![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
Articles d’actualité sur les crypto-monnaies
Flash Loan Attack Drains 500K USD From CloberDEX on Base
Dec 26, 2024 at 09:05 am
Recently, an on-chain attack was detected against CloberDEX, a project on Base. The attacker gained about 133 ETH, or about 500,000 USD, through this attack.
The attacked project is CloberDEX, and its main functions are as follows: open a new trading pool containing trading pairs A to B and B to A, and each trading pair also contains a preset trading strategy; mint is to add liquidity to the trading pair and obtain LP Token; burn is to destroy LP Token to obtain the corresponding currency.
Let's take a look at the attack process:
First, the attacker borrowed 267 WETH from Morpho Blue using flashloan.
Then, the attacker used open to open two trading pairs on CloberDEX, namely Token/WETH and WETH/Token, where Token is a contract deployed by the attacker himself.
Then, the attacker used mint to transfer 267 WETH and 267 Token to the newly opened trading pair to add liquidity and obtain LP Token.
So far, there is no problem. Finally, the attacker uses burn to destroy the LP Token just obtained. Let's take a look at the specific implementation of burn;
The control flow goes to the lock function. Similarly, let's take a look at the specific implementation of lock;
As you can see, the lock function passes bytes caldata data to the lockAcquired function. Let's continue to look at the implementation of this function.
We found this line of code
We can see that the function called by the code is determined by data. The first four bytes of data are the signature of _burn, so burn essentially calls _burn.
We can see that _burn calls pool.strategy.burnHook(msg.sender, key, burnAmount,supply) again, and the processing of the pool's reserver comes after this code. So, the problem lies here. The address of the strategy contract of the pool corresponding to the trading pair can be controlled by the attacker. In this attack, the attacker wrote the address as his own attack contract address: 0x32fb1bedd95bf78ca2c6943ae5aeaeaafc0d97c1 .
When the contract process reaches the BurnHook of the attacking contract, burn is called again to complete the reentrancy attack.
The attacker took out 264 WETH and 133 WETH from the CloberDEX contract through this vulnerability, and made a profit of 133.7 ETH after repaying the flashloan loan, which is about 500,000 USD.
The main cause of this vulnerability is that the CloberDEX project contract did not perform reentrancy detection and protection in the code for obtaining and destroying LP Tokens, and the state variables were updated after the contract was called, which eventually led to the attacker using the reentry vulnerability to empty the project's WETH. It is recommended that the project party should conduct multi-party verification when designing the economic model, price calculation mechanism and code operation logic, and try to select multiple audit companies for cross-audit when auditing the contract before it goes online.
Clause de non-responsabilité:info@kdj.com
Les informations fournies ne constituent pas des conseils commerciaux. kdj.com n’assume aucune responsabilité pour les investissements effectués sur la base des informations fournies dans cet article. Les crypto-monnaies sont très volatiles et il est fortement recommandé d’investir avec prudence après une recherche approfondie!
Si vous pensez que le contenu utilisé sur ce site Web porte atteinte à vos droits d’auteur, veuillez nous contacter immédiatement (info@kdj.com) et nous le supprimerons dans les plus brefs délais.
-
- Robert Kiyosaki toujours haussier sur Bitcoin: pourquoi 107k $ est «bon marché»
- Jul 02, 2025 at 08:30 pm
- L'auteur de Rich Dad Poor Dad, Robert Kiyosaki, double le bitcoin, considérant même 107 000 $ comme une bonne affaire. Découvrez pourquoi il achète toujours et sa prédiction audacieuse de 1 million de dollars.
-
-
- Licences de nœud de damier d'Aethir: maintenant échangeable et faire des vagues!
- Jul 02, 2025 at 08:30 pm
- Les licences de nœud de damier Aethir sont désormais négociables sur Nodestore, ajoutant de la liquidité à un calcul décentralisé. De plus, Aethir organise des événements Web3 exclusifs à New York et Cannes.
-
- Paiements instantanés, FinTech et USDC Stablecoins: une nouvelle ère de financement?
- Jul 02, 2025 at 06:30 pm
- Exploration de l'intersection des paiements instantanés, de l'innovation fintech et de la montée en puissance des stablescoins de l'USDC et du potentiel transformateur pour les entreprises et les consommateurs.
-
-
- Crypto Summit, White House et Bitcoin Solaris: une nouvelle ère?
- Jul 02, 2025 at 06:50 pm
- Exploration de l'intersection de la politique cryptographique à Washington et Bitcoin Solaris à l'approche de l'exploitation minière et des investissements, au milieu des initiatives d'actifs numériques de la Maison Blanche.
-
-
-
- Paddington Coin Mania: Rare Find ou Fool's Gold? La question de 10 000 £!
- Jul 02, 2025 at 07:10 pm
- Est-ce que Paddington Bear 50p Coin dans votre poche vaut une fortune? Nous plongeons dans le battage médiatique autour de pièces de monnaie «rares» et des étiquettes de prix de 10 000 £ qui ont fait son apparition en ligne.