Back to Blog

一月三大 DeFi 事件

Code Auditing
February 1, 2026

Truebit Protocol: ~2600万美元

2026年1月8日,以太坊上的Truebit Protocol遭到漏洞攻击,造成约2600万美元的损失。

根本原因在于TRU代币购买定价函数中的整数溢出漏洞。该合约使用Solidity v0.6.10编译,该版本默认不强制执行溢出检查。攻击者精心构造输入参数,导致购买成本计算中的一个巨大中间值溢出并回绕成一个非常小的数字。这使得攻击者能够以极低的成本甚至零ETH成本购买大量TRU代币。

攻击者在一次攻击交易中进行了多轮套利,反复执行TRU代币的买卖操作。值得注意的是,该协议故意设计了买卖之间的定价不对称性,以防止即时买卖套利。然而,易受攻击的合约使用了过时的Solidity版本进行部署,没有溢出保护,暴露了攻击面,并最终导致协议储备金流失了8,535 ETH。

阅读详细攻击分析

SwapNet & Aperture: ~1700万美元

2026年1月25日,SwapNet 和 Aperture Finance 遭受攻击,原因是一个共享的漏洞,总损失约1700万美元。此次攻击严重影响了Matcha Meta用户,受损资金超过1300万美元。

尽管两个受影响的合约都是闭源的,但可以通过分析反编译的字节码以及链上交易追踪来重建攻击路径。根本原因在于易受攻击函数中关键用户输入的验证不足,允许攻击者使用恶意参数执行任意调用。在一系列攻击交易中,攻击者构造了ERC20 transferFrom()调用,以耗尽先前已授予易受攻击合约代币授权的用户手中的代币。

此次攻击涉及的两个协议都没有开源其代码,使得社区难以通过公开审查来识别安全漏洞。与此同时,基于授权的攻击方法为行业敲响了警钟:用户必须仔细管理其代币授权,而协议应实施保护机制,如时间锁定或限制额度的授权,以从根本上减轻此类攻击的风险。

了解更多事件详情

Saga: 约700万美元

2026年1月21日,Saga生态系统中的SagaEVM遭到漏洞攻击,导致未经授权的代币铸造,损失约700万美元。

尽管根本原因尚未完全披露,但官方消息已确认,Ethermint和CosmosEVM代码中的一个共享漏洞(SagaEVM继承了该漏洞)导致了此次攻击。攻击者部署了恶意智能合约来执行此次漏洞利用,铸造了大量的Saga Dollars。成功攻击后,几乎所有被盗资金均通过跨链桥迅速转移至以太坊网络。

此事件凸显了区块链生态系统中代码继承的风险。当基础代码库存在漏洞时,继承该代码的所有项目都可能面临同样的威胁,从而产生级联的安全漏洞。

Sign up for the latest updates
Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure
Case Studies

Tracing $1.6B in TRON USDT: Inside the VerilyHK Ponzi Infrastructure

An on-chain investigation into VerilyHK, a fraudulent platform that moved $1.6B in TRON USDT through a multi-layered fund-routing infrastructure of rotating wallets, paired payout channels, and exchange exit funnels, with traced connections to the FinCEN-sanctioned Huione Group.

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 30 – Apr 5, 2026

This BlockSec weekly security report covers nine DeFi attack incidents detected between March 30 and April 5, 2026, across Solana, BNB Chain, Arbitrum, and Polygon, with total estimated losses of approximately $287M. The week was dominated by the $285.3M Drift Protocol exploit on Solana, where attackers combined multisig signer social engineering with Solana's durable nonce mechanism to bypass a zero-timelock 2-of-5 Security Council, alongside notable incidents including a $950K flash loan TWAP manipulation against the LML staking protocol, a $359K Silo Finance vault inflation via an external `wstUSR` market donation exploiting a depegged-asset oracle and `totalAssets()` accounting flaw, and an EIP-7702 delegated-code access control failure. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident, covering flawed business logic, access control, price manipulation, phishing, and misconfiguration attack types.

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit