
Address Poisoning Attack, A continuing Threat
This article is jointly published by X-explore and WuBlockchain.Abstract:The address poisoning attack on $0 USD transfers is savage in recent weeks. As of December 2, more than 340K addresses have been poisoned on the chain, totaling 99 victim addresses and more than 1.64M USD stolen. In this article, X-explore provides a comprehensive analysis of the attack landscape, traces the attackers on-chain, and also provides an in-depth analysis of how the attack is implemented. We would like to appe...

Advanced Analysis For Arbitrum Airdrop
This article is jointly published by X-explore and WuBlockchain.OverviewThe long-awaited Arbitrum has finally released its airdrop news. Along with the airdrop news, they also released their rules for checking Sybil addresses.https://github.com/ArbitrumFoundation/sybil-detectionAccording to the rule described, we can infer that the project team:Excluded cross-chain bridges, centralized exchanges, and smart contracts while detecting SybilA relatively tolerant detection was adopted for small-sc...

链上地址投毒,让你防不胜防
Abstract: 近一周,0U 转账的链上地址投毒攻击愈演愈烈,截至12月2日,已经有超过37W地址被投毒,总计92个受害地址,被盗取金额超过164W USD。 本篇文章,X-explore 对攻击态势进行了全面分析,对攻击者进行了链上溯源,同时也深入分析了攻击的实现方式。 我们呼吁钱包APP加强风险提示,普通用户在转账时谨防此类攻击。因为我们注意到UTC时间11月2日10点38分,有一位链上用户损失惨重,近100万美金因投毒而被转到黑客地址。本文由 X-explore 与吴说区块链联合发布。1. 背景近期,我们的链上风险监控发现ETH、BSC链上频繁出现 0u 转账现象,以下图bsc链的交易数据为例,受害者A发出一笔正常交易将452 BSC-USD发给B后,会收到C转来的0 BSC-USD,同时,在同一笔交易hash内用户A自己也会不受控制的给C转0 BSC-USD(实现了“一来一回”的0 BSC-USD转账操作)用户交易列表出现的现象在社区中,很多用户不知所以然,担心自己的钱包私钥已经泄漏,攻击者正在窃取资产。2. 攻击意图其实遇到这种情况的用户不用紧张,大家的资产是安全的...
Share Dialog

Address Poisoning Attack, A continuing Threat
This article is jointly published by X-explore and WuBlockchain.Abstract:The address poisoning attack on $0 USD transfers is savage in recent weeks. As of December 2, more than 340K addresses have been poisoned on the chain, totaling 99 victim addresses and more than 1.64M USD stolen. In this article, X-explore provides a comprehensive analysis of the attack landscape, traces the attackers on-chain, and also provides an in-depth analysis of how the attack is implemented. We would like to appe...

Advanced Analysis For Arbitrum Airdrop
This article is jointly published by X-explore and WuBlockchain.OverviewThe long-awaited Arbitrum has finally released its airdrop news. Along with the airdrop news, they also released their rules for checking Sybil addresses.https://github.com/ArbitrumFoundation/sybil-detectionAccording to the rule described, we can infer that the project team:Excluded cross-chain bridges, centralized exchanges, and smart contracts while detecting SybilA relatively tolerant detection was adopted for small-sc...

链上地址投毒,让你防不胜防
Abstract: 近一周,0U 转账的链上地址投毒攻击愈演愈烈,截至12月2日,已经有超过37W地址被投毒,总计92个受害地址,被盗取金额超过164W USD。 本篇文章,X-explore 对攻击态势进行了全面分析,对攻击者进行了链上溯源,同时也深入分析了攻击的实现方式。 我们呼吁钱包APP加强风险提示,普通用户在转账时谨防此类攻击。因为我们注意到UTC时间11月2日10点38分,有一位链上用户损失惨重,近100万美金因投毒而被转到黑客地址。本文由 X-explore 与吴说区块链联合发布。1. 背景近期,我们的链上风险监控发现ETH、BSC链上频繁出现 0u 转账现象,以下图bsc链的交易数据为例,受害者A发出一笔正常交易将452 BSC-USD发给B后,会收到C转来的0 BSC-USD,同时,在同一笔交易hash内用户A自己也会不受控制的给C转0 BSC-USD(实现了“一来一回”的0 BSC-USD转账操作)用户交易列表出现的现象在社区中,很多用户不知所以然,担心自己的钱包私钥已经泄漏,攻击者正在窃取资产。2. 攻击意图其实遇到这种情况的用户不用紧张,大家的资产是安全的...
Share Dialog
This article is jointly published by X-explore and WuBlockchain.
On 18 Nov 2023, about $9m from the dYdX v3 insurance fund were used to fill gaps on liquidations processed in the YFI market, and the CEO said this was pretty clearly a targeted market manipulation attack against dYdX.
We do an exploring of dYdX price manipulation in $YFI.
From this article, readers will know:
Based on chain info, how the hacker gets the profit in dYdX about YFI price manipulation.
The total profit of this hacker.
The on-chain trace and de-anonymize of the hacker.
l2beat shows the detail of balance of the address in dYdX. We take 0x779c313c968aA36fb696DAcca674Dc757c8BB4C2 as an example. This address earns 750% profit before busted trade.
First, deposit 35,000 USDC to dYdX at 2023-11-07 23:35:23.
And then, open 49.67 YFI-USDC contract at the price of 6,199U. The cost is 302,865U and the leverage is 8.6X at 2023-11-09 00:39:11.
Then, between 2023-11-11 04:46:23 and 2023-11-17 14:32:35, with the increase of the YFI price, the hacker withdrew the unrealized profit 6 times and 271,602 USDC. The total profit is 236,602 USDC.
Finally, at 2023-11-18 10:40:47, the address is bust trade after the huge decrease in price. The balance of YFI and USDC is to the zero. It is worth mentioning that at the time of brute force, the on-site price of dYdX was approximately 9,000U, and the forced liquidation price was 11,400U. So the dYdX insurance fund lost a lot.


