CertiK: FOOMCASH lottery contract may have been exploited, resulting in a loss of approximately $1.8 million

Foresight News reports that, according to CertiK monitoring, the privacy gaming project FOOMCASH’s lottery contract experienced a vulnerability exploit (or white-hat rescue operation), involving approximately $1.8 million. The root cause of the vulnerability may be related to its Groth16 verifier setup, allowing attackers to repeatedly collect ZOOM tokens when all other inputs remain the same.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

User Loses $316K USDC After Signing Malicious Permit2 Transaction, GoPlus Warns

A user lost $316,000 in USDC due to a malicious Permit2 transaction, highlighting vulnerabilities in token approval mechanisms. GoPlus Security urges users to avoid phishing by following key security practices and installing its protective extension.

GateNews15m ago

Cow Protocol suffers a DNS hijacking; users must immediately revoke permissions

Cow Swap, a DEX aggregation platform built by Cow Protocol, suffered DNS hijacking on April 14. The attacker tampered with domain name records, redirecting user traffic to a spoofed website, and deployed a wallet-draining script. Cow DAO immediately paused the service and advised users to revoke approvals. This incident did not affect the protocol’s smart contracts, but users should remain alert to related risks and verify their transaction records.

MarketWhisper53m ago

CoW Swap Issues Security Alert After Frontend Attack Detected by Blockaid

Blockaid has identified a frontend attack on CoW Swap, marking its domain as malicious. Users are advised to cease interactions, revoke wallet authorizations, and await further updates from the CoW Swap team.

GateNews6h ago

The Ethereum Foundation uses it too! The CoW Swap frontend was hacked, and DeFi leaders advise revoking approvals

The Ethereum DeFi platform CoW Swap experienced DNS hijacking on April 14, which may put users at risk of phishing. Although the protocol itself was not compromised, the risk of frontend attacks remains high. The industry recommends that users revoke approvals before taking any future actions. CoW Swap offers batch transaction functionality and protects against MEV attacks, and its security incident may affect the entire DeFi ecosystem.

ChainNewsAbmedia6h ago

Cowswap Frontend Under Attack, Users Urged to Revoke Permissions

Blockaid's security system detected a frontend attack on Cowswap, flagging the website COW.FI as malicious. Users are urged to revoke wallet permissions and refrain from interacting with the DApp.

GateNews10h ago
Comment
0/400
No comments