Between February 9 and February 12, 2024, an attacker minted 1.79 billion PLA tokens on the PlayDapp gaming platform — a nominal $290 million at the prices at the time. PLA was the in-platform currency of a Korean Web3 gaming ecosystem.
What happened
The attacker did not exploit a logic bug — they stole an admin key that controlled the PLA token contract's privileged functions. With that key, they:
- Added themselves as a minter, granting their own address the authority to create new PLA.
- Stripped existing administrators of their permissions, locking the legitimate team out.
- Minted 200 million PLA (~$36.5M) in the first attack on February 9.
- Returned three days later and minted another 1.59 billion PLA (~$253.9M) on February 12.
Aftermath
- The attacker only managed to convert about $32 million of the stolen tokens into other assets before exchanges froze associated addresses; the rest sat in their wallet as dilution that destroyed PLA's value rather than netting them cash.
- PlayDapp paused the PLA contract and announced a migration to a new "PDA" token with multi-signature controls. Existing holders were issued PDA at a fixed ratio; the attacker's minted PLA was effectively voided.
- The loss to legitimate PLA holders was real: market cap collapsed during the incident.
Why it matters
A single privileged key on a non-upgradeable contract can be worse than an upgradeable contract — because there is no mechanism to revoke a stolen authority short of a hard migration. Most tokens issued in 2024 and 2025 ship with mint authority either renounced post-launch or gated behind a Safe multi-sig with timelock.
Sources & on-chain evidence
- [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-playdapp-hack-february-2024
- [02]immunebytes.comhttps://immunebytes.com/blog/playdapp-exploit-feb-9th-12th-2024-detailed-analysis-report/
- [03]playdapp.medium.comhttps://playdapp.medium.com/playdapp-post-mortem-on-the-hacking-incident-361b4ddfb5a1