Hackers siphon millions in cryptocurrency from dForce exchange
Known ERC777 vulnerability allowed hackers to steal $25m in cryptocurrency
Chinese decentralized finance (DeFi) protocol dForce has fallen victim to a well-known exploit of an Ethereum token which led to $25m worth of its customers' cryptocurrency being stolen.
As reported by Decrypt, DForce had recently secured $1.5m in a seed funding round led by the crypto venture capital fund Multicoin Capital. However, those funds were drained from the contracts of a lending protocol that is part of dForce called Lendf.Me.
Lendf.Me is now offline and all of its smart contracts have been paused. However, the hackers did return $126.014 of the stolen funds back to the lending platform with a note, which read “Better luck next time”.
- Cryptocurrency deals dried up in 2019
- Bitcoin Cash "halving event" could cause many miners to give up
- Also check out the best antivirus software
ERC777 token vulnerability
A similar attack was recently launched against the decentralized exchange Uniswap to steal over $300,000. The exchange's smart contracts containing an Ethereum-based, tokenized version of Bitcoin run by TokenIon called imBTC were drained. The connection between the two attacks deals with the fact that Lendf.ME integrated imBTC earlier this year.
The Uniswap attack leveraged a known vulnerability in the ERC77 token standard. As a result of the way Uniswap smart contracts are set up, a hacker could continually withdraw ERC77 funds from Uniswap before the balance updated which could allow them to drain the contracts of imBTC.
While the dForce hack is entire separate from the Uniswap hack, it is believed that the same exploit was used in both attacks. The vulnerability is not new and the firm ConsenSys conducted an extensive audit of Uniswap 16 months ago, concluding that it was a “major” issue.
To make matters worse, the CEO of Compound, Robert Leshner claims that Lendf.Me had appropriated its open source code. In a tweet, Leshner called out Lendf.Me's security, saying: “If a project doesn't have the expertise to develop its own smart contracts, and instead steals and redeploys somebody else's copyrighted code, it's a sign that they don't have the capacity or intention to consider security.”
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
As of now, dForce has not discussed the hack on its social media channels and it looks like the rest of the stolen funds won't be returned anytime soon.
- We've also highlighted the best PCs for mining
Via Decrypt
After working with the TechRadar Pro team for the last several years, Anthony is now the security and networking editor at Tom’s Guide where he covers everything from data breaches and ransomware gangs to the best way to cover your whole home or business with Wi-Fi. When not writing, you can find him tinkering with PCs and game consoles, managing cables and upgrading his smart home.