Cointime

Download App
iOS & Android

Review of Blockchain Security in Q3 2022

Validated Project

OVERVIEW

The overall crypto market was still not optimistic through Q3 2022. However attacks against the crypto ecosystem persisted. Crypto assets worth around $440 million were exploited.

Fairyproof studied 103 publicly reported security incidents that occurred in Q3 2022. This report is composed of findings, analysis and best practices.

BACKGROUND

Before proceeding, the following terms and technologies are introduced in this report:

CCBS

CCBS stands for “centralized crypto or blockchain service”. A CCBS refers to a platform or a service that provides crypto or blockchain related products or services and is run by a conventional/centralized organization, entity or company such as conventional crypto exchanges e.g xxx. and blockchain service companies e.g xxx.

FLASHLOAN

Flash loans are a popular feature that hackers utilize when attacking EVM-Compatible smart contracts. Flash loans were developed by the team behind the famous DeFi application AAVE [1]. This feature “allows users to borrow any available amount of assets without putting up any collateral, as long as the liquidity is returned to the protocol within one block transaction” [2]. Flash loans are quite often used to borrow ERC-20 tokens [3] and attack DeFi applications. To initiate a flash loan, users will need to write a contract that borrows an available amount of assets and pay back the loan + interest + necessary fees all within the same transaction.

CROSS-CHAIN BRIDGE

A cross-chain bridge is an infrastructure that connects multiple independent blockchains and enables an exchange of cryptos, data or information from one blockchain to another.

As more blockchains have their own ecosystems, cryptos and dApps, the need for exchanging cryptos or data across different blockchains becomes increasingly high while the volume of cross-chain transactions dramatically increase. This causes cross-chain bridges to suffer more attacks.

FOCUS OF THIS REPORT

In this report we list our statistics collected from typical security incidents that happened in the blockchain industry in Q3 2022, give an in-depth analysis of their root causes and present our recommended best practices.

STATISTICS AND ANALYSIS OF SECURITY INCIDENTS OF Q3 2022

We studied 103 publicly reported security incidents that occurred in Q3 2022 and present our statistics and analysis based on the targets and root causes.

In Q3, 2022 the total value of the exploited assets in Q3 was $436.42 million and the overall market cap of the cryptocurrency according to Tradingview was $905.64 billion. The value of the exploited assets accounted for 0.05% of the total market cap of the cryptocurrency.

INCIDENTS CATEGORIZED BY TARGETS

Our researched incidents can be categorized into four types of targets

1. CCBS

2. Blockchains

3. DApps

4. Cross-chain Bridges

A CCBS related incident is one in which a centralized crypto or blockchain service platform is attacked by hackers resulting in a loss of crypto assets under its custody or that its services would fail.

A blockchain-related incident is one where a blockchain mainnet, side chain or layer 2 is attacked by malicious actors from inside, outside, or both, resulting in its operation going out of order, or that a blockchain fails to work properly due to issues related to software, hardware, or both. Attackers will then be able to exploit the consensus for profits.

A dApp-related incident is one where a dApp is attacked or that its daily operation goes out-of-order, leaving it open for attackers to exploit users and crypto assets under the custody of the dApp.

A cross-chain bridge-related incident occurs when a cross-chain bridge is attacked resulting in a failure of the exchange function between multiple blockchains or that the crypto assets under its custody would suffer a loss.

There were 103 incidents in total. Here is a figure that shows the percentage for each of these targets respectively.

The number of dApp-related incidents account for more than 86.41% of the total incidents. Out of 103 incidents, 6 were CCBS-related, 5 were blockchain-related, 3 were cross-chain bridge-related, and 89 were dApp-related.

BLOCKCHAIN-RELATED INCIDENTS

Incidents that had occurred to blockchains can be further categorized into three sub-categories:

i. Blockchain mainnets

ii. Side chains

iii. Layer 2 solutions

A blockchain mainnet, also known as layer 1, is an independent blockchain that has its own network with its own protocol, consensus, and validators. A blockchain mainnet can validate transactions, data, and blocks generated in its network by its own validators and reach a finality. Bitccoin and Ethereum are typical blockchain mainnets.

