According to the latest Web3 industry security report from Gate Research, a total of 27 security incidents occurred in December, resulting in losses of approximately $4.11 million. The types of incidents were diverse, with contract vulnerabilities remaining the primary threat, accounting for 72% of the total losses. The report also provides a detailed analysis of key security events, including the FEG vulnerability, Clober contract vulnerability, Clipper DEX contract vulnerability, and the HarryPotterObamaSonic10Inu flash loan attack. Contract vulnerabilities and account hacks were identified as the major security risks for the month, highlighting the ongoing need for the industry to strengthen its security measures.
According to data from Slowmist, December 2024 saw a total of 27 hacking incidents, resulting in losses of $4.11 million. The attacks primarily involved contract vulnerabilities, account hacks, and other methods. Compared to November, both the number of incidents and the total losses saw a significant decline, indicating that industry security measures and awareness have improved. Contract vulnerabilities remain the leading cause of attacks, with nine incidents accounting for over $2.98 million in losses, or 72% of the total. Official X accounts and cryptocurrency project websites continue to be hackers’ primary targets [1].
This month’s distribution of security incidents across public blockchains reveals that most losses were concentrated on several mature and popular blockchains, particularly Ethereum and Base, with losses of $2.01 million and $950,000, respectively. This highlights that, despite the strong foundational security of public blockchains, vulnerabilities in the application layer and smart contracts still pose significant risks to user funds.
Several blockchain projects experienced major security incidents this month, resulting in significant financial losses. Notable incidents include the FEG security vulnerability, which caused a loss of $1 million; the Clober contract vulnerability, which led to a loss of $500,000; the Vestra DAO contract vulnerability, resulting in $500,000 in losses; and the Clipper DEX contract vulnerability, which caused a loss of $457,000.
According to official disclosures, the following projects suffered losses exceeding $3.22 million in December. These incidents underscore that contract vulnerabilities continue to pose a significant threat.
Project Overview: Clipper is a decentralized exchange (DEX) designed to provide the best rates for small cryptocurrency traders (less than $10,000). It achieves this by limiting liquidity and reducing impermanent loss.
Incident Overview: According to an analysis report released by Clipper, on December 1, 2024, attackers exploited a vulnerability in the smart contract used by Clipper, manipulating the single-asset deposit/withdrawal function. This operation affected the liquidity pools on the Optimism and Base networks, causing an imbalance in the pool assets and allowing the attackers to withdraw more assets than they had deposited. The attack resulted in a loss of approximately $457,878.
Within a few hours, AdmiralDAO launched an emergency response plan, quickly taking measures to protect the remaining funds in the protocol and halt the attack. After the response, no additional funds were affected[2].
Post-Incident Recommendations:
Project Overview: VSTR is a token developed by the NFT community “CMLE” (Crypto Monster Limited Edition) that offers semi-decentralized, Web2+Web3 hybrid services. It operates as a decentralized autonomous organization (DAO) project, providing DeFi solutions.
Incident Overview: On December 4, 2024, Vestra DAO tweeted that a hacker exploited a vulnerability in the locked staking contract, manipulating the reward mechanism to acquire excessive rewards beyond what was due. The incident led to the theft of a total of 73,720,000 VSTR tokens. The stolen tokens were gradually sold on Uniswap, resulting in a loss of around $500,000 in ETH liquidity.
The team quickly identified the issue and took immediate action by blacklisting the locked staking contract, thereby disabling further interactions with these contracts. As a result, 755,631,188 VSTR tokens in the staking pool were removed from circulation, and the funds in these contracts could no longer be withdrawn. On December 6, the team announced that to protect the VSTR tokenomics and the stability of the project, the remaining 755,631,188 VSTR tokens would be permanently removed from circulation[3].
Post-Incident Recommendations:
Conduct Comprehensive Contract Security Audits and Optimization
Hire a reputable third-party security audit firm to thoroughly review all smart contracts, especially the staking and locked contracts. The focus should be on permission management, boundary condition handling, and code logic security. After the audit, the contract code should be optimized based on the recommendations, and the audit report should be made publicly available to enhance transparency and user trust.
Deploy Multi-layered Protection Mechanisms and Real-Time Monitoring
Project Overview: Clober is a fully on-chain order book DEX that allows on-chain order matching and settlement on decentralized smart contract platforms. With Clober, market participants can place limit and market orders fully decentralized and trustless at manageable costs.
