May 1, 2023
April 2023 Security Incident Report


The content in this article is a monthly serialized publication that provies a concise overviewe of security incidents occurring within the blockchain network ecosystem. Starting from this month, it aims to present and summarize notable security incidents.


Allbridge io

  • Date : 2023-04-01
  • Loss : $570K
  • Type : Token Inflation Attack

BSCScan : is essentially a platform for Cross-Chain token swaps.

Internally, the attack is carried out by creating an imbalance between vUSDbalance and tokenBalance through the withdraw function.

MEV bot fund losing

  • Date : 2023-04-02
  • Loss : $25M
  • Type : Sandwich bot

Etherscan :

This incident is believed to be a case resulting from a Sandwich bot, with funds being lost from a total of 8 addresses.

ZeroTransfer scammer hack

  • Date : 2023-04-04
  • Loss : $850K
  • Type : Scammer Phishing

Etherscan :

Sentiment Read-only Reentrancy Attack

  • Date : 2023-04-04
  • Loss : $1M
  • Type : Read-only Reentrancy Attack

Arbiscan :

The vulnerability stems from the possibility of an internal Reentrancy Attack occurring during the process of exitPool or joinPool. This vulnerability was exploited by triggering a Read-only Reentrancy Attack, allowing the attacker to steal funds

SushiSwap RouterProcess Approve Attack

  • Date : 2023-04-09
  • Loss : $3M
  • Type : Unsafe approval

Etherscan :

Arbitrum Project Rugpull

  • Date : 2023-04-09
  • Loss : $20K
  • Type : Rugpull

Arbiscan :

The owner executed a malicious transaction using the 'upgradeTo()' function, resulting in a loss of nearly $20,000 in funds

Paribuos io Reentrancy Attack

  • Date : 2023-04-11
  • Loss : $100K
  • Type : Reentrancy Attack

Arbiscan :

This is Reentrancy Issue in CompoundV2.

Internally, the Reentrancy Attack occured in the 'doTransferOut()' function.

SyncDex Rugpull

  • Date : 2023-04-13
  • Loss : $370K
  • Type : Rugpull

Yearn Finance Inflation Attack

  • Date : 2023-04-13
  • Loss : $11.6M
  • Type : Inflation Attack

Etherscan :

Broadly speaking, the overall attack process appears to fall under the category of an Inflation Attack using a flash loan exploit, leveraging the rebalancing of yUSDT tokens.

By calling the Curve y swap with the manipulated prices, a significant amount of stablecoins was acquired.

These acquired stablecoins were then converted back to the original USDT and used to repay the loan to Aave, effectively transferring the funds, while the remaining balance was claimed by the attacker.

Hundred Finance Inflation Attack

  • Date : 2023-04-15
  • Loss : $7M
  • Type : Inflation Attack

Optimistic Etherscan :

The cause of the attack involves rapidly inflating the exchange rate of hWBTC using 200 WBTC and draining the funds in the token pool with a minimal amount.

The vulnerability is attributed to a rounding issue, where the vulnerability arises from the logic that the exchangeRateMantissa is determined based on the amount of WBTC held in the contract rather than the WBTC used to create hWBTC.

0vixProtocol Deflation Attack

  • Date : 2023-04-28
  • Loss : $2M
  • Type : Deflation Attack

Polygonscan :

The vulnerability occurred due to an issue with the Price Oracle of the GHST token. The attacker utilized a significant amount of borrowed funds to manipulate the token ratio during the vGHST -> GHST swap process. This manipulation caused fluctuations in the token's value, allowing the attacker to gain illicit profits.

About the author.