<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=ERC1967Proxy_Upgrade_0x03b79c24_Function_Access_Control</id>
	<title>ERC1967Proxy Upgrade 0x03b79c24 Function Access Control - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=ERC1967Proxy_Upgrade_0x03b79c24_Function_Access_Control"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=ERC1967Proxy_Upgrade_0x03b79c24_Function_Access_Control&amp;action=history"/>
	<updated>2026-04-30T07:44:35Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=ERC1967Proxy_Upgrade_0x03b79c24_Function_Access_Control&amp;diff=6840&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/erc1967proxyupgrade0x03b79c24functionaccesscontrol.php}} {{Unattributed Sources}}  Ethereum Foundation Logo/Homepage#0x54cd_ERC1967Proxy is a nickname assigned by TenArmor to a smart contract launched on the Ethereum blockchain on January 12, 2025. The contract suffered a significant vulnerability due to missing access controls, particularly in the 0...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=ERC1967Proxy_Upgrade_0x03b79c24_Function_Access_Control&amp;diff=6840&amp;oldid=prev"/>
		<updated>2025-07-28T22:48:35Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/erc1967proxyupgrade0x03b79c24functionaccesscontrol.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Ethereumfoundation.jpg&quot; title=&quot;File:Ethereumfoundation.jpg&quot;&gt;thumb|Ethereum Foundation Logo/Homepage&lt;/a&gt;#0x54cd_ERC1967Proxy is a nickname assigned by TenArmor to a smart contract launched on the Ethereum blockchain on January 12, 2025. The contract suffered a significant vulnerability due to missing access controls, particularly in the 0...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/erc1967proxyupgrade0x03b79c24functionaccesscontrol.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Ethereumfoundation.jpg|thumb|Ethereum Foundation Logo/Homepage]]#0x54cd_ERC1967Proxy is a nickname assigned by TenArmor to a smart contract launched on the Ethereum blockchain on January 12, 2025. The contract suffered a significant vulnerability due to missing access controls, particularly in the 0x03b79c24() function after an upgrade, which allowed an attacker to drain approximately $285.7K. TenArmor detected and reported the incident, providing the attack transaction hash. Unfortunately there does not appear to be any public information about the project's operators, any recovery efforts, or ongoing investigations.&amp;lt;ref name=&amp;quot;tenarmoralerttweet-20543&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscantransaction-20544&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;exploiteraddressetherscan-20545&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscansmartcontract-20546&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscancreation-20547&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About #0x54cd_ERC1967Proxy ==&lt;br /&gt;
#0x54cd_ERC1967Proxy is the nickname given to a smart contract on the Ethereum blockchain by TenArmor. The smart contract was originally launched on January 12th, 2025.&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
Unfortunately, the #0x54cd_ERC1967Proxy smart contract appears to have lacked proper access controls.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
Due to a lack of access controls, it was possible for $285.7k to be drained from an ethereum smart contract.&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - ERC1967Proxy Upgrade 0x03b79c24 Function Access Control&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|July 5th, 2025 3:03:35 PM MDT&lt;br /&gt;
|Suspicious Transaction Occurs&lt;br /&gt;
|The suspicious transaction on the Ethereum blockchain.&lt;br /&gt;
|-&lt;br /&gt;
|July 5th, 2025 8:44:00 PM MDT&lt;br /&gt;
|TenArmorAlert Tweets Report&lt;br /&gt;
|TenArmorAlert posts a real-time warning about suspicious on-chain activity, highlighting attacks on smart contracts such as unauthorized fund drains. In this instance, they report a $285.7K loss from an Ethereum contract (#0x54cd_ERC1967Proxy) due to missing access control on the 0x03b79c24() function after a contract upgrade. The alert includes details like the affected contract, the nature of the vulnerability, and a link to the attack transaction.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;It appears that the 0x03b79c24() function lacks proper access control after an contract upgrade, resulting in the funds in the contract being drained&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Attack Transaction: 0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
TenArmor reported the loss amount as $285.7k.&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $286,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
The attack was reported by TenArmor. There is no indication of which entity is behind the smart contract.&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
A basic analysis was performed by TenArmor.&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
There is no indication of who is behind the project or any efforts they have taken to recover the funds.&lt;br /&gt;
&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
It is unclear if anything further is being investigated or responded to.&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;tenarmoralerttweet-20543&amp;quot;&amp;gt;[https://twitter.com/TenArmorAlert/status/1941689712621576493 TenArmorAlert - &amp;quot;Our system has detected a suspicious attack involving a contract #0x54cd_ERC1967Proxy on #ETH, resulting in an approximately loss of $285.7K.&amp;quot; - Twitter/X] (Accessed Jul 9, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscantransaction-20544&amp;quot;&amp;gt;[https://etherscan.io/tx/0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2 Suspicious Transaction - Etherscan] (Accessed Jul 9, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;exploiteraddressetherscan-20545&amp;quot;&amp;gt;[https://etherscan.io/address/0xb750e3165de458eae09904cc7fad099632860b0f Exploiter Ethereum Wallet - Etherscan] (Accessed Jul 9, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscansmartcontract-20546&amp;quot;&amp;gt;[https://etherscan.io/address/0x54cd23460df45559fd5feeaada7ba25f89c13525 The ERC1967Proxy Smart Contract - Etherscan] (Accessed Jul 9, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscancreation-20547&amp;quot;&amp;gt;[https://etherscan.io/tx/0x31ba50b2a0390e95ec8ff1ece32bb30438a7cb178acaabe843c23ca7f6442aaf The ERC1967Proxy Smart Contract Creation - Etherscan] (Accessed Jul 9, 2025)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>