On May 2024, MixedSwapRouter suffered a arbitrary call — the first of 21 documented arbitrary call incidents in our archive where the loss figure was not publicly disclosed but the exploit pattern is documented below.
Attack Mechanics: How the MixedSwapRouter Arbitrary Call Played Out
Exploit Class Applied to MixedSwapRouter
The MixedSwapRouter incident on May 31, 2024 is classified as a Arbitrary Call. The contract executes an external call with attacker-controlled target or calldata, letting them impersonate the contract. In the full archive, MixedSwapRouter is 1 of 21 documented arbitrary call incidents.
MixedSwapRouter in Context
The MixedSwapRouter incident joins a class whose largest loss to date is Seneca (2024) at $6M.
Prior Arbitrary Call Before MixedSwapRouter
The nearest arbitrary call incident before MixedSwapRouter was Rico, 41 days earlier on April 20, 2024 ($36K lost). The same exploit class surfaced again within the arbitrary call attack surface.
Impact & Recovery for MixedSwapRouter
MixedSwapRouter Loss Figure
The loss figure for MixedSwapRouter is not publicly disclosed. The primary source reports the exploit in non-USD terms, so no USD estimate is published here. For reference, the average loss across 21 arbitrary call incidents in our archive is $783.5K.
Timeline Since the MixedSwapRouter Incident
The MixedSwapRouter exploit occurred 1.9 years ago (683 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for MixedSwapRouter
Public post-mortem / on-chain analysis for the MixedSwapRouter incident: view source.
FAQ
How much did MixedSwapRouter lose?
The MixedSwapRouter loss figure is not publicly disclosed. The primary source reports the exploit in non-USD token terms, so no USD estimate is published here.
When did the MixedSwapRouter hack happen?
The MixedSwapRouter exploit was recorded on May 31, 2024 — 683 days ago.
What type of exploit hit MixedSwapRouter?
The MixedSwapRouter incident is classified as a Arbitrary Call. The contract executes an external call with attacker-controlled target or calldata, letting them impersonate the contract.
How common is the Arbitrary Call pattern seen at MixedSwapRouter?
Our archive contains 21 documented arbitrary call incidents. The MixedSwapRouter incident is one of them.
How does MixedSwapRouter compare to the largest Arbitrary Call attack?
The largest arbitrary call incident in our archive is Seneca (2024) at $6M. The MixedSwapRouter loss was not publicly disclosed.
Which model performed best on the training set according to the study?
AdaBoost model.
What database provided the sample for this study?
China Stock Market and Accounting Research (CSMAR) database.