Low | Medium | High | Critical | Total | |
---|---|---|---|---|---|
Not fixed | 1 | - | - | - | 1 |
Fixed | - | - | - | - | 0 |
Total | 1 | 0 | 0 | 0 | 1 |
Click to show description
Quick Summary The Genius token team executed a partial exit scam on May 5th, 2024, making a profit of approximately $1.2 million USD. Details of the Exploit The original GNUS Token deployer 0x1804dE was funded on the Fantom chain by another scam wallet 0x548c63 initiated a function deployTokenManager on the InterchainProxy contract which is one of the core Axelar Network contracts. This function deployed a new token manager with a fake token 0xC77522 registered as a bridged token. Simultaneously, another address, 0x548c63, deployed and minted 100,000,000 fake tokens, 0xC77522, on the Fantom network. Subsequently, 500,000 of the fake tokens were bridged via Axelar to the Ethereum network and sold on the Uniswap DEX for 407 ETH. The profits were then mixed and sent to various addresses. Block Data Reference GNUS Token Deployer: https://etherscan.io/address/0x1804deca63705e18edf04f242b325bcd54a8b463 Fake token manager: https://ftmscan.com/address/0x8c10c2867384c87d5a555e4f96C7036336b575C6#code Fantom fake token: https://ftmscan.com/address/0xC77522dC90A4F6E30d73C6E8612A7d357D027d17 Bridging to Ethereum mainnet: https://ftmscan.com/tx/0x9fe599bfb8bd381b1f2d07b685e00e501828f68a9f9596050aa8f63a25c12ec6 Ethereum mainnet sell: https://etherscan.io/tx/0xe8a5780cc89d9115acf307da9e6fae68e8b3634a8b41c77d81e95edb9085a407 Two scammer addresses are linked to the transaction: https://ftmscan.com/tx/0xae046accf5c10965640c339a05ed3785b27834c219e18b8be6763ae9d91c9ac9
# | Name | Auditor | Date | Chains | Issues |
---|---|---|---|---|---|
1 | GNUSai | SolidProof | 2024/02/28 | Ethereum | No active critical issues |