Back to Blog

阻止鸭嘴兽攻击:行业首次反制黑客合约

March 21, 2023
3 min read

自BlockSec于2021年首次亮相以来,我们一直认为代码审计本身无法解决Web3安全问题。因此,我们一直致力于探索Web3安全的新范式。为此,我们创建了**Phalcon**,这是全球首个加密货币黑客攻击阻止系统。

在Phalcon推出之前,该系统已在内部运行了2年,成功阻止了20多次黑客攻击,挽救了价值超过2000万美元的资产,其中包括为Saddle Finance挽回的380万美元,为Platypus挽回的240万美元,为ParaSpace挽回的500万美元,以及更多。

在本系列文章中,我们将介绍我们系统Phalcon的代表性成功案例。今天,让我们来看看行业首个针对黑客合约进行反制的案例,挽回了240万美元。

我们是如何阻止针对Platypus的攻击的

2023年2月16日,Platypus Finance遭受攻击,损失了900万美元。有趣的是,攻击者犯了一个巨大的错误——他们忘记编写从攻击合约中提取资金的逻辑。幸运的是,我们找到了一种方法,利用攻击合约挽回了200万美元。

攻击者合约有一个函数(flashloan的callback),当被调用时,它会授权将USDC转移到Platypus的合约。尽管最初用于攻击,但现在我们可以利用它来授权将USDC从攻击者合约转移到Platypus的合约。

接下来,我们编写了一个PoC并验证了这个挽回方案是有效的!我们将这个解决方案分享给了Platypusdefi,并与他们密切合作,在此次交易中成功恢复了240万美元的USDC。

BlockSec始终处于加密安全的前沿。我们孜孜不倦地分析和研究每一次安全事件,并尽一切努力来保障资金安全。因为我们知道,我们不仅仅是在保护数字,我们是在保护加密用户的生命。

7月12日,Platypus再次面临攻击,团队迅速响应以尽量减少损失。立即响应是关键!然而,Phalcon等自动化防御措施可以进一步最小化损失。

如何访问服务

  • Phalcon是一个SaaS平台。您可以登录我们的网站来探索功能、查看定价并直接订阅。
  • 您还可以预约演示以了解更多关于Phalcon的信息并获得专家安全建议。

查看更多Phalcon成功案例

关于Phalcon

Phalcon 是BlockSec推出的攻击监控和自动化阻止平台。该平台能够准确识别攻击并自动阻止它们。Phalcon旨在为Web3项目提供全面的上线后安全保护,包括持续监控、攻击阻止和应急响应,为协议提供商、LP和DAO组织参与者提供链上资产保障。

迄今为止,Phalcon已成功阻止了20多次黑客攻击,挽回了超过2000万美元的资产。即使在早期客户阶段,Phalcon也获得了顶级DeFi协议Compound的认可和资助,并为其建立了攻击阻止平台。

网站: https://blocksec.com/phalcon

Twitter: @Phalcon_xyz

Telegram: https://t.me/BlockSecTeam

Sign up for the latest updates
~$15.9M Lost: Trusted Volumes & More | BlockSec Weekly
Security Insights

~$15.9M Lost: Trusted Volumes & More | BlockSec Weekly

This BlockSec bi-weekly security report covers 11 notable attack incidents identified between April 27 and May 10, 2026, across Sui, Ethereum, BNB Chain, Base, Blast, and Berachain, with total estimated losses of approximately $15.9M. Three incidents are analyzed in detail: the highlighted $1.14M Aftermath Finance exploit on Sui, where a signed/unsigned semantic mismatch in the builder-fee validation allowed an attacker to inject a negative fee that was converted into positive collateral during settlement; the $5.87M Trusted Volumes RFQ authorization mismatch on Ethereum; and the $5.7M Wasabi Protocol infrastructure-to-contract-control compromise across multiple EVM chains.

Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.