Scan to download
BTC $70,289.11 -0.07%
ETH $2,115.09 +2.17%
BNB $639.85 +0.35%
XRP $1.44 +1.19%
SOL $87.08 +0.69%
TRX $0.2792 +0.62%
DOGE $0.0961 +0.13%
ADA $0.2697 +0.17%
BCH $531.29 +1.19%
LINK $8.86 +1.06%
HYPE $31.46 -4.75%
AAVE $112.73 +0.66%
SUI $0.9695 -0.18%
XLM $0.1603 -0.40%
ZEC $239.13 -0.47%
BTC $70,289.11 -0.07%
ETH $2,115.09 +2.17%
BNB $639.85 +0.35%
XRP $1.44 +1.19%
SOL $87.08 +0.69%
TRX $0.2792 +0.62%
DOGE $0.0961 +0.13%
ADA $0.2697 +0.17%
BCH $531.29 +1.19%
LINK $8.86 +1.06%
HYPE $31.46 -4.75%
AAVE $112.73 +0.66%
SUI $0.9695 -0.18%
XLM $0.1603 -0.40%
ZEC $239.13 -0.47%

The DPC token contract was hacked, resulting in losses of over $100,000

2022-09-10 10:53:27
Collection

According to Chain Catcher news, monitoring by the Beosin EagleEye platform shows that the DPC token contract has been hacked, resulting in a loss of approximately $103,755.

The Beosin security team analyzed and found that the attacker first utilized the tokenAirdop function in the DPC token contract to prepare for meeting the reward claim conditions. Then, the attacker exchanged USDT for DPC tokens, added liquidity to obtain LP tokens, and then mortgaged the LP tokens in the token contract. The earlier preparation was to meet the reward claim conditions. The attacker then repeatedly called the claimStakeLp function in the DPC token to claim rewards. Because of the "ClaimQuota = ClaimQuota.add(oldClaimQuota[addr]);" in the getClaimQuota function, the rewards could accumulate continuously. Finally, the attacker called the claimDpcAirdrop function in the DPC contract to withdraw the rewards (DPC tokens) and exchanged them for USDT to exit. The stolen funds are still stored in the attacker's address, and the Beosin security team will continue to track them.

app_icon
ChainCatcher Building the Web3 world with innovations.