
The most promising Web3 games for 2023
2022 has seen no shortage of ambitious play-to-earn Web3 games in the industry, with even massive AAA productions entering the market to compete. But what Web3 games are poised to roll out bigger plans in 2023?SubscribeMistMist is a blockchain-based MMORPG that boasts an open fantasy world and fantastic narratives. On 30 November, Mist launched its pre-alpha test. Players with Tier 3 NFTs or higher are among the first to experience the dynamic combat style and immersive open-world adventures ...

Camel Racing History
Camel racing is a traditional sport practiced for centuries in the deserts of Arabia, North Africa, and Central Asia. The history of camel racing can be traced back to Bedouin tribes, who have been breeding and racing camels for thousands of years. Camels were used for transportation, as well as for racing and betting. Camel racing first originated in the 7th century on the Arabian Peninsula. At the time, it was just an informal part of cultural events and ceremonies like weddings and birthda...

Robot jockeys —a modern twist to the ancient Arabian tradition of camel racing
Camel racing is a popular sport in Middle Eastern countries, where camels are bred and trained specifically for racing. Historically, human jockeys were used to ride camels in races, but the use of child jockeys was a major source of concern and controversy. The international community criticized the use of child jockeys due to the physical danger and exploitation involved. In response to these concerns, many countries began to ban the use of human jockeys in camel racing and replaced them wi...

The most promising Web3 games for 2023
2022 has seen no shortage of ambitious play-to-earn Web3 games in the industry, with even massive AAA productions entering the market to compete. But what Web3 games are poised to roll out bigger plans in 2023?SubscribeMistMist is a blockchain-based MMORPG that boasts an open fantasy world and fantastic narratives. On 30 November, Mist launched its pre-alpha test. Players with Tier 3 NFTs or higher are among the first to experience the dynamic combat style and immersive open-world adventures ...

Camel Racing History
Camel racing is a traditional sport practiced for centuries in the deserts of Arabia, North Africa, and Central Asia. The history of camel racing can be traced back to Bedouin tribes, who have been breeding and racing camels for thousands of years. Camels were used for transportation, as well as for racing and betting. Camel racing first originated in the 7th century on the Arabian Peninsula. At the time, it was just an informal part of cultural events and ceremonies like weddings and birthda...

Robot jockeys —a modern twist to the ancient Arabian tradition of camel racing
Camel racing is a popular sport in Middle Eastern countries, where camels are bred and trained specifically for racing. Historically, human jockeys were used to ride camels in races, but the use of child jockeys was a major source of concern and controversy. The international community criticized the use of child jockeys due to the physical danger and exploitation involved. In response to these concerns, many countries began to ban the use of human jockeys in camel racing and replaced them wi...

Subscribe to Meta Camel Racing Club

Subscribe to Meta Camel Racing Club
Share Dialog
Share Dialog


>100 subscribers
>100 subscribers
Ankr, a web3 infrastructure project on BNB Chain, has suffered a significant exploit. Two hackers were able to make a fortune.
The first one sold an aBNBc "pack", thus clearing the liquidity pool on the Pancake Swap decentralized exchange. The income from the manipulation amounted to $5 million.
Following the aBNBc collapse, the second hacker bought 180K aBNBc for 10 BNB, exchanged them for Helio protocol hBNB, and used them as collateral to take a loan in the project's stablecoin. Then he exchanged $16 million units of this stable for BUSD, leaving his 10 BNB as collateral. In the end, the loss was $3K, and the profit was $16 million.
To explain the ANKR hack, let's recall the recent GALA token exploit on the BSC network. A month ago, a hacker attacked pNetwork, issued trillions of pGALA tokens, and successfully sold them on DEX exchanges. However, similar to aBNBc, that was not the hack's intention.
Due to disorganized platforms, the GALA entrance into the BSC network on some exchanges was open for 30–40 minutes following the attack. Ordinary users purchased a coin at a price 100 times below market, transferred it to CEX, and sold it. The Huobi exchange was the most affected, and it eventually accused pNetwork of purposely leaving a gap in the smart contract and delaying the announcement of the attack.
aBNBc from ANKR could be utilized in credit protocols that deemed the asset at "full value" for an additional hour. Besides, they could also be quickly exchanged through bridges for wrapped tokens like wBNB, hBNB, and stBNB before being sold for the market price of BNB. The deBridgeGate and Celer bridges were mainly involved. At the same time, some users stated that they could even exchange aBNBc for the original BNB, and sell them quickly.

The guys made a fortune in 20 minutes while remaining anonymous. In an official statement, ANKR claimed that only the pool on Pancake Swap and the Helio protocol were impacted. However, there were many more victims of the attack, and the loss could easily reach $60-80 million with decentralized exchanges alone.
A rumor quickly spread that the attack had been organized by the ANKR protocol itself, leaving the base contract's backdoor unlocked. And the fact that Tornado Cash and the anonymous protocol Zcash (ZEC) were used to "launder" the funds shows that the attacker had been preparing the hack for a long time. Additionally, ANKR declared that it would compensate all users affected by the initial attack, those who held aBNBc before the hack. It just costs $5 million.
These attacks will probably increase in frequency in the future. Therefore you should carefully review smart contracts and act quickly to close any vulnerabilities.
Ankr, a web3 infrastructure project on BNB Chain, has suffered a significant exploit. Two hackers were able to make a fortune.
The first one sold an aBNBc "pack", thus clearing the liquidity pool on the Pancake Swap decentralized exchange. The income from the manipulation amounted to $5 million.
Following the aBNBc collapse, the second hacker bought 180K aBNBc for 10 BNB, exchanged them for Helio protocol hBNB, and used them as collateral to take a loan in the project's stablecoin. Then he exchanged $16 million units of this stable for BUSD, leaving his 10 BNB as collateral. In the end, the loss was $3K, and the profit was $16 million.
To explain the ANKR hack, let's recall the recent GALA token exploit on the BSC network. A month ago, a hacker attacked pNetwork, issued trillions of pGALA tokens, and successfully sold them on DEX exchanges. However, similar to aBNBc, that was not the hack's intention.
Due to disorganized platforms, the GALA entrance into the BSC network on some exchanges was open for 30–40 minutes following the attack. Ordinary users purchased a coin at a price 100 times below market, transferred it to CEX, and sold it. The Huobi exchange was the most affected, and it eventually accused pNetwork of purposely leaving a gap in the smart contract and delaying the announcement of the attack.
aBNBc from ANKR could be utilized in credit protocols that deemed the asset at "full value" for an additional hour. Besides, they could also be quickly exchanged through bridges for wrapped tokens like wBNB, hBNB, and stBNB before being sold for the market price of BNB. The deBridgeGate and Celer bridges were mainly involved. At the same time, some users stated that they could even exchange aBNBc for the original BNB, and sell them quickly.

The guys made a fortune in 20 minutes while remaining anonymous. In an official statement, ANKR claimed that only the pool on Pancake Swap and the Helio protocol were impacted. However, there were many more victims of the attack, and the loss could easily reach $60-80 million with decentralized exchanges alone.
A rumor quickly spread that the attack had been organized by the ANKR protocol itself, leaving the base contract's backdoor unlocked. And the fact that Tornado Cash and the anonymous protocol Zcash (ZEC) were used to "launder" the funds shows that the attacker had been preparing the hack for a long time. Additionally, ANKR declared that it would compensate all users affected by the initial attack, those who held aBNBc before the hack. It just costs $5 million.
These attacks will probably increase in frequency in the future. Therefore you should carefully review smart contracts and act quickly to close any vulnerabilities.
No activity yet