<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=JokInTheBoxETH_Unstaking_Vulnerability</id>
	<title>JokInTheBoxETH Unstaking Vulnerability - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=JokInTheBoxETH_Unstaking_Vulnerability"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=JokInTheBoxETH_Unstaking_Vulnerability&amp;action=history"/>
	<updated>2026-05-24T09:01:56Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=JokInTheBoxETH_Unstaking_Vulnerability&amp;diff=6058&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/jokintheboxethunstakingvulnerability.php}} {{Unattributed Sources}}  JokInTheBox Logo/HomepageJokInTheBox is a utility to assist with sandwich attacks and copy sniping, with profits going to the JOK token stakers. A vulnerability in the smart contract allowed a user to unstake their assets multiple times, draining the pool of staked assets from other users....&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=JokInTheBoxETH_Unstaking_Vulnerability&amp;diff=6058&amp;oldid=prev"/>
		<updated>2024-09-18T19:41:09Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/jokintheboxethunstakingvulnerability.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Jokinthebox.jpg&quot; title=&quot;File:Jokinthebox.jpg&quot;&gt;thumb|JokInTheBox Logo/Homepage&lt;/a&gt;JokInTheBox is a utility to assist with sandwich attacks and copy sniping, with profits going to the JOK token stakers. A vulnerability in the smart contract allowed a user to unstake their assets multiple times, draining the pool of staked assets from other users....&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/jokintheboxethunstakingvulnerability.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Jokinthebox.jpg|thumb|JokInTheBox Logo/Homepage]]JokInTheBox is a utility to assist with sandwich attacks and copy sniping, with profits going to the JOK token stakers. A vulnerability in the smart contract allowed a user to unstake their assets multiple times, draining the pool of staked assets from other users. This was exploited on June 10th, and the attacker made off with $34k worth of funds. The protocol appears to have moved forward with replacing all lost tokens and it performing a series of buy-backs and token burns to raise the token price.&amp;lt;ref name=&amp;quot;slowmisthackedarchive-14374&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;jokintheboxethtwitter-14390&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;jokinthebox-14391&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;jokintheboxdocs-14392&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;x-14393&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;chainaegisapp-14394&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscan-14395&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;neptunemutual-14015&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About JokInTheBox ==&lt;br /&gt;
&amp;quot;MEV Bot for Everyone Copy Sniping &amp;amp; AI Social Bot. Enjoy private access to sandwich attacks, copy sniping and Unlock Passive Income through Stacking and Taxes! Empower Revenue Generation and Maximize Daily Engagement with Our Advanced AI-Driven Social Algorithm.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;JokInTheBox stands at the forefront of blockchain innovation. Built on the robust Ethereum blockchain, our project is dedicated to revolutionizing the crypto space with cutting-edge technology and a community-centric approach.&amp;quot; &amp;quot;Our MEV Bot is built to be the best in the market. Our developers and mathematicians keep improving it for top performance. It works on many DEXs and pairs, and supports various networks. Best of all, 100% of the profits go to $JOK stakers.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Enhance social engagements with our AI tools! Use our Telegram Bot for better group chats or have fun on Twitter with our Automated Crypto Trading Bot. Each time you use them, 777 JOK Tokens are burned, making our platform more visible and viral! Our platform uses Advanced Crypto Trading Bot Strategies and High Frequency Crypto Trading to give you the best performance.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Stake your $JOK Tokens and earn daily income from our MEV Bot and Sandwich Bot. Profits are distributed daily at 00:00 UTC. Enjoy maximized returns with our Algorithmic Crypto Trading and Crypto Transaction Optimization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
&amp;quot;Since the unstake function does not check the state of the variable &amp;quot;unstake&amp;quot;, the exploiter could unstake multiple times and drian the assets.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
&amp;quot;MEV Bot JokInTheBoxETH was attacked, lost ~$34K.&amp;quot;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - JokInTheBoxETH Unstaking Vulnerability&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|June 9th, 2024 7:39:59 AM MDT&lt;br /&gt;
