According to PeckShield monitoring, on July 25th, from 9:00 am to 11:00 am, the hacker at the beginning of TM8LP7 continued to initiate multiple transaction rollback attacks on the DApp contract address at the beginning of TEMpMR by creating an attack contract. As of now, 113,913 TRXs have been profitable, and there are thousands of TRXs in the attack contract balance, and players are betting. PeckShield security personnel analyzed that the contract draw was on the chain and in the same transaction and was therefore vulnerable to rollback attacks. Previously, PeckShield has disclosed that many wavefield DApps have been dealt back to the rollback attack. PeckShield cautions that DApp developers should be wary of the continued spread of such transaction rollback attacks, filter contract players, and contact security vendors in a timely manner to avoid further loss of digital assets.