLinkData/ok…