A side chain is a separate blockchain which runs in parallel and independently to a blockchain mainnet. It has its own network, consensus and validators. It is connected to a blockchain mainnet e.g. by a two-way peg[4].

A layer 2 solution refers to a protocol or network that relies on a blockchain as its base layer (layer 1) for security and finality [5]. Its main purpose is to solve the base layer’s scalability issues. It processes transactions faster and costs less compared to its base layer. For instance, the Ethereum blockchain saw a huge surge in the growth and development of layer 2 solutions since 2021.

Both side chains and layer 2 solutions are present to solve a blockchain mainnet’s scalability issues. The significant difference between a side chain and a layer 2 solution is that a side chain does not necessarily rely on its blockchain mainnet for security or finality but a layer 2 solution does.

There were 5 blockchain-related incidents in total in Q3 2022. The figure below shows the percentages of blockchain mainnet related incidents, side-chain related incidents, and layer 2 related incidents respectively.

The number of blockchain mainnet related incidents and layer 2 related incidents account for 60% (3) and 40% (2) of the total incidents respectively. No side-chain related incidents were covered in our statistics. The layer 2 solutions that were attacked were Aurora[6] and Bitcoin Lightning Network [7], while the attacked blockchain mainnets were Acala [8], Near [9] and Celo [10]. None of these mainnets were EVM-compatible blockchains.

DAPP RELATED INCIDENTS

Among the 89 incidents that occurred toward dApps, 3 were rug-pulls, 57 were involved in exploitation, and 29 were directly attacked. An attack against a dApp can specifically target its front-end, server side, or smart contract(s). We can therefore further classify these 29 incidents into three sub-categories:

i. dApp’s front-end

ii. dApp’s server side

iii. dApp’s smart contract(s)

dApp’s front-end related incidents refers to events where vulnerabilities from the conventional client side are exploited, compromising on the account information and personal details of users which can be used to steal their crypto assets.

dApp’s server side related incidents are those where vulnerabilities present in the conventional server side are exploited, leaving on-chain and off-chain communication open for hijacking and crypto assets of users open for exploitation.

Smart contract related incidents refer to vulnerabilities in a smart contract’s design or implementation, which are leveraged to exploit crypto assets from users.

Here is a figure that shows the percentages of front-end, server-side and smart contract related incidents respectively.

The above figure shows that the number of smart contract related incidents, server side related incidents and front-end related incidents respectively accounted for 82.76%, 0% and 17.24% of the total incidents. Among 29 incidents, 5 were front-end related and 24 were smart contract related.

We further studied the amount of loss incurred from these sub-categories and derived the following:

Our study showed that $1.61 million were lost in front-end related incidents; the amount of loss in server-side related incidents was 0, and the amount of loss in smart contract related incidents was $179.82 million.

It’s clear that smart contract related incidents were the biggest issue. Typical vulnerabilities we found pertaining to smart contracts in Q3 2022 include logic vulnerabilities, private key leaked, flash loans, missing validation for parameters, missing validation for access control, governance attacks[11] and more.

We studied the 27 incidents in which smart contracts were directly attacked and got the following figure based on vulnerability types:

The figured shows that the number of incidents with the highest percentage are flashloan followed by logic vulnerability. Missing validations for parameters, missing validation for access control and governance attack follow the third place. 14 projects suffered from flashloan attacks and 3 suffered from logic vulnerability attacks.

The following figure illustrates the amount of loss for each vulnerability type:

It is interesting to note that although the number of incidents that suffered from flash loans were the most, the amount of loss it caused just ranked the third. 14 incidents were caused by flash loans, totaling a loss of $15.25 million. 3 incidents caused by logic vulnerabilities totaled a loss of $190.23 million and accounted for 51.24% of the total loss ranked the first and 1 incident caused by private key leaked totaled a loss of $160 million and accounted for 43.10% of the total loss ranked the second.

