Sihoon Lee
@push0ebp
Followers
437
Following
162
Media
19
Statuses
229
Web3 Security Researcher / Retired reverser / prev. @kalos_security, @theori_io
대한민국 서울
Joined November 2018
GG with 2nd place. Thanks for organizing @DeFi_Wonderland!
The Wonderland CTF was a blast! Huge congrats to all the teams, especially “STACK TOO DEEP”, “NADA ESPECIAL” and “SECSEE”. Oh, also: https://t.co/WHMt1f36Mk 👉👈
0
0
8
is anyone heading to @EFDevcon? We are looking for a @DeFi_Wonderland CTF team members and are currently three. I also want to meet many security researchers. Please DM me if you're interested.
0
0
3
When I queried approvals on-chain, there are many victims on Ethereum, but only few victims on Linea.
1
0
1
When victims deposited tokens into their wallets, the attacker used claimMessageWithProof() to execute the message (sent from Linea) on Ethereum and steal the tokens. Attack Tx (claimMessageWithProof):
etherscan.io
Transfer 16,000 USDC to 0xB24791D4...1fa75cEC8 | Success | Sep-24-2025 05:43:35 PM (UTC)
1
0
1
The attacker identified that victims had approved Linea Bridge, then used sendMessage() to send a message calling USDT.transferFrom on Ethereum to steal tokens. Attacker's Tx (sendMessage):
lineascan.build
Call 0x19757da9 Method By 0x280FF4b0...670B33536 on 0x07368029...6e3D5C552 | Success | Sep-17-2025 12:48:55 PM (UTC)
1
0
1
I found that Linea provides message transmission functionality (arbitrary call) between L1 and L2.
1
0
1
The common activity of victims was that they had approved Linea Bridge on Ethereum through OKX Web3. This contract should not be approved (according to SEAL's analysis).
1
0
1
For some reason, I guess the OKX frontend requested users to approve the Linea Bridge contract. The wallet history showed approvals made on https://t.co/ZM5Iyn1U4z. Victim Approval Tx (approve):
1
0
1
SEAL's researchers discovered abnormal approvals. However, the victims hadn't visited phishing sites, and I saw their wallet approval history.
1
0
1
I realized that we cannot trust approvals to official contracts. The safe usage is to approve up to the necessary amount. Let's dive into the incident.
1
0
1
If you've ever used @LineaBuild bridge on @okx Web3, Make sure to REVOKE approvals immediately on https://t.co/N8HibsHrkd. The contracts are 0xd19d4B5d358258f05D7B411E21A1460D11B0876F on Ethereum, 0x508ca82df566dcd1b0de8296e70a96332cd644ec on Linea.
revoke.cash
Take back control of your wallet and stay safe by revoking token approvals and permissions you granted on Ethereum and over 100 other networks.
1
1
5
GG. Enjoyed 3rd place again at this year's DEFCON CTF! Thanks to @SuperDiceCode.
We came 3rd at this year's DEFCON CTF Finals as @SuperDiceCode! Thanks to @SuperGuesser , CodeRed, and @SquidProxyLover for playing with us, and @Nautilus_CTF for organising.
0
0
6
GG with talented hackers
0
0
8
🎉The KimchiPremium took 3rd place at Remedy 2025! 🎉 We're a Korean CTF team that plays for fun. Many thanks to the @xyz_remedy @hexensio for hosting such a fantastic CTF with fun challenges. Looking forward to the next one!
The biggest Web3 CTF is over: 🥇 @ChainLight_io 🥈 A-Team 🥉 @Web3Kimchi The Remedy CTF 2025 was @hexensio's first-ever competition. Check out all the highlights 🧵
1
9
28
Happy to have learned good lessons and excited to have tried @xyz_remedy 's Glider, which is a code query tool I’ve been wanting to explore for some time. I'm looking forward to trying for real hunting.
0
1
10
Good game with 3rd place and managed to solve an only 3-solved challenge. Thanks to @xyz_remedy @hexensio and all the authors for hosting the biggest Web3 CTF and creating such great challenges.
The biggest Web3 CTF is over: 🥇 @ChainLight_io 🥈 A-Team 🥉 @Web3Kimchi The Remedy CTF 2025 was @hexensio's first-ever competition. Check out all the highlights 🧵
2
2
20