Back to Blog

成功阻止 HomeCoin 攻击:行业首个成功阻击案例

March 10, 2022
3 min read

自 BlockSec 于 2021 年首次亮相以来,我们一直认为代码审计本身无法解决 Web3 安全问题。因此,我们一直在投入资源探索 Web3 安全的新范式。因此,我们创建了 Phalcon,这是世界上第一个加密货币黑客攻击拦截系统。

在 Phalcon 推出之前,该系统已在内部运行了 2 年,成功阻止了 20 多起黑客攻击,挽救了价值超过 2000 万美元的资产,其中包括为 Saddle Finance 挽回的 380 万美元,为 Platypus 挽回的 240 万美元,为 ParaSpace 挽回的 500 万美元,以及更多。

在本系列文章中,我们将展示我们系统 Phalcon 具有代表性的成功案例。今天,让我们来了解一下 Web3 中具有划时代意义的故事:行业首次成功防御黑客攻击。

我们如何阻止针对 HomeCoin 的攻击

本着“保护 Web3 生态系统需要比安全审计更多的东西”的信念,我们在 2022 年初开发了主动威胁防御系统(即 Phalcon)的原型。拥抱未知,不确定系统是否能真正运行并交付结果,我们既感到担忧又充满兴奋。

2022 年 3 月 5 日下午 4:35:19 (UTC),我们的系统检测到攻击者 (0xC711374BaC07Df9bB9dbAC596451517cEcBf0F0f) 发起的待处理攻击。随后,我们系统的另一个组件自动触发了构建反击交易,该交易被迅速发送 (0xf3bd801f5a75ec8177af654374f2901b5ad928abcc0a99432fb5a20981e7bbd1) 并成功阻止了攻击(失败的原始攻击交易:0xc161973ed0e43db78763aa178be311733d4ffb77948d824ed00443803d22739c)。

由我们的系统创建的反击交易
由我们的系统创建的反击交易

鉴于受害者合约仍存在漏洞(典型的重入攻击),受威胁的资产被转移到一个安全且公开的专用救援账户。最终,这个案例有一个圆满的结局。我们联系了项目(即 HomeCoin),并将救援的代币(0x31bff8989e9d627331435df9fed118f988b50bd1ab3b6056600ce86ccf0275ea)返还给了他们的部署者账户(0x67368f4c89dda2a82d12d3a703c32c35ff343bf6)。

尽管与许多事件中的损失相比,救援的代币数量并不显著,但这标志着首次公开记录的自动阻止正在进行的攻击的尝试。我们相信这是保护区块链生态系统的正确方向。这个切实的例子表明,这是可以实现的,代表着“人类的一小步,却是人类的一大步”。

尽管仍然存在许多挑战,但这代表了即将到来的黎明和未来,我们致力于在不久的将来实现它。

如何访问服务

  • Phalcon 是一个 SaaS 平台。您可以 登录我们的网站 来探索功能、查看定价并直接订阅。
  • 您还可以 预约演示 以了解更多关于 Phalcon 的信息并获得专业的安全建议。

查看更多 Phalcon 的成功案例

关于 Phalcon

Phalcon 是 BlockSec 推出的攻击监控和自动拦截平台。该平台能够准确识别攻击并自动进行拦截。Phalcon 旨在为 Web3 项目提供全面的上线后安全保护,包括持续监控、攻击拦截和应急响应,从而保护协议提供商、LP 和 DAO 组织参与者的链上资产。

迄今为止,Phalcon 已成功阻止了 20 多起黑客攻击,挽救了超过 2000 万美元的资产。即使在早期客户阶段,Phalcon 也获得了顶级 DeFi 协议 Compound 的认可和资助,并为其建立了攻击拦截平台。

网站:https://blocksec.com/phalcon

Twitter:@Phalcon_xyz

Telegram:https://t.me/BlockSecTeam

Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.