Look up anything

Look up anything

Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

back to top

Blast protocol MonoSwap publicizes hack with hyperlink to attacker’s web site

Related Article

MonoSwap, which describes itself as a “Blast native liquidity space” introduced through its X account that it has been hacked.

The submit saying the hack particulars how a developer for MonoSwap “installed a phishing app to join a call with scammers who pretended to be a VC. The attackers installed the botnet into his office PC, which has access to all MonoSwap-related wallets and contracts.”

It additionally notes that “the hackers then withdrew most of the staked liquidity positions, causing damage to the protocol.”

The unique submit included a hyperlink to the hacker’s web site, however this was eliminated after Protos reached out to ask, “Do you suppose it was prudent to offer a hyperlink to the hacker’s web site in your announcement submit?

Learn extra: Blast L2-based lending platform makes pricey error, liquidating customers for $26M

MonoSwap’s documentation has a web page labeled ‘Security Measures’ which claims “MonoSwap’s expertly crafted smart contracts are developed by seasoned professionals with a deep understanding of the industry. We prioritize the safety and optimization of your investments by incorporating a robust set of features and security measures.” 

Moreover, it has a web page labeled ‘Audits’ which optimistically claims “Coming soon,” although the web page additionally says “Last updated 6 months ago.” 

The protocol has further immaturities, together with describing its wrapped token, xMONO, as a governance token, even though, so far as Protos has been capable of decide, there isn’t any voting mechanism to at the moment use these governance tokens for governance.

Protos has reached out to MonoSwap for clarification on the standing of the protocol audits, why one government had entry to all of those mission vital assets on their laptop, and what the usage of the governance token is. At press we now have not acquired a response.

Information from DefiLlama exhibits the ‘Total Value Locked’ for this protocol dropping from roughly $1.5 million to $200,000 in the present day.

Obtained a tip? Ship us an electronic mail or ProtonMail. For extra knowledgeable information, comply with us on XInstagramBluesky, and Google Information, or subscribe to our YouTube channel.

Related Article