On the 9th of August 2023, Earning Farm from Aave protocol was attacked. The attack was made possible by a reentrancy vulnerability. And around $528k was stolen by the exploiter from the exploit.
Earning Farm is a set of smart contracts that manage crypto assets. To learn more about them, check out their website.
Attacker Address: 0xee4b3dd20902Fa3539706F25005fa51D3b7bDF1b
Victim Contract: 0xFe141C32E36Ba7601D128F0C39DEdBE0F6aBb983
Attack Transaction: 0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa
Although the root cause of the attack was reentrancy but a flawed business logic in burning the shares was also responsible for increasing the impact of the attack.
The withdraw() function was the function that the attacker reentered.
Notice how the withdrawing process is executed before burning the shares.
Upon close analysis a logical flaw was spotted.
Here is the fund flow during and after the exploit. You can see more details here.
Currently, all the funds residing in a bundle of 4 addresses with the majority of funds in these –
0x9d5765ae1c95c21d4cc3b1d5bba71bad3b012b68
0xe0afadad1d93704761c8550f21a53de3468ba599
Here is a snippet of one of the wallet address
The Project hasn’t acknowledged the attack as of now.
Incident Timelines
Aug-09-2023 07:34:23 AM +UTC – A suspicious transaction was spotted on stETH to/from Aave Protocol.
Aug-09-2023 07:41:59 AM +UTC – Another suspicious transaction was spotted.
Aug-10-2023 02:49:11 AM +UTC – The attacker transferred the stolen funds to multiple different addresses.
Your weekly dose of Web3 innovation and security, featuring blockchain updates, developer insights, curated knowledge, security resources, and hack alerts. Stay ahead in Web3!