Incident Overview:
On December 10, 2024, the liquidity vault of Clober DEX on the Base Network was attacked, resulting in a loss of 133.7 ETH (approximately $501,000). The root cause of the attack was a reentrancy vulnerability in the _burn() function within the Rebalancer contract.
The team offered 20% of the stolen funds as a bounty for identifying the security vulnerability, provided that the remaining assets could be returned. Additionally, the team assured that no legal action would be taken if the attacker cooperated. On December 31, 2024, the team stated that the negotiations had not reached a consensus, and the attacker had moved the stolen assets to Tornado Cash. The team cooperates with law enforcement agencies to trace the attacker’s origins[4].
Post-Incident Recommendations:
Project Overview: HarryPotterObamaSonic10Inu is the ultimate form of crypto assets. Inspired by BITCOIN, the project encourages the creation of novel and fun meme content. With ownership relinquished and liquidity locked, the ever-growing community has taken the lead. Drawing inspiration from the legendary Bitcoin meme, the project is developing a unique website, exclusive merchandise, and an e-commerce platform. The goal is to create an ecosystem where active community members can interact and collaborate.
Incident Overview:
On December 18, 2024, a series of exploitative transactions targeted the liquidity pool of the HarryPotterObamaSonic10Inu 2.0 token on the Ethereum network. The attacker profited approximately $243,000 and transferred the funds into Tornado Cash.
Over the next four days, the token’s price saw a significant decline of around -33.42%, with its market cap dropping from $245 million to $168 million[5]. \
Post-Incident Recommendations:
Enhance Smart Contract Security Audits and Optimization
Engage a third-party professional organization to conduct a comprehensive security audit of the existing smart contracts, focusing on liquidity pool logic and access control. Vulnerabilities should be fixed, and the contract code should be optimized. Mechanisms like time-locks and rate-limiting should be added to prevent malicious operations in a short timeframe.
Integrate On-Chain Price Oracles
Integrate reliable on-chain oracles to verify asset prices during deposit and withdrawal transactions, ensuring that operations align with actual market values and preventing funds from being manipulated through price manipulation.
Increase Community Transparency and Confidence
Publish the results of the incident investigation and the remediation plan, ensuring transparency of information and building trust within the user community.
The FEG token is a deflationary governance token within the FEG ecosystem, which includes a decentralized exchange and passive income incentive mechanisms. Its goal is to reshape the operational model of decentralized trading networks. The token is available on both the Ethereum and Binance Smart Chain networks.
Incident Overview:
On December 29, 2024, the FEG project was targeted by a security vulnerability attack, resulting in a loss of approximately $1 million. The incident’s root cause appears to be a composability issue related to the integration of the underlying Wormhole cross-chain bridge, which facilitates cross-chain messaging and token transfers. The Wormhole Foundation later clarified that no issues were found within the Wormhole protocol, and the attack was unrelated to Wormhole.
Following the incident, the team suspended all FEG transactions on centralized exchanges and initiated a comprehensive investigation. While the SmartDeFi contract code was not directly affected, the SmartDeFi protocol was also paused as a precaution. However, all projects on the protocol have remained secure so far[6].
Post-Incident Recommendations:
In December 2024, multiple DeFi projects were targeted by security vulnerabilities, resulting in the loss of millions of dollars in assets. These incidents included the Clober DEX liquidity vault attack, a cross-chain exploit caused by the integration of FEG with Wormhole, the staking vulnerability in Vestra DAO, the manipulation of Clipper DEX’s single-asset withdrawal feature, and a flash loan attack on HarryPotterObamaSonic10Inu. These events highlighted critical risks in smart contract security, cross-chain protocol composability, and liquidity pool management. The industry urgently needs to strengthen smart contract audits, implement real-time monitoring, and adopt multi-layered protection mechanisms to improve platform security and user trust. Gate.io reminds users to stay updated on security developments, choose reliable platforms, and enhance personal asset protection.
Reference:
Gate Research
Gate Research is a comprehensive blockchain and crypto research platform, providing readers with in-depth content, including technical analysis, hot insights, market reviews, industry research, trend forecasts, and macroeconomic policy analysis.
Click the Link to learn more
Disclaimer
Investing in the cryptocurrency market involves high risk, and it is recommended that users conduct independent research and fully understand the nature of the assets and products they purchase before making any investment decisions. Gate.io is not responsible for any losses or damages caused by such investment decisions.
