{"id":44234,"date":"2021-12-02T15:55:59","date_gmt":"2021-12-02T15:55:59","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32875\/Really-Stupid-Smart-Contract-Bug-Let-Hackers-Steal-31-Million-In-Digital-Coin.html"},"modified":"2021-12-02T15:55:59","modified_gmt":"2021-12-02T15:55:59","slug":"really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/","title":{"rendered":"Really Stupid &#8220;Smart Contract&#8221; Bug Let Hackers Steal $31 Million In Digital Coin"},"content":{"rendered":"<figure class=\"intro-image intro-left\"> <img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/12\/cryptocurrency-800x532.jpeg\" alt=\"Close-up photo of hand operating touchscreen.\"><figcaption class=\"caption\"><\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"> <a title=\"115 posters participating, including story author\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/information-technology\/2021\/12\/hackers-drain-31-million-from-cryptocurrency-service-monox-finance\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">225<\/span> <span class=\"visually-hidden\"> with 115 posters participating, including story author<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p> <!-- cache hit 633:single\/related:0dd102731f70c492a9a24e28cacd76ee --><!-- empty --><\/p>\n<p>Blockchain startup MonoX Finance said on Wednesday that a hacker stole $31 million by exploiting a bug in software the service uses to draft smart contracts.<\/p>\n<p>The company uses a decentralized finance protocol known as MonoX that lets users trade digital currency tokens without some of the requirements of traditional exchanges. \u201cProject owners can list their tokens without the burden of capital requirements and focus on using funds for building the project instead of providing liquidity,\u201d MonoX company representatives <a href=\"https:\/\/medium.com\/monoswap\/monox-spotlight-coinlist-seed-5a45ca1e5205\">say here<\/a>. \u201cIt works by grouping deposited tokens into a virtual pair with vCASH, to offer a single token pool design.\u201d<\/p>\n<p>An accounting error built into the company\u2019s software let an attacker inflate the price of the MONO token and to then use it to cash out all the other deposited tokens, MonoX Finance <a href=\"https:\/\/medium.com\/monoswap\/exploit-post-mortem-33921a779b43\">revealed in a post<\/a>. The haul amounted to $31 million worth of tokens on the Ethereum or Polygon blockchains, both of which are supported by the MonoX protocol.<\/p>\n<p>Specifically, the hack used the same token as both the tokenIn and tokenOut, which are methods for exchanging the value of one token for another. MonoX updates prices after each swap by calculating new prices for both tokens. When the swap is completed, the price of tokenIn\u2014that is, the token sent by the user\u2014decreases and the price of tokenOut\u2014or the token received by the user\u2014increases.<\/p>\n<p>By using the same token for both tokenIn and tokenOut, the hacker greatly inflated the price of the MONO token because the updating of the tokenOut overwrote the price update of the tokenIn. The hacker then exchanged the token for $31 million worth of tokens on the Ethereum and Polygon blockchains.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>There\u2019s no practical reason for exchanging a token for the same token, and therefore the software that conducts trades should never have allowed such transactions. Alas, it did, despite MonoX receiving <a href=\"https:\/\/docs.monox.finance\/library\/audits\">three security audits<\/a> this year.<\/p>\n<h2>The pitfalls of smart contracts<\/h2>\n<p>\u201cThese kinds of attacks are common in smart contracts because many developers do not put in the legwork to define security properties for their code,\u201d said Dan Guido, an expert in securing smart contracts like the one hacked here and CEO of security consultancy Trail of Bits. \u201cThey had audits, but if the audits only state that a smart person looked at the code for a given period of time, then the results are of limited value. Smart contracts need testable evidence that they do what you intend, and only what you intend. That means defined security properties and techniques employed to evaluate them.\u201d<\/p>\n<p>Guido continued:<\/p>\n<blockquote>\n<p>Most software requires vulnerability mitigation. We proactively look for vulnerabilities, acknowledge they might be insecure while using them, and build systems to detect when they get exploited. Smart contracts require vulnerability elimination. Software verification techniques are widely used to offer provable assurances that the contracts work as intended. Most of the security issues in smart contracts arise when developers adopt the former security approach, instead of the latter. There are many smart contracts and protocols that are large, complex, and highly valuable that have avoided incidents, alongside the many that have been instantly exploited upon their launch.<\/p>\n<\/blockquote>\n<p>Blockchain researcher Igor Igamberdiev <a href=\"https:\/\/twitter.com\/FrankResearcher\/status\/1465679352448917504\">took to Twitter<\/a> to break down the makeup of the drained tokens. Tokens included $18.2 million in Wrapped Ethereum, $10.5 in MATIC tokens, and $2 million worth of WBTC. The haul also included smaller amounts of tokens for Wrapped Bitcoin, Chainlink, Unit Protocol, Aavegotchi, and Immutable X.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<h2>Only the latest DeFi hack<\/h2>\n<p>MonoX isn\u2019t the only decentralized finance protocol to fall victim to a multimillion-dollar hack. In October, Indexed Finance <a href=\"https:\/\/ndxfi.medium.com\/indexed-attack-post-mortem-b006094f0bdc\">said<\/a> it lost about $16 million in a hack that exploited the way it rebalances index pools. Earlier this month, blockchain-analysis company Elliptic <a href=\"https:\/\/www.elliptic.co\/resources\/defi-risk-regulation-and-the-rise-of-decrime\">said<\/a> so-called DeFi protocols have lost $12 billion to date due to theft and fraud. Losses in the first roughly 10 months of this year reached $10.5 billion, up from $1.5 billion in 2020.<\/p>\n<p>\u201cThe relative immaturity of the underlying technology has allowed hackers to steal users\u2019 funds, while the deep pools of liquidity have allowed criminals to launder proceeds of crime such as ransomware and fraud,\u201d the Elliptic report stated. \u201cThis is part of a broader trend in the exploitation of decentralised technologies for illicit purposes, which Elliptic refers to as DeCrime.