All Questions
14 questions
4
votes
1
answer
147
views
Did the spamming counter-attack on The DAO attack work to slow down the attacks?
This question was asked in the comment section of What does TheDAO counter-attack by spamming actually do? (suggested by Stephan Tual).
Background links:
The attacks used a recursive call ...
9
votes
1
answer
931
views
How many ethers have been drained through the recursive call attacks on The DAO?
The recursive call attacks on The DAO have now stopped as there are no more ethers in The DAO account.
What are the amounts and percentages that can be attributed to the hostile and friendly attacks, ...
8
votes
1
answer
1k
views
How many The DAO recursive call vulnerability attacks have occurred to date?
The first identified The DAO recursive call vulnerability attack occurred on 17 June 2016, with the accounts identified in Which accounts are involved in mounting the recursive call vulnerability ...
6
votes
2
answers
899
views
What was the second vulnerability used in The DAO attack on 17 June 2016?
From The big theDAO heist FAQ by koeppelmann:
How did the attack worked exactly? The attacker managed to combine 2 exploits. The first exploit was to call the split DAO function recursively. That ...
3
votes
1
answer
533
views
How was the recursive call vulnerability attack conducted via proposal #59 when there were no Yes votes?
From Which split proposal was used to mount the recursive call vulnerability attack on The DAO?, proposal #59 is very likely the vector uses by the attacker to hack 3,641,694.241898506 Ether ($59,578,...
3
votes
1
answer
495
views
Which accounts are involved in mounting the recursive call vulnerability attacks on The DAO?
The first transaction 0x0ec3f2488a93839524add10ea229e773f6bc891b4eb4794c3337d4495263790b was initiated from account 0x969837498944ae1dc0dcac2d0c65634c88729b2d to the contract at ...
3
votes
1
answer
401
views
Which split proposal was used to mount the recursive call vulnerability attack on The DAO?
I'm assuming that a split proposal was used to mount the recursive call vulnerability attack on The DAO.
Which of the splits below was used to mount this attack?
Here are the current list of splits:
...
7
votes
2
answers
2k
views
How was the recursion created that lead to theDAO hack?
I understand that if theDAO contract has a withdrawal function that sends money to contract X - contract X can be malicious and use the fallback function to call the withdrawal function again. However ...
5
votes
4
answers
594
views
In simple terms, how did the DAO get hacked and funds removed from it?
How did the DAO get hacked? Can someone explain in simple terms?
4
votes
1
answer
248
views
Does the recent attack to "the DAO" means end of it? [duplicate]
However implementing the DAO and its smart contracts are incredibly exciting experiments, the recent attack to the DAO clearly suggested that the code is not safe and may or may not have more ...
12
votes
2
answers
217
views
Is it possible to attack "the DAO" attackers new splitted DAO?
Since the splitted DAO (dark DAO) has the exact same vulnerability in its code, is it possible to execute the same attack to the attackers DAO?
7
votes
2
answers
2k
views
How did they stop "the DAO" attack on 17 June 2016? [duplicate]
Is it possible to prevent some transactions from happening? Obviously not, since it will ruin the whole purpose of having a decentralized system.
So my question is how could they stop the attack? In ...
22
votes
3
answers
4k
views
TheDAO hack FAQ: How did the attack happen on 17 June 2016?
Can anyone explain that how the DAO attack happened? Vitalik Buterin explained here that it was performed by splitting a DAO from the main DAO but calling the split function recursively.
We know that ...
5
votes
2
answers
416
views
Can the stalker attack in TheDAO be stopped?
https://github.com/slockit/dao/wiki/Why-The-Stalker-attack-is-a-non-issue#a-way-to-guarantee-you-get-your-eth says:
Assuming the attacker also voted yes in all of the new Curator
Proposals, in ...