Deus DAO - R3KT
It’s a hat trick for Deus DAO.
Token holders lost a total of ~$6.5M on Arbitrum, BSC and Etherum, and the DEI stablecoin depegged over 80%.
This incident, just over a year since their last appearance, makes Deus DAO the third protocol with three entries on our leaderboard.
Deus’ two previous entries were on the project’s original home, FTM, where they don’t appear to have been affected. Since then, DEI has branched out onto other chains.
After the alarm was raised, and the root cause identified, Deus eventually acknowledged the hack, as well as confirming a multisig address for whitehats to return funds.
But how many times can a thrice-hacked protocol be trusted?
Credit: _adamb, Zellic, 0xProtosec
A simple implementation error was introduced into the DEI token contract, in an upgrade last month. The burnFrom function was misconfigured, with the ‘_allowances’ parameters ‘msgSender’ and ‘account’ written into the contract in the wrong order.
This created a public (or pubic, according to Peckshield) burn vulnerability, which an attacker is then able to manipulate and gain control of DEI holders’ approvals and transfer assets directly to their own address.
The mis-ordered parameters allow the attacker to set a large token approval for any DEI holder’s address. Then, by burning 0 tokens from the address, the approval is updated to the attacker’s address, who can drain the holder’s funds.
See the following step-by-step:
identify an address with a huge amount of DEI
approve to this address
call burnFrom with amount = 0 and this address
During the burnFrom it grants approves all tokens from the address to your own
call transferFrom
Attacker’s address (Arbitrum): 0x189cf534de3097c08b6beaf6eb2b9179dab122d1
Example attack tx (Arbitrum): 0xb1141785…
Frontrunner address (BSC): 0x5a647e376d3835b8f941c143af3eb3ddf286c474
Example attack tx (BSC): 0xde2c8718…
Attacker’s address (Ethereum): 0x189cf534de3097c08b6beaf6eb2b9179dab122d1
Example attack tx (Ethereum): 0x6129dd42…
According to BlockSec’s MetaSleuth, the losses were approximately $5M on Arbitrum, $1.3M on BSC and $135k on Ethereum.
Luckily, the exploit on BSC was frontrun, and an on-chain message to the Deus Deployer shows the intent to return the funds. Other whitehats also sprang into action, and over $600k in USDC has so far been returned to a recovery multisig.
However, there were also doubts about the usefulness of giving funds back to a team that produced such a trivial bug.
Returning rescued funds to a thrice-hacked protocol seems rather counterproductive…
An official update mentions a recovery plan for users who lost out in the exploit, and Deus have reached out to the attacker on-chain.
But given the account was originally funded via Tornado Cash on BSC, it’s not looking good.
Will this be finally be a killing blow for Deus DAO?
REKT serves as a public platform for anonymous authors, we take no responsibility for the views or content hosted on REKT.
donate (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C
disclaimer:
REKT is not responsible or liable in any manner for any Content posted on our Website or in connection with our Services, whether posted or caused by ANON Author of our Website, or by REKT. Although we provide rules for Anon Author conduct and postings, we do not control and are not responsible for what Anon Author post, transmit or share on our Website or Services, and are not responsible for any offensive, inappropriate, obscene, unlawful or otherwise objectionable content you may encounter on our Website or Services. REKT is not responsible for the conduct, whether online or offline, of any user of our Website or Services.
you might also like...
Deus DAO - REKT 2
Deus DAO double damage. In an unfortunate sequel to last month’s incident, the protocol has now lost a further $13.4M. How did the attacker bypass the new oracle?
Deus DAO - REKT
Deus rekt machina. An unexpected plot twist saw Deus DAO users liquidated, with the attacker making ~$3M profit. Flash loan attacks are not as common they once were. Is DeFi growing stronger?
Multichain - R3KT
So the rumours were true. At least according to Multichain. CEO Zhaojun has been in custody in China since May 21st, and he held all the keys. Multichain’s recent troubles have turned Fantom into a ghost town…