shield Reentrancy · $100K loss

Paribus Hack: How $100K Was Lost in a Reentrancy (2023)

On April 2023, Paribus was exploited in a reentrancy, resulting in approximately $100K in losses. That makes the Paribus exploit the 214th largest DeFi incident out of 690 documented in our archive.

Attack Mechanics: How the Paribus Reentrancy Played Out

Exploit Class Applied to Paribus

The Paribus incident on April 11, 2023 is classified as a Reentrancy. A malicious contract re-enters a vulnerable function before state is updated, letting it drain funds multiple times. In the full archive, Paribus is 1 of 51 documented reentrancy incidents.

Paribus in Context

At $100K, the Paribus exploit is a minor (<$1M) event compared to the largest same-class incident in our archive — Curve (2023) at $41M.

Prior Reentrancy Before Paribus

The nearest reentrancy incident before Paribus was Sentiment, 6 days earlier on April 5, 2023 ($1M lost). The same exploit class surfaced again within the reentrancy attack surface.

Impact & Recovery for Paribus

Paribus Loss Figure

The Paribus exploit caused $100,000 in losses — a minor (<$1M) incident and the 84th largest of 214 documented in 2023.

Where Paribus Sits Among Reentrancy Attacks

Ranked by loss size, Paribus is the 24th largest of 51 reentrancy incidents documented. That puts the Paribus loss below the class average of $2.87M.

Timeline Since the Paribus Incident

The Paribus exploit occurred 3 years ago (1,099 days). The contract, its fork-block, and the attack transaction remain on-chain and forensically reproducible.

Primary Reference for Paribus

Public post-mortem / on-chain analysis for the Paribus incident: view source.

FAQ

How much did Paribus lose?

The Paribus exploit in April 2023 resulted in $100,000 in losses — the 84th largest of 214 DeFi incidents that year.

When did the Paribus hack happen?

The Paribus exploit was recorded on April 11, 2023 — 1,099 days ago.

What type of exploit hit Paribus?

The Paribus incident is classified as a Reentrancy. A malicious contract re-enters a vulnerable function before state is updated, letting it drain funds multiple times.

How common is the Reentrancy pattern seen at Paribus?

Our archive contains 51 documented reentrancy incidents. The Paribus incident is one of them.

How does Paribus compare to the largest Reentrancy attack?

The largest reentrancy incident in our archive is Curve (2023) at $41M. The Paribus loss is $100K.

What does the experimental evaluation of the BBDSPP scheme reveal about its performance?

The evaluation shows the scheme is efficient in terms of computational and storage resources, making it suitable for IIoT applications.

How does the study contribute to the understanding of cryptocurrency market risks?

By identifying the best-fitting distributions, the study aids in better understanding and modeling the market risks associated with different cryptocurrencies.