On October 2022, MulticallWithoutCheck suffered a arbitrary call — the first of 21 documented arbitrary call incidents in our archive where the loss figure was not publicly disclosed but the exploit pattern is documented below.
Attack Mechanics: How the MulticallWithoutCheck Arbitrary Call Played Out
Exploit Class Applied to MulticallWithoutCheck
The MulticallWithoutCheck incident on October 24, 2022 is classified as a Arbitrary Call. The contract executes an external call with attacker-controlled target or calldata, letting them impersonate the contract. In the full archive, MulticallWithoutCheck is 1 of 21 documented arbitrary call incidents.
MulticallWithoutCheck in Context
The MulticallWithoutCheck incident joins a class whose largest loss to date is Seneca (2024) at $6M.
Prior Arbitrary Call Before MulticallWithoutCheck
The nearest arbitrary call incident before MulticallWithoutCheck was Rabby Wallet SwapRouter, 13 days earlier on October 11, 2022. The same exploit class surfaced again within the arbitrary call attack surface.
MulticallWithoutCheck Vulnerability Signature
The primary source categorises the MulticallWithoutCheck exploit specifically as “Arbitrary External Call Vulnerability”. This narrower label is entity-specific: it reflects how the MulticallWithoutCheck contract failed, rather than the broad arbitrary call pattern alone.
Impact & Recovery for MulticallWithoutCheck
MulticallWithoutCheck Loss Figure
The loss figure for MulticallWithoutCheck is not publicly disclosed. The primary source reports the exploit in non-USD terms, so no USD estimate is published here. For reference, the average loss across 21 arbitrary call incidents in our archive is $783.5K.
Timeline Since the MulticallWithoutCheck Incident
The MulticallWithoutCheck exploit occurred 3.5 years ago (1,268 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
FAQ
How much did MulticallWithoutCheck lose?
The MulticallWithoutCheck loss figure is not publicly disclosed. The primary source reports the exploit in non-USD token terms, so no USD estimate is published here.
When did the MulticallWithoutCheck hack happen?
The MulticallWithoutCheck exploit was recorded on October 24, 2022 — 1,268 days ago.
What type of exploit hit MulticallWithoutCheck?
The MulticallWithoutCheck incident is classified as a Arbitrary Call. The contract executes an external call with attacker-controlled target or calldata, letting them impersonate the contract.
How common is the Arbitrary Call pattern seen at MulticallWithoutCheck?
Our archive contains 21 documented arbitrary call incidents. The MulticallWithoutCheck incident is one of them.
How does MulticallWithoutCheck compare to the largest Arbitrary Call attack?
The largest arbitrary call incident in our archive is Seneca (2024) at $6M. The MulticallWithoutCheck loss was not publicly disclosed.
What is the primary function of the proposed secure blockchain-enabled remote healthcare monitoring system?
To securely transmit patient vital signs for home-isolated individuals to a hospital information system using blockchain.
What methodological approach was used to analyze the literature on SHSCs and I4.0?
Systematic literature network analysis, integrating literature review with bibliometric network analyses.