{"id":30435,"date":"2022-09-29T01:41:40","date_gmt":"2022-09-29T01:41:40","guid":{"rendered":"http:\/\/egrowonline.com\/?p=30435"},"modified":"2022-09-29T01:41:40","modified_gmt":"2022-09-29T01:41:40","slug":"the-crypto-world-is-on-edge-after-a-string-of-hacks","status":"publish","type":"post","link":"http:\/\/egrowonline.com\/?p=30435","title":{"rendered":"The Crypto World Is on Edge After a String of Hacks"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">Not long after dropping out of college to pursue a career in cryptocurrencies, Ben Weintraub woke up to some bad news.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Mr. Weintraub and two classmates from the University of Chicago had spent the past few months working on a software platform called Beanstalk, which offered a <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2022\/06\/17\/technology\/tether-stablecoin-cryptocurrency.html\" title=\"\" rel=\"noopener\">stablecoin<\/a>, a type of cryptocurrency with a fixed value of $1. To their surprise, Beanstalk became an overnight sensation, attracting crypto speculators who viewed it as an exciting contribution to the experimental field of <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/interactive\/2022\/03\/18\/technology\/what-is-defi-cryptocurrency.html#:~:text=DeFi%20(pronounced%20dee%2Dfye),Don't\" title=\"\" rel=\"noopener\">decentralized finance<\/a>, or DeFi.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Then it collapsed. In April, a hacker exploited a flaw in Beanstalk\u2019s design to steal more than $180 million from users, one of a series of thefts this year targeting DeFi ventures. The morning of the hack, Mr. Weintraub, 24, was home for Passover in Montclair, N.J. He walked into his parents\u2019 bedroom.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">\u201cWake up,\u201d he said. \u201cBeanstalk is dead.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Hackers have terrorized the crypto industry for years, stealing Bitcoin from online wallets and <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2014\/02\/25\/business\/apparent-theft-at-mt-gox-shakes-bitcoin-world.html\" title=\"\" rel=\"noopener\">raiding the exchanges<\/a> where investors buy and sell digital currencies. But the rapid proliferation of DeFi start-ups like Beanstalk has given rise to a new type of threat.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">These loosely regulated ventures allow people to borrow, lend and conduct other transactions without banks or brokers, relying instead on a system governed by code. Using DeFi software, investors can take out loans without revealing their identities or even undergoing a credit check. As the market surged last year, the emerging sector was <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2021\/09\/05\/us\/politics\/cryptocurrency-explainer.html\" title=\"\" rel=\"noopener\">hailed<\/a> as the future of finance, a democratic alternative to Wall Street that would give amateur traders access to more capital. Crypto users <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.defipulse.com\/?time=All\" title=\"\" rel=\"noopener noreferrer\">entrusted roughly $100 billion<\/a> in virtual currency to hundreds of DeFi projects.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">But some of the software was built on faulty code. This year, $2.2 billion in cryptocurrency has been stolen from DeFi projects, according to the crypto tracking firm Chainalysis, putting the overall industry on a pace for its worst year of hacking losses.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Many of the thefts have stemmed from flaws in the computer programs \u2014 known as \u201csmart contracts\u201d \u2014 that power DeFi. The programs are often built hastily. And because smart contracts use open-source code, which provides a publicly viewable map of the software, hackers have been able to orchestrate attacks on the digital infrastructure itself, rather than simply infiltrating someone\u2019s account. It\u2019s the difference between robbing an individual and emptying an entire bank vault.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">\u201cDeFi has introduced a whole other level for hackers to be able to access a platform,\u201d said Erin Plante, vice president of investigations at Chainalysis. \u201cIt\u2019s putting a lot of pressure on the space and restricting the innovation that\u2019s possible.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The breaches have shaken faith in DeFi during a grim period for the crypto industry. An <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2022\/06\/29\/technology\/crypto-crash-divide.html\" title=\"\" rel=\"noopener\">epic crash<\/a> this spring erased nearly $1 trillion and forced several high-profile companies into <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2022\/08\/18\/technology\/crypto-crash-investments.html\" title=\"\" rel=\"noopener\">bankruptcy<\/a>. In August, thieves exploited a coding issue to <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-08-05\/crypto-bridge-nomad-offers-10-bounty-after-190-million-hack?sref=zVYYYI5e\" title=\"\" rel=\"noopener noreferrer\">drain $190 million<\/a> from a company called Nomad. Last week, the crypto firm Wintermute said its DeFi division had been hacked, leading to <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.coindesk.com\/business\/2022\/09\/20\/crypto-market-maker-wintermute-hacked-for-160m-says-ceo\/\" title=\"\" rel=\"noopener noreferrer\">losses of $160 million<\/a>.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">Tracking the movement of stolen crypto is fairly straightforward. Transactions are recorded on public ledgers called blockchains, which anyone can analyze to find patterns. But it\u2019s significantly harder to regain access to lost funds.