
Detail Analysis

Key Indicators
Platform:
Type:
Category:
Method:
Contract Vulnerabilities
Extended Method:
Rollback attack
Data Sources:
The PeckShield security shield risk control platform DAppShield detected that at 6:38 this morning, hackers at the beginning of the TPSHfJ address continued to launch multiple transaction rollback attacks on the DApp contract address beginning with TLGUT5 by creating attack contracts. Up to now, 45,200 TRX has been profited, and the balance of the attacked contract has almost returned to zero. PeckShield security personnel analyzed that the contract draw is on the chain and in the same transaction, so it is vulnerable to rollback attacks. Prior to this, PeckShield has disclosed multiple incidents of transaction rollback attacks on TRON's DApp. PeckShield hereby reminds that DApp developers should be alert to the continued spread of such transaction rollback attacks, filter contract players, and contact security vendors in time to avoid greater losses of digital assets
DISCLAIMER: While Zero Friction LLC has used the best efforts in aggregating and maintaining this database, Zero Friction LLC makes no representations or warranties with respect to the accuracy or completeness, and specifically disclaim any implied warranties of merchantability or fitness for any particular purpose.
Under no circumstances, shall Zero Friction LLC be liable for any loss of profit or funds, any regulatory or governmental penalties, any legal costs, or any other commercial and non-commercial damages, including but not limited to special, incidental, consequential, or other damages from any or all usage of the dataset or information derived from our database.