Low | Medium | High | Critical | Total | |
---|---|---|---|---|---|
Not fixed | 1 | 5 | 1 | - | 7 |
Fixed | - | - | - | - | 0 |
Total | 1 | 5 | 1 | 0 | 7 |
Click to show description
Quick Summary The Kyber Network project was exploited by a hacker who took advantage of a vulnerability in the front end taking a profit of ~$265k. Details of the Exploit Kyber Network is a decentralized, blockchain-based protocol that aggregates liquidity and enables the exchange of tokens without an intermediary. The hacker managed to add malicious code to Google Tag Manager (GTM), which performed an approve, which gave the hacker access to user's funds. The script added by hacker's team was specifically targeting whale wallets. Block Data Reference Involved addresses: - Scammer address: - Polygon: https://polygonscan.com/address/0x57A72cE4fd69eBEdEfC1a938b690fbf11A7Dff80 - Ethereum: https://etherscan.io/address/0x57A72cE4fd69eBEdEfC1a938b690fbf11A7Dff80 - Addresses supplying native tokens to hacker addresses: https://etherscan.io/address/0x9bc22f7e0234029eaf2c570588d829f07123fdd6
# | Name | Auditor | Date | Chains | Issues |
---|---|---|---|---|---|
1 | [SCA] Kyber Network / Gover... | Hacken | 2021/04/04 | Ethereum | No active critical issues |