|Malicious Contract Creation&lt;br /&gt;
|Initial malicious contract creation.&lt;br /&gt;
|-&lt;br /&gt;
|June 10th, 2024 6:28:23 PM MDT&lt;br /&gt;
|Attack Transaction&lt;br /&gt;
|The final transaction which profits 9.834 ETH (~$34k).&lt;br /&gt;
|-&lt;br /&gt;
|June 10th, 2024 11:32:00 PM MDT&lt;br /&gt;
|ChainAegis Analysis&lt;br /&gt;
|ChainAegis posts their analysis of the blockchain exploit. They do not, however, link to a specific transaction.&lt;br /&gt;
|-&lt;br /&gt;
|June 11th, 2024 8:44:00 AM MDT&lt;br /&gt;
|JokInTheBoxETH Tweet&lt;br /&gt;
|The JokInTheBoxETH team posts to announce compensation for user losses. They plan to airdrop tokens matching what each user staked and lost within 24 hours. Instead of burning 15% of our supply, they'll use those tokens for airdrops and reduce circulating supply through market buybacks. They aim to purchase and burn 110 billion $JOK tokens. They're grateful for their community's support and committed to preventing similar events in the future.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;MEV Bot JokInTheBoxETH was attacked, lost ~$34K. The root cause of the exploit was poorly implemented unstake function fo the staking contract. Since the unstake function does not check the state of the variable &amp;quot;unstake&amp;quot;, the exploiter could unstake multiple times and drian the assets.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
#34k&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $34,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
&amp;quot;How are we going to compensate for the loss of our users?&lt;br /&gt;
We will airdrop the exact amount of tokens each user staked and lost on the platform within 24h.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;We were planning to burn 15% of the supply.&lt;br /&gt;
Instead, we will use that supply to airdrop tokens to our users.&lt;br /&gt;
We still want to reduce the circulating supply.&lt;br /&gt;
We will regularly buy back from the market and burn.&lt;br /&gt;
Than means we are going to buy 110B $JOK token from the market over the time.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;We believe it's a better solution than relaunch.&lt;br /&gt;
&lt;br /&gt;
Our community showed strong support.&lt;br /&gt;
We can't thank you enough.&lt;br /&gt;
Some might think that it's unfair that some &amp;quot;new whales&amp;quot; took the opportunity to buy that dip.&lt;br /&gt;
But they took a huge risk doing it.&lt;br /&gt;
&lt;br /&gt;
We will move forward from here and never let such an event happen again.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
&amp;quot;How are we going to compensate for the loss of our users?&lt;br /&gt;
We will airdrop the exact amount of tokens each user staked and lost on the platform within 24h.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;We were planning to burn 15% of the supply.&lt;br /&gt;
Instead, we will use that supply to airdrop tokens to our users.&lt;br /&gt;
We still want to reduce the circulating supply.&lt;br /&gt;
We will regularly buy back from the market and burn.&lt;br /&gt;
Than means we are going to buy 110B $JOK token from the market over the time.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
What parts of this case are still remaining to be concluded?&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;slowmisthackedarchive-14374&amp;quot;&amp;gt;[https://web.archive.org/web/20240617180525/https://hacked.slowmist.io/ SlowMist Hacked - SlowMist Zone] (Accessed Jun 20, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;jokintheboxethtwitter-14390&amp;quot;&amp;gt;[https://twitter.com/JokInTheBoxETH/status/1800539599082500106 @JokInTheBoxETH Twitter] (Accessed Jun 21, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;jokinthebox-14391&amp;quot;&amp;gt;[https://jokinthebox.com/ JokInTheBox | MEV Sandwich, Copy Trading &amp;amp; AI Social Bot] (Accessed Jun 21, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;jokintheboxdocs-14392&amp;quot;&amp;gt;[https://docs.jokinthebox.com/jokinthedocs Welcome To JokInTheDocs | JokInTheDocs] (Accessed Jun 21, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;x-14393&amp;quot;&amp;gt;[https://x.com/ChainAegis/status/1800400617539883186 x.com] (Accessed Jun 21, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;chainaegisapp-14394&amp;quot;&amp;gt;[https://app.chainaegis.com/result?type=eth&amp;amp;search=0xfcd4acbc55df53fbc4c9d275e3495b490635f113 ChainAegis] (Accessed Jun 21, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscan-14395&amp;quot;&amp;gt;[https://etherscan.io/tx/0xd14f5d5181c181d1c0734ebf7976199652caaad91fad9391b8a725407a284852 Ethereum Transaction Hash (Txhash) Details | Etherscan] (Accessed Jun 21, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;neptunemutual-14015&amp;quot;&amp;gt;[https://neptunemutual.com/hack-database/ DeFi and Cryptocurrency Hacks / Neptune Mutual] (Accessed May 28, 2024)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>