We also want to find the evidence to show the price manipulation in the dex as this hacker did at the beginning of Nov, 2023 like this twitter https://twitter.com/lookonchain/status/1719403866146656447.
However, we cannot find any suspicious transaction or address. We guess that this price manipulation in YFI is only in the dYdX because the open interest of dYdX is positively related to the price. Just a guess.

The hacker has 129 addresses and we can calculate the profit according to sum the inflow and outflow between these addresses and dYdX fund address.
Here is an overall screenshot of the hacker addresses. The hacker earns 12.75M in the dYdX and the 5.55M is from YFI and the other is from Sushi.

The profit in the above addresses in part2 deposited to Huobi Exchange via two combined addresses. We do a cross exchange fund trace and find a suspicious address related to the hacker and part of the fund to this address 0x8Af700bA841f30e0a3Fcb0EE4C4A9D223E1eFA05. This address is a frequently used address and has connections with Binance and Bitget.

In addition, we can also see on the chain that this suspicious address and the hacker address are basically exactly the same at the time when they purchased sDAI and manipulated the price of Sushi on DEX.


For more, please follow x-explore.
Mirror: https://mirror.xyz/x-explore.eth
Twitter: https://twitter.com/x_explore_eth
This article is jointly published by X-explore and WuBlockchain.
On 18 Nov 2023, about $9m from the dYdX v3 insurance fund were used to fill gaps on liquidations processed in the YFI market, and the CEO said this was pretty clearly a targeted market manipulation attack against dYdX.
We do an exploring of dYdX price manipulation in $YFI.
From this article, readers will know:
Based on chain info, how the hacker gets the profit in dYdX about YFI price manipulation.
The total profit of this hacker.
The on-chain trace and de-anonymize of the hacker.
l2beat shows the detail of balance of the address in dYdX. We take 0x779c313c968aA36fb696DAcca674Dc757c8BB4C2 as an example. This address earns 750% profit before busted trade.
First, deposit 35,000 USDC to dYdX at 2023-11-07 23:35:23.
And then, open 49.67 YFI-USDC contract at the price of 6,199U. The cost is 302,865U and the leverage is 8.6X at 2023-11-09 00:39:11.
Then, between 2023-11-11 04:46:23 and 2023-11-17 14:32:35, with the increase of the YFI price, the hacker withdrew the unrealized profit 6 times and 271,602 USDC. The total profit is 236,602 USDC.
Finally, at 2023-11-18 10:40:47, the address is bust trade after the huge decrease in price. The balance of YFI and USDC is to the zero. It is worth mentioning that at the time of brute force, the on-site price of dYdX was approximately 9,000U, and the forced liquidation price was 11,400U. So the dYdX insurance fund lost a lot.


We also want to find the evidence to show the price manipulation in the dex as this hacker did at the beginning of Nov, 2023 like this twitter https://twitter.com/lookonchain/status/1719403866146656447.
However, we cannot find any suspicious transaction or address. We guess that this price manipulation in YFI is only in the dYdX because the open interest of dYdX is positively related to the price. Just a guess.

The hacker has 129 addresses and we can calculate the profit according to sum the inflow and outflow between these addresses and dYdX fund address.
Here is an overall screenshot of the hacker addresses. The hacker earns 12.75M in the dYdX and the 5.55M is from YFI and the other is from Sushi.

The profit in the above addresses in part2 deposited to Huobi Exchange via two combined addresses. We do a cross exchange fund trace and find a suspicious address related to the hacker and part of the fund to this address 0x8Af700bA841f30e0a3Fcb0EE4C4A9D223E1eFA05. This address is a frequently used address and has connections with Binance and Bitget.

In addition, we can also see on the chain that this suspicious address and the hacker address are basically exactly the same at the time when they purchased sDAI and manipulated the price of Sushi on DEX.


For more, please follow x-explore.
Mirror: https://mirror.xyz/x-explore.eth
Twitter: https://twitter.com/x_explore_eth

Subscribe to X-explore

Subscribe to X-explore
>300 subscribers
>300 subscribers
No activity yet