
Detail Analysis

Key Indicators
Platform:
Type:
Category:
Method:
DApp
Contract Vulnerabilities
Extended Method:
Rollback attack
Data Sources:
The PeckShield security shield risk control platform DAppShield monitored and hackers starting with TKnzni continued to launch transaction rollback attacks on LuckLambo104 contract addresses starting with TGsyJF by creating attack contracts, which totaled 6,588 TRX. PeckShield security personnel further research found that the contract was created at 23 o'clock on February 01, was attacked the next day after the launch, and the contract balance has now returned to zero. PeckShield hereby reminds that DApp developers should establish a one-click pause game operation mechanism when they are subjected to abnormal attacks, especially to filter contract players. Gamers should also stop participating in the game being attacked in time to avoid creating larger digital assets loss.
DISCLAIMER: While Zero Friction LLC has used the best efforts in aggregating and maintaining this database, Zero Friction LLC makes no representations or warranties with respect to the accuracy or completeness, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall Zero Friction LLC be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the dataset or information derived from our database.