Cyvers Flags Suspicious Transactions Involving Seamless Protocol on Base Network
The post Cyvers Flags Suspicious Transactions Involving Seamless Protocol on Base Network appeared on BitcoinEthereumNews.com.
Cyvers Flags Suspicious Seamless Protocol Transactions on Base Network: Web3 security firm Cyvers has raised alarms over suspicious activity related to Seamless Protocol on the Base network. In a post on X (formerly Twitter), Cyvers reported that a malicious contract was deployed at 11:57 UTC on September 13, followed by an immediate hack. Approximately $130,000 worth of stolen funds were quickly bridged to the Ethereum network and deposited into Tornado Cash, a decentralized crypto tumbler. Details of the Incident 1. Malicious Contract Detected: Cyvers flagged a suspicious contract deployed on the Base network shortly before the hack occurred. The malicious activity began almost immediately after the contract was created, signaling a coordinated attack. 2. Stolen Funds: The hacker managed to steal around $130,000 worth of funds. The stolen assets were then quickly bridged to the Ethereum network, where they were deposited into Tornado Cash, a service often used to obscure the origin of funds. 3. Seamless Protocol’s Response: Seamless Protocol responded to the incident by assuring users that their funds are safe and the protocol itself was not exploited. In their statement on X, Seamless Protocol emphasized that the breach did not affect their core platform or user assets. Implications for Web3 Security 1. Vulnerability Concerns: The incident highlights the ongoing vulnerability of blockchain networks and decentralized finance (DeFi) platforms to malicious contracts. While Seamless Protocol has stated that user funds were not compromised, the successful bridging of stolen funds to Ethereum raises concerns about network security. 2. Use of Tornado Cash: The hacker’s use of Tornado Cash to launder the stolen funds presents challenges for tracking and recovering the assets. Tornado Cash has long been associated with obfuscating illicit transactions, making it harder for authorities to trace stolen funds. 3. Security Protocols: This incident emphasizes the importance of robust…
Filed under: News - @ September 15, 2024 3:10 am