On January 2025, SorStaking suffered a other — the first of 188 documented other incidents in our archive where the loss figure was not publicly disclosed but the exploit pattern is documented below.
Attack Mechanics: How the SorStaking Other Played Out
Exploit Class Applied to SorStaking
The SorStaking incident on January 4, 2025 is classified as a Other. A specific exploit class outside the most common buckets. In the full archive, SorStaking is 1 of 188 documented other incidents.
SorStaking in Context
The SorStaking incident joins a class whose largest loss to date is MIMSpell (2024) at $65M.
Prior Other Before SorStaking
The nearest other incident before SorStaking was LAURAToken, 3 days earlier on January 1, 2025. The same exploit class surfaced again within the other attack surface.
SorStaking Vulnerability Signature
The primary source categorises the SorStaking exploit specifically as “Incorrect reward calculation”. This narrower label is entity-specific: it reflects how the SorStaking contract failed, rather than the broad other pattern alone.
Impact & Recovery for SorStaking
SorStaking Loss Figure
The loss figure for SorStaking is not publicly disclosed. The primary source reports the exploit in non-USD terms, so no USD estimate is published here. For reference, the average loss across 188 other incidents in our archive is $2.03M.
Timeline Since the SorStaking Incident
The SorStaking exploit occurred 1.3 years ago (465 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.
Primary Reference for SorStaking
Public post-mortem / on-chain analysis for the SorStaking incident: view source.
FAQ
How much did SorStaking lose?
The SorStaking loss figure is not publicly disclosed. The primary source reports the exploit in non-USD token terms, so no USD estimate is published here.
When did the SorStaking hack happen?
The SorStaking exploit was recorded on January 4, 2025 — 465 days ago.
What type of exploit hit SorStaking?
The SorStaking incident is classified as a Other. A specific exploit class outside the most common buckets.
How common is the Other pattern seen at SorStaking?
Our archive contains 188 documented other incidents. The SorStaking incident is one of them.
How does SorStaking compare to the largest Other attack?
The largest other incident in our archive is MIMSpell (2024) at $65M. The SorStaking loss was not publicly disclosed.
What are cryptocurrencies secured by?
Cryptocurrencies are secured by cryptographic decentralized technology.
What future directions does the study suggest for blockchain in gaming?
Future directions include further research into overcoming blockchain implementation challenges and exploring new applications in gaming.