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The hacks have prompted many DeFi start-ups to explore preventive measures, recruiting auditors to examine their code for vulnerabilities. Even as other types of crypto firms cut costs during the downturn, security and auditing companies have seen <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-08-22\/the-sleuths-who-protect-crypto-from-hackers-are-raking-in-money?sref=zVYYYI5e\" title=\"\" rel=\"noopener noreferrer\">a huge surge in business<\/a>.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">\u201cThis year was a good year for attackers,\u201d said Goncalo Sa, a founder of ConsenSys Diligence, which conducts code audits. \u201cThat has definitely ingrained in the minds of people that security is something that they should take seriously.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">From crypto\u2019s inception, companies have struggled with security. In 2014, the first major Bitcoin exchange, Mt. Gox, was <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.gemini.com\/cryptopedia\/mt-gox-bitcoin-exchange-hacked\" title=\"\" rel=\"noopener noreferrer\">breached<\/a> in a damaging attack that eventually led to the company\u2019s bankruptcy and the loss of billions of dollars in digital currency.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">At the time, the industry was relatively small and uncomplicated. Now hackers can attack a wider ecosystem, including an experimental economy of crypto-based video games, decentralized lending projects and newfangled coins. Last year, a hacker stole $600 million from the DeFi platform Poly Network; the thief <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.cnbc.com\/2021\/08\/23\/poly-network-hacker-returns-remaining-cryptocurrency.html#:~:text=Poly%20Network%20said%20its%20team,overall%20affected%20in%20this%20attack.\" title=\"\" rel=\"noopener noreferrer\">returned<\/a> the money after negotiations with the project\u2019s leaders.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">This year\u2019s hacks have caused far more damage. In March, <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2022\/06\/30\/business\/north-korea-crypto-hack.html\" title=\"\" rel=\"noopener\">a group sponsored by the North Korean government<\/a> stole $620 million in digital currency from the Ronin Network, a DeFi platform that powers the video game Axie Infinity. Around the same time, a hacker exploited a software flaw in a DeFi project called Wormhole to <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/blog.chainalysis.com\/reports\/wormhole-hack-february-2022\/\" title=\"\" rel=\"noopener noreferrer\">abscond<\/a> with $320 million.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">\u201cMany people are putting up platforms with a known vulnerability,\u201d said Chris Tarbell, a former F.B.I. agent who now runs the cybersecurity firm NAXO. \u201cIn a target-rich environment, criminals are going to be opportunistic.\u201d<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">The Wormhole hack exploited vulnerabilities in a novel element of crypto technology known as a <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-06-24\/crypto-bridge-horizon-is-hacked-for-100-million?sref=zVYYYI5e\" title=\"\" rel=\"noopener noreferrer\">cross-chain bridge<\/a>, which allows investors to switch back and forth between digital currencies built on separate blockchains. Some DeFi platforms facilitate these conversions to help people capitalize on trading opportunities; a trader who owns lots of Ether, for example, might want to use an application on another currency\u2019s blockchain without having to sell the Ether and buy the other currency.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The sheer amount of crypto flowing across these cross-chain bridges makes them valuable targets. A total of 10 hacks this year have involved bridges, leading to losses of $1.3 billion, according to Chainalysis.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The technology is \u201chighly complicated, and complexity is the enemy of security,\u201d said Steve Walbroehl, a founder of the crypto security firm Halborn. <\/p>\n<p class=\"css-at9mc1 evys1bk0\">Beanstalk wasn\u2019t built as a cross-chain bridge. But it had other vulnerabilities baked into its code.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The project\u2019s inner workings were almost comically obscure. A <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/bean.money\/docs\/beanstalk.pdf\" title=\"\" rel=\"noopener noreferrer\">white paper<\/a> outlining its mechanics consists of 61 pages of graphs, charts and mathematical equations (as well as a quote from Alexander Hamilton\u2019s letters).<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">\u201cThe number of Pods that grow from 1 Sown Bean is determined by the Temperature \u2014<span class=\"css-8l6xbc evw5hdy0\"> \u200a<\/span>the Beanstalk-native interest rate<span class=\"css-8l6xbc evw5hdy0\"> \u200a<\/span>\u2014<span class=\"css-8l6xbc evw5hdy0\">\u200a <\/span>at the time of Sowing,\u201d reads one passage from a guide to the platform called the <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/docs.bean.money\/\" title=\"\" rel=\"noopener noreferrer\">Farmers\u2019 Almanac<\/a>.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">In essence, Beanstalk allowed people to deposit tens of millions of dollars in virtual currency into a software system, which generated interest and helped maintain the value of a stablecoin called a bean.