Unibot contract 0K exploit crashes token price by more than 40%

According to reports, a new contract deployed by Unibot (a popular Telegram bot used to snipe transactions on decentralized exchange Uniswap) on October 29 was exploited to obtain approximately $560,000 from users in various models. Because of coins.

On October 31, blockchain security company Scopescan issued an alert to Unibot users, stating that Unibot was being attacked by hackers but had not been detected. Unibot’s attack on a newly deployed contract drained the cryptocurrency holdings of multiple users.

Unibot later confirmed the hack by revealing preliminary details:

“We have experienced a token approval vulnerability with our new routers and have suspended our routers to contain the issue.”

Amid ongoing investigations by Unibot and blockchain investigators, Scopescan advises users to revoke approval of the exploited contract (0x126c9FbaB3A2FCA24eDfd17322E71a5e36E91865) and transfer funds to a new wallet.

Unibot hack moves funds. Source: 0xscope.com

Hackers are converting stolen memecoin to Ethereum (ETH), blockchain data Displayed from Scopescan.

The Unibot 1-day price chart shows a sharp drop in price following the hack. Source: CoinGecko

As mentioned above, the market reacted negatively to this development, as the price of the UNIBOT token immediately fell by 42.7% in one hour – from $57.56 to $32.94. However, at the time of writing, the coin’s price is trying to recover.

Unibot promises to compensate all users who suffer financial losses due to contract loopholes. Weekly trading data shows that cryptocurrencies such as Joe (JOE), UNIBOT and BeerusCat (BCAT) account for the bulk of the loot.

Cointelegraph has also learned from Scopescan that the same address 0x835B as the exploited address has been deployed and used to receive coins from unsuspecting victims.

Unibot has not yet responded to Cointelegraph’s request for comment.

related: Telegram Crypto Bot Gaining Momentum in the Market: Binance Research

Recently, a similar contract vulnerability stole 280 ETH from users of Maestrobots, a group of cryptocurrency bots on the Telegram Messenger app.

Over the next few days, Maestrobots paid out a total of 610 ETH from its own earnings to cover all user losses, while citing a lack of liquidity to buy back the lost tokens:

“So we compensated affected users with ETH equivalent to their tokens and increased that amount by 20% because that’s what you deserve. These refunds cost 334 ETH.”

Blockchain security firm CertiK confirmed to Cointelegraph that it has been able to detect transactions showing Maestro paying users 334 ETH in compensation.

Magazine: Ethereum Reclaimed: Blockchain Innovation or a Dangerous House of Cards?