Ethereum Alarm Clock exploit leads to $260K in stolen gas fees

10/20 03:00

According to Cointelegraph, a bug in the smart contract code for the Ethereum Alarm Clock service has been exploited, with nearly $260,000 said to have been swiped from the protocol so far. The Ethereum Alarm Clock enables users to schedule future transactions by pre-determining the receiver address, sent amount, and desired time of transaction. Users must have the required Ether on hand to complete the transaction and need to pay the gas fees upfront. According to an Oct. 19 Twitter post from blockchain security and data analytics firm PeckShield, hackers managed to exploit a loophole in the scheduled transaction process which allows them to make a profit on returned gas fees from canceled transactions. Web3 security frim Supremacy Inc also provided an update, pointing to Etherscan transaction history that showed the hacker(s) were so far able to swipe 204 ETH, worth roughly $259,800.
bullishbullishbullishAlcistabearishbearishbearishBajista2Compartir
Descargo de responsabilidadEl contenido anterior no representa las posiciones de HTX.HTX no ofrece ninguna recomendación de trading.

Artículos relacionados

  • Image

    Ethereum activity hits 788K addresses – Can ETH finally break out?

  • Image

    Hyperliquid Strategies CEO bets on HYPE to outperform Bitcoin, Ethereum in Q2 – Details

  • Image

    Solana hits 10B transactions as Ethereum crosses 200M — two blockchains, two models

Todos los comentarios0Lo más recientePopular

avatar
Lo más recientePopular

Artículos relacionados

  • Image

    Ethereum activity hits 788K addresses – Can ETH finally break out?

  • Image

    Hyperliquid Strategies CEO bets on HYPE to outperform Bitcoin, Ethereum in Q2 – Details

  • Image

    Solana hits 10B transactions as Ethereum crosses 200M — two blockchains, two models