Back to Blog

Nachahmer des Popsicle Finance Angriffs

Code Auditing
August 9, 2021

Unser System hat einige Transaktionen beobachtet, die „collectFees(0,0)“ des SorbettoFragola-Vertrags aufgerufen haben. Einige davon sind Nachahmer, die den ähnlichen Angriff von (0xcd7dae143a4c0223349c16237ce4cd7696b1638d116a72755231ede872ab70fc) starten wollen. Glücklicherweise ist die Anzahl der Token im Pool begrenzt.

"2021-08-04T12:17:27Z" : [ "0xfdeb455027202aa1e82e0eef85075870db0fb4a2427e81bc3a01973024923c39" ],

"2021-08-07T07:33:36Z" : [ "0xdb5303b6e5aa0148bdd31fd5c51319243940755e956002b820033b1eba602ef6" ],

"2021-08-03T22:53:42Z" : [ "0xcd7dae143a4c0223349c16237ce4cd7696b1638d116a72755231ede872ab70fc" ],

"2021-07-21T22:06:24Z" : [ "0x631cdd776ceeb062a6c71ebddd7357a5d873182446382c03bd8abaf85deb69e4" ],

"2021-08-04T11:01:18Z" : [ "0xa4430da5cc039b84213b44e4ca6ade9750fab987fbab3da27a11bbd0c7d23ee6" ],

"2021-08-05T14:46:05Z" : [ "0xf7d36fff17b56d5396539c8573ffeb8abd4b67ee22f4a7c492f2bd0ddfba8272" ],

"2021-08-06T11:26:57Z" : [ "0xb25e3f872896a0fde22ce60b57553b5304aa4584c47bdb293589bdbd3317de65" ],

"2021-08-05T11:52:23Z" : [ "0x1af887449dac564272fa15a8d91012759e40c1356b6ffcd5c88d2ac50c8c8502" ],

"2021-08-04T10:22:49Z" : [ "0xe86742e4c6831c6a46278d9a0143adbc8885a6f56191c52045e775ee22f870b0" ],

"2021-08-02T05:36:13Z" : [ "0x2016024bcb3ab283f367dfb34fced088db170c3c6cd026aa9f5c968654fd0142" ],

"2021-07-31T01:56:50Z" : [ "0xf34d0039dc0b20174e77cec510d7a094a2e81b4161a2a537de95b1fd089ae6f9" ],

"2021-08-06T07:34:22Z" : [ "0x2810a6f9f158c4e463e165e0aee6fecb1e617295e2215e015ee03d7265bd1e5a" ],

"2021-08-04T08:39:46Z" : [ "0xcc5a321ac3897beae976bceeeb651fa62f9975df90dd6431e73a8416bdf723b9" ]

Über BlockSec

BlockSec ist ein wegweisendes Unternehmen für Blockchain-Sicherheit, das 2021 von einer Gruppe weltweit renommierter Sicherheitsexperten gegründet wurde. Das Unternehmen hat sich der Verbesserung der Sicherheit und Benutzerfreundlichkeit für die aufstrebende Web3-Welt verschrieben, um deren breite Akzeptanz zu fördern. Zu diesem Zweck bietet BlockSec Dienstleistungen für die Sicherheitsprüfung von Smart Contracts und EVM-Chains security auditing, die Phalcon Plattform für die sichere Entwicklung und proaktive Abwehr von Bedrohungen, die MetaSleuth Plattform für die Nachverfolgung und Untersuchung von Geldern sowie die MetaSuites Erweiterung für Web3-Entwickler, um effizient in der Krypto-Welt zu agieren.

Bis heute hat das Unternehmen über 300 angesehene Kunden wie MetaMask, Uniswap Foundation, Compound, Forta und PancakeSwap betreut und in zwei Finanzierungsrunden von namhaften Investoren wie Matrix Partners, Vitalbridge Capital und Fenbushi Capital zweistellige Millionenbeträge erhalten.

Offizielle Website: https://blocksec.com/

Offizielles Twitter-Konto: https://twitter.com/BlockSecTeam

Sign up for the latest updates
Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure
Case Studies

Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure

An on-chain investigation into VerilyHK, a fraudulent platform that moved $1.6B in TRON USDT through a multi-layered fund-routing infrastructure of rotating wallets, paired payout channels, and exchange exit funnels, with traced connections to the FinCEN-sanctioned Huione Group.

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026

This BlockSec weekly security report covers nine DeFi attack incidents detected between March 30 and April 5, 2026, across Solana, BNB Chain, Arbitrum, and Polygon, with total estimated losses of approximately $287M. The week was dominated by the $285.3M Drift Protocol exploit on Solana, where attackers combined multisig signer social engineering with Solana's durable nonce mechanism to bypass a zero-timelock 2-of-5 Security Council, alongside notable incidents including a $950K flash loan TWAP manipulation against the LML staking protocol, a $359K Silo Finance vault inflation via an external `wstUSR` market donation exploiting a depegged-asset oracle and `totalAssets()` accounting flaw, and an EIP-7702 delegated-code access control failure. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident, covering flawed business logic, access control, price manipulation, phishing, and misconfiguration attack types.

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit