Skip to main content

All Questions

Tagged with
Filter by
Sorted by
Tagged with
4 votes
1 answer
147 views

Did the spamming counter-attack on The DAO attack work to slow down the attacks?

This question was asked in the comment section of What does TheDAO counter-attack by spamming actually do? (suggested by Stephan Tual). Background links: The attacks used a recursive call ...
BokkyPooBah's user avatar
  • 40.4k
9 votes
1 answer
931 views

How many ethers have been drained through the recursive call attacks on The DAO?

The recursive call attacks on The DAO have now stopped as there are no more ethers in The DAO account. What are the amounts and percentages that can be attributed to the hostile and friendly attacks, ...
BokkyPooBah's user avatar
  • 40.4k
8 votes
1 answer
1k views

How many The DAO recursive call vulnerability attacks have occurred to date?

The first identified The DAO recursive call vulnerability attack occurred on 17 June 2016, with the accounts identified in Which accounts are involved in mounting the recursive call vulnerability ...
BokkyPooBah's user avatar
  • 40.4k
6 votes
2 answers
899 views

What was the second vulnerability used in The DAO attack on 17 June 2016?

From The big theDAO heist FAQ by koeppelmann: How did the attack worked exactly? The attacker managed to combine 2 exploits. The first exploit was to call the split DAO function recursively. That ...
BokkyPooBah's user avatar
  • 40.4k
3 votes
1 answer
533 views

How was the recursive call vulnerability attack conducted via proposal #59 when there were no Yes votes?

From Which split proposal was used to mount the recursive call vulnerability attack on The DAO?, proposal #59 is very likely the vector uses by the attacker to hack 3,641,694.241898506 Ether ($59,578,...
BokkyPooBah's user avatar
  • 40.4k
3 votes
1 answer
495 views

Which accounts are involved in mounting the recursive call vulnerability attacks on The DAO?

The first transaction 0x0ec3f2488a93839524add10ea229e773f6bc891b4eb4794c3337d4495263790b was initiated from account 0x969837498944ae1dc0dcac2d0c65634c88729b2d to the contract at ...
3 votes
1 answer
401 views

Which split proposal was used to mount the recursive call vulnerability attack on The DAO?

I'm assuming that a split proposal was used to mount the recursive call vulnerability attack on The DAO. Which of the splits below was used to mount this attack? Here are the current list of splits: ...
7 votes
2 answers
2k views

How was the recursion created that lead to theDAO hack?

I understand that if theDAO contract has a withdrawal function that sends money to contract X - contract X can be malicious and use the fallback function to call the withdrawal function again. However ...
mKoeppelmann's user avatar
  • 7,636
5 votes
4 answers
594 views

In simple terms, how did the DAO get hacked and funds removed from it?

How did the DAO get hacked? Can someone explain in simple terms?
Patoshi パトシ's user avatar
4 votes
1 answer
248 views

Does the recent attack to "the DAO" means end of it? [duplicate]

However implementing the DAO and its smart contracts are incredibly exciting experiments, the recent attack to the DAO clearly suggested that the code is not safe and may or may not have more ...
Kobayashi's user avatar
  • 1,255
12 votes
2 answers
217 views

Is it possible to attack "the DAO" attackers new splitted DAO?

Since the splitted DAO (dark DAO) has the exact same vulnerability in its code, is it possible to execute the same attack to the attackers DAO?
Kobayashi's user avatar
  • 1,255
7 votes
2 answers
2k views

How did they stop "the DAO" attack on 17 June 2016? [duplicate]

Is it possible to prevent some transactions from happening? Obviously not, since it will ruin the whole purpose of having a decentralized system. So my question is how could they stop the attack? In ...
Kobayashi's user avatar
  • 1,255
22 votes
3 answers
4k views

TheDAO hack FAQ: How did the attack happen on 17 June 2016?

Can anyone explain that how the DAO attack happened? Vitalik Buterin explained here that it was performed by splitting a DAO from the main DAO but calling the split function recursively. We know that ...
5 votes
2 answers
416 views

Can the stalker attack in TheDAO be stopped?

https://github.com/slockit/dao/wiki/Why-The-Stalker-attack-is-a-non-issue#a-way-to-guarantee-you-get-your-eth says: Assuming the attacker also voted yes in all of the new Curator Proposals, in ...
eth's user avatar
  • 86.5k