According to the latest Web3 industry security report from Gate Research, a total of 27 security incidents occurred in December, resulting in losses of approximately $4.11 million. The types of incidents were diverse, with contract vulnerabilities remaining the primary threat, accounting for 72% of the total losses. The report also provides a detailed analysis of key security events, including the FEG vulnerability, Clober contract vulnerability, Clipper DEX contract vulnerability, and the HarryPotterObamaSonic10Inu flash loan attack. Contract vulnerabilities and account hacks were identified as the major security risks for the month, highlighting the ongoing need for the industry to strengthen its security measures.
According to data from Slowmist, December 2024 saw a total of 27 hacking incidents, resulting in losses of $4.11 million. The attacks primarily involved contract vulnerabilities, account hacks, and other methods. Compared to November, both the number of incidents and the total losses saw a significant decline, indicating that industry security measures and awareness have improved. Contract vulnerabilities remain the leading cause of attacks, with nine incidents accounting for over $2.98 million in losses, or 72% of the total. Official X accounts and cryptocurrency project websites continue to be hackers’ primary targets [1].
This month’s distribution of security incidents across public blockchains reveals that most losses were concentrated on several mature and popular blockchains, particularly Ethereum and Base, with losses of $2.01 million and $950,000, respectively. This highlights that, despite the strong foundational security of public blockchains, vulnerabilities in the application layer and smart contracts still pose significant risks to user funds.
Several blockchain projects experienced major security incidents this month, resulting in significant financial losses. Notable incidents include the FEG security vulnerability, which caused a loss of $1 million; the Clober contract vulnerability, which led to a loss of $500,000; the Vestra DAO contract vulnerability, resulting in $500,000 in losses; and the Clipper DEX contract vulnerability, which caused a loss of $457,000.
According to official disclosures, the following projects suffered losses exceeding $3.22 million in December. These incidents underscore that contract vulnerabilities continue to pose a significant threat.
Project Overview: Clipper is a decentralized exchange (DEX) designed to provide the best rates for small cryptocurrency traders (less than $10,000). It achieves this by limiting liquidity and reducing impermanent loss.
Incident Overview: According to an analysis report released by Clipper, on December 1, 2024, attackers exploited a vulnerability in the smart contract used by Clipper, manipulating the single-asset deposit/withdrawal function. This operation affected the liquidity pools on the Optimism and Base networks, causing an imbalance in the pool assets and allowing the attackers to withdraw more assets than they had deposited. The attack resulted in a loss of approximately $457,878.
Within a few hours, AdmiralDAO launched an emergency response plan, quickly taking measures to protect the remaining funds in the protocol and halt the attack. After the response, no additional funds were affected[2].
Post-Incident Recommendations:
Project Overview: VSTR is a token developed by the NFT community “CMLE” (Crypto Monster Limited Edition) that offers semi-decentralized, Web2+Web3 hybrid services. It operates as a decentralized autonomous organization (DAO) project, providing DeFi solutions.
Incident Overview: On December 4, 2024, Vestra DAO tweeted that a hacker exploited a vulnerability in the locked staking contract, manipulating the reward mechanism to acquire excessive rewards beyond what was due. The incident led to the theft of a total of 73,720,000 VSTR tokens. The stolen tokens were gradually sold on Uniswap, resulting in a loss of around $500,000 in ETH liquidity.
The team quickly identified the issue and took immediate action by blacklisting the locked staking contract, thereby disabling further interactions with these contracts. As a result, 755,631,188 VSTR tokens in the staking pool were removed from circulation, and the funds in these contracts could no longer be withdrawn. On December 6, the team announced that to protect the VSTR tokenomics and the stability of the project, the remaining 755,631,188 VSTR tokens would be permanently removed from circulation[3].
Post-Incident Recommendations:
Conduct Comprehensive Contract Security Audits and Optimization
Hire a reputable third-party security audit firm to thoroughly review all smart contracts, especially the staking and locked contracts. The focus should be on permission management, boundary condition handling, and code logic security. After the audit, the contract code should be optimized based on the recommendations, and the audit report should be made publicly available to enhance transparency and user trust.
Deploy Multi-layered Protection Mechanisms and Real-Time Monitoring
Project Overview: Clober is a fully on-chain order book DEX that allows on-chain order matching and settlement on decentralized smart contract platforms. With Clober, market participants can place limit and market orders fully decentralized and trustless at manageable costs.
