PANews reported on October 15th that BlockSec Phalcon issued an alert stating that its system had detected several suspicious transactions (initiated by different EOAs) targeting two unknown contracts deployed to the same address on Ethereum, resulting in losses of approximately $120,000. The root cause is suspected to be a lack of access control on the critical functions approveERC20 and withdrawAll in the victim contract (which is not open source), allowing the attacker to drain the tokens held within the contract. It is worth noting that the withdrawAll function requires the destruction of a sufficient amount of #sil tokens. This explains why in the second attack transaction (TX2, which caused the majority of the losses), the attacker first obtained #sil tokens through a flash loan, then performed multiple token swaps before carrying out the actual attack.PANews reported on October 15th that BlockSec Phalcon issued an alert stating that its system had detected several suspicious transactions (initiated by different EOAs) targeting two unknown contracts deployed to the same address on Ethereum, resulting in losses of approximately $120,000. The root cause is suspected to be a lack of access control on the critical functions approveERC20 and withdrawAll in the victim contract (which is not open source), allowing the attacker to drain the tokens held within the contract. It is worth noting that the withdrawAll function requires the destruction of a sufficient amount of #sil tokens. This explains why in the second attack transaction (TX2, which caused the majority of the losses), the attacker first obtained #sil tokens through a flash loan, then performed multiple token swaps before carrying out the actual attack.

BlockSec: Suspicious transactions on the Ethereum chain resulted in a loss of approximately $120,000

2025/10/15 12:43

PANews reported on October 15th that BlockSec Phalcon issued an alert stating that its system had detected several suspicious transactions (initiated by different EOAs) targeting two unknown contracts deployed to the same address on Ethereum, resulting in losses of approximately $120,000. The root cause is suspected to be a lack of access control on the critical functions approveERC20 and withdrawAll in the victim contract (which is not open source), allowing the attacker to drain the tokens held within the contract.

It is worth noting that the withdrawAll function requires the destruction of a sufficient amount of #sil tokens. This explains why in the second attack transaction (TX2, which caused the majority of the losses), the attacker first obtained #sil tokens through a flash loan, then performed multiple token swaps before carrying out the actual attack.

Market Opportunity
The Root Network Logo
The Root Network Price(ROOT)
$0.000267
$0.000267$0.000267
-2.55%
USD
The Root Network (ROOT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.