Sihoon Lee Profile
Sihoon Lee

@push0ebp

Followers
437
Following
162
Media
19
Statuses
229

Web3 Security Researcher / Retired reverser / prev. @kalos_security, @theori_io

대한민국 서울
Joined November 2018
Don't wanna be here? Send us removal request.
@push0ebp
Sihoon Lee
24 days
GG with 2nd place. Thanks for organizing @DeFi_Wonderland!
@Wonderland
Wonderland
25 days
The Wonderland CTF was a blast! Huge congrats to all the teams, especially “STACK TOO DEEP”, “NADA ESPECIAL” and “SECSEE”. Oh, also: https://t.co/WHMt1f36Mk 👉👈
0
0
8
@push0ebp
Sihoon Lee
29 days
is anyone heading to @EFDevcon? We are looking for a @DeFi_Wonderland CTF team members and are currently three. I also want to meet many security researchers. Please DM me if you're interested.
0
0
3
@push0ebp
Sihoon Lee
2 months
I'm heading to @EFDevcon in Argentina next month! I'd love to meet many security researchers and builders. Please DM me and recommend for good security events!
0
0
1
@push0ebp
Sihoon Lee
3 months
Huge thanks to @SEAL_911 for helping with the analysis.
0
0
2
@push0ebp
Sihoon Lee
3 months
When I queried approvals on-chain, there are many victims on Ethereum, but only few victims on Linea.
1
0
1
@push0ebp
Sihoon Lee
3 months
When victims deposited tokens into their wallets, the attacker used claimMessageWithProof() to execute the message (sent from Linea) on Ethereum and steal the tokens. Attack Tx (claimMessageWithProof):
Tweet card summary image
etherscan.io
Transfer 16,000 USDC to 0xB24791D4...1fa75cEC8 | Success | Sep-24-2025 05:43:35 PM (UTC)
1
0
1
@push0ebp
Sihoon Lee
3 months
The attacker identified that victims had approved Linea Bridge, then used sendMessage() to send a message calling USDT.transferFrom on Ethereum to steal tokens. Attacker's Tx (sendMessage):
Tweet card summary image
lineascan.build
Call 0x19757da9 Method By 0x280FF4b0...670B33536 on 0x07368029...6e3D5C552 | Success | Sep-17-2025 12:48:55 PM (UTC)
1
0
1
@push0ebp
Sihoon Lee
3 months
I found that Linea provides message transmission functionality (arbitrary call) between L1 and L2.
1
0
1
@push0ebp
Sihoon Lee
3 months
The common activity of victims was that they had approved Linea Bridge on Ethereum through OKX Web3. This contract should not be approved (according to SEAL's analysis).
1
0
1
@push0ebp
Sihoon Lee
3 months
For some reason, I guess the OKX frontend requested users to approve the Linea Bridge contract. The wallet history showed approvals made on https://t.co/ZM5Iyn1U4z. Victim Approval Tx (approve):
1
0
1
@push0ebp
Sihoon Lee
3 months
SEAL's researchers discovered abnormal approvals. However, the victims hadn't visited phishing sites, and I saw their wallet approval history.
1
0
1
@push0ebp
Sihoon Lee
3 months
I analyzed attack tx at a friend's request. I couldn't find malicious contracts and tx, I requested @SEAL_911 .
1
0
1
@push0ebp
Sihoon Lee
3 months
I realized that we cannot trust approvals to official contracts. The safe usage is to approve up to the necessary amount. Let's dive into the incident.
1
0
1
@push0ebp
Sihoon Lee
3 months
If you've ever used @LineaBuild bridge on @okx Web3, Make sure to REVOKE approvals immediately on https://t.co/N8HibsHrkd. The contracts are 0xd19d4B5d358258f05D7B411E21A1460D11B0876F on Ethereum, 0x508ca82df566dcd1b0de8296e70a96332cd644ec on Linea.
Tweet card summary image
revoke.cash
Take back control of your wallet and stay safe by revoking token approvals and permissions you granted on Ethereum and over 100 other networks.
1
1
5
@push0ebp
Sihoon Lee
4 months
GG. Enjoyed 3rd place again at this year's DEFCON CTF! Thanks to @SuperDiceCode.
@dicegangctf
DiceGang
4 months
We came 3rd at this year's DEFCON CTF Finals as @SuperDiceCode! Thanks to @SuperGuesser , CodeRed, and @SquidProxyLover for playing with us, and @Nautilus_CTF for organising.
0
0
6
@push0ebp
Sihoon Lee
5 months
GG for getting first blood at R3CTF by @r3kapig Thanks for the good Solana RCE pwn challenge, which only 3 teams solved!
2
1
22
@push0ebp
Sihoon Lee
8 months
GG with talented hackers
@SuperGuesser
Super Guesser
8 months
We got 2nd place in the prequal of DEFCON CTF! We have collaborated with @dicegangctf and CodeRed 👏
0
0
8
@Web3Kimchi
KimchiPremium
11 months
🎉The KimchiPremium took 3rd place at Remedy 2025! 🎉 We're a Korean CTF team that plays for fun. Many thanks to the @xyz_remedy @hexensio for hosting such a fantastic CTF with fun challenges. Looking forward to the next one!
@xyz_remedy
Remedy
11 months
The biggest Web3 CTF is over: 🥇 @ChainLight_io 🥈 A-Team 🥉 @Web3Kimchi The Remedy CTF 2025 was @hexensio's first-ever competition. Check out all the highlights 🧵
1
9
28
@push0ebp
Sihoon Lee
11 months
Happy to have learned good lessons and excited to have tried @xyz_remedy 's Glider, which is a code query tool I’ve been wanting to explore for some time. I'm looking forward to trying for real hunting.
0
1
10
@push0ebp
Sihoon Lee
11 months
Good game with 3rd place and managed to solve an only 3-solved challenge. Thanks to @xyz_remedy @hexensio and all the authors for hosting the biggest Web3 CTF and creating such great challenges.
@xyz_remedy
Remedy
11 months
The biggest Web3 CTF is over: 🥇 @ChainLight_io 🥈 A-Team 🥉 @Web3Kimchi The Remedy CTF 2025 was @hexensio's first-ever competition. Check out all the highlights 🧵
2
2
20