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The project didn\u2019t operate as a traditional start-up. <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2022\/03\/02\/technology\/cryptocurrency-anonymity-alarm.html\" title=\"\" rel=\"noopener\">Like many crypto founders<\/a>, Mr. Weintraub and his collaborators \u2014 Brendan Sanderson, 25, and Michael Montoya, 24 \u2014 kept their identities secret, calling themselves Publius, an homage to the authors of the Federalist Papers. When the software was released in August 2021, users who deposited their crypto got votes in an investor collective called a decentralized autonomous organization, or DAO, which had to agree to make changes to the software.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Beanstalk\u2019s collective governance was ultimately its undoing. In April, a hacker borrowed $1 billion of cryptocurrency from another DeFi project, Aave. The transaction was a so-called flash loan \u2014 a lightning-fast process in which a crypto user borrows funds without posting any collateral, makes a trade and then immediately pays back the loan, keeping any profits generated from the series of near-simultaneous exchanges.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The code that Mr. Weintraub and his partners had designed did not have a mechanism to stop someone from using a flash loan to take over the platform. So the hacker used the $1 billion to claim a huge stake in the Beanstalk DAO, taking total control of the software\u2019s governance. Then the hacker transferred everyone\u2019s funds \u2014 a total of nearly $200 million \u2014 out of the Beanstalk system.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Panic ensued. \u201cI lost $1 million today,\u201d one Beanstalk user <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.youtube.com\/watch?v=UGFl60dWexM\" title=\"\" rel=\"noopener noreferrer\">declared<\/a> on YouTube. \u201cIt happened through beans.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Some users suspected that Mr. Weintraub and the other founders were behind the attack \u2014 a classic \u201crug pull\u201d in which a team of developers flees with investors\u2019 funds.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<div>\n<div class=\"css-53u6y8\">\n<p class=\"css-at9mc1 evys1bk0\">\u201cThe pitchforks were out,\u201d Mr. Weintraub said. \u201cIt felt like death.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Ultimately, he and the other founders decided to continue the project. They reported the theft to the F.B.I. and held calls with Beanstalk enthusiasts to find a path forward. In an April <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/medium.com\/@nvy_0x\/the-beanstalk-bean-exploit-b038f4d324ea\" title=\"\" rel=\"noopener noreferrer\">post<\/a> on the chat forum Discord, they also revealed their identities for the first time. It was a risky move: Even though the project wasn\u2019t a traditional business, they could be vulnerable to lawsuits from users or regulatory scrutiny.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Over the last few months, the Beanstalk DAO has worked to <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.prnewswire.com\/news-releases\/defi-stablecoin-protocol-beanstalk-formally-announces-post-exploit-recapitalization-fundraiser-the-barn-raise-to-begin-on-june-6-with-10m-15-of-maximum-funding-already-committed-301559794.html\" title=\"\" rel=\"noopener noreferrer\">restart the project<\/a>, recruiting blockchain analysis firms to help track down the lost crypto. The group also hired Halborn, the security firm, which is reviewing the code to eliminate any vulnerabilities. Beanstalk officially reopened last month.<\/p>\n<p class=\"css-at9mc1 evys1bk0\">Such comeback efforts are <a target=\"_blank\" class=\"css-yywogo\" href=\"https:\/\/www.nytimes.com\/2022\/09\/13\/technology\/celsius-network-crypto.html\" title=\"\" rel=\"noopener\">increasingly common<\/a> in crypto. \u201cWe\u2019ve always been so transparent with the community that this is an experiment,\u201d Mr. Weintraub said. \u201cWe\u2019re all figuring this out together.\u201d<\/p>\n<p class=\"css-at9mc1 evys1bk0\">The stolen funds remain missing.<\/p>\n<p class=\"css-798hid etfikam0\">Kitty Bennett<!-- --> contributed research.<\/p>\n<\/div>\n<aside class=\"css-ew4tgv\" aria-label=\"companion column\" \/><\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/www.nytimes.com\/2022\/09\/28\/technology\/crypto-hacks-defi.html\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not long after dropping out of college to pursue a career in cryptocurrencies, Ben Weintraub woke up to some bad news. Mr. Weintraub and two classmates from the University of Chicago had spent the past few months working on a software platform called Beanstalk, which offered a stablecoin, a type of cryptocurrency with a fixed [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":30436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[36],"tags":[62,1676,5184,11476,61],"class_list":["post-30435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cryptocurrency","tag-crypto","tag-edge","tag-hacks","tag-string","tag-world"],"jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"http:\/\/egrowonline.com\/wp-content\/uploads\/2022\/09\/28crypto-hacking-facebookJumbo.jpg","_links":{"self":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/30435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=30435"}],"version-history":[{"count":1,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/30435\/revisions"}],"predecessor-version":[{"id":30437,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/posts\/30435\/revisions\/30437"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=\/wp\/v2\/media\/30436"}],"wp:attachment":[{"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=30435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=30435"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/egrowonline.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=30435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}