Web3 lost $644 million in six months, with contract logic vulnerabilities becoming the main target for hackers.

robot
Abstract generation in progress

Analysis of Common Attack Methods in the Web3 Field in the First Half of 2022

In the first half of 2022, the Web3 security sector faced severe challenges. Data shows that there were 42 major attack incidents caused solely by contract vulnerabilities, resulting in total losses of up to $644 million. Among these attacks, logical or function design flaws were the most commonly exploited vulnerabilities by hackers, followed by verification issues and reentrancy vulnerabilities.

"Anonymous" tactics disassembled: What are the common attack methods used by hackers in Web3 in the first half of 2022?

Major Loss Cases

On February 3, a certain cross-chain bridge project was attacked, resulting in a loss of approximately $326 million. The hacker exploited a signature verification vulnerability in the contract to successfully forge accounts and mint tokens.

On April 30, a lending protocol suffered a flash loan reentrancy attack, resulting in a loss of $80.34 million. This attack dealt a fatal blow to the project, ultimately leading to its closure.

The attacker implements the attack through the following steps:

  1. Perform a flash loan from a certain liquidity pool
  2. Exploiting the reentrancy vulnerability in contracts using cEther on lending platforms
  3. Extract all tokens from the affected pool by attacking the contract.
  4. Repay the flash loan and transfer the proceeds from the attack.

"Anonymous" tactics analysis: What are the common attack methods used by hackers in Web3 in the first half of 2022?

Common Vulnerability Types

During the smart contract audit process, the most common vulnerabilities can be divided into four major categories:

  1. ERC721/ERC1155 Reentrancy Attack: Involves malicious code in the token transfer notification function.

"Anonymous" Tactics Breakdown: What Are the Common Attack Methods Used by Hackers in Web3 in the First Half of 2022?

  1. Logical Flaw:
    • Insufficient consideration of special scenarios, such as self-transfer leading to the creation of something from nothing.
    • The functional design is not perfect, such as lacking extraction or settlement mechanisms.

"Anonymous" Tactics Analysis: What are the Common Attack Methods Used by Hackers in Web3 in the First Half of 2022?

  1. Missing Authentication: Key functions have not set permission control

"Anonymous" Tactics Dissection: What are the Common Attack Methods Used by Hackers in Web3 in the First Half of 2022?

  1. Price Manipulation:
    • Unused Time-Weighted Average Price
    • Directly use the token balance ratio in the contract as the price

"Anonymous" Tactics Breakdown: What are the Common Attack Methods Used by Hackers in Web3 in the First Half of 2022?

Vulnerability Prevention

Almost all vulnerabilities found in the audit have been exploited by hackers in real scenarios. Among them, contract logic vulnerabilities remain the main attack point. Most of these vulnerabilities can be discovered during the audit phase through professional formal verification platforms and manual reviews by security experts.

"Anonymous" Tactics Breakdown: What are the Common Attack Methods Used by Hackers in Web3 in the First Half of 2022?

To enhance the security of Web3 projects, it is recommended that the development team:

  1. Conduct a comprehensive contract security audit
  2. Emphasize special scenario testing
  3. Implement strict permission management
  4. Use reliable price oracles
  5. Follow the "Check-Effect-Interaction" design pattern

"Anonymous" tactics analysis: What are the commonly used attack methods by hackers in Web3 in the first half of 2022?

As attack methods continue to evolve, ongoing security awareness and upgrades to protective measures are crucial for the healthy development of the Web3 ecosystem.

"Anonymous" Tactics Breakdown: What are the common attack methods used by hackers in Web3 in the first half of 2022?

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 9
  • Repost
  • Share
Comment
0/400
AirdropSweaterFanvip
· 08-18 13:16
Oh no, it's another issue with smart contracts.
View OriginalReply0
ser_we_are_earlyvip
· 08-18 01:54
Rekt 6 e, guys, we are still early.
View OriginalReply0
BakedCatFanboyvip
· 08-15 23:59
The project party is all busy with their Rug Pulls.
View OriginalReply0
InscriptionGrillervip
· 08-15 15:23
Another wave of suckers has been played for suckers. Unlock the classics.
View OriginalReply0
OPsychologyvip
· 08-15 15:16
The money is gone, the money is gone, but the contract is still there.
View OriginalReply0
SigmaBrainvip
· 08-15 15:11
Money is gone, so it’s gone, right? Daily life.
View OriginalReply0
MEVHuntervip
· 08-15 15:05
just another day in defi... weak contracts get rekt, alpha leaks everywhere smh
Reply0
GateUser-40edb63bvip
· 08-15 14:59
Just knowing that exploiting vulnerabilities is really annoying.
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)