Web3 Hacker Analysis of Common Attack Techniques in the First Half of 2022
In the first half of 2022, the security situation in the Web3 field was severe. Data shows that there were a total of 42 major attack incidents caused by smart contract vulnerabilities, resulting in total losses of up to $644 million. Among these attacks, the exploitation of contract vulnerabilities accounted for more than half, reaching 53%.
Common Attack Techniques
Analysis shows that the most commonly exploited vulnerabilities by hackers include:
Improper design of logical OR function
Verification Issues
Reentrancy Vulnerability
Major Loss Cases
Wormhole event
On February 3, 2022, the Solana cross-chain bridge project Wormhole was attacked, resulting in a loss of approximately $326 million. The Hacker exploited a signature verification vulnerability in the contract to successfully forge accounts to mint wETH.
Fei Protocol event
On April 30, 2022, the Rari Fuse Pool under Fei Protocol suffered a flash loan combined with a reentrancy attack, resulting in a loss of $80.34 million. This incident ultimately led to the project's announcement of closure on August 20.
The attacker implements the attack through the following steps:
Obtain flash loans from Balancer
Exploiting the reentrancy vulnerability in the cEther contract of Rari Capital
Extract all tokens affected in the pool through the callback function
Repay the flash loan and transfer the profits
Common Vulnerabilities in Audits
The most common types of vulnerabilities in the smart contract auditing process include:
ERC721/ERC1155 Reentrancy Attack
Logic flaws ( insufficient consideration of special scenarios, imperfect function design )
Missing Authentication
Price Manipulation
Vulnerability Prevention
Most of the vulnerabilities that are actually exploited can be discovered during the audit phase. Contract developers should focus on:
Strictly follow the check-effect-interactive mode
Improve special scenario handling
Strengthen permission management
Use a reliable price oracle
Through a professional smart contract formal verification platform and manual review by security experts, potential risks can be effectively identified, and timely remediation measures can be taken to enhance contract security.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
13 Likes
Reward
13
9
Repost
Share
Comment
0/400
FOMOSapien
· 08-14 22:52
The Last Dignity of Digital Refugees
View OriginalReply0
GateUser-3824aa38
· 08-14 20:58
Are smart contracts all bugs?
View OriginalReply0
LongTermDreamer
· 08-14 08:09
Opportunities brought by vulnerabilities, looking back three years later, it's all trivial.
View OriginalReply0
LightningPacketLoss
· 08-14 04:32
Damn, someone has been stolen again.
View OriginalReply0
ParanoiaKing
· 08-14 04:32
600 million is gone, what coin can we play with? Let's disperse.
Web3 Security Report: Hacker attacks in the first half of 2022 caused losses of $644 million
Web3 Hacker Analysis of Common Attack Techniques in the First Half of 2022
In the first half of 2022, the security situation in the Web3 field was severe. Data shows that there were a total of 42 major attack incidents caused by smart contract vulnerabilities, resulting in total losses of up to $644 million. Among these attacks, the exploitation of contract vulnerabilities accounted for more than half, reaching 53%.
Common Attack Techniques
Analysis shows that the most commonly exploited vulnerabilities by hackers include:
Major Loss Cases
Wormhole event
On February 3, 2022, the Solana cross-chain bridge project Wormhole was attacked, resulting in a loss of approximately $326 million. The Hacker exploited a signature verification vulnerability in the contract to successfully forge accounts to mint wETH.
Fei Protocol event
On April 30, 2022, the Rari Fuse Pool under Fei Protocol suffered a flash loan combined with a reentrancy attack, resulting in a loss of $80.34 million. This incident ultimately led to the project's announcement of closure on August 20.
The attacker implements the attack through the following steps:
Common Vulnerabilities in Audits
The most common types of vulnerabilities in the smart contract auditing process include:
Vulnerability Prevention
Most of the vulnerabilities that are actually exploited can be discovered during the audit phase. Contract developers should focus on:
Through a professional smart contract formal verification platform and manual review by security experts, potential risks can be effectively identified, and timely remediation measures can be taken to enhance contract security.