Scan to download
BTC $77,175.30 +3.38%
ETH $2,410.81 +3.94%
BNB $645.41 +2.76%
XRP $1.47 +2.98%
SOL $88.46 +1.02%
TRX $0.3270 +0.40%
DOGE $0.0988 +2.03%
ADA $0.2581 +2.25%
BCH $453.80 +1.36%
LINK $9.61 +2.76%
HYPE $44.80 +2.90%
AAVE $114.91 +2.63%
SUI $1.00 +2.85%
XLM $0.1741 +5.83%
ZEC $337.88 +2.00%
BTC $77,175.30 +3.38%
ETH $2,410.81 +3.94%
BNB $645.41 +2.76%
XRP $1.47 +2.98%
SOL $88.46 +1.02%
TRX $0.3270 +0.40%
DOGE $0.0988 +2.03%
ADA $0.2581 +2.25%
BCH $453.80 +1.36%
LINK $9.61 +2.76%
HYPE $44.80 +2.90%
AAVE $114.91 +2.63%
SUI $1.00 +2.85%
XLM $0.1741 +5.83%
ZEC $337.88 +2.00%

Beosin: Analysis of the Attack Incident on zkSync Ecosystem DEX Merlin

2023-04-26 13:37:15
Collection

ChainCatcher message: According to the monitoring of the Beosin EagleEye security risk monitoring, early warning, and blocking platform under the blockchain security audit company Beosin, on April 26, 2023, the liquidity pool of Merlin Dex on the zksync chain (address 0x82) was attacked.

The specific process was that the attacker address one (address 0x27) directly called the transferFrom function to withdraw 811K USDC from the pool, and then cross-chained it to its Ethereum mainnet address via Anyswap. The attacker address two (address 0xcE) extracted 435.2 ETH from the token1 contract (WETH) and cross-chained it to the Ethereum mainnet address (address 0x0b), resulting in a total profit of approximately 1.8 million USD. The Beosin KYT anti-money laundering analysis platform found that the stolen funds are still held in the two aforementioned attacker’s Ethereum mainnet addresses, and Beosin will continue to monitor the stolen funds.

app_icon
ChainCatcher Building the Web3 world with innovations.