\u201d<\/p>\n<p>Wednesday\u2019s MonoX post said that, over the past day, team members have taken the following steps:<\/p>\n<blockquote>\n<ul class>\n<li id=\"21d7\" class=\"hm hn dh ho b hp hq hr hs ht hu hv hw hx hy hz ia ib ic id ie if ig ih ii ij im in io ee\" data-selectable-paragraph>Tried to make contact with the attacker to open a dialogue through submitting a message via transaction on ETH Mainnet<\/li>\n<li id=\"a654\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Paused the contract and will implement a fix to undergo more rigorous testing. After coming up with an adequate compensation plan we will work on unpausing after our security partners have given the OK<\/li>\n<li id=\"f2c3\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Contacted large exchanges to monitor and possibly stop any wallet address linked to the attack<\/li>\n<li id=\"902b\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Collaborated with our security advisers to make progress in identifying the hacker and how to mitigate future risk<\/li>\n<li id=\"7099\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Cross-referenced Tornado Cash wallet interactions with wallets that also used our platform<\/li>\n<li id=\"0b48\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Searched for any metadata left by front end interactions with our Dapp<\/li>\n<li id=\"8bea\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Detailed and mapped wallet addresses that could be considered \u2018suspicious\u2019 based on their interaction with our product. For example, removing a large amount of liquidity prior to the exploit<\/li>\n<li id=\"3c19\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Ongoing monitoring of the wallet with the funds. So far 100 ETH has been sent to Tornado Cash from the stolen funds. The rest is still there<\/li>\n<li id=\"d418\" class=\"hm hn dh ho b hp ip hr hs ht iq hv hw hx ir hz ia ib is id ie if it ih ii ij im in io ee\" data-selectable-paragraph>Additionally, we will file a formal police report<\/li>\n<\/ul>\n<\/blockquote>\n<p>The post said MonoX Finance has insurance that will cover $1 million worth of losses and that the company is now \u201cworking on distributions.\u201d<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32875\/Really-Stupid-Smart-Contract-Bug-Let-Hackers-Steal-31-Million-In-Digital-Coin.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":44235,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[277],"tags":[9758],"class_list":["post-44234","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity-blogs","tag-headlinehackerbankcybercrimedata-lossflawcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Really Stupid &quot;Smart Contract&quot; Bug Let Hackers Steal $31 Million In Digital Coin 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Really Stupid &quot;Smart Contract&quot; Bug Let Hackers Steal $31 Million In Digital Coin 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-02T15:55:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/12\/cryptocurrency-800x532.jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Really Stupid &#8220;Smart Contract&#8221; Bug Let Hackers Steal $31 Million In Digital Coin\",\"datePublished\":\"2021-12-02T15:55:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/\"},\"wordCount\":948,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg\",\"keywords\":[\"headline,hacker,bank,cybercrime,data loss,flaw,cryptography\"],\"articleSection\":[\"CyberSecurity Blogs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/\",\"name\":\"Really Stupid \\\"Smart Contract\\\" Bug Let Hackers Steal $31 Million In Digital Coin 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg\",\"datePublished\":\"2021-12-02T15:55:59+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg\",\"width\":800,\"height\":532},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,bank,cybercrime,data loss,flaw,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinehackerbankcybercrimedata-lossflawcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Really Stupid &#8220;Smart Contract&#8221; Bug Let Hackers Steal $31 Million In Digital Coin\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Really Stupid \"Smart Contract\" Bug Let Hackers Steal $31 Million In Digital Coin 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/","og_locale":"en_US","og_type":"article","og_title":"Really Stupid \"Smart Contract\" Bug Let Hackers Steal $31 Million In Digital Coin 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-02T15:55:59+00:00","og_image":[{"url":"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/12\/cryptocurrency-800x532.jpeg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Really Stupid &#8220;Smart Contract&#8221; Bug Let Hackers Steal $31 Million In Digital Coin","datePublished":"2021-12-02T15:55:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/"},"wordCount":948,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg","keywords":["headline,hacker,bank,cybercrime,data loss,flaw,cryptography"],"articleSection":["CyberSecurity Blogs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/","url":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/","name":"Really Stupid \"Smart Contract\" Bug Let Hackers Steal $31 Million In Digital Coin 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg","datePublished":"2021-12-02T15:55:59+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/12\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin.jpg","width":800,"height":532},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/really-stupid-smart-contract-bug-let-hackers-steal-31-million-in-digital-coin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,bank,cybercrime,data loss,flaw,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackerbankcybercrimedata-lossflawcryptography\/"},{"@type":"ListItem","position":3,"name":"Really Stupid &#8220;Smart Contract&#8221; Bug Let Hackers Steal $31 Million In Digital Coin"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44234","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44234"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44234\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/44235"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44234"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44234"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44234"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}