Scan to download
BTC $68,020.97 +0.39%
ETH $1,975.55 +0.79%
BNB $621.77 -0.59%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $577.33 +2.52%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%
BTC $68,020.97 +0.39%
ETH $1,975.55 +0.79%
BNB $621.77 -0.59%
XRP $1.42 -4.56%
SOL $81.67 -4.53%
TRX $0.2795 -0.47%
DOGE $0.0974 -3.83%
ADA $0.2735 -4.22%
BCH $577.33 +2.52%
LINK $8.64 -2.97%
HYPE $28.98 -1.81%
AAVE $122.61 -3.42%
SUI $0.9138 -6.63%
XLM $0.1605 -4.62%
ZEC $260.31 -8.86%

hijacking

Review of Balancer's historical security incidents, resulting in a loss of 21 million dollars due to flash loans, front-end hijacking, and cross-protocol vulnerabilities

The DeFi protocol Balancer is currently under attack, with losses exceeding $116.6 million across multiple chains, and the attack on Balancer is still ongoing.According to the on-chain AI analysis tool CoinBob, the historical security incidents of Balancer are as follows:June 2020 Flash Loan Attack: Attackers exploited a compatibility issue between the deflationary token (STA/STONK) and Balancer's smart contracts, repeatedly calling swapExactAmountIn to drain the liquidity pool, ultimately profiting $523,600.August 2023 V2 Pool Vulnerability: The Balancer V2 pool suffered multiple flash loan attacks due to a code vulnerability, with total losses reaching $2.1 million. The team urgently paused the affected pools and advised users to withdraw their funds, but some funds that were not withdrawn in time were still exploited.September 2023 Frontend Hijacking Attack: Hackers gained control of Balancer's frontend through BGP/DNS hijacking, tricking users into authorizing malicious contracts, resulting in a loss of $238,000. On-chain detective ZachXBT traced the funds to address 0x645710Af050E26bB96e295bdfB75B4a878088d7E.2023 Euler Incident Impact: Due to a vulnerability in Euler Finance, Balancer's bbeUSD pool suffered a loss of $11.9 million, accounting for 65% of the pool's TVL. The team took protective measures to limit liquidity withdrawals.2024 Velocore Attack Association: The Velocore vulnerability exploited Balancer-style CPMM pools, resulting in a loss of $6.8 million. Balancer's technical architecture was indirectly implicated due to cross-protocol integration.

Slow Fog: Last week, there were 10 security incidents in the Web3 field, with an increase in DNS hijacking attacks and Discord hacking incidents

ChainCatcher news, according to the Slow Mist blockchain hacking archive statistics, from October 1 to October 7, 2023, a total of 10 security incidents occurred, with an increase in DNS hijacking attacks and Discord hacking incidents. The specific events are as follows:Galxe (2023-10-06): Unauthorized access obtained through DNS hijacking led to the misappropriation of visitor funds, affecting 1,120 users. Loss: approximately $270,000;MCT (2023-10-06): DNS domain hijacking allowed private keys to be uploaded to a fraudulent domain. Preventive measures are recommended. Loss: not specified;Fake CommEx tokens (2023-10-06): A large amount of liquidity was removed in a rug pull, with the deployer extracting approximately $154,000;friend.tech (2023-10-05): Four users faced SIM swap attacks, resulting in significant losses. Loss: approximately $385,000;Stars Arena (2023-10-05): The platform's smart contract had a major security vulnerability, leading to the theft of a large amount of funds. Loss: approximately $3 million;DePay (2023-10-05): The platform faced a flash loan attack, resulting in relatively small theft. Loss: $827;Metropolis World (2023-10-05): The platform's Discord server was hacked. Loss: unspecified;GEMIE (2023-10-02): The Discord server was hacked, leading to phishing links being shared. Users are advised not to interact. Loss: not specified;VendX (2023-10-02): Another instance of a Discord server being hacked. Loss: not specified;Fake EigenLayer tokens (2023-10-01): A fake token exit scam that brought huge profits to the deployer. Loss: approximately $300,000.

Slow Mist: balancer.fi is currently under BGP Hijacking attack

ChainCatcher news, according to SlowMist Intelligence, balancer.fi is currently under a BGPHijacking attack. Accessing the website and linking a wallet may result in a phishing attack. According to CloudFlare's BGP Origin Hijack-17957, the ASN victim list includes AS13335, which is associated with balancer.fi. Currently, accessing the website will trigger a phishing security warning from CloudFlare.Here is the analysis of this incident by the SlowMist security team:Query the DNS resolution records of the domain balancer.fi (https://bgp.tools/dns/balancer.fi). The A records show addresses 104.21.37.47 and 172.67.203.244. The BGP AS region number for these two IP addresses is AS13335, which belongs to CloudFlare.According to CloudFlare's records (https://radar.cloudflare.com/routing/anomalies/hijack-17957), AS13335 is on the list of ASs involved in the BGP Origin Hijack attack.It was found that the HTTPS certificate for balancer.fi has been replaced with the attacker's certificate.Currently, accessing https://app.balancer.fi will trigger a phishing security warning from CloudFlare.Analysis shows that there is malicious JavaScript code on the frontend of app.balancer.fi (https://app.balancer.fi/js/overchunk.js).Users connecting their wallets to app.balancer.fi will have their balances automatically checked by the malicious script, leading to phishing attacks.After analysis by MistTrack, the malicious addresses are as follows:0x00006DEAcd9ad19dB3d81F8410EA2B45eA5700000x645710Af050E26bB96e295bdfB75B4a878088d7E0x0000626d6DC72989e3809920C67D01a7fe030000The SlowMist security team reminds users that the BGP attack against balancer is still ongoing, and they should temporarily stop accessing the balancer website to avoid being attacked.
app_icon
ChainCatcher Building the Web3 world with innovations.