Attacker Deployed 40 Malicious Contracts to Exploit $3.9M From Flow Network - Unchained

UnchainedCrypto

The Flow Network shared a post-mortem of a Dec. 27 exploit that led to $3.9 million in losses from the protocol, but no user balances were compromised.

The attacker used 40 malicious smart contracts to orchestrate a three-part attack chain, extracting counterfeit tokens before Flow validators halted the chain after the exploit was detected.


This story is an excerpt from the Unchained Daily newsletter.

Subscribe here to get these updates in your email for free


“It’s important to also note that these assets were duplicated, not minted, therefore total token supply values for each of the tokens remained unchanged; minting logic was entirely bypassed in the attack,” explained the Flow team.

The Flow Foundation initially floated a full chain rollback to a pre-exploit state, but later pivoted to an “isolated recovery” plan, which involves restarting the chain from the last sealed block.

Flow’s native token FLOW dropped around 40% immediately after the exploit, but has since gained around 6% and was trading at $0.099 as of Tuesday evening.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.
Comment
0/400
WenXinvip
· 01-14 02:54
Hold on tight, we're about to take off 🛫
View OriginalReply0