Rari Capital - REKT



Young blood and new money.

After a quick break for lunch, it was Rari Capitals turn to get rekt.

The youthful yield aggregator has fallen victim to a serial attacker, as the same wallet which attacked Value DeFi only hours before, turned their eyes onto the Rari Capital ETH pool, removing $10 million worth of ETH.

Rari Capital has attracted attention due to the young age of their developers, causing the community to argue amongst themselves as to whether age is of much relevance when the whole DeFi industry is only 2 - 3 years old.

Although some might say they “had it coming”, we take no pleasure in learning that people have lost their money.

There are no developers with 10 years experience in DeFi system design, this is a meritocracy that depends on the skill and maturity of the person rather than the length of their CV.

Each attack presents us with a valuable lesson, and we must study the techniques in order to build a safer future.

We’re looking at the actions of a cross-chain killer, who used the blood money from Value DeFi to fuel their attack on Rari Capital.

5,346 BNB ($3.8M) were stolen and swapped to 1k ETH.

The attacker’s actions on BSC were as follows:

1: Create a fake token and pool it with BNB on PancakeSwap in order to use Alpaca Finance.

2: Interact with Alpaca Finance, where when calling approve() for a fake token, a payload is called, which allows an attacker to use VSafe through Codex farm to get vSafeWBNB

3: Convert vSafeWBNB to WBNB

4: Transfer WBNB to Ethereum through Anyswap.

Repeat 2x.

The attack on Rari was as follows:

1: Create a fake token and pool with it on SushiSwap

2: Interact with Alpha Homora, where a payload is also called so that the attacker can get ibETH in the Rari ETH pool contract.

3: Convert ibETH to ETH in the Rari ETH pool.

As a result, 2.9k ETH ($11.1M) was stolen, and another 1.7k ETH was at risk before the actions of the Rari team.

The total profit from the two attacks was $15M in ETH.

credit: frankresearcher

The Rari Capital governance token $RGT fell sharply in price following the attack.

The attacker decided to voice their opinion on the involved protocols, but it seems they had second thoughts, as they tried to cancel the transaction. However, they set the gas too low and the cancellation didn’t go through for 20 minutes, giving everyone time to see their message.

Credit: banteg & dudesahn

This attack technique was similar to the Evil Pickle Jar, one which looks likely to become even more common in the future.

Even though various protocols were used, the same exploit mechanism was applied.

Alpaca/Alpha, vSafe/Rari, PancakeSwap/SushiSwap - the interaction between them was built in such a way that the exploit was easily repeated on another chain.

The interoperability between DeFi protocols is increasing, and the blurred lines make for even easier escape routes.

In the roaring twenties, the ruthless are rewarded, and any prosecution seems unlikely.

With so many other surface-level crimes in crypto, who’s going to try and prosecute someone for exploiting contracts where so many remain anonymous?


bu makaleyi paylaş

REKT, anonim yazarlar için halka açık bir platform olarak hizmet eder, REKT'te bulunan görüşler veya içerik için hiçbir sorumluluk kabul etmiyoruz.

bağış yap (ETH / ERC20): 0x3C5c2F4bCeC51a36494682f91Dbc6cA7c63B514C

sorumluluk reddi:

REKT, Web Sitemizde veya hizmetlerimizle bağlantılı olarak web sitemizin ANON yazarı veya REKT tarafından gönderilen, yayınlanan veya neden olunan hiçbir içerikten hiçbir şekilde sorumlu veya yükümlü değildir. Anon yazarın davranışları ve gönderileri için kurallar sağlamamıza rağmen, onun web sitemizde veya hizmetlerimizde yayınladığı, ilettiği veya paylaştığı şeylerden sorumlu değiliz veya web sitemizde ve hizmetlerimizde karşılaşabileceğiniz herhangi bir saldırgan, uygunsuz, müstehcen, yasa dışı veya başka şekilde sakıncalı olan içerikten sorumlu değiliz. REKT, Web Sitemizin veya Hizmetlerimizin herhangi bir kullanıcısının çevrimiçi veya çevrimdışı davranışlarından sorumlu değildir.