PeckShield security shield wind control platform DAppShield monitored this morning at 06:38, the hacker at the beginning of the TPSHfJ address continued to initiate multiple transaction rollback attacks on the DApp contract address at the beginning of TLGUt5 by creating an attack contract. As of now, 45,200 TRXs have been profitable, and the balance of the attacked contract is almost zero. PeckShield security personnel analyzed that the contract draw was on the chain and in the same transaction and was therefore vulnerable to rollback attacks. Previously, PeckShield has disclosed that many wavefield DApps have been dealt back to the rollback attack. PeckShield cautions that DApp developers should be wary of the continued spread of such transaction rollback attacks, filter contract players, and contact security vendors in a timely manner to avoid further loss of digital assets.