ERC1967Proxy Upgrade 0x03b79c24 Function Access Control
Notice: This page is a freshly imported case study from an original repository. While the original content had a similar format, some sections may not have been fully completed. Please help fill in any empty sections or any missing information you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.
Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!
#0x54cd_ERC1967Proxy is a nickname assigned by TenArmor to a smart contract launched on the Ethereum blockchain on January 12, 2025. The contract suffered a significant vulnerability due to missing access controls, particularly in the 0x03b79c24() function after an upgrade, which allowed an attacker to drain approximately $285.7K. TenArmor detected and reported the incident, providing the attack transaction hash. Unfortunately there does not appear to be any public information about the project's operators, any recovery efforts, or ongoing investigations.[1][2][3][4][5]
About #0x54cd_ERC1967Proxy
- 0x54cd_ERC1967Proxy is the nickname given to a smart contract on the Ethereum blockchain by TenArmor. The smart contract was originally launched on January 12th, 2025.
The Reality
Unfortunately, the #0x54cd_ERC1967Proxy smart contract appears to have lacked proper access controls.
What Happened
Due to a lack of access controls, it was possible for $285.7k to be drained from an ethereum smart contract.
| Date | Event | Description |
|---|---|---|
| July 5th, 2025 3:03:35 PM MDT | Suspicious Transaction Occurs | The suspicious transaction on the Ethereum blockchain. |
| July 5th, 2025 8:44:00 PM MDT | TenArmorAlert Tweets Report | TenArmorAlert posts a real-time warning about suspicious on-chain activity, highlighting attacks on smart contracts such as unauthorized fund drains. In this instance, they report a $285.7K loss from an Ethereum contract (#0x54cd_ERC1967Proxy) due to missing access control on the 0x03b79c24() function after a contract upgrade. The alert includes details like the affected contract, the nature of the vulnerability, and a link to the attack transaction. |
Technical Details
"It appears that the 0x03b79c24() function lacks proper access control after an contract upgrade, resulting in the funds in the contract being drained"
Attack Transaction: 0xa57ec56af91ec70517ca71ca50101958d9c2ec9fdb61edcf35a9081c375725c2
Total Amount Lost
TenArmor reported the loss amount as $285.7k.
The total amount lost has been estimated at $286,000 USD.
Immediate Reactions
The attack was reported by TenArmor. There is no indication of which entity is behind the smart contract.
Ultimate Outcome
A basic analysis was performed by TenArmor.
Total Amount Recovered
There is no indication of who is behind the project or any efforts they have taken to recover the funds.
There do not appear to have been any funds recovered in this case.
Ongoing Developments
It is unclear if anything further is being investigated or responded to.
Individual Prevention Policies
No specific policies for individual prevention have yet been identified in this case.
For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.
Platform Prevention Policies
Policies for platforms to take to prevent this situation have not yet been selected in this case.
For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.
Regulatory Prevention Policies
No specific regulatory policies have yet been identified in this case.
For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.
References
- ↑ TenArmorAlert - "Our system has detected a suspicious attack involving a contract #0x54cd_ERC1967Proxy on #ETH, resulting in an approximately loss of $285.7K." - Twitter/X (Accessed Jul 9, 2025)
- ↑ Suspicious Transaction - Etherscan (Accessed Jul 9, 2025)
- ↑ Exploiter Ethereum Wallet - Etherscan (Accessed Jul 9, 2025)
- ↑ The ERC1967Proxy Smart Contract - Etherscan (Accessed Jul 9, 2025)
- ↑ The ERC1967Proxy Smart Contract Creation - Etherscan (Accessed Jul 9, 2025)