shield Access Control · $11.7K loss

$11.7K drained from INUMI in an access control (September 2024)

On September 2024, INUMI was exploited in a access control, resulting in approximately $11.7K in losses. That makes the INUMI exploit the 380th largest DeFi incident out of 690 documented in our archive.

Attack Mechanics: How the INUMI Access Control Played Out

Exploit Class Applied to INUMI

The INUMI incident on September 11, 2024 is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it. In the full archive, INUMI is 1 of 77 documented access control incidents.

INUMI in Context

At $11.7K, the INUMI exploit is a minor (<$1M) event compared to the largest same-class incident in our archive — Corkprotocol (2025) at $12M.

Prior Access Control Before INUMI

The nearest access control incident before INUMI was PLN, 6 days earlier on September 5, 2024 ($400K lost). The same exploit class surfaced again within the access control attack surface.

Impact & Recovery for INUMI

INUMI Loss Figure

The INUMI exploit caused $11,700 in losses — a minor (<$1M) incident and the 111th largest of 188 documented in 2024.

Where INUMI Sits Among Access Control Attacks

Ranked by loss size, INUMI is the 47th largest of 77 access control incidents documented. That puts the INUMI loss below the class average of $636K.

Timeline Since the INUMI Incident

The INUMI exploit occurred 1.6 years ago (580 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.

Primary Reference for INUMI

Public post-mortem / on-chain analysis for the INUMI incident: view source.

FAQ

How much did INUMI lose?

The INUMI exploit in September 2024 resulted in $11,700 in losses — the 111th largest of 188 DeFi incidents that year.

When did the INUMI hack happen?

The INUMI exploit was recorded on September 11, 2024 — 580 days ago.

What type of exploit hit INUMI?

The INUMI incident is classified as a Access Control. A privileged function lacks a proper authorisation check, letting an unauthorised caller execute it.

How common is the Access Control pattern seen at INUMI?

Our archive contains 77 documented access control incidents. The INUMI incident is one of them.

How does INUMI compare to the largest Access Control attack?

The largest access control incident in our archive is Corkprotocol (2025) at $12M. The INUMI loss is $11.7K.

What is the ultimate goal of the proposed adversarial attack and defense methods?

To improve the security and robustness of time series classification systems against adversarial threats.

What methods are used for empirical analysis?

The study uses the fixed effect model and the generalized method of moments model.