<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Mosca_Exit_Program_Double_Withdrawal_Exploit_2</id>
	<title>Mosca Exit Program Double Withdrawal Exploit 2 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=Mosca_Exit_Program_Double_Withdrawal_Exploit_2"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Mosca_Exit_Program_Double_Withdrawal_Exploit_2&amp;action=history"/>
	<updated>2026-05-02T17:24:31Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Mosca_Exit_Program_Double_Withdrawal_Exploit_2&amp;diff=6542&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/moscaexitprogramdoublewithdrawalexploit2.php}} {{Unattributed Sources}}  BNB Smart Chain ImageThe Mosca contract, launched on the Binance Smart Chain (BSC) on January 4th, is a decentralized subscription and referral system supporting multiple tokens, including USDT, USDC, and a native Mosca token. It offers users two subscription tiers, Standard and En...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=Mosca_Exit_Program_Double_Withdrawal_Exploit_2&amp;diff=6542&amp;oldid=prev"/>
		<updated>2025-02-12T20:38:10Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/moscaexitprogramdoublewithdrawalexploit2.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Binancesecurity.jpg&quot; title=&quot;File:Binancesecurity.jpg&quot;&gt;thumb|BNB Smart Chain Image&lt;/a&gt;The Mosca contract, launched on the Binance Smart Chain (BSC) on January 4th, is a decentralized subscription and referral system supporting multiple tokens, including USDT, USDC, and a native Mosca token. It offers users two subscription tiers, Standard and En...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/moscaexitprogramdoublewithdrawalexploit2.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Binancesecurity.jpg|thumb|BNB Smart Chain Image]]The Mosca contract, launched on the Binance Smart Chain (BSC) on January 4th, is a decentralized subscription and referral system supporting multiple tokens, including USDT, USDC, and a native Mosca token. It offers users two subscription tiers, Standard and Enterprise, with rewards based on network activity. However, the contract contained a critical vulnerability, particularly in the exitProgram() function, where improper state updates allowed attackers to manipulate balances and perform double withdrawals. This exploit was caused by user.balanceUSDT and user.balanceUSDC not being reset correctly, which enabled attackers to acquire unusually large balances and withdraw funds using a flawed logic in the join() and exitProgram() functions. The exploit, attributed to a unique attacker named the Mosca exploiter (0xE763DA20e25103Da8E6AFa84b6297F87de557419), resulted in reported losses of $37.6k.&amp;lt;ref name=&amp;quot;tenarmoralerttwitter-18019&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;bscscan-18020&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;moscalaunch-18013&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;slowmistteamtwitter-18014&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;tenarmoralerttwitter-18015&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;olympixsubstack-18016&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;maanvadermedium-18017&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;verichainsblog-18018&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About Mosca ==&lt;br /&gt;
The Mosca contract appears to be a decentralized subscription and referral-based system deployed on the Binance Smart Chain (BSC) starting January 4th. It supports multiple tokens, including USDT, USDC, and a native Mosca token. The contract enables users to join a subscription program, participate in a multi-level referral system, and earn rewards based on network activity. It offers two subscription tiers: Standard and Enterprise, with higher rewards and benefits for enterprise users.&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
The smart contract appears to have been deployed quickly and with a critical vulnerability.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
&amp;quot;Mosca was reportedly attacked on BSC, resulting in an approximate loss of $19,500.&amp;quot;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - Mosca Exit Program Double Withdrawal Exploit 2&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|January 4th, 2025 1:41:11 PM MST&lt;br /&gt;
|Mosca Smart Contract Launch&lt;br /&gt;
|The Mosca smart contract is first launched on BSC.&lt;br /&gt;
|-&lt;br /&gt;
|January 5th, 2025 10:22:49 PM MST&lt;br /&gt;
|Theft Transaction On BSC&lt;br /&gt;
|The first exploit transaction occurs on the Binance Smart Chain.&lt;br /&gt;
|-&lt;br /&gt;
|January 5th, 2025 10:44:00 PM MST&lt;br /&gt;
|TenArmorAlert Posts About Exploit&lt;br /&gt;
|TenArmorAlert posts about the exploit, along with details of the root cause. &amp;quot;Root cause appears to be in the exitProgram() call, the user.balanceUSDT &amp;amp; user.balanceUSDC are not reset correctly, enabling double withdrawal.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|January 5th, 2025 11:40:00 PM MST&lt;br /&gt;
