Daily View | Saturday September 10

The following contents are organized and provided by PlatONWorld to spread more information and not represent the position of PlatONWorld. The contents are from third-party platforms, and the accuracy, authenticity, completeness, validity, and real-time nature of the information are not guaranteed.


【LAT】

Total issuanceCirculationPledge rateTotal pledgeNumber of addresses
10,506,250,0002,910,780,00030.49%1,498,617,144.96224,116
Data source: https://scan.platon.network/

【Quotes】

Trading pair24 hours high24 hours low24-hour trading volume
LAT/USDT0.0088640.00820423,098,714
BTC/USDT21617.5819835.1211,316
ETH/USDT1746.001666.9872,216
Data source: Huobi Exchange

【10 days node data】

2022ActiveCandidateExitingExited
Sep 10201143166
Sep 9201143166
Sep 8201143166
Sep 7201143166
Sep 6201143166
Sep 05201143166
Sep 04201143166
Sep 03201143166
Sep 02201143166
Sep 01201143166
Data source: https://scan.platon.network/

【Industry News】

LooksWhale project Discord server attacked

September 10 – The LooksWhale Project Discord server has been attacked, as monitored by CertiK. Community users are asked not to click on links, cast or approve any transactions.

Beosin: Analysis of the hacking of the DPC token contract on BNBChain

According to the Beosin EagleEye platform monitoring, the DPC token contract was hacked with a loss of approximately $103,755. analysis by the Beosin security team revealed that the attackers first used the tokenAirdop function in the DPC token contract to prepare for the conditions to receive the reward, then the attackers used USDT to exchange the DPC tokens and then added liquidity to obtain LP tokens, and then pledges the LP tokens in the token contract. The previous preparations are made to satisfy the claiming condition. The attacker then repeatedly calls the claimStakeLp function in the DPC token to repeatedly claim the reward. Because of the ” ClaimQuota = ClaimQuota.add(oldClaimQuota[addr]);” in the getClaimQuota function, the rewards can keep accumulating. Finally the attacker calls the claimDpcAirdrop function in the DPC contract to extract the rewards (DPC tokens) and exchange them for Udst to leave the market. The stolen funds are still stored at the attacker’s address and will be followed up by the Beosin security team.

Daily View | Saturday September 10

👇👇👇

PlatONWorld — the base of PlatON ecological long-termists!

Welcome everyone to continue to pay attention to PlatONWorld!

PlatONWorld | Official website platonworld.org

PlatONWorld | Telegram_EN Telegram_CN

PlatONWorld | WeChat:mcqueen678

每日速览 | 06月17日 星期四

Publisher:PlatONWorld-M6,Please indicate the source for forwarding:https://platonworld.org/?p=8094

(0)
PlatONWorld-M6的头像PlatONWorld-M6Official
上一篇 9 9 月, 2022 11:06
下一篇 10 9 月, 2022 12:08

相关推荐

发表回复

登录后才能评论