当前位置:网站首页>Cross-chain bridge protocol Nomad suffers hacker attack, losing more than $150 million
Cross-chain bridge protocol Nomad suffers hacker attack, losing more than $150 million
2022-08-03 10:49:00 【Babbitt Information】

DeFi 之道讯,8 月 2 日,跨链桥协议 Nomad 遭遇攻击,超过 1.5 $100 million in user funds were transferred by hackers,Paradigm 合伙人 samczsun This security incident was analyzed.
Nomad just suffered Web3 Lost in one of the most chaotic hacks ever 1.5 亿美元.So how exactly does this happen,其根本原因是什么?Allow me to take you behind the scenes of this attack.

这一切都始于 @officer_cia 在 ETHSecurity Shared in the telegram group channel @spreekaway 推文,Although I didn't know what was going on at the time,但离开 Nomad The amount of assets across the chain bridge is clearly not a good sign.

My first thought was that there was some misconfiguration of the coin's decimal point.毕竟,This cross-chain bridge appears to be in progress“发送 0.01 WBTC,返还 100 WBTC”的促销活动.

然而,在 Moonbeam After some painful manual digging around the web,我确认 Moonbeam The transaction is indeed cross-chain 0.01 WBTC,但不知何故,The asset that the Ethereum transaction crosses the chain is 100 WBTC.
https://moonscan.io/tx/0xcca9299c739a1b538150af007a34aba516b6dade1965e80198be021e3166fe4c
https://etherscan.io/tx/0xa5fe9d044e4f3e5aa5bc4c0709333cd2190cba0f4e7f16bcf73f49f83e4a5460


此外,WBTC Cross-chain transactions don't actually prove anything.It's just called directly process,可以说,Being able to process a message without first proving it is very bad.

这个时候,有两种可能性,Either the proof was submitted separately in an earlier block,要么是 Replica The contract has serious loopholes.但是,There is absolutely no indication that anything has been proven recently.

That leaves only one possibility,Replica There is a fatal loophole in the contract.那到底是怎么回事呢?A quick look shows,Submitted messages must belong to an acceptable root,否则,第 185 The line check will fail.

幸运的是,There is an easy way to check this assumption.I know the unproven message root will be 0x00,因为消息 [_messageHash] will be uninitialized.All I have to do is check if the contract will accept this.

哎……

事实证明,During routine upgrades,Nomad The team initializes the root of trust as 0x00.需要明确的是,It is a common practice to use a zero value as an initialization value.不幸的是,在这种情况下,It has a small side effect,That is, each message is automatically validated.


That's why hacking is so messy,你不需要了解 Solidity 或 Merkle tree or something,All you have to do is find a valid deal,Find it with your address/Substitute another person's address,Then rebroadcast it.
总的来说,A routine upgrade marks the zero hash as a valid root,The effect is to allow in Nomad spoofed news,Attackers abuse this feature to replicate/paste transaction,And quickly drained the funds of this cross-chain bridge in a frantic melee.
译者注:此次 Nomad Cross-chain bridge hacking,Moonbeam 和 evmos Users of these two public chains will be greatly affected,其中, Moonbeam The cross-chain funds involved are relatively large.This incident reminds us once again of the risks of cross-chain bridges,After the user uses the cross-chain bridge,You should try to avoid holding cross-chain assets,Instead, it should be exchanged for the native assets of the blockchain as soon as possible,And the native asset security of the Ethereum main chain is higher than other chains.

中文推特:https://twitter.com/8BTC_OFFICIAL
英文推特:https://twitter.com/btcinchina
Discord社区:https://discord.gg/defidao
电报频道:https://t.me/Mute_8btc
电报社区:https://t.me/news_8btc

边栏推荐
猜你喜欢

成为优秀架构师必备技能:怎样才能画出让所有人赞不绝口的系统架构图?秘诀是什么?快来打开这篇文章看看吧!...

如何改变sys_guid() 返回值类型

OPENCV学习DAY7

VL53L0X V2激光测距传感器 采集距离数据串口输出

混合型界面:对话式UI的未来

Skills required to be a good architect: How to draw a system architecture that everyone will love?What's the secret?Come and open this article to see it!...

在 Chrome 开发者工具里通过 network 选项模拟网站的离线访问模式

月薪没到35K的程序员必须要背的面试八股,我先啃为敬!

干货!一种被称为Deformable Butterfly(DeBut)的高度结构化且稀疏的线性变换

全新的Uber App设计
随机推荐
数字藏品和ICP
从餐桌到太空,孙宇晨的“星辰大海”
创建C UDR时,指定的HANDLESNULLS的作用是什么?
MATLAB programming and application 2.7 Structural data and unit data
跨链桥协议 Nomad 遭遇黑客攻击,损失超 1.5 亿美元
如何通过DBeaver 连接 TDengine?
QT with OpenGL(Shadow Mapping)(面光源篇)
Mysql OCP 75题
深入解析分布式文件系统的一致性的实现
聊天app开发——防炸麦以及节省成本的内容鉴定方法
面试突击71:GET 和 POST 有什么区别?
507. 完美数
Win10/11 删除文件资源管理器左侧栏目文件夹
Leecode-SQL 1484. 按日期分组销售产品
科普大佬说 | 黑客帝国与6G有什么关系?
媒体查询代码
分布式事务七种解决方案
成对连接点云分割
试题G:单词分析 ← 第十一届蓝桥杯大赛第二场省赛赛题
MATLAB Programming and Applications 2.6 Strings