|SlowMist Reports On Incident&lt;br /&gt;
|SlowMist&lt;br /&gt;
|-&lt;br /&gt;
|January 7th, 2025 6:10:00 AM MST&lt;br /&gt;
|Tweet Post By @lmanuel&lt;br /&gt;
|Twitter/X user @lmanualm reports &amp;quot;[p]otential suspicious activity&amp;quot;.&lt;br /&gt;
|-&lt;br /&gt;
|January 7th, 2025 9:42:00 AM MST&lt;br /&gt;
|0xCommit Audits Post Made&lt;br /&gt;
|0xCommits makes a post which appears to summarize only that there was a high level exploit.&lt;br /&gt;
|-&lt;br /&gt;
|January 12th, 2025 6:52:21 PM MST&lt;br /&gt;
|Verichain Publishes Blog Post&lt;br /&gt;
|Verichain publishes a detailed breakdown of the exploit.&lt;br /&gt;
|-&lt;br /&gt;
|January 12th, 2025 11:00:03 PM MST&lt;br /&gt;
|Second BSC Theft Transaction&lt;br /&gt;
|The vulnerability is exploited a second time in the Mocha smart contact.&lt;br /&gt;
|-&lt;br /&gt;
|January 13th, 2025 12:04:00 AM MST&lt;br /&gt;
|TenArmor Posts Second Attack&lt;br /&gt;
|TenArmor posts a second attack, including additional detail on the cause.&lt;br /&gt;
|-&lt;br /&gt;
|January 14th, 2025 7:17:53 AM MST&lt;br /&gt;
|Substack Vestra Article&lt;br /&gt;
|Olympix publishes a description of the first exploit with additional details.&lt;br /&gt;
|-&lt;br /&gt;
|January 23rd, 2025 12:15:12 AM MST&lt;br /&gt;
|MaanVader Article Published&lt;br /&gt;
|MaanVader publishes a Medium article with even more details of the exploit.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;Improper state updates in the exitProgram() function allowed attackers to manipulate balances.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Root cause appears to be in the exitProgram() call, the user.balanceUSDT &amp;amp; user.balanceUSDC are not reset correctly, enabling double withdrawal.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The join() function in the Mosca contract appears to have a logic flaw, incorrectly adding a diff to the deposited amount. A strange logic!&lt;br /&gt;
&lt;br /&gt;
This flaw enabled the attacker to acquire an unusually large user.balance.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The root cause of the exploit was improper state updates in the exitProgram function. The withdrawAll() function calculated the withdrawal amount as the sum of user.balance, user.balanceUSDT, and user.balanceUSDC. However, only user.balance was reset to zero after the withdrawal, leaving user.balanceUSDT and user.balanceUSDC unchanged. The attacker manipulated this flaw by first calling the buy() function to increase their user.balanceUSDC. Next, they used the join() function to add their address to the rewardQueue. Finally, they withdrew funds using the exitProgram() function, leveraging the incomplete state reset.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Unique exploiter named Mosca exploiter (0xE763DA20e25103Da8E6AFa84b6297F87de557419)&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
Losses here are reported as $37.6k.&lt;br /&gt;
&lt;br /&gt;
The total amount lost has been estimated at $38,000 USD.&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
What funds were recovered? What funds were reimbursed for those affected users?&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
What parts of this case are still remaining to be concluded?&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;tenarmoralerttwitter-18019&amp;quot;&amp;gt;[https://twitter.com/TenArmorAlert/status/1878699517450883407 @TenArmorAlert Twitter] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;bscscan-18020&amp;quot;&amp;gt;[https://bscscan.com/tx/0xf13d281d4aa95f1aca457bd17f2531581b0ce918c90905d65934c9e67f6ae0ec BNB Smart Chain Transaction Hash (Txhash) Details | BscScan] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;moscalaunch-18013&amp;quot;&amp;gt;[https://bscscan.com/tx/0x8c78478a9620df5b835dfecf3f0a5c341f5a6eef3ea1f63c6f39b7a665fce1c9 Mosca Smart Contract Launch] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;slowmistteamtwitter-18014&amp;quot;&amp;gt;[https://twitter.com/SlowMist_Team/status/1876156823637770441 @SlowMist_Team Twitter] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;tenarmoralerttwitter-18015&amp;quot;&amp;gt;[https://twitter.com/TenArmorAlert/status/1876142779564277971 @TenArmorAlert Twitter] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;olympixsubstack-18016&amp;quot;&amp;gt;[https://olympix.substack.com/p/vestra-targeted-in-500k-hack Vestra Targeted in $500K Hack - Olympix Newsletter] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;maanvadermedium-18017&amp;quot;&amp;gt;[https://medium.com/@MaanVader/mosca-hack-analysis-19-5k-stolen-735e1bd26f5c Mosca Hack Analysis $19.5K Stolen | by MaanVader | Jan, 2025 | Medium] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;verichainsblog-18018&amp;quot;&amp;gt;[https://blog.verichains.io/p/mosca-hack-analysis Mosca Hack Analysis - by LCD - Verichains] (Accessed Feb 11, 2025)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>