Back to Blog

阻止鸭嘴兽攻击:行业首次反制黑客合约

March 21, 2023
3 min read

自BlockSec于2021年首次亮相以来,我们一直认为代码审计本身无法解决Web3安全问题。因此,我们一直致力于探索Web3安全的新范式。为此,我们创建了**Phalcon**,这是全球首个加密货币黑客攻击阻止系统。

在Phalcon推出之前,该系统已在内部运行了2年,成功阻止了20多次黑客攻击,挽救了价值超过2000万美元的资产,其中包括为Saddle Finance挽回的380万美元,为Platypus挽回的240万美元,为ParaSpace挽回的500万美元,以及更多。

在本系列文章中,我们将介绍我们系统Phalcon的代表性成功案例。今天,让我们来看看行业首个针对黑客合约进行反制的案例,挽回了240万美元。

我们是如何阻止针对Platypus的攻击的

2023年2月16日,Platypus Finance遭受攻击,损失了900万美元。有趣的是,攻击者犯了一个巨大的错误——他们忘记编写从攻击合约中提取资金的逻辑。幸运的是,我们找到了一种方法,利用攻击合约挽回了200万美元。

攻击者合约有一个函数(flashloan的callback),当被调用时,它会授权将USDC转移到Platypus的合约。尽管最初用于攻击,但现在我们可以利用它来授权将USDC从攻击者合约转移到Platypus的合约。

接下来,我们编写了一个PoC并验证了这个挽回方案是有效的!我们将这个解决方案分享给了Platypusdefi,并与他们密切合作,在此次交易中成功恢复了240万美元的USDC。

BlockSec始终处于加密安全的前沿。我们孜孜不倦地分析和研究每一次安全事件,并尽一切努力来保障资金安全。因为我们知道,我们不仅仅是在保护数字,我们是在保护加密用户的生命。

7月12日,Platypus再次面临攻击,团队迅速响应以尽量减少损失。立即响应是关键!然而,Phalcon等自动化防御措施可以进一步最小化损失。

如何访问服务

  • Phalcon是一个SaaS平台。您可以登录我们的网站来探索功能、查看定价并直接订阅。
  • 您还可以预约演示以了解更多关于Phalcon的信息并获得专家安全建议。

查看更多Phalcon成功案例

关于Phalcon

Phalcon 是BlockSec推出的攻击监控和自动化阻止平台。该平台能够准确识别攻击并自动阻止它们。Phalcon旨在为Web3项目提供全面的上线后安全保护,包括持续监控、攻击阻止和应急响应,为协议提供商、LP和DAO组织参与者提供链上资产保障。

迄今为止,Phalcon已成功阻止了20多次黑客攻击,挽回了超过2000万美元的资产。即使在早期客户阶段,Phalcon也获得了顶级DeFi协议Compound的认可和资助,并为其建立了攻击阻止平台。

网站: https://blocksec.com/phalcon

Twitter: @Phalcon_xyz

Telegram: https://t.me/BlockSecTeam

Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.