EVM Hacks @evmhacks Channel on Telegram

EVM Hacks

@evmhacks


EVM Hacks (English)

Are you fascinated by the world of hacking and cybersecurity? Look no further, as EVM Hacks is here to provide you with the latest tips, tricks, and techniques to explore the world of electronic voting machines (EVMs). Our channel is dedicated to sharing valuable insights and knowledge about EVM security, vulnerabilities, and potential hacks. Whether you are a cybersecurity enthusiast, a tech-savvy individual, or simply curious about the inner workings of electronic voting systems, EVM Hacks has something for everyone. Join our community of like-minded individuals who are passionate about uncovering the secrets of EVMs and protecting the integrity of electoral processes. Stay informed, stay ahead, and stay secure with EVM Hacks. Subscribe now and unlock a world of possibilities in the realm of cybersecurity and hacking.

EVM Hacks

20 Nov, 09:47


https://blog.decurity.io/current-state-of-web3-security-products-202de56b68bf

EVM Hacks

18 Nov, 15:11


On November 14, several Uniswap pairs with the vETH token were exploited due to a price manipulation vulnerability in the vETH liquidity addition contract. The total amount lost was 140.4 ETH (~$450,000).
The attack was executed in three transactions:

1. Attack on the BIF-vETH pair at 08:35:47, 132.5 ETH stolen.
2. Attack on the Cowbo-vETH pair at 08:36:59, 4.84 ETH stolen.
3. Attack on the BOVIN-vETH pair at 08:39:23, 3.12 ETH stolen.

I was unable to identify the name of the exploited protocol, its landing page, or its Twitter profile. However, the owner of the vETH token is GnosisSafeProxy, whose creator and owner is shaneson.eth.

Attack steps(pic. 1):
Steps 1-2: The exploit got flashloan 32,560 ETH from Balancer and called buyQuote() on an unverified contract 0x19c55. This function wrap ETH->vETH in vETH contract via the cashIn() function(pic. 2) and swapped vETH for a specified token through a Uniswap pair. As a result, the BIF/vETH price in pool increased. Only whitelisted addresses (contract 0x19c55 in whitelist) can call the cashIn() function.
Step 3: Exploit approved BIF tokens on an unverified contract 0x62f25 and called a function with the 0x6c0472da signature. This function added liquidity to the vETH-BIF pair, transfers only BIF tokens from exploit contract. The required amount of BIF was calculated using UniswapV2Library.quote() (pic. 3), which accounted for the current reserves in the pool. vETH tokens were minted to Uniswap pair using the takeLoan() function in the vETH contract. The 0x62f25 contract, with validFactory permissions, was able to call takeLoan(). By exploiting price manipulation, the attacker added 300 vETH to the pool for a minimal amount of BIF.
Step 4: The attacker called sellQuote() in 0x19c55, swapping BIF for vETH and unwrapping vETH into ETH. Due to the addition of "cheap" liquidity, the attacker profited 132.5 ETH.
Step 5: Flashloan was repaid, and the stolen ETH was transferred to the attackerโ€™s address.

Contract containing the vulnerability was deployed on October 27. The BIF-vETH pair was created, and liquidity was added on November 11.

Recently, unverified contracts are being exploited more frequently. Unverified smart contracts are not a guarantee of reliability; they also require audits. Blackhats are willing to do anything for easy money.

EVM Hacks

29 Oct, 09:19


Use this list of fantastic telegram channels I've put together in order to discover them as your own personal Web3-Google!

Feel free to use this folder to onboard your non-web3 friends to Web3, as the majority of the channels are maintained by independent researchers. There are also additional channels for news, CT reviews, and more!

A small tip to subscribooors: if you find a channel interesting, move it out of the folder into your main list of chats. That way youโ€™ll view content youโ€™re interested in more often, and channels get more views instead of just subscribers!

EVM Hacks

26 Sep, 20:17


root cause of the bedrock uniBTC hack: mint() function transfer uniBTC to user in amount of ETH received...
upgrade proxy was 34 hours before hack.
649 ETH stolen

EVM Hacks

26 Sep, 16:14


another $3.3kk. same vulnerability

EVM Hacks

26 Sep, 14:09


Short overview of $3.2kk Onyx hack:
https://fxtwitter.com/DecurityHQ/status/1839286176668061871

EVM Hacks

26 Nov, 12:53


https://www.youtube.com/watch?v=9aiABoKltG4

DefiHackLabs launched their YouTube channel

EVM Hacks

13 Nov, 08:27


3000 subscribers. Congratulations.

EVM Hacks

22 Aug, 11:35


https://blog.decurity.io/typical-vulnerabilities-in-amm-protocols-9006f7986ba0

EVM Hacks

18 Jul, 13:34


https://vxtwitter.com/DecurityHQ/status/1681288860175663109

EVM Hacks

06 Jun, 13:52


https://blog.decurity.io/typical-vulnerabilities-in-lsd-protocols-e52ffe4ee175

EVM Hacks

06 Jun, 13:51


https://vxtwitter.com/DecurityHQ/status/1666079923411517444

EVM Hacks

22 May, 19:28


Audit checklists for CDP( Collaterized Debt Positions)

Give it a star๐Ÿ™

https://github.com/Decurity/audit-checklists/blob/master/cdp.md

EVM Hacks

22 May, 18:30


https://blog.decurity.io/typical-vulnerabilities-in-lending-and-cdp-protocols-e778e540e215

EVM Hacks

28 Feb, 14:15


Channel created