The Superrare NFT ART platform was utilized through staking smart contracts. The attacker was able to move $730,30,000 in rare tokens from his long-standing contract.
The Superrare platform suffered from relatively small exploits. This indicates that hackers are still looking for dangerous smart contracts. Chain investigators intercepted $7.303 million with rare tokens, moved into the hacker’s wallet, and remained inert for a while after hacking.
Exploiter’s wallet was funded by Tornado Cash and waited several months before the attack. Funds have yet to be exchanged and remixed.
The alert🚨Or system has detected a malicious transaction targeting @superrare’s staking contract.
The attacker’s address, funded via @Tornadocash about 186 days ago, ran an exploit and earned $rare worth 731K.
The stolen funds are currently on the attacker’s…pic.twitter.com/9cz6ig4b4b
– 🚨Cyber Alerts🚨 (@cyversalerts) July 28, 2025
According to Smart Contract Investigators, the main reasons are Faulty checkwhich allowed anyone to claim a token from the contract.
Recent hacking activities continue trending from First half of 2025when the exploit reaches a new peak. Smart contracts remain one of the most vulnerable, particularly targeted by DPRK hackers. The Ethereum chain is also chosen as a feature that allows you to easily exchange and mix tokens.
Unusual tokens are safe. Only one staking vault attacked.
All tokens were billed in a single transaction, a rare total of 11,907,874. Exploiter built another smart contract to generate transactions and used the front runner to grab the unusual token.
The real real-time exploit detection system was identifying malicious transactions targeting one of the staking contracts used by @superrare
The attackers had deployed an exploit contract, but the actual attack was carried out by the frontrunner a block later.
pic.twitter.com/wzqepdzbhj update
– blocaid (@blocaid_) July 28, 2025
LISA AI agents too I explained it Detailed attacks based on open source smart contracts.
“The updatemerkleroot function uses the incorrect condition in the request statement to allow an address to update the Merkle route. The intended authorization check for an owner or a particular address is flawed due to a logical error in the condition. This allows fraudulent users to set up new Merkle routes, allowing potentially fraudulent claims and allowing contract fund emissions. ”
Hacker wallets only show exploit transactions, but are linked to larger ones wallet It is mainly used for liquidity pools. The connected wallet also contained 563.15K in the rare token.
Rare is not affected beyond normal volatility. The token trades for around $0.06, and its activities are primarily MEXC gate.io. The tokens are not affected except for related panic cellars. The only contract affected is one version of the rare staking.
Superrare remains the NICH NFT platform
Superrare has not benefited from the growth of its NFT activities. The platform achieved a lifetime trading volume of $950 million with around 6,550 traders.
Every day, the platform has fewer than 10 buyers and sellers, with volumes dropping to $16,000. The platform exchanges art for $5 at a relatively low price, with some items being sold after years of holding.
Rare token activity was one of the factors that led super rare to the spotlight. The usefulness of rare tokens is still limited due to the slower NFT market. The only option for hackers is to settle the tokens and could potentially tank prices due to low liquidity.
The platform itself is secure and continues to post auctions and its low-level general NFT swaps. NFT items were not stolen or affected.
Discover more from Earlybirds Invest
Subscribe to get the latest posts sent to your email.