INCIDENTS CATEGORIZED BY ROOT CAUSES

The root cause of these incidents can be categorized into the following:

i. Attacks from hackers

ii. Rug-pulls

iii. Misc.

We studied these incidents and got the following figure.

The above figure shows that the number of attacks from hackers, rug-pulls and of misc incidents accounted for 95.15% (98), 2.91% (3) and 1.94% (2) of the total incidents respectively.

We studied the amount of loss of each category of incidents based on the root cause and got the following figure:

The above figure shows that the amount of loss in the incidents that suffered from attacks and the amount of loss in misc incidents each accounted for 98.92% and 1.08% of the total loss respectively. That amount of loss in the incidents that suffered from attacks was $431.72 million and the amount of loss in misc incidents was $4.7 million. This reveals that attacks from hackers pose the largest threat to the whole crypto ecosystem.

ATTACKS FROM HACKERS

We studied the targets the hackers attacked and got the following figure:

The figure above shows that the number of attacks on dApps, CCBSs, blockchains and cross-chain bridges accounted for 86% (78), 6% (6), 5% (5) and 3% (3) respectively.

After we studied the amount of loss in each of them we got the following figure:

The amount of loss in attacks on dApps, CCBSs, cross-chain bridges and blockchains were 43.59%, 43.54%, 8.75% and 4.12%, resulting in a loss of $190.22 million, $190 million, $38.2 million and $18 million respectively.

RUG-PULLS

The rug-pulls that happened in Q3 2022 were all dApps. There were 3 incidents however they didn’t cause much loss..

RESEARCH FINDINGS

Cross-chain bridges were prominent targets for attacks in Q3 2022. Although the number of cross-chain bridge incidents only accounted for 3% of the total, the amount of loss in the cross-chain bridge incidents accounted for nearly 43.54% of the total amount of loss and was nearly the same as the amount of loss in attacks against Dapps which ranked the first among all attacked targets. Its security situation needs increasing awareness in the crypto space.

Although the number of attacks on mainnets still accounted for more than half of the attacks against blockchains, the number of attacks against layer 2 solutions was significant and it far surpassed the number of attacks against side chains. The losses incurred for attacks on both mainnets and side chains could be neglected, but the loss incurred for attacks on layer 2 solutions alone reached $18 million.

Hackers proved to remain as the main threat to the crypto industry, accounting for 97% among all incidents. It far surpassed any other root causes such as maintenance issues, inappropriate operations etc.

A dApp consists of three parts: a front-end, a server-side and smart contracts(s). Either one or multiple parts are targeted during dApp attacks. According to our statistics, smart contract(s) accounted for a extraordinarily higher percentage of attacks compared to the front-ends and server sides with regard to both attack frequencies and amount loss in Q3 2022. This shows that attacks on smart contracts still posed as the biggest threat to dApps. However, it is worth noting that the number of attack against front-ends have increased rapidly compared to that in Q2 2022.

All rug-pulls in Q3 2022 were dApps.

Finally, for smart contract related incidents, we found the number of attack sub-categories to be ranked as the following:

Rank 1: Flashloan

Rank 2: Logic vulnerability

Rank 3: Missing validations for access control, missing validations for parameters and governance attack.

In contrast, the amount of loss in the incidents that suffered from logic vulnerabilities far surpassed any one of these ranks.

TENTATIVE THOUGHTS

The biggest pain-point of all the existing cross-chain bridges is that they more or less rely on off-chain centralized parties to monitor and schedule transactions. These centralized parties become the weakest link in the systems. Recently a new trend in the crypto space is to utilize the MPC [12] technology to decentralize the centralized parties especially in decentralizing the management and storage of private keys. This trend is worth great awareness. Fairyproof is exploring this area and working with multiple innovative MPC teams to developing security solutions to fix this pain-point.

None of the exploited layer 2s in Q3 in our collected cases is attached to Ethereum. We think the root cause was likely due to these layer 2 solutions’ immature technologies and development.

In addition, as more and more zk-rollup solutions for Ethereum surged in Q3, we think zk technology will play an increasing role in Ethereum’s ecosystem and the demand for audit of zk related contracts and blockchains will increase.

