Deep潮 TechFlow News, February 26 — Blockchain security firm BlockSec monitoring discovered that the FOOMCASH contract on the Base and Ethereum networks was subjected to a mimic attack. The attack used the same method as the previous Veil Cash vulnerability, where the attacker forged zkSNARK proofs due to incorrect verification key configuration, resulting in a total loss of approximately $2.26 million. Among these, a single attack transaction on Base caused a loss of about $427,000, while the approximately $1.83 million worth of related transactions on Ethereum are suspected to be white-hat rescue operations.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Deep潮 TechFlow News, February 26 — Blockchain security firm BlockSec monitoring discovered that the FOOMCASH contract on the Base and Ethereum networks was subjected to a mimic attack. The attack used the same method as the previous Veil Cash vulnerability, where the attacker forged zkSNARK proofs due to incorrect verification key configuration, resulting in a total loss of approximately $2.26 million. Among these, a single attack transaction on Base caused a loss of about $427,000, while the approximately $1.83 million worth of related transactions on Ethereum are suspected to be white-hat rescue operations.