The hacker used a smart contract …

Hacker used smart contract to steal funds from EtherDelta users

Not surprisingly, the EtherDelta platform has become one of the most popular places to exchange ERC20 tokens. These tokens are available on EtherDelta at a time when other major exchanges are just wondering whether to add them or not. It is noteworthy that the platform itself is built on a smart contract. This is a great example of the versatility of such contracts. In fact, EtherDelta is a real decentralized application that works without centralized servers, but this does not mean that it is completely protected from hacker attacks. Writes about this The Merkle.

The attacker distributed a link to the token that was not submitted on EtherDelta among interested users. Somehow, this link got into the official EtherDelta chat, which once again convinced users of its reliability. In fact, the link led to a malicious smart contract created by a hacker. The contract contained JavaScript code that, once launched, provided the attacker with full access to the active user session on EtherDelta.

This allowed him to view the private keys of users’ wallets directly through the browser. The keys were then passed to a PHP script that allowed the hacker to manage and empty the wallets..

The hacker used a smart contract ...

There is no specific information on how much money was stolen, but the account goes to at least thousands of dollars. The EtherDelta team reported that the vulnerability has been fixed, but this episode was another confirmation that reliable decentralized exchanges do not exist today..

Similar articles

  • Hacker who attacked KuCoin exchange…

    The hacker who attacked the KuCoin exchange transferred 425 bitcoins to the mixer for laundering The hacker, who attacked the KuCoin exchange in September, is actively moving and…

  • Hackers used cloud servers…

    Hackers Used Amazon Cloud Servers to Mining Bitcoin According to RedLock, an investigative company in the…

  • General Electric proposes to use…

    General Electric proposes to use cryptocurrencies for settlements in the aviation industry New patent application by American diversified corporation…

  • Hackers use Monero miner…

    Hackers Use Monero Miner To Hide The True Purpose Of Their Attacks – Microsoft Hackers Start Using Cryptocurrency Miners As A Cover,…

  • Blockchain was suggested to be used…

    Blockchain was proposed to be used in the process of nuclear disarmament States involved in the process of nuclear disarmament should use…