~$48M CASHed out.
The latest leaderboard entry (#13) comes from the Solana network, where an anonymous attacker used an infinite mint to make Cashio print faster than the Fed.
The exploit began at 08:15 UTC. At 09:59 UTC, Cashio made their announcement:
Please do not mint any CASH. There is an infinite mint glitch.
We are investigating the issue and we believe we have found the root cause. Please withdraw your funds from pools. We will publish a postmortem ASAP.
Hyperinflation on a crypto timeframe.
At least their tagline was accurate.
The root of the infinite mint vulnerability was Cashio’s incomplete collateral validation system.
Before accepting tokens as collateral to mint CASH, the contract checks that the tokens to be deposited are correct (the same type of token that the contract holds).
However, the validation of the LP tokens to be deposited via saber_swap.arrow is incomplete, as the .mint field is never validated.
This results in the hacker being able to create a fake root contract, which is never validated, and then a chain of fake accounts which each pass validation checks as they are compared only to one another.
UPDATE (25/03/2022): The hacker also bypassed depositor_source via a similar mechanism, creating a false bank in order to pass the common.collateral verification. Full details here.
The hacker was therefore able to use their token as collateral to mint 2B $CASH.
The majority of funds were bridged back to Ethereum, and swapped for >16k ETH (~$48M) which remains in this wallet.
Following the attack, the exploiter’s SOL address emitted hundreds of transactions of relatively small amounts of USDC to different addresses. And 3 hours after the exploit began, the hacker left the following message via transaction input data:
“Account with less 100k have been returned. all other money will be donated to charity.”
As the attacker has handled part of the refund process themselves, perhaps Cashio will decide to continue.
We’ll find out for sure in their planned post-mortem.
Should we believe the charitable claims of the anonymous attacker, or is this just an attempt to dissuade anyone from trying to track them down?
Shitcoins stolen to fund the war effort?
We’ll watch the wallet to find out.
REKT serves as a public platform for anonymous authors, we take no responsibility for the views or content hosted on REKT.
donate (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C
REKT is not responsible or liable in any manner for any Content posted on our Website or in connection with our Services, whether posted or caused by ANON Author of our Website, or by REKT. Although we provide rules for Anon Author conduct and postings, we do not control and are not responsible for what Anon Author post, transmit or share on our Website or Services, and are not responsible for any offensive, inappropriate, obscene, unlawful or otherwise objectionable content you may encounter on our Website or Services. REKT is not responsible for the conduct, whether online or offline, of any user of our Website or Services.
you might also like...
Fortress is in ruins after $3M was stolen by an oracle manipulation and malicious governance act. The UI is paused, but the contracts remain live. Will Fortress's ecosystem bail out users for the lost funds?
Mad Meerkat Finance (not to be confused with normal Meerkat Finance) lost $2M to a DNS exploit. Back-end attacks, front-end attacks, when will we see the end of the attacks?
Fei Rari - rekt. Seven of Rari’s Fuse pools were drained for a total of ~$80M. This isn’t the first time that Rari's got rekt - lets hope the hackers don’t go for a hat trick.