diff --git a/content/attacks/posts/2024-03-05-WooFi.md b/content/attacks/posts/2024-03-05-WooFi.md index 97e482d56..661df464c 100644 --- a/content/attacks/posts/2024-03-05-WooFi.md +++ b/content/attacks/posts/2024-03-05-WooFi.md @@ -2,11 +2,11 @@ date: 2024-03-05 target-entities: WOOFi entity-types: -  - DeFi -  - Exchange + - DeFi + - Exchange attack-types: -  - Smart Contract Exploit -  - Flash Loan + - Smart Contract Exploit + - Flash Loan title: "The WOOFi suffered a flash loan exploit on Arbitrum" loss: 7969434 --- @@ -17,9 +17,9 @@ On March 5th, WOOFi Swaps' sPMM algorithm was exploited on the Arbitrum network. ## Attackers The attacker market as WOOFi Exploiter 1. The hacker used the following addresses to exploit and transfer the funds: - Arbitrum: -    - [0x9961190B258897BCa7a12B8f37F415E689D281C4](https://arbiscan.io/address/0x9961190B258897BCa7a12B8f37F415E689D281C4) - WOOFi Exploiter 1 + - [0x9961190B258897BCa7a12B8f37F415E689D281C4](https://arbiscan.io/address/0x9961190B258897BCa7a12B8f37F415E689D281C4) - WOOFi Exploiter 1 - Funds Holder Address -    - [0xb59d04d9957C9e266dfF5c4173D4d2324Eb029Ad](https://arbiscan.io/address/0xb59d04d9957c9e266dff5c4173d4d2324eb029ad) - WOOFi Exploiter 2 + - [0xb59d04d9957C9e266dfF5c4173D4d2324Eb029Ad](https://arbiscan.io/address/0xb59d04d9957c9e266dff5c4173d4d2324eb029ad) - WOOFi Exploiter 2 - Affected pool - [0xeff23b4be1091b53205e35f3afcd9c7182bf3062](https://arbiscan.io/address/0xeff23b4be1091b53205e35f3afcd9c7182bf3062) - WooPPV2