Cointime

Download App
iOS & Android

SharkTeam: PolyNetwork attack principles and asset transfer analysis

On July 2nd, Poly Network was attacked, and assets worth over three billion dollars were minted across multiple chains. The attacker has already profited approximately 10 million dollars. Through analysis, we have discovered that the attacker had already attempted an attack on April 28th, but it was unsuccessful at that time. On July 2nd, they carried out the attack again and succeeded. SharkTeam has analyzed the attack principles and the current fund transfer patterns employed by the hacker.

1. Analysis of Attack Principle

Take an attack transaction on Ethereum as an example

Attacker address:

0x906639ab20d12a95a8bec294758955870d0bb5cc

Attacked contract:

0x250e76987d838a75310c34bf422ea9f1AC4Cc906

Attack transactions:

0x1b8f8a38895ce8375308c570c7511d16a2ba972577747b0ac7ace5cc59bbb1c4

Attack process:

1. The attacker (0x906639ab) calls the lock function of the attacked contract (0x250e7698) to lock 0.000000000000001 LEV coins

2. Then the attacker (0x906639ab) called verifyHeaderAndExecuteTx of the attacked contract (0x250e7698), and directly extracted a large amount of LEV coins, which obviously did not match the locked amount

3. Then the attacker (0x906639ab) calls verifyHeaderAndExecuteTx of the attacked contract (0x250e7698) again to extract a large amount of LEV coins.

The root cause of the attack is that the hacker obtained the signatures of 3 of the 4 EOA accounts in the multi-signed contract, and then realized the withdrawal and additional issuance operations. Hackers are highly likely to obtain private keys or signatures through social engineering means such as phishing or APT attacks.

2. Analysis of asset transfer mode

As analyzed above, this is a long-planned attack against PolyNetwork, not an attack that exploits an accidental contract loophole. It is very different from the reason why Poly Network was attacked last year. Hackers had already implemented the exact same attack on April 28 this year, but it was not successful. The success of the attack on July 2 is probably because the hackers successfully obtained sufficient signature authority or private information during this period. key (3/4)

At present, the estimated loss due to this attack exceeds 10 million US dollars. Through the analysis of asset transfers, we found that hackers are conducting asset transfers that are well-planned and organized.

Attacker address:

0xe0Afadad1d93704761c8550F21A53DE3468Ba599

The main assets have been transferred to the following 21 Ethereum addresses after July 2 and July 3:

0xc8Ab4aa93949c377C32c069272425bd42738C42F

0x23f4CA51aa75d9d3f28888748d514173394Cc671

0xfD3E731AFf8B930337302f26EEf015CFA022b778

0x3d66756BE05b9A54138530c3e5103A7A489E7047

0x2F6C25E3c93c0FC7fdDe2Ece8e370AE152a57B82

0xB69F28D84497107c2740471926Cc258BA1B855e9

0x85ef23553eae46eE8759Ee347D2b2fb1ee99bB60

0xbf6302Cbb051e1579Fe0eE116daf708739Ca4aE6

0x21f1628F288fc54c61284CFDc8275DAf7d057118

0x6893D0DE6746ffae0CDc94916F98B03E566B67a5

0xbCAC1C15AFEA9cd5a4879c8a476BC6494d544eb6

0xe5fa7E2AEC791Da10c5D5F397c4013e7C42dDAb9

0x9D8195f3DcC357Cd0A14De2609C9bB7e82831d66

0x5979fbfe759f77287B4F8129CD3949d6bD87A9f9

0x8d62f78a18AB68C7808183609B25b29e476b3573

0x8D72F9597571b6f1BA416beFf61Ef204732446a7

0xF3066Df075eFBCa47963e8E883E4055C02B0eb8A

0x9E98612E0ABB4E2034D2dE7f23Cf56644E56F89b

0x38aD785acF804c070a2DEc73cFbf85F4C08fD913

0x211AE110E2318c7cfA9391B390E5021709218D12

0x1417ba048C1FB874b00f519D5Ef68E8955bbe729

The amount and types are relatively scattered, just to prepare for subsequent money laundering, and most of them are new addresses, with little interaction with other exchanges, so the difficulty of asset recovery this time will be relatively large. SharkTeam has monitored these asset transfer addresses, and if there is any change in the account, it will be alerted and synchronized as soon as possible.