Incident Overview:
On December 10, 2024, the liquidity vault of Clober DEX on the Base Network was attacked, resulting in a loss of 133.7 ETH (approximately $501,000). The root cause of the attack was a reentrancy vulnerability in the _burn() function within the Rebalancer contract.
The team offered 20% of the stolen funds as a bounty for identifying the security vulnerability, provided that the remaining assets could be returned. Additionally, the team assured that no legal action would be taken if the attacker cooperated. On December 31, 2024, the team stated that the negotiations had not reached a consensus, and the attacker had moved the stolen assets to Tornado Cash. The team cooperates with law enforcement agencies to trace the attacker’s origins[4].
Post-Incident Recommendations:
Project Overview: HarryPotterObamaSonic10Inu is the ultimate form of crypto assets. Inspired by BITCOIN, the project encourages the creation of novel and fun meme content. With ownership relinquished and liquidity locked, the ever-growing community has taken the lead. Drawing inspiration from the legendary Bitcoin meme, the project is developing a unique website, exclusive merchandise, and an e-commerce platform. The goal is to create an ecosystem where active community members can interact and collaborate.
Incident Overview:
On December 18, 2024, a series of exploitative transactions targeted the liquidity pool of the HarryPotterObamaSonic10Inu 2.0 token on the Ethereum network. The attacker profited approximately $243,000 and transferred the funds into Tornado Cash.
Over the next four days, the token’s price saw a significant decline of around -33.42%, with its market cap dropping from $245 million to $168 million[5]. \
Post-Incident Recommendations:
Enhance Smart Contract Security Audits and Optimization
Engage a third-party professional organization to conduct a comprehensive security audit of the existing smart contracts, focusing on liquidity pool logic and access control. Vulnerabilities should be fixed, and the contract code should be optimized. Mechanisms like time-locks and rate-limiting should be added to prevent malicious operations in a short timeframe.
Integrate On-Chain Price Oracles
Integrate reliable on-chain oracles to verify asset prices during deposit and withdrawal transactions, ensuring that operations align with actual market values and preventing funds from being manipulated through price manipulation.
Increase Community Transparency and Confidence
Publish the results of the incident investigation and the remediation plan, ensuring transparency of information and building trust within the user community.
The FEG token is a deflationary governance token within the FEG ecosystem, which includes a decentralized exchange and passive income incentive mechanisms. Its goal is to reshape the operational model of decentralized trading networks. The token is available on both the Ethereum and Binance Smart Chain networks.
Incident Overview:
On December 29, 2024, the FEG project was targeted by a security vulnerability attack, resulting in a loss of approximately $1 million. The incident’s root cause appears to be a composability issue related to the integration of the underlying Wormhole cross-chain bridge, which facilitates cross-chain messaging and token transfers. The Wormhole Foundation later clarified that no issues were found within the Wormhole protocol, and the attack was unrelated to Wormhole.
Following the incident, the team suspended all FEG transactions on centralized exchanges and initiated a comprehensive investigation. While the SmartDeFi contract code was not directly affected, the SmartDeFi protocol was also paused as a precaution. However, all projects on the protocol have remained secure so far[6].
Post-Incident Recommendations:
In December 2024, multiple DeFi projects were targeted by security vulnerabilities, resulting in the loss of millions of dollars in assets. These incidents included the Clober DEX liquidity vault attack, a cross-chain exploit caused by the integration of FEG with Wormhole, the staking vulnerability in Vestra DAO, the manipulation of Clipper DEX’s single-asset withdrawal feature, and a flash loan attack on HarryPotterObamaSonic10Inu. These events highlighted critical risks in smart contract security, cross-chain protocol composability, and liquidity pool management. The industry urgently needs to strengthen smart contract audits, implement real-time monitoring, and adopt multi-layered protection mechanisms to improve platform security and user trust. Gate.io reminds users to stay updated on security developments, choose reliable platforms, and enhance personal asset protection.
Reference:
Gate Research
Gate Research is a comprehensive blockchain and crypto research platform, providing readers with in-depth content, including technical analysis, hot insights, market reviews, industry research, trend forecasts, and macroeconomic policy analysis.
Click the Link to learn more
Disclaimer
Investing in the cryptocurrency market involves high risk, and it is recommended that users conduct independent research and fully understand the nature of the assets and products they purchase before making any investment decisions. Gate.io is not responsible for any losses or damages caused by such investment decisions.