📢 Gate Square #MBG Posting Challenge# is Live— Post for MBG Rewards!
Want a share of 1,000 MBG? Get involved now—show your insights and real participation to become an MBG promoter!
💰 20 top posts will each win 50 MBG!
How to Participate:
1️⃣ Research the MBG project
Share your in-depth views on MBG’s fundamentals, community governance, development goals, and tokenomics, etc.
2️⃣ Join and share your real experience
Take part in MBG activities (CandyDrop, Launchpool, or spot trading), and post your screenshots, earnings, or step-by-step tutorials. Content can include profits, beginner-friendl
Web3 Security in Crisis: 42 Attacks in the First Half of the Year Caused Losses of $644 Million
Analysis of Common Web3 Hacker Attack Methods: Interpretation of Security Situation in the First Half of 2022
In the first half of 2022, the security situation in the Web3 field was not optimistic. According to monitoring data from a blockchain situational awareness platform, there were a total of 42 major contract vulnerability attack incidents, resulting in losses of up to $644 million. Among these attacks, contract vulnerability exploitation accounted for more than half, becoming the hackers' preferred method.
Analysis of Main Attack Types
Among all the exploited vulnerabilities, logical or function design flaws are the most commonly targeted by hackers. Following that are validation issues and reentrancy vulnerabilities. These vulnerabilities not only occur frequently but often lead to significant losses.
For example, in February 2022, the cross-chain bridge project Wormhole in the Solana ecosystem was attacked, resulting in losses of up to $326 million. The attacker exploited a signature verification vulnerability in the contract to successfully forge system accounts and mint a large amount of wETH.
Another major incident occurred at the end of April, when the Rari Fuse Pool under Fei Protocol suffered a flash loan combined reentrancy attack, resulting in a loss of 80.34 million USD. This attack dealt a fatal blow to the project, ultimately leading to the project's announcement of closure in August.
In-depth Analysis of Fei Protocol Attack Cases
The attacker first took out a flash loan from Balancer and then used these funds for collateralized borrowing on Rari Capital. Due to the reentrancy vulnerability in the cEther implementation contract of Rari Capital, the attacker successfully extracted all tokens from the affected pool through a carefully crafted callback function.
The attack process is roughly as follows:
This attack ultimately resulted in the theft of over 28,380 ETH (approximately $80.34 million).
Common Vulnerability Types
During the smart contract auditing process, the most common types of vulnerabilities mainly include:
These vulnerabilities not only frequently appear during audits but are also the most commonly exploited weaknesses in actual attacks. Among them, logical vulnerabilities in contracts remain the hackers' favorite attack targets.
Prevention Suggestions
To enhance the security of smart contracts, it is recommended that project parties take the following measures:
Through professional security auditing and verification platforms, combined with manual checks by security experts, most vulnerabilities can be identified and fixed before a project goes live. This not only effectively reduces project risks but also contributes to the healthy development of the entire Web3 ecosystem.