BEST PRACTICES TO PREVENT SECURITY ISSUES

In this section we present some best practices to help both blockchain developers and users manage the risks posed by the incidents that happened in Q3 2022 and support coordinated and efficient response to crypto security incidents. Both blockchain developers and users are recommended to apply these practices to the greatest extent possible based on availability of their resources.

Note: the blockchain developer here refers to not only developers of blockchains but also every developer that participates in development of dApps, blockchains or systems pertaining to crypto currencies. The blockchain user here refers to everyone that participates in activities pertaining to crypto system’s management, operation, trading etc.

FOR BLOCKCHAIN DEVELOPERS

Developers of cross-chain bridges need to pay closer attention to the bridges’ security as cross-chain transactions become increasingly popular. Cross-chain bridge solutions include handling of operations — not only on-chain but also off-chain. Naturally, the off-chain part would be more vulnerable to attacks. Hence, security solutions for cross-chain bridges should be particularly capable of handling off-chain activities safely and securely.

Awareness of security for layer 2 solutions in particular should increase as more layer 2 solutions have and will emerge in the coming years. Research and development for solutions to tackle security challenges in this area must be prompt.

The security especially for front-ends for dApps requires more awareness, even though the security for smart contracts remains as a priority. An audit of a dApp’s front-end should not be ignored.

A step to transfer an admin’s access control to a multi-sig wallet or a DAO to manage access control to crypto assets or critical operations is a must-have.

Attackers would employ flash loans to maximize their exploits when they detect vulnerabilities in smart contracts, including issues of re-entrancy, missing validations for access control, incorrect token price algorithm, and more. Proper handling of these issues should have the highest priority for a smart contract developer when designing and coding a smart contract.

Our statistics show that an increasing number of hackers have been using social media tools — especially Discord — to launch phishing attacks. This persisted through Q1, Q2 and Q3 and will very likely persist in Q4. Many users have suffered huge losses. Project developers and managers are advised to prioritize safely and securely managing social media accounts and finding security solutions for them on top of project implementation.

FOR BLOCKCHAIN USERS

More users are varying their crypto portfolio across different blockchains. The demand for cross-chain transactions is rapidly increasing. Whenever a user participates in a cross-chain transaction, the user will have to interact with a cross-chain bridge — a popular target among hackers. Hence, before starting a cross-chain transaction, users are advised to investigate the bridge’s security condition and ensure they use a reliable, safe and secure bridge.

Q3 2022 witnessed a boom in Ethereum’s layer 2 solutions. However, their security situations were not optimistic. Users must comprehensively investigate a layer 2 solution’s security status before participating in activities on top of it.

While it is necessary to pay great attention to the security for smart contracts when interacting with a dApp, the importance to also pay attention to the security of the user interface while exercising caution to detect suspicious messages, prompts, and behavior presented by the UI is increasing.

We strongly urge users to check whether a project has audit reports and read these reports before proceeding with further actions.

Use a cold wallet or a mutl-sig wallet where possible to manage crypto assets that are not for frequent trading. Be careful about using a hot wallet and make sure the hardware in which a hot wallet is installed is safe and secure.

Be cautious of a dApp where its team members are unknown or lack reputation. Such dApps may eventually be rug-pull projects. Be cautious of a centralized exchange which has not established a reputation or does not have tracked transaction data on third party media as it may also eventually prove to be rug-pull projects.

REFERENCES

[1] Aave. https://aave.com/

[2] Flash-loans.. https://aave.com/flash-loans/

[3] ERC-20 TOKEN STANDARD. https://ethereum.org/en/developers/docs/standards/tokens/erc-20/

