skip to Main Content
bitcoin
Bitcoin (BTC) $ 95,995.72 0.97%
ethereum
Ethereum (ETH) $ 3,334.91 1.51%
tether
Tether (USDT) $ 0.999628 0.05%
xrp
XRP (XRP) $ 2.20 3.19%
bnb
BNB (BNB) $ 670.76 0.54%
solana
Solana (SOL) $ 184.98 0.50%
dogecoin
Dogecoin (DOGE) $ 0.316514 1.58%
usd-coin
USDC (USDC) $ 1.00 0.01%
staked-ether
Lido Staked Ether (STETH) $ 3,330.65 1.56%
cardano
Cardano (ADA) $ 0.899516 1.86%

Onyx Protocol exploiter begins siphoning $2.1M loot on Tornado Cash

The bug the Onyx Protocol hacker exploited to steal $2.1 million was previously used by a hacker to extort $7 million from Hundred Finance.

485 Total views

9 Total shares

Onyx Protocol exploiter begins siphoning $2.1M loot on Tornado Cash

Decentralized peer-to-peer lending platform Onyx Protocol lost roughly $2.1 million in an exploit of a market with no liquidity that was deployed on Oct. 27. 

The Onyx Protocol hacker exploited a known bug, a rounding issue behind the popular CompoundV2 fork, explained blockchain investigator PeckShield soon after alerting about the hack that went unnoticed by the protocol.

#PeckShieldAlert @OnyxProtocol has been exploited for ~2.1M pic.twitter.com/5Z50tCg6MD

— PeckShieldAlert (@PeckShieldAlert) November 1, 2023

The alleged liquidity lacking oPEPE market was “abused with donation to borrow funds from other markets with liquidity,” found PeckShield’s independent investigation on the matter.

“The donated funds were then redeemed by exploiting the known rounding issue.”

Previously, on April 16, an attacker exploited the same bug to steal $7 million from multichain lending protocol Hundred Finance.

#CertiKSkynetAlert @HundredFinance’s attacker manipulated the exchange rate between ERC-20 tokens and htokens which allowed them to withdraw more tokens than they had originally deposited. The estimated losses of this attack is around $7.4 million.

Stay vigilant! https://t.co/1hxAnFoNjj

— CertiK Alert (@CertiKAlert) April 15, 2023

In Hundred’s case, the attacker manipulated the exchange rate between ERC-20 tokens and hTOKENS, allowing them to withdraw more tokens than originally deposited, according to CertiK.

Related: Crypto thief steals $4.4M in a day as toll rises from LastPass breach

Consistent hack attempts from bad actors require a greater understanding of the art of tracking cryptocurrencies.

A recent Cointelegraph Research article details the various methods that can be used to fortify crypto security with blockchain analysis. As explained, tracking stolen crypto using blockchain analysis broadly involves six major steps: transaction tracing, address clustering, behavioral analysis, pattern recognition, regulatory vigilance and collaboration.

Magazine: Slumdog billionaire: Incredible rags-to-riches tale of Polygon’s Sandeep Nailwal

Loading data ...
Comparison
View chart compare
View table compare
Back To Top