When an attack hits a project designed for savvy degen traders, you know things are about to get complicated.
The Banana Gun exploit wasn’t your run-of-the-mill hack, it targeted some of the veterans in the crypto space.
Let's peel back the layers of what exactly happened, how it happened, and what steps are being taken to make sure it doesn’t happen again.
On September 19, 2024, an exploit in the Banana Gun trading bot resulted in $3 million being siphoned from 11 users, most of whom were experienced traders.
The attackers exploited a vulnerability in the Telegram message oracle, allowing them to manually transfer ETH from victims' wallets while they were using the bot.
It was patched later on & all affected users are fully reimbursed from the Banana Gun treasury, with no tokens sold to fund these repayments.
For those unfamiliar, Banana Gun is a popular Telegram-based crypto trading bot that automates trades on EVM and Solana blockchains.
These bots are designed for efficiency, helping traders execute profitable trades seamlessly. With a growing reputation among crypto veterans, Banana Gun’s bots were trusted for their speed and reliability—until this exploit threw a wrench in the gears.
The exploit wasn’t a typical, automated smart contract drain.
Here’s how it unfolded:
Targeting High-Value Users:
The attacker was laser-focused on seasoned traders, folks who know their way around crypto. These were people with notable social presence or trading expertise.
Manual Transfers:
The attackers exploited a flaw in the Telegram message oracle, manually transferring ETH from wallets while the victims were using the bot. Essentally, the victims witnessed their funds being drained in real time.
No Scripted Draining:
This wasn’t a typical automated bot attack; it required manual involvement, hinting at a more targeted and precise exploit.
Impact on Both EVM and Solana Bots:
The attack affected both the EVM and Solana bots, though they operate on different codebases, showing the vulnerability was within a shared component, the Telegram oracle.
Ready to secure your smart contracts? Take the first step towards a safer blockchain journey. Request an Audit with QuillAudits today & ensure your contracts are robust and secure!
Our investigation uncovered a vulnerability in the Telegram message oracle used by the Banana Gun bot. This flaw allowed the attacker to intercept messages and gain unauthorized access to user wallets. Once the attacker had access, they could initiate manual transfers while the bot was still in use by victims.
In simpler terms: the bot’s security hole allowed the attacker to manipulate user wallets during live trading sessions, manually sending ETH to their own addresses while the victims were interacting with the bot.
After the attack, funds were distributed across multiple wallet addresses controlled by the attacker.
Here's the list of attacker wallets (11):
Here are some of the victim wallets (45):
Banana Gun’s team took swift action after the attack to ensure no further damage:
Immediate Bot Shutdown:
As soon as the unauthorized transfers were detected, both the EVM and Solana bots were immediately shut down to prevent further exploitation.
Full Refunds:
Affected users were promised full refunds from the Banana Gun treasury, ensuring that no tokens would be sold to reimburse them.
Security Patch and Bot Re-Activation:
The vulnerability in the Telegram message oracle was patched, and both bots were redeployed with enhanced security measures.
New Security Measures:
To avoid a repeat scenario, Banana Gun introduced several new layers of protection:
Collaboration with Security Experts:
Banana Gun teamed up with Security Alliance to conduct further audits and penetration tests on the bot infrastructure.
This attack is a reminder of the importance of airtight security measures, especially when dealing with user funds.
Here are a few ways these projects can mitigate risks moving forward:
Use Multi-Factor Authentication (2FA):
Multi-factor authentication is a must-have in this day and age. Requiring multiple verification steps can stop attackers dead in their tracks.
Regular Audits and Penetration Testing:
It’s essential for projects to regularly audit their smart contracts and infrastructure. Partnering with security firms like QuillAudits to conduct penetration tests can help identify vulnerabilities before attackers do.
Time Delays on High-Value Transactions:
Introducing a time delay on transfers, especially for large sums, gives users a window to catch any suspicious activity and cancel transactions before they’re executed.
Vulnerability Bounties:
Consider running a bug bounty program where security researchers are incentivized to find and report vulnerabilities before they can be exploited in the wild.
Choosing a reputable audit firm like QuillAudits ensures that your protocol undergoes rigorous scrutiny
from experienced security professionals. QuillAudits specializes in uncovering critical vulnerabilities and providing actionable remediation strategies.
Our expertise helps safeguard your project from attacks, ensuring that security issues are addressed proactively.
Get Pure Alpha Straight to Your Inbox. Miss this, and you’re missing out.
Insider Secrets - Delivered Right to You. Subscribe now.