Cointime

Download App
iOS & Android

An onslaught of hacks in the Web3 Ecosystem: What Security Risks to Watch out for in H2 2023?

In the Web3 ecosystem, blockchain, smart contracts, application platforms, and users are all targets of hackers. Due to the decentralized, immutable, and anonymous nature of blockchain technology, recovering stolen assets poses significant challenges.

Moreover, the anonymity of virtual currencies and the difficulty in tracking transactions have led to a rise in illegal activities such as money laundering, fraud, and dark web transactions. Regulatory authorities are facing new challenges in combating these criminal activities.

In the recently published review of the Web3 blockchain security and anti-money laundering for the first half of 2023, we analyzed the security trends during that period. In the second half of 2023, hackers continue to target the Web3 ecosystem, and we still need to pay attention to the following security risks:

1. Security Challenges for Smart Contracts

According to the half-year report published by Beosin recently, the most frequent and damaging attack method in the first half of 2023 was exploiting contract vulnerabilities. 60 contract vulnerability incidents resulted in losses of $264 million, accounting for 56% of all losses.

Among the different types of vulnerabilities, the top three were business logic defects, permission issues, and reentrancy. 36 instances of business logic vulnerabilities led to approximately $239 million in losses, representing 90% of all losses from contract vulnerability attacks. These types of vulnerabilities are often overlooked by developers and can result in substantial losses, with 9 incidents leading to losses exceeding $1 million each.

It is evident that smart contracts still face significant security challenges in the second half of 2023.

2. Security Challenges for Cross-Chain Bridges

In recent years, with the continuous development of blockchain technology and the expansion of application scenarios, cross-chain bridges have become increasingly widespread. The primary function of cross-chain bridges is to connect different blockchains and enable cross-chain transactions. However, cross-chain bridges still pose some risks, including the following:

(1) Incomplete cross-chain message verification.

When checking cross-chain data, cross-chain protocols should include contract addresses, user addresses, quantities, chain IDs, and other essential elements. For instance, the pNetwork security incident occurred because the event record's contract address was not verified, allowing attackers to forge Redeem events to withdraw funds, resulting in cumulative losses of approximately $13 million.

(2) Validator private key leakage.

Currently, most cross-chain transactions rely on validators to execute cross-chain operations. If the private key is lost, it can threaten the entire protocol's assets. For example, the Ronin side chain suffered an attack where four of its validators and a third-party validator were controlled by attackers through social engineering, leading to unauthorized withdrawal of protocol assets and a loss of $600 million.

(3) Signature data reuse.

This mainly refers to the reuse of withdrawal certificates, enabling multiple fund withdrawals. The Gnosis Omni Bridge security incident resulted in a loss of approximately $66 million because it hard-coded the Chain ID, allowing hackers to use the same withdrawal certificate to withdraw corresponding locked funds on the ETH and ETHW chains.

Therefore, cross-chain bridge security still requires attention in the second half of 2023.

Additional readings on cross-chain bridge security:

Follow-up on the Poly Network attack: Beosin KYT/AML helps track stolen funds, unlocking more tricks of hackers.

3. Security Challenges for Blockchain Platforms

(1) Language encoding security

Common blockchain platforms are developed using languages such as C++, Go, Rust, and Java. The executable files of these blockchain platforms (i.e., node programs) run directly on servers such as Linux and Windows. Consequently, node programs may also have language encoding issues.

For example, there was a lurking stack overflow vulnerability in Ethereum (CVE-2021-39137) for almost two years:

Cause:

The GETH node program of Ethereum failed to consider thestack overflow problem when copying data, allowing the memory location storing the return value of an internal function to be overwritten during data copying.

Impact:

Hackers exploited this vulnerability to perform attacks on the Ethereum network, leading to a fork on ETH main chain. Since BSC, HECO, Polygon, and other public chains are secondary developments based on ETH, they may also be susceptible to this vulnerability.

(2) Security issues at the platform level

Security issues at the consensus level include double-spending attacks and 51% attacks.

At the permission management level, security issues involve private key leaks, DNS attacks, and CA attacks.

4. Security Challenges for zk Platforms

In the past two years, Zero-Knowledge Proof (zk) technology has rapidly developed, increasingly gaining attention as the importance of blockchain technology and data privacy protection grows. However, this technology still has some security risks, including the following:

(1) Under-constrained circuits

Under-constrained circuits lack the necessary constraints to force the proof provider to follow the expected rules of the circuit, leading to ineffective verifications.

(2) Non-deterministic circuits

Non-deterministic circuits are a subset of under-constrained circuits, usually resulting from a lack of constraints that introduce uncertainty into the circuit. In such cases, non-deterministic means that there are multiple ways to create valid proofs for specific results.

(3) Forzen Heart

Algorithmic vulnerabilities in the Fiat-Shamir protocol, which is used by many zk protocols. Improper implementation of the Fiat-Shamir transformation can allow attackers to forge proofs successfully.

(4) Trusted setup leakage

For Zero-Knowledge Protocols such as Pinocchio and Groth16, a trusted setup is required to generate prover and verifier keys. The trusted setup process typically involves parameters referred to as "toxic waste," which, if maliciously utilized by a proof provider, can be used to forge proofs.

(5) Double-spending attacks

Incorrect design and implementation may lead to double-spending attacks, such as CVE-2023-33252, where lack of complete legitimacy checks for parameters allowed attackers to forge multiple proofs, enabling double-spending attacks.

To ensure the security and reliability of zk platforms, multiple security measures, such as technical audits, risk management, and privacy protection, need to be implemented. Additionally, developers of zk platforms should continuously update and improve the protocols and technologies to adapt to evolving security threats.

