Back to Blog

Blocked Paraspace Attack: Industry's Most Important Block that Rescued $5,000,000

Phalcon
April 6, 2023

Since BlockSec’s debut in 2021, we have long maintained that code auditing alone cannot solve Web3 security issues. Therefore, we have been investing in exploring new paradigms for Web3 security. Thus we created Phalcon, the world's first crypto hack-blocking system.

Before the launch of Phalcon, the system had been running internally for 2 years, successfully blocking over 20 hacks, and rescuing more than 20 million USD worth of assets, including $3.8 million for Saddle Finance, $2.4 million for Platypus, $5 million for ParaSpace, and more.

Over the past four days, we have proudly shared the extraordinary success stories of our system Phalcon. Today let's dive into the industry's most important block, the one that rescued a staggering $5,000,000.

How We Blocked the Attack Against Paraspace

In March 2023, Paraspace was attacked. Luckily, we managed a rescue in the nick of time, recovering all losses: over 2900 Ether.

Click here to view the tweet
Click here to view the tweet

In this article, we will reveal an insider story of the rescue without giving you any complicated tech details.

Paraspace is a top NFT lending protocol on Ethereum. For any lending protocol, ensuring collateral value is higher than lent funds is key. Many attacks on lending protocol manipulate the collateral value, and this attack on Paraspace was no exception.

On March 17, 2023, the attacker deployed the attack contract and completed the setup. He made three unsuccessful attacks from 3:51:23 UTC to 4:36:23 UTC.

Post-analysis revealed the attacker's main failure was due to the 'Gas Limit' not being enough to execute this "complex" attack. During the three failed attacks, the attacker was gradually increasing the gas limit, and by the third attempt, they were very close to success. (Gas Limit: 6,721,975 -> 9,000,000 -> 13,000,000)

Luckily for us, the three failed transactions used up the funds he had prepared for the attack. Now he needed to find some more funds to continue the attack. That gave us some time.

We detected the attack when the attacker sent the first tx, even though the tx failed. At 5:47:11 UTC on March 17, 2023, our rescue contract was ready. We immediately sent the rescue transaction and successfully saved 2906 Ether.

The following image shows after failing to steal the funds, the hacker left an on-chain message that asked our team to return some of the gas fees expended for the hack.

Install MetaSuites to enable GPT-powered tx explanation on Etherscan
Install MetaSuites to enable GPT-powered tx explanation on Etherscan

If the attacker had given one more try ahead of us, he would have stolen the money. It was Phalcon that played a pivotal role in securing our victory in the battle with the attacker. That was the victory of justice!

How to Access the Service

  • Phalcon is a SaaS platform. You can log in to our website to explore features, view pricing, and subscribe directly.
  • You can also book a demo to learn more about Phalcon and receive expert security advice.

Let Phalcon build a defense line for your protocol. It doesn't require much work on the protocol side and would never bring in additional risk. It's just like a shield providing an additional layer of safety. Book a demo now!

See More Success Stories of Phalcon

About Phalcon

Phalcon is an attack monitoring and automated blocking platform launched by BlockSec. The platform is capable of accurately identifying attacks and automatically blocking them. Phalcon aims to provide comprehensive post-launch security protection for Web3 projects, including continuous monitoring, attack blocking, and emergency response, safeguarding on-chain assets for protocol providers, LPs, and DAO organization participants.

To date, Phalcon has successfully blocked over 20 hacker attacks, rescuing more than $20 million in assets. Even in the early customer stage, Phalcon gained recognition and a grant from the top DeFi protocol Compound and established an attack-blocking platform for it.

Website: https://blocksec.com/phalcon

Twitter: @Phalcon_xyz

Telegram: https://t.me/BlockSecTeam

Sign up for the latest updates
Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield
Security Insights

Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield

Looking ahead, targeted freezing events like this $6.76M USDT action will only become more common. On-chain data analysis is improving. Stablecoin issuers are also working closely with regulators. As a result, hidden illicit financial networks will be exposed.

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026

During the week of March 2 to March 8, 2026, seven blockchain security incidents were reported with total losses of ~$3.25M. The incidents occurred across Base, BNB Chain, and Ethereum, exposing critical vulnerabilities in smart contract business logic, token deflationary mechanics, and asset price manipulation. The primary causes included a double-minting logic flaw during full token deposits that allowed an attacker to exponentially inflate their balances through repeated burn-and-mint cycles, a price manipulation vulnerability in an AMM-based lending market where artificially inflated vault shares created divergent price anchors to incorrectly force healthy positions into liquidation, and a flawed access control implementation relying on trivially spoofed contract interfaces that enabled attackers to bypass authorization to batch-mint and dump arbitrary tokens.

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026

During the week of February 23 to March 1, 2026, seven blockchain security incidents were reported with total losses of ~$13M. The incidents affected multiple protocols, exposing critical weaknesses in oracle design/configuration, cryptographic verification, and core business logic. The primary drivers included oracle manipulation/misconfiguration that led to the largest loss at YieldBloxDAO (~$10M), a crypto-proof verification flaw that enabled the FOOMCASH (~$2.26M) exploit, and additional token design and logic errors impacting Ploutos, LAXO, STO, HedgePay, and an unknown contract, underscoring the need for rigorous audits and continuous monitoring across all protocol layers.