In September 2024, Bedrock, a multi-asset liquid staking protocol, found itself in the crosshairs of a sophisticated exploit that drained around $2 million worth of crypto assets.
The attack primarily targeted uniBTC, a synthetic Bitcoin token issued by Bedrock, exposing a vulnerability that allowed hackers to mint excessive tokens without proper price calculation.
Let’s break down what happened, why it happened, and what can be done to prevent such exploits in the future.
Bedrock launched in February 2023 as a liquid restaking protocol, focusing on synthetic assets like uniBTC, uniETH, and uniIOTX. These synthetic tokens allow users to stake major blockchain tokens while still earning yield, making it attractive to both retail users and institutions looking to maximize their returns.
Bedrock quickly became one of the top liquid staking protocols with over $240 million in total value locked (TVL) on its platform.
UniBTC, a wrapped version of Bitcoin, was the epicenter of this exploit. It’s designed to offer Bitcoin staking yields, while its security is dependent on the underlying smart contracts—making it crucial for these contracts to function without vulnerabilities.
The core of the Bedrock exploit was an issue in the mint function of the uniBTC contract.
Here’s a breakdown of how the hacker managed to slip past the defenses:
Ready to secure your smart contracts? Take the first step towards a safer blockchain journey. Request an Audit with QuillAudits today & ensure your contracts are robust and secure!
The primary reason for the hack was the flawed mint function in the uniBTC contract, which didn’t account for the price differential between ETH and uniBTC.
This opened the door for an attacker to deposit a small amount of ETH and mint uniBTC at a highly disproportionate rate. Essentially, the protocol created far more uniBTC than it should have, given the value of the deposited ETH.
Once the hacker minted the excess uniBTC, they began to liquidate the tokens across DEXs.
According to our on-chain analysis:
Bedrock responded to the attack quickly, shutting down the affected contracts to prevent further losses. Key steps included:
Security breaches like this one remind us of the fragility of DeFi protocols. Here’s how this attack could have been prevented:
Know the whole scoop of crypto hacks, scams & key
highlights of 2024
Choosing a reputable audit firm like QuillAudits ensures that your protocol undergoes rigorous scrutiny
from experienced security professionals. QuillAudits specializes in uncovering critical vulnerabilities and providing actionable remediation strategies.
Our expertise helps safeguard your project from attacks, ensuring that security issues are addressed proactively.
Join 1000+ leaders who secured themselves from losing Billion Dollars.
Get Pure Alpha Straight to Your Inbox. Miss this, and you’re missing out.
Insider Secrets - Delivered Right to You. Subscribe now.