Back to Blog

月度安全回顾:2024年3月

April 1, 2024
4 min read

安全速览 👀

2024年3月,DeFi漏洞利用导致约8100万美元的损失。幸运的是,在各方努力下,大部分资金已被追回,或正在进行谈判。

  • PrismaFi 漏洞事件

3月28日,以太坊上的PrismaFi遭到攻击,损失约1100万美元。 根本原因在于未经验证的用户输入。值得注意的是,此次攻击在10多次交易中完成,且有2名模仿者。项目团队在首次攻击90分钟后,通过多签成功暂停了合约。在此次攻击中,使用**Phalcon**实现单签名紧急暂停可以显著减少损失。

主攻击者已表示愿意归还资金,与项目团队的谈判仍在进行中,请查看谈判聊天记录

  • Munchables 事件

3月27日,Blast L2上的Munchables资产被盗6200万美元。 该事件归因于开发人员实施的恶意升级(合约未开源)。万幸的是,项目团队和Blast L2核心团队采取了行动,开发人员归还了资金。目前,所有资金都存放在由Blast L2核心团队控制的Safe{wallet}中。

托管声明时间线;点击此处了解更多关于此事件的信息。

  • ParaSwap 漏洞事件

3月19日至3月21日,ParaSwap的几名用户遭到攻击,总损失至少30万美元。 根本原因在于访问控制问题。值得一提的是,主攻击者已归还90%的资产。

  • Unizen 漏洞事件

3月8日,以太坊和Polygon上的Unizen遭受漏洞利用,损失280万美元。 根本原因在于未经验证的用户输入问题。DeFi用户应定期检查其授权并保持警惕!

此外,白帽黑客通过bloXroute的半私有RPC在Polygon上发送了救援交易,但该交易被发送到mempool并被MEV机器人抢跑,引发了争议。阅读更多关于此事件

  • TGBS Token 漏洞事件

3月6日,BSC上的TGBS Token遭受漏洞利用,损失15万美元。有趣的是,项目方在一小时前所做的更改触发了攻击,因此这可能又是一次“跑路盘”。查看警报

  • WooFi 漏洞事件

3月5日,Arbitrum上的WooFi遭受漏洞利用,损失875万美元。 根本原因在于易受攻击的价格依赖问题。WooFi的借贷市场被利用,因为Woo的价格被操纵得非常低,允许攻击者通过闪电贷借入大量Woo的价格被操纵得非常低,允许攻击者通过闪电贷借入大量Woo并轻松偿还。

尽管其价格机制利用Chainlink预言机进行价格检查,但Arbitrum上的Chainlink并未提供$Woo的价格,未能阻止攻击。阅读事后分析报告

👉 您可以在我们的安全事件列表中查看以上事件的攻击交易、根本原因和PoC。

博客文章 & 视频

L2链如何实施多项措施来增强顶级协议的安全性并保护链上用户的资产。

使用BlockSec保护协议的整个生命周期。从预启动安全审计到上线后攻击监控和阻止(Phalcon),我们为您全程服务。

BlockSec CEO Zhou Yajin在ETHDenver 2024的Open Information House上发表了题为“BlockSec与安全前沿”的重要演讲。

不要错过这个参与一场引人入胜且富有见地的讨论的机会,这场讨论有望改变您对区块链安全的看法。

合作伙伴

Blockscout区块链浏览器已集成MetaSuites地址标签EthereumPolygonGnosisOptimismBase)以及GPT驱动的交易解释Ethereum)功能,并且还增加了对Phalcon Explorer的快速访问。🎉🎉

新网站,新篇章

激动人心的消息——我们对网站进行了全面改版!

在BlockSec,我们时刻关注您的安全,从预启动到上线后阶段,确保您的协议在每一步都安全可靠!点击**此处**进行探索。

Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.