Page 1 of 1
New Industry Crypto Loss
Report any new industry crypto losses to us using this form. We will research and cross validate the incident and log it into our database, if approved.
What is the name of the entity?
*
What country is the entity in? If known.
*
When did the loss occur?
*
When was the loss discovered?
*
How much approximate value of the loss, in USD equivalent, at the time of loss. Do not include any recoveries, if any. (e.g. $2.2M)
*
What was the cause of the event?
*
What was the cause of the event?
A
Current Team Member: A current team member refers to an individual who is currently part of the team or organization involved in a cryptocurrency project or entity at the time of the hack. Their actions, negligence, or malicious intent contributed to security vulnerabilities leading to a hack.
B
Former Team Member: A former team member refers to an individual who was previously part of the team or organization involved in a cryptocurrency project or platform. The actions, knowledge, or access they had during their tenure may have implications for the security of the project, especially if they retain any unauthorized access or have malicious intent after leaving the team.
C
Technical Error: A technical error refers to a mistake or flaw in the design, implementation, or operation of software, systems, or protocols related to cryptocurrencies. It can be caused by coding errors, software bugs, misconfigurations, botched updates, miscommunication, or other technical issues that may inadvertently create vulnerabilities or weaknesses that hackers can exploit.
D
Affiliated Business: An affiliated business refers to a company or organization connected or associated with a cryptocurrency project or platform. This could include partners, service providers, or other entities that have relationships or dependencies with the targeted project. Security breaches or vulnerabilities in these affiliated businesses can have an indirect impact on the security of the crypto project.
E
Targeted Cyber Attack: A targeted cyber attack specifically focuses on a particular cryptocurrency project, platform, or entity with the intention of gaining unauthorized access, stealing funds, or disrupting operations. These attacks may involve sophisticated hacking techniques, malware, or other malicious activities designed to exploit vulnerabilities and compromise the targeted system.
F
Prior Security Breach: A prior security breach refers to a previous incident where a cryptocurrency project or platform experienced a breach or compromise in its security. This could be a previous hack, data breach, or unauthorized access that occurred in the past. Prior security breaches can have lasting implications, as they may leave behind residual vulnerabilities or compromised accounts that can be exploited in subsequent attacks.
G
Hijacked Software: Hijacked software refers to the situation where legitimate software used in the cryptocurrency ecosystem is tampered with or compromised by malicious actors. This can involve injecting malicious code, introducing backdoors, or modifying the software to carry out unauthorized activities. Users unknowingly using hijacked software may be exposed to security risks or have their funds stolen.
H
Social Engineering: Social engineering refers to the psychological manipulation of individuals to deceive them into divulging sensitive information, such as passwords, private keys, or account credentials. These techniques are used to trick users into revealing their confidential information, allowing hackers to gain unauthorized access to their crypto assets or accounts.
I
Contract Manipulation: Contract manipulation refers to the unauthorized modification or exploitation of smart contracts in a blockchain-based system. Hackers may identify vulnerabilities or bugs in smart contracts and exploit them to gain control, manipulate transactions, or siphon funds from the affected contracts.
J
Authority Seizure: Authority seizure refers to the action taken by government officials to confiscate or take control of cryptocurrencies or digital assets due to their involvement in alleged illegal activities. It involves freezing or transferring the assets under government control based on legal warrants or court orders.
K
Token Offering: A token offering, commonly referred to as an Initial Coin Offering (ICO) or Token Sale, is a crowdfunding method used by cryptocurrency projects to raise funds by selling their native tokens to investors. It involves issuing and distributing tokens to contributors in exchange for other cryptocurrencies or fiat currencies.
L
51% Attack: A 51% attack, also known as a majority attack or majority hash power attack, occurs when a single entity or group gains control over more than 50% of the total mining power or computational resources in a blockchain network. This control enables them to manipulate transactions, reverse transactions, or carry out double-spending attacks, undermining the security and integrity of the blockchain.
M
Unknown: Unknown refers to situations where the exact cause or source of a hack or security breach cannot be definitively identified or attributed. It could indicate that the investigation is ongoing, the attack was highly sophisticated, there is a lack of sufficient evidence to pinpoint the responsible party, or that the are conflicting reports on such incident.
N
Other
Was the private key lost? (i.e. assets were "burned")
*
Was the private key lost? (i.e. assets were "burned")
A
Yes
B
No
C
Unknown
Wallet Type
*
Wallet Type
A
Hot Wallet
B
Cold Wallet
C
Both
D
Unknown
What assets were lost? How many? Were any recovered? e.g.:
BTC, 2.4, 0.0
ETH, 5.0, 1.7
*
What relevant sources can you share? New articles (urls), transaction or wallet ID, or any other facts of loss that is relevant to the event will be helpful to us.
*
Submit