shield Other

SorStaking Exploit: Other Incident Explained (2025)

On January 2025, SorStaking suffered a other — the first of 188 documented other incidents in our archive where the loss figure was not publicly disclosed but the exploit pattern is documented below.

Attack Mechanics: How the SorStaking Other Played Out

Exploit Class Applied to SorStaking

The SorStaking incident on January 4, 2025 is classified as a Other. A specific exploit class outside the most common buckets. In the full archive, SorStaking is 1 of 188 documented other incidents.

SorStaking in Context

The SorStaking incident joins a class whose largest loss to date is MIMSpell (2024) at $65M.

Prior Other Before SorStaking

The nearest other incident before SorStaking was LAURAToken, 3 days earlier on January 1, 2025. The same exploit class surfaced again within the other attack surface.

SorStaking Vulnerability Signature

The primary source categorises the SorStaking exploit specifically as “Incorrect reward calculation”. This narrower label is entity-specific: it reflects how the SorStaking contract failed, rather than the broad other pattern alone.

Impact & Recovery for SorStaking

SorStaking Loss Figure

The loss figure for SorStaking is not publicly disclosed. The primary source reports the exploit in non-USD terms, so no USD estimate is published here. For reference, the average loss across 188 other incidents in our archive is $2.03M.

Timeline Since the SorStaking Incident

The SorStaking exploit occurred 1.3 years ago (465 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.

Primary Reference for SorStaking

Public post-mortem / on-chain analysis for the SorStaking incident: view source.

FAQ

How much did SorStaking lose?

The SorStaking loss figure is not publicly disclosed. The primary source reports the exploit in non-USD token terms, so no USD estimate is published here.

When did the SorStaking hack happen?

The SorStaking exploit was recorded on January 4, 2025 — 465 days ago.

What type of exploit hit SorStaking?

The SorStaking incident is classified as a Other. A specific exploit class outside the most common buckets.

How common is the Other pattern seen at SorStaking?

Our archive contains 188 documented other incidents. The SorStaking incident is one of them.

How does SorStaking compare to the largest Other attack?

The largest other incident in our archive is MIMSpell (2024) at $65M. The SorStaking loss was not publicly disclosed.

What are cryptocurrencies secured by?

Cryptocurrencies are secured by cryptographic decentralized technology.

What future directions does the study suggest for blockchain in gaming?

Future directions include further research into overcoming blockchain implementation challenges and exploring new applications in gaming.