Хакерская атака на Flow: токен обрушивается на 40% после утери $3,9 млн Headline: Hacker Attack on Flow: Token Plummets 40% After $3.9 Million Loss

On December 27, the price of the L1 blockchain token Flow (FLOW) plummeted by 40% — from $0.17 to $0.1. This decline occurred amid an attack resulting in damages of $3.9 million.

At the time of this report, the asset had bounced back to $0.12.

User Wazz was the first to bring attention to the incident. He reported that the attacker generated 5 million FLOW and sold them, draining the liquidity pools. It is suspected that the perpetrator compromised private keys.

Later, the Flow team confirmed the attack. Initially, the developers announced they were investigating a «potential security incident,» but subsequently corroborated Wazz’s suspicions.

«The attacker exploited a vulnerability in the transaction execution layer of Flow, extracting assets worth approximately $3.9 million from the network before validators coordinated to halt the operation. Importantly, the attack did not affect user funds,» stated their announcement.

The hacker primarily withdrew assets through Celer, Debridge, Relay, and Stargate bridges, while laundering coins through THORChain and Chainflip mixers. Their addresses were identified and flagged on the blockchain.

The developers have already released an update to patch the vulnerability. However, the network is currently operating in a limited mode. The blockchain will later be restarted, reverting to its state prior to the incident.

Flow is a layer-one network designed for the issuance of NFTs and the deployment of gaming applications. The project allows for the creation of dapps, digital collectibles, and metaverses.

The attack on the protocol and the subsequent drop in the token price prompted several exchanges, including South Korean platforms Upbit and Bithumb, to temporarily suspend deposits for FLOW.

It is worth noting that in December, the prediction platform Polymarket confirmed that several users had been affected due to a hack linked to a vulnerability in a third-party provider.