• Dapps:16.23K
  • Blockchains:78
  • Active users:66.47M
  • 30d volume:$303.26B
  • 30d transactions:$879.24M

Cyvers Reports Suspicious Seamless Protocol Transactions on Base Network

user avatar

by Giorgi Kostiuk

a year ago


  1. Malicious Contract Detected
  2. Stolen Funds
  3. Seamless Protocol’s Response

  4. Web3 security firm Cyvers has raised alarms over suspicious activity related to Seamless Protocol on the Base network. In a post on X (formerly Twitter), Cyvers reported that a malicious contract was deployed at 11:57 UTC on September 13, followed by an immediate hack. Approximately $130,000 worth of stolen funds were quickly bridged to the Ethereum network and deposited into Tornado Cash, a decentralized crypto tumbler.

    Malicious Contract Detected

    Cyvers flagged a suspicious contract deployed on the Base network shortly before the hack occurred. The malicious activity began almost immediately after the contract was created, signaling a coordinated attack.

    Stolen Funds

    The hacker managed to steal around $130,000 worth of funds. The stolen assets were then quickly bridged to the Ethereum network, where they were deposited into Tornado Cash, a service often used to obscure the origin of funds.

    Seamless Protocol’s Response

    Seamless Protocol responded to the incident by assuring users that their funds are safe and the protocol itself was not exploited. In their statement on X, Seamless Protocol emphasized that the breach did not affect their core platform or user assets.

    The flagging of suspicious transactions on Seamless Protocol by Cyvers underscores the persistent challenges facing the security of decentralized platforms. While Seamless Protocol has assured users that funds remain safe, the hacker’s successful extraction of $130,000 through a malicious contract raises questions about vulnerabilities in the DeFi space. As investigations unfold, the crypto community will be watching closely to see how security protocols evolve in response to these incidents.

0

Rewards

chest
chest
chest
chest

More rewards

Discover enhanced rewards on our social media.

chest

Other news

The Role of Entanglement in Quantum Computing

chest

Entanglement allows qubits to influence each other instantly, enabling complex problem-solving.

user avatarSon Min-ho

Understanding the Differences Between Classical and Quantum Computers

chest

Quantum computers utilize qubits that can exist in multiple states, unlike classical computers that operate on binary bits.

user avatarAyman Ben Youssef

Challenges in Quantum Computing: Qubit Stability and Decoherence

chest

Maintaining qubit stability is one of the greatest challenges in quantum computing due to decoherence.

user avatarTando Nkube

The Importance of Quantum Computing in Modern Science

chest

Quantum computing represents a significant scientific direction that aims to expand scientific capabilities rather than replace traditional computers.

user avatarZainab Kamara

US Agencies Form New Task Force to Combat Crypto Scams

chest

A new interagency task force has been established to target cryptocurrency scams linked to Chinese criminal organizations.

user avatarKofi Adjeman

Viberate VIB Delisted from Binance, Impacting Market Activity

chest

Binance has announced the delisting of Viberate VIB effective April 30, 2025, impacting trading on the exchange.

user avatarNguyen Van Long

Important disclaimer: The information presented on the Dapp.Expert portal is intended solely for informational purposes and does not constitute an investment recommendation or a guide to action in the field of cryptocurrencies. The Dapp.Expert team is not responsible for any potential losses or missed profits associated with the use of materials published on the site. Before making investment decisions in cryptocurrencies, we recommend consulting a qualified financial advisor.