SuperRare Hack: $730K Stolen in Staking Exploit With Frontrun Twist
The post SuperRare Hack: $730K Stolen in Staking Exploit With Frontrun Twist appeared on BitcoinEthereumNews.com.
Key Insights: The SuperRare hack resulted in 11.9 million RARE tokens stolen through a Merkle root manipulation. A frontrunner hijacked the exploit one block after the original attacker’s contract deployment. Core platform functions were unaffected, but the staking logic failure revealed deeper risks. On July 28, something strange happened on the Ethereum blockchain. A smart contract from SuperRare, a well-known NFT platform, was tricked, and about $730,000 worth of RARE tokens were stolen. This wasn’t just a normal crypto hack. The SuperRare hack had an unusual twist. The person who found the bug in the code didn’t even end up getting the money. Someone else saw the attack coming and jumped in first. Now, experts are calling this a clear case of front-running, a type of move where someone copies an action but sends their transaction faster. This SuperRare hack is not just about one mistake in code. It shows how things can go wrong even when attackers are fighting each other for money. What Is SuperRare and How Did the Hack Happen? SuperRare is an NFT website where artists sell their digital art. It’s been around since 2018 and only allows selected artists to list their work. It also has a special token called RARE. People who hold RARE can vote on how the platform works and even earn rewards by staking their tokens. Source: Peckshield alerts X The SuperRare hack didn’t affect the art side of things or the RARE token itself. It hit the staking contract, the part of the code that lets users earn rewards. This contract had a serious mistake. The contract had something called a Merkle root, a tool used to check who should get rewards. But the code that controls who can update this Merkle root wasn’t strict enough. Staking contract was exploited-…
Filed under: News - @ July 28, 2025 2:30 pm