About us

SharkTeam’s vision is to comprehensively protect the security of the Web3 world. The team is composed of experienced security professionals and senior researchers from all over the world. They are proficient in the underlying theory of blockchain and smart contracts, and provide services including smart contract auditing, on-chain analysis, and emergency response. It has established long-term cooperative relationships with key players in various fields of the blockchain ecosystem, such as Polkadot, Moonbeam, polygon, OKC, Huobi Global, imToken, ChainIDE, etc.
Official website: https://www.sharkteam.org/
Twitter: https://twitter.com/sharkteamorg
Discord: https://discord.gg/jGH9xXCjDZ
Telegram: https://t.me/sharkteamorg

Comments

All Comments

Recommended for you

  • CFTC settles registration violations with Falcon Labs

    The US Commodity Futures Trading Commission (CFTC) has reached a settlement with the major cryptocurrency broker Falcon Labs, Ltd. to resolve Falcon Labs' failure to register. This is the CFTC's first action against an unregistered futures commission merchant, and Falcon Labs was accused of improperly facilitating customer trading on digital asset exchanges. Falcon Labs neither admitted nor denied the CFTC's findings and was fined over $1.7 million. Previously, the CFTC had charged Binance and its former CEO, and Falcon Labs subsequently changed its method of collecting customer information and updated its know-your-customer policy. The CFTC said it hopes to encourage other illegal digital asset intermediaries to report their activities through cooperation and reform with Falcon Labs.

  • Chainalysis: Around $24 Million in Crypto to be Stolen by Impostors and Tax Authorities in 2023

    According to Chainalysis, by 2023, approximately $24 million worth of cryptocurrency will be stolen through impersonation and tax authority scams. The company estimates that as of April 2024, the total amount stolen will be close to $17 million.

  • Tether CEO: Ripple CEO's comments spread fear about USDT

    According to reports, Tether CEO Paolo Ardoino responded to comments made by Ripple CEO Brad Garlinghouse in a recent interview about the stablecoin Tether (USDT) on social media. Garlinghouse stated in the interview that the US government is pursuing Tether, which is clear to me. Ardoino said that an uninformed CEO leading a company under SEC investigation launched a competitive stablecoin (cui prodest), spreading fear about USDT. Ardoino emphasized Tether's critical role in providing financial services to unbanked communities in emerging and developing regions, which are often overlooked by traditional financial institutions. He further asserted that Tether adheres to strict transparency and regulatory compliance standards, as evidenced by its compliance with the OFAC/SDN list, its partnership with Chainalysis, and its extensive collaboration with international law enforcement agencies to detect and prevent illegal activities, thereby enhancing the security of its ecosystem.

  • Multisig Exploit hacker-related addresses become active and launder money

    Multisig Exploit's hacker attack was the first hacker attack in ETH's history, with over 150,000 ETH stolen, worth about $30 million at the time (back in July 2017). Today it is worth nearly $450 million, and more than 80,000 ETH is still involved in the addresses starting with 0xb37647. The address has sent about 70,000 ETH to seven different addresses, each with 10,000 ETH. In recent months, these different addresses have been slowly laundering the money. One of the addresses starting with 0x5167052 has recently become active again.

  • Web3 AI platform ChainML completes $6.2 million seed round of financing

    Web3 AI platform ChainML has announced the completion of a $6.2 million seed round of expansion financing, led by Hack VC, with participation from Inception Capital, HTX Ventures, Figment Capital, Hypersphere Ventures, and Alumni Ventures. The platform also announced the launch of its agent-based foundation layer, Theoriq.

  • Metaverse project Baby Shark Universe completes seed round financing

    Baby Shark Universe project, a metaverse project, has completed a seed round of financing with a valuation of $34 million. Participating investors include Animoca Brands, CREDIT SCEND, Sui Foundation, Comma3 Ventures, Creditcoin, GM Ventures, Neuler, Notch Ventures, X+, and Planetarium. The specific amount has not been disclosed, and the new funds will be used for development and global marketing. According to reports, Baby Shark Universe is an open-world role-playing game where players can create their own game content (items, maps), enjoy content created by other players, and expand the game's narrative based on their choices and actions.

  • Hong Kong Stock Exchange Confirms Crypto ETFs Unavailable to Mainland Chinese Investors

    According to Coindesk, the Hong Kong Stock Exchange has confirmed that cryptocurrency ETFs are not available to mainland Chinese investors. Hong Kong's cryptocurrency ETFs will provide a means to bypass capital controls in mainland China due to their unique physical redemption model.

  • Web3 social infrastructure UXLINK completes $5 million in financing

    Web3 social infrastructure UXLINK announced the completion of a new round of $5 million financing, led by SevenX Ventures, INCE Capital, and HashKey Capital. It is reported that UXLINK's total financing has now exceeded $15 million.

  • OKX Ventures invests in Web3 ‘play ARPG to train AI’ game Blade of God X

    The game is currently available in early access on the Epic Games Store.

  • Barcelona-based Web3 Video Games Startup GFAL Raises $3.2M in Seed Funding to Expand Team and Accelerate Production Plans

    Barcelona-based startup GFAL has secured $3.2 million in seed funding from investors including Supercell Ltd and Mitch Lasky. The company plans to use the funds to expand its team and accelerate its game production plans, which leverage AI and Web3 technology for immersive gameplay. GFAL's Elemental Raiders mobile game soft-launched in March 2023, with plans to build on this for a 2024 launch. CEO Manel Sort expressed gratitude for the investment and excitement to work with former colleagues from Digital Chocolate.