💙 Gate Square #Gate Blue Challenge# 💙
Show your limitless creativity with Gate Blue!
📅 Event Period
August 11 – 20, 2025
🎯 How to Participate
1. Post your original creation (image / video / hand-drawn art / digital work, etc.) on Gate Square, incorporating Gate’s brand blue or the Gate logo.
2. Include the hashtag #Gate Blue Challenge# in your post title or content.
3. Add a short blessing or message for Gate in your content (e.g., “Wishing Gate Exchange continued success — may the blue shine forever!”).
4. Submissions must be original and comply with community guidelines. Plagiarism or re
Bit Jungle: Blockchain Security Analysis Report for the First Half of 2023
Preface
With the continuous deepening of the digitalization process, blockchain technology has become an important driving force in many fields. It not only brings disruptive changes to traditional industries such as finance, medical care, and logistics, but also brings more openness to participants. and transparent experience. However, with the widespread application of blockchain technology, the security issues associated with it have become increasingly severe. In recent years, blockchain security incidents have occurred frequently, which not only caused huge losses to individuals and enterprises, but also brought challenges to the development of blockchain technology.
This report sorts out and analyzes the blockchain security incidents in the first half of 2023, aiming to explore the hidden dangers of blockchain security, analyze the causes of blockchain security incidents, and propose corresponding solutions and suggestions. Through this report, we hope to draw the attention of all parties to blockchain security issues, jointly promote the safe development of blockchain technology, and lay a solid foundation for the future of the digital world.
Overview of economic losses of security incidents
In the first half of 2023, a total of 192 major attacks occurred, with a total loss of approximately US$920 million.
Euler Finance flash loan attack lost $197 million
Blockchain for dog nose wrinkles scam project causes $127 million in losses
BonqDAO & AllianceBlock manipulated prices and caused losses of 120 million US dollars
Atomic Wallet stolen and lost $100 million
Analysis overview of attack methods
According to the analysis of attack methods used in security incidents, the most frequent attack methods are Rug Pull and Contract Vulnerabilities, both with 32 attacks. This was followed by flash loan attacks, which occurred 20 times, accounting for 14.93% of all incidents.
Among the attack methods with the highest number of occurrences, the flash loan lost the most amount, causing a total loss of 250 million US dollars. It was followed by the blockchain scam, which only occurred seven times and caused losses of $230 million.
Although the total number of contract vulnerabilities and Rug Pull is relatively large, accounting for 47.76% of all attack methods, the losses caused by them are far less than the former two, with only a loss of 66.49 million US dollars. The high incidence of these attacks and the huge amount of losses once again highlight the risks in the cryptocurrency market. Although blockchain technology has great potential and application prospects, it still faces security risks and technical challenges.
Rug Pull incidents occur frequently, of which 75% of the project runaway amount is less than 10 million US dollars, and 28% of the project runaway amount is less than 1 million US$. Such projects usually lack official website, Twitter, Telegram, Github and other information, there is no Roadmap or white paper, and the information of team members is suspicious. The period from the project launch to the final run does not exceed three months.
The losses caused by such security incidents cannot be ignored. It is necessary to strengthen the investigation of the project background, increase the awareness of prevention of unfamiliar information, and improve the prevention ability through early prevention to avoid losses.
An overview of the types of security events attacked
1 Chain Application
On-chain Application, also known as Decentralized Application (DApp), is an application built on blockchain or distributed ledger technology. Use the features and functions of the blockchain for data storage, transaction processing, and smart contract execution.
suggestion:
2 Exchange
Exchange (Exchange) refers to a platform or institution that provides digital asset trading and trading services. It allows users to exchange one digital asset (such as Bitcoin, Ethereum, etc.) for another, or to buy or sell digital assets with fiat currencies (such as USD, EUR, etc.).
suggestion:
*Users beware of phishing and malicious links: Avoid clicking on untrusted links, especially those received via email or social media.
3 Public Chain/Side Chain
Public Blockchain, referred to as the public chain, refers to a consensus blockchain that anyone in the world can access and read at any time, and anyone can send transactions and obtain effective confirmation. A sidechain is a blockchain parallel to the main chain, which can be understood as an extension protocol of the blockchain. To meet specific business needs, such as cross-chain asset exchange, private chain expansion, and industry-specific blockchain solutions.
suggestion:
4 Cross-chain bridge
Cross-Chain Bridge is a technical solution that allows the transfer of digital assets between different blockchain networks. A cross-chain bridge typically locks or burns tokens in a smart contract on the originating chain, and unlocks or mints tokens through another smart contract on the target chain. Cross-chain communication essentially requires a trade-off in three dimensions: security, trust, and flexibility. Due to the existence of these complex factors, cross-chain bridges have become the main target of attack in the Web3 field.
suggestion:
5 Wallets
A blockchain wallet is an important part of the blockchain, a digital currency storage and management tool that allows users to securely store, receive and send various cryptocurrencies such as Bitcoin, Ethereum and other tokens. Wallet security has always been a hot topic in the blockchain industry. Once the wallet is attacked, the attacker can easily steal sensitive information such as the user's private key and mnemonic, and then master the user's digital assets. The value of these digital assets can be very high, and if stolen, the loss will be very heavy. Therefore, in order to maximize the security of users' digital assets, we recommend that users take some security measures.
suggestion:
Analysis and summary of blockchain security incidents in the first half of 2023
Through the sorting out of blockchain security incidents in the first half of 2023, it was found that the application on the chain was the type of project with the highest attack frequency and the largest amount of loss in half a year. A total of 157 security incidents occurred in the on-chain application field, 32 of which were attacks based on contract vulnerabilities.
In the face of frequent security incidents, developers should further follow security coding, audit contract codes, and use mature security libraries to protect user rights; and users who use smart contracts should also choose contracts carefully, and carefully check their contracts before use. For code and security, choose a professional security company for auditing. When a security incident occurs, users can do very little. Only by continuously improving their own security awareness, discovering vulnerabilities in advance, solving vulnerabilities, and taking precautions can they avoid being attacked as much as possible.
The information provided in this report is for reference and research only. The information comes from public sources. The author has tried his best to verify the accuracy and completeness, but cannot guarantee its accuracy and completeness, and does not assume any responsibility for using or relying on the information. liability for loss or damage. This report should not be considered a recommendation or recommendation for any particular blockchain project or cryptocurrency investment, and readers should conduct their own research and decision-making. The content of this report is not a substitute for the judgment and decision-making of the reader, nor can it guarantee the persistence or realization of the situation described.