Search results for "ARA"
16:39

Flight invasion alarms sounded in many areas of northern Israel

On October 23rd, Jinshi Data reported that on the evening of the 22nd local time, the Israeli Defense Forces spokesperson stated that there were alerts of an aircraft invasion in the northern areas of Israel, including Upper Galilee, Gulf, Carmel, Wadi Ara and Valley. Currently, the Israeli army is tracking and intercepting the target, and requesting that the public follow the instructions of the Homeland Defense Command. According to reports, the aircraft is an unmanned drone launched by the Hezbollah in Lebanon. The Israeli army has been searching for it for 40 minutes and the search is still ongoing. There are currently no reports of casualties.
10:35
Jinse Finance News, according to CertiK’s official Twitter announcement, ARA attackers have deposited 987 BNB into Tornado Cash. It was previously reported that ARA suffered a flash loan attack, and the attacker obtained 124,000 BUSD.
11:13
Jinse Finance News, according to CertiK’s official Twitter announcement, the EOA address (0x623) related to the Ara attacker has transferred 294.9 BNB to Tornado Cash.
05:57
On June 19th, Beosin _ tweeted that the root cause of the attack on the Ara project was a loophole in the contract processing permissions. Addresses beginning with 0xB817 approve a large number of ARA and USDT exchange contracts, which do not limit the funds transferred from the caller for exchange.
01:59
According to PANews news on June 19, according to CertiK official Twitter, the Ara project was attacked by flash loans. The attackers are suspected to have made approximately $124,000 in BUSD. Attacker address: 0xF84efA8a9F7E68855CF17EAaC9c2f97A9d131366.
01:57
Odaily Planet Daily News According to CertiK’s official Twitter release, the Ara project was attacked by a flash loan, and the attacker is suspected of making a profit of about 124,000 US dollars in BUSD. Attacker address: 0xF84efA8a9F7E68855CF17EAaC9c2f97A9d131366.
  • 1
  • 1
01:56
Jinse Finance reported that, according to CertiK’s official Twitter announcement, the Ara project was attacked by flash loans. The attackers are suspected to have made approximately $124,000 in BUSD. Attacker address: 0xF84efA8a9F7E68855CF17EAaC9c2f97A9d131366.
Load More
Hot Tags

Hot Topics

More

Crypto Calendar

More
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)