Scan to download
BTC $66,602.03 -4.05%
ETH $1,935.66 -4.38%
BNB $597.92 -3.66%
XRP $1.36 -3.84%
SOL $80.09 -5.05%
TRX $0.2758 -0.75%
DOGE $0.0896 -3.90%
ADA $0.2548 -2.82%
BCH $513.66 -1.22%
LINK $8.27 -3.54%
HYPE $29.17 -2.86%
AAVE $107.04 -2.82%
SUI $0.8898 -4.68%
XLM $0.1522 -3.83%
ZEC $228.30 -3.06%
BTC $66,602.03 -4.05%
ETH $1,935.66 -4.38%
BNB $597.92 -3.66%
XRP $1.36 -3.84%
SOL $80.09 -5.05%
TRX $0.2758 -0.75%
DOGE $0.0896 -3.90%
ADA $0.2548 -2.82%
BCH $513.66 -1.22%
LINK $8.27 -3.54%
HYPE $29.17 -2.86%
AAVE $107.04 -2.82%
SUI $0.8898 -4.68%
XLM $0.1522 -3.83%
ZEC $228.30 -3.06%

Beosin: Analysis of the Rubic Attack Incident

2022-12-25 20:18:32
Collection

ChainCatcher news, according to monitoring by Beosin EagleEye, a blockchain security audit company under Beosin, the Rubic project has been attacked. The Beosin security team analyzed that the routerCallNative function of the RubicProxy contract lacks parameter validation, allowing _params to specify arbitrary parameters. Attackers can use a specific integrator to enable the RubicProxy contract to call the function data they provide at almost zero cost.

By calling the routerCallNative function, the attacker transferred all USDC authorized to the RubicProxy contract to the address 0x001B via transferFrom, stealing nearly 1100 Ethereum. Through Beosin Trace, it was discovered that all stolen funds have been transferred to Tornado cash.

app_icon
ChainCatcher Building the Web3 world with innovations.