The first attack transaction attempt was recorded on September 26th at 07:55:45 AM UTC.

21 Nov 2023, 23:08
The first attack transaction attempt was recorded on September 26th at 07:55:45 AM UTC. The first successful attack occurred at 07:56:42 AM UTC stealing 0.1 BNB a minute after the first attempt

Same news in other sources

5
Forta
FortaFORT #469
Twitter
21 Nov 2023, 23:08
Dice9 would have not received any alerts prior to the incident, precision from the perspective of the Dice9 team is 100%. While the protocol doesn't have a pause functionality, it does have a 'setMaxProfit' function, could have been used as a proxy function for incident response
Dice9 would have not received any alerts prior to the incident, precision from the perspective of the Dice9 team is 100%.
Dice9 would have not received any alerts prior to the incident, precision from the perspective of the Dice9 team is 100%. While the protocol doesn't have a pause functionality, it does have a 'setMaxProfit' function, could have been used as a proxy function for incident response
Forta
FortaFORT #469
Twitter
21 Nov 2023, 23:08
With the launch of Attack Detector 2.0 and @OpenZeppelin Defender 2.0, incident response is ready, reliable, and prepped for deployment 🛡️ More on incident response soon 👀
With the launch of Attack Detector 2. 0 and @OpenZeppelin Defender 2.
With the launch of Attack Detector 2.0 and @OpenZeppelin Defender 2.0, incident response is ready, reliable, and prepped for deployment 🛡️ More on incident response soon 👀
Forta
FortaFORT #469
Twitter
21 Nov 2023, 23:08
This is where things get interesting 🤔 Forta’s Attack Detector fired at 07:57:02 GMT just after the first successful exploit but the BEFORE subsequent exploits that resulted in the loss of $25K. Inside the Forta alert, Dice’s address was identified
This is where things get interesting.
This is where things get interesting 🤔 Forta’s Attack Detector fired at 07:57:02 GMT just after the first successful exploit but the BEFORE subsequent exploits that resulted in the loss of $25K. Inside the Forta alert, Dice’s address was identified
Forta
FortaFORT #469
Twitter
21 Nov 2023, 23:08
So, if Dice9 was subscribed to the Attack Detector and automatically paused the protocol upon receiving the alert, the protocol would have only lost 0.1 BNB (around $22) instead of the 25K in BNB they did loose AND mitigated any other potential losses
So, if Dice9 was subscribed to the Attack Detector and automatically paused the protocol upon receiving the alert, the protocol
So, if Dice9 was subscribed to the Attack Detector and automatically paused the protocol upon receiving the alert, the protocol would have only lost 0.1 BNB (around $22) instead of the 25K in BNB they did loose AND mitigated any other potential losses
Forta
FortaFORT #469
Twitter
21 Nov 2023, 23:08
The $25K hack of could have been a lot worse, but thanks to SEAL911, the protocol saved $200k after engaging in active incident response measures 🛡️ But if Forta monitoring was integrated, ALL funds would be safe 👇
The $25K hack of could have been a lot worse, but thanks to SEAL911, the protocol saved $200k after engaging in active incident
The $25K hack of https://t.co/dgnzTE7UtW could have been a lot worse, but thanks to SEAL911, the protocol saved $200k after engaging in active incident response measures 🛡️ But if Forta monitoring was integrated, ALL funds would be safe 👇