Additional readings on zk security:

1. Beosin has discovered a vulnerability in the Circom verification library, identified as CVE-2023–332

2. An In-depth Analysis of zk-SNARK Input Aliasing Vulnerability

5. Security Challenges for Users

In February 2023, there were multiple NFT phishing and fraud incidents, resulting in more than $20 million in total losses for various NFT assets such as BAYC, Otherdeed, Doodles, and Meebits.

Shortly after, the Algorand wallet project MyAlgo suffered an attack, resulting in the theft of exceeding $9.2 million from 25 users. Trust Wallet also discovered vulnerabilities in its wallet, indicating security risks for addresses created using browser plugins from November 14 to 23, 2022.

Hence, user security remains a critical concern in the second half of 2023. Beosin has compiled reviewed articles on user security to help users stay protected.

Additional readings on user security:

How to Avoid Telegram Scams?

6. Regulatory Security

In Beosin's half-year report, we conducted a comprehensive review of global Web3 virtual asset industry regulations and events during the first half of 2023. The increasing integration between the virtual asset market and the traditional financial market highlights the risks it brings. This emphasizes the importance and necessity of implementing effective regulation in the virtual asset industry.

Beosin has already launched a "one-stop" Web3 security and compliance solution in Hong Kong, including KYT/AML, smart contract security audits, virtual asset compliance technology due diligence, virtual asset security monitoring and early warning, and exchange security solutions. These products and services allow Virtual Asset Service Providers (VASPs) to meet Hong Kong’s new licensing system and requirements for security and regulatory technology.

It is foreseeable that in the second half of 2023, major jurisdictions worldwide will transition their regulatory policies from lenient approaches (targeting anti-money laundering and payment issues) to comprehensive supervision (focusing on investor protection). Therefore, regulatory security will also be a point worth paying attention to in the second half of 2023.

Contact

If you need any blockchain security services, welcome to contact us:

Official Website Beosin EagleEye Twitter Telegram Linkedin

Comments

All Comments

Recommended for you

  • Another Iranian Oil Tanker Returns to Iran After Breaking US Blockade

    On April 21, according to CCTV News, maritime intelligence company 'TankerTrackers' reported that a tanker belonging to the National Iranian Tanker Company returned to Iran after unloading approximately 2 million barrels of crude oil in Indonesia, crossing the relevant maritime blockade line. The tanker is currently en route to Iran's main oil export hub, Khark Island, and is expected to arrive on April 22 local time. It is reported that the tanker set sail from Iran in late March, heading towards the Riau Islands of Indonesia.

  • White House: US and Iran on the Verge of Reaching an Agreement

    On April 21, White House Press Secretary Kayleigh McEnany stated in an interview with Fox News on the evening of the 20th that the United States and Iran are on the "verge of reaching an agreement." McEnany remarked, "The US has never been closer to achieving a truly good deal." However, she did not disclose any information regarding the current status of the negotiations. McEnany noted that even if an agreement is not reached, President Trump has multiple options and is not afraid to utilize these measures. Previous actions have demonstrated that Trump is not just "bluffing."

  • Kelp DAO Attacker Transfers 30,800 ETH to Special Address

    On April 21, news emerged that, according to monitoring by PeckShield, the Kelp DAO attacker transferred 30,800 ETH to a special address starting with 0x00000, possibly indicating a destruction action.

  • Trump: 'Midnight Hammer' Completely Dismantled Iran's Nuclear Dust Base

    On April 21, U.S. President Trump stated that the 'Midnight Hammer' operation has completely destroyed the 'nuclear dust' base within Iran. As a result, the cleanup will be a long and arduous process. The fake news media, including CNN and other corrupt media networks and platforms, have failed to give our great pilots the credit they deserve, instead always attempting to belittle and undermine them. They are losers!!! (Dongxin News Agency)

  • BTC Drops Below $76,000

    Market data shows that BTC has dropped below $76,000, currently priced at $75,999.63, with a 24-hour increase of 1.68%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Japan Officially Allows Export of Lethal Weapons Through Cabinet Resolution

    On April 21, according to Kyodo News, the Japanese government officially revised the 'Three Principles on Transfer of Defense Equipment' and its operational guidelines during a cabinet meeting, which will, in principle, allow the export of lethal weapons. (Xinhua News Agency)

  • Trump Claims Iran Will Negotiate

    On April 21, during a phone interview with CNN, U.S. President Trump stated that Iran "will negotiate" and expressed confidence in potential talks set to take place in Pakistan. Trump remarked, "They will negotiate; if they don't, they will face unprecedented problems." He also expressed hope that both sides could reach a "fair agreement" and emphasized that Iran "will not have nuclear weapons." Additionally, he defended military actions against Iran by stating there was "no choice" and claimed that they would ultimately "wrap things up."

  • Amazon to Invest Additional $5 Billion in Anthropic

    On April 21, Amazon announced on Monday that it will invest an additional $5 billion in the artificial intelligence company Anthropic, bringing the total investment to as much as $20 billion. Anthropic develops the Claude chatbot and programming tools, and plans to invest over $100 billion in Amazon's cloud technology and chips over the next decade.

  • Three U.S. Carrier Strike Groups May Deploy Simultaneously in the Middle East

    On April 21, according to CCTV, the U.S. military is expected to deploy three carrier strike groups simultaneously in the Middle East in the coming days. Currently, the USS Lincoln strike group is stationed in the Gulf of Oman, near the Strait of Hormuz, participating in maritime blockade operations; the USS Ford strike group is located in the northern Red Sea; and the USS Bush strike group, which is taking a route around Africa, is heading north from the southeast of Africa and is expected to enter the Arabian Sea—this carrier may replace the USS Ford in its mission. In the short term, the U.S. military may have three aircraft carriers in the Middle East.