On October 2024, Erc20transfer was exploited in a access control, resulting in approximately $14.8K in losses. That makes the Erc20transfer exploit the 361st largest DeFi incident out of 690 documented in our archive.
Attack Mechanics: How the Erc20transfer Access Control Played Out
Exploit Class Applied to Erc20transfer
The Erc20transfer incident on October 22, 2024 is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it. In the full archive, Erc20transfer is 1 of 77 documented access control incidents.
Erc20transfer in Context
At $14.8K, the Erc20transfer exploit is a minor (<$1M) event compared to the largest same-class incident in our archive — Corkprotocol (2025) at $12M.
Prior Access Control Before Erc20transfer
The nearest access control incident before Erc20transfer was Shezmu, 32 days earlier on September 20, 2024 ($4.9M lost). The same exploit class surfaced again within the access control attack surface.
Impact & Recovery for Erc20transfer
Erc20transfer Loss Figure
The Erc20transfer exploit caused $14,773 in losses — a minor (<$1M) incident and the 102nd largest of 188 documented in 2024.
Where Erc20transfer Sits Among Access Control Attacks
Ranked by loss size, Erc20transfer is the 43rd largest of 77 access control incidents documented. That puts the Erc20transfer loss below the class average of $636K.
Timeline Since the Erc20transfer Incident
The Erc20transfer exploit occurred 1.5 years ago (539 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for Erc20transfer
Public post-mortem / on-chain analysis for the Erc20transfer incident: view source.
FAQ
How much did Erc20transfer lose?
The Erc20transfer exploit in October 2024 resulted in $14,773 in losses — the 102nd largest of 188 DeFi incidents that year.
When did the Erc20transfer hack happen?
The Erc20transfer exploit was recorded on October 22, 2024 — 539 days ago.
What type of exploit hit Erc20transfer?
The Erc20transfer incident is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it.
How common is the Access Control pattern seen at Erc20transfer?
Our archive contains 77 documented access control incidents. The Erc20transfer incident is one of them.
How does Erc20transfer compare to the largest Access Control attack?
The largest access control incident in our archive is Corkprotocol (2025) at $12M. The Erc20transfer loss is $14.8K.
What significant change did Ethereum undergo with the introduction of Ethereum 2.0?
Ethereum transitioned from a Proof-of-Work (PoW) to a Proof-of-Stake (PoS) consensus mechanism.
What is the purpose of using a pre-adaptor signature scheme?
To combine the benefits of multi-signature and adaptor signature schemes for secret channel transmission.