[4] Sidechains. https://ethereum.org/en/developers/docs/scaling/sidechains/

[5] Layer-2. https://academy.binance.com/en/glossary/layer-2

[6] Aurora. https://aurora.dev/

[7] Bitcoin Lightning Network. https://lightning.network/

[8] Acala. https://acala.network/

[9] Near. https://near.org/

[10] Celo. https://celo.org/

[11] Governance Attack. https://halborn.com/what-is-a-governance-attack/

[12] MPC. https://wiki.mpcalliance.org/

Comments

All Comments

Recommended for you

  • Crypto Super PAC Raises Over $100 Million for 2024 US Election

    According to PUBLIC CITIZEN, a cryptocurrency industry-backed super PAC has raised over $102 million, ranking third among all super PACs participating in the 2024 election. More than half of the political funds for the cryptocurrency super PAC (about $54 million) come from direct corporate spending, mainly from Coinbase and Ripple Labs.It is reported that four of the eight corporate cryptocurrency super PAC donors have settled or face charges from the US Securities and Exchange Commission (SEC) for alleged violations of securities laws, with Ripple Labs alone facing a fine of nearly $2 billion.

  • The US government seized 3,940 BTC from drug dealers

    Blockchain data tracking company Arkham has stated that the US government has seized $250 million worth of BTC, currently being held by Arkham. The US government obtained 3,940 BTC from drug dealer Banmeet Singh and seized them during a trial in January 2024. According to court documents, Singh was responsible for selling controlled substances on the dark web market from 2012 to 2017 and distributing them throughout the United States. The statement from the Department of Justice (DOJ) and court documents match the on-chain flow of funds already added to our US government entity.

  • Jack Dorsey's Blockchain plans to raise $1.5 billion through senior notes issuance

    Jack Dorsey's financial technology company, Block (formerly known as Square), announced on May 6th that it plans to issue $1.5 billion in preferred notes to qualified institutional investors through private placement.

  • Yesterday, the US Bitcoin ETF had a net inflow of $218 million

    According to HODL15Capital data, yesterday (May 6th), the net inflow of US Bitcoin ETF was 218 million US dollars.

  • The US SEC has submitted sealed documents regarding the lawsuit against Ripple

    On May 7th, former US federal prosecutor James K. Filan disclosed the latest progress in the SEC's lawsuit against Ripple on X platform. The SEC has submitted sealed documents containing its response brief and supporting evidence for remedies. These documents have not been made public yet. The revised version that will be made public is expected to be submitted before Wednesday, May 8th. Other sealed documents will be submitted later.

  • Hong Kong Bitcoin Spot ETF has held 4,388 BTC since its listing

    According to HODL15Capital monitoring, the Hong Kong Bitcoin spot ETF has held 4,388 BTC since its listing.

  • 400 million DOGE transferred from unknown wallet to Robinhood

    Whale Alert monitoring shows that at 09:10:35 Beijing time, 400,000,000 DOGE coins (worth $62,825,933) were transferred from an unknown wallet to Robinhood.

  • Contango Blockchain x AI Fund Completes $5 Million Fundraising

    Contango Digital Assets, a portfolio under Orthogonal Global Group, announced that its blockchain and AI seed fund, Contango Blockchain x AI Fund, has completed a fundraising of $5 million. Investors include the CEO of Quantstamp, the CFO of SingularityNet, the CEO of WonderFi, a general partner of X Ventures, early limited partners of Digital Money Group and Polychain Capital, as well as investors of VANTA DAO. It is reported that the fundraising goal of the fund is $10 million, and it will focus on supporting projects in the decentralized artificial intelligence field in the future. Currently, it has purchased tokens of the telecommunications sharing economy project Minutes Network.

  • SEC v. Ripple case progress: SEC will submit a public redacted version of the remedy response brief and supporting evidence by Wednesday

    Former US federal prosecutor James K. Filan shared the latest developments in the SEC's lawsuit against Ripple on X platform. The SEC has submitted sealed documents, including its response brief and supporting evidence for its remedies. These documents have not been made public yet. The revised public version will be submitted before Wednesday, May 8th. Other sealed documents will be submitted later.

  • LayerZero: Working with Nansen and others to write a Sybil Detection Report

    LayerZero Labs announced that it has been working with Chaos Labs and Nansen to compile a witch detection report. They will consider the total weighted transactions of each user in all LayerZero applications to ensure consistency between TGE, developers, and long-term users. The report will be released after the deadline for self-reporting witches.