Cointime

Download App
iOS & Android

Oracle Manipulation Attacks are Rising, Creating a Unique Concern for DeFi

Validated Project

As we’ve covered previously, 2022 was the biggest year in crypto hacking history, with more than $3.8 billion stolen. However, not all of those attacks were what one may think of as hacks in the traditional sense. In some cases, bad actors were able to drain DeFi protocols of funds without actually taking advantage of an error in the protocol’s code. These attackers were able to do this by manipulating the price oracles DeFi protocols use to ensure the assets available on their platforms are priced in accordance with the wider cryptocurrency market. As such, we’ll refer to these unique instances as oracle manipulation attacks.

Bad actors typically carry out oracle manipulation attacks by using large amounts of cryptocurrency to quickly increase the trading volume of low-liquidity tokens on the targeted DeFi protocol, which can lead to fast, significant price increases not reflective of the wider market. Those initial funds are often sourced through a flash loan if the attacker doesn’t have the funds on hand. Once an asset’s price has been driven up, the attacker can then exchange their artificially inflated holdings for other tokens with greater liquidity and a more consistent value, or use them as (worthless) collateral to borrow assets, never to be repaid.

Overall, we estimate that in 2022, DeFi protocols lost $386.2 million in 41 separate oracle manipulation attacks.Overall, we estimate that in 2022, DeFi protocols lost $386.2 million in 41 separate oracle manipulation attacks.

Some attackers have tried to argue that oracle manipulation attacks aren’t criminal in the same way a more straightforward hack is. In fact, Avraham Eisenberg, the individual behind one of the biggest oracle manipulation attacks of the year, claimed that his actions were perfectly legal and represented nothing more than a “profitable trading strategy.” However, the SEC and CFTC both filed charges of market manipulation against him, with the DOJ also bringing an indictment. While the trial hasn’t happened yet, the complaint suggests that authorities won’t allow these attackers to evade responsibility, even if the targeted protocol technically behaved as designed. Below, we’ll look at Eisenberg’s infamous million attack on Mango Markets as an example of how oracle manipulation attacks can work.

Breaking down Avraham Eisenberg’s Mango Markets exploit

One of the biggest oracle manipulation attacks of last year was the October 2022 attack of Mango Markets, a DEX on the Solana blockchain, which saw $117 million in assets drained from the protocol. The Mango Markets exploit was particularly interesting in that the perpetrator, Avraham Eisenberg, identified himself publicly afterwards and argued that his actions didn’t constitute a crime. Here’s how the exploit occurred from an on-chain perspective:

  1. Eisenberg started with $10 million USDC (it’s possible he also used funds not attributable to him on-chain to manipulate asset prices on other exchanges), split across two separate accounts at Mango Markets. 
  2. Eisenberg used one account to short 488 million MNGO (MNGO, or Mango, is the governance token for Mango Markets) — effectively selling 488 million MNGO on leverage — while the other account took the opposite side of that trade, using leverage to buy the same amount.
  3. Eisenberg’s leveraged purchase of MNGO, combined with further buying of MNGO on other DEXes, pushed the price of MNGO up very quickly on spot exchanges. This was possible because MNGO was a low-liquidity asset without much trading volume. The account used to purchase MNGO immediately profited roughly $400 million in paper gains because all of Eisenberg’s buying activity significantly boosted the asset’s price. 
  4. With such a high portfolio value, Eisenberg was able to borrow against his artificially inflated MNGO holdings and remove virtually all of the assets held by Mango Markets. This activity caused MNGO’s price to drop immediately, so his long positions were liquidated due to loss of collateral value, but it was too late — Eisenberg had already “borrowed” all of Mango Market’s assets with any real value.  

We can see this activity on the Chainalysis Storyline below:

Adding insult to injury, Eisenberg used the MNGO he still held after the exploit to propose and vote on a governance proposal that would allow him to return $10 million worth of cryptocurrency stolen in the attack, and keep the rest as a “bug bounty.” The proposal eventually passed. While most hackers avoid publicity, Eisenberg was open about his role in the Mango Markets exploit, and seemed convinced that because the code had at all times technically run as designed, he had done nothing wrong. He even appeared on Laura Shin’s popular Unchained Podcast to explain this perspective.

However, as the SEC lays out in its complaint, Eisenberg’s actions allegedly qualify as market manipulation due to the false increase in MNGO trading volume — 2,000% higher on the day of the exploit compared to the average over the previous ten days — that he orchestrated. Since charges were filed, Mango Markets has also sued Eisenberg for the difference between what he stole and what he returned as a result of his governance proposal, arguing that Eisenberg was not engaged in “lawful bargaining” when he negotiated his bug bounty with the Mango Markets DAO.

This material is for informational purposes only, and is not intended to provide legal, tax, financial, or investment advice. Recipients should consult their own advisors before making these types of decisions. Chainalysis has no responsibility or liability for any decision made or any other acts or omissions in connection with Recipient’s use of this material.

Chainalysis does not guarantee or warrant the accuracy, completeness, timeliness, suitability or validity of the information in this report and will not be responsible for any claim attributable to errors, omissions, or other inaccuracies of any part of such material.

Read more: https://blog.chainalysis.com/reports/oracle-manipulation-attacks-rising/

Comments

All Comments

Recommended for you

  • Decentralized AI platform Prime Intellect completes $5.5 million seed round of financing

    Decentralized AI platform Prime Intellect has announced the completion of a $5.5 million seed round of financing, led by Distributed Global and CoinFund, with Compound also participating. The funds will be used to build a computing platform that enables decentralized training across instances, and to achieve shared ownership of artificial intelligence models through contributions of computing power, code, data, capital, or expertise.

  • Crypto wallet Turnkey raises $15 million in funding, led by Galaxy Ventures

    Turnkey, a cryptocurrency wallet infrastructure company, has raised $15 million in Series A funding led by Lightspeed Faction and Galaxy Ventures, with participation from Sequoia Capital, Coinbase Ventures, Alchemy, Figment Capital, and Mirana Ventures. The project concluded in October of last year and raised $7.5 million in seed funding starting from 2022. Turnkey was co-founded by two former Coinbase employees who helped build the company's cryptocurrency exchange custody service, with the aim of helping application developers build user-friendly blockchain wallets.

  • Magpie: A vulnerability was found in the contract, and users are advised to cancel authorization as soon as possible

    Cross-chain infrastructure Magpie Protocol published an article stating that there is a vulnerability in the contract and urging users who have authorized its contract and still hold funds in their wallets to cancel the relevant contract authorization on each chain as soon as possible.

  • SlowMist reveals a new scam: maliciously modifying RPC node links to defraud assets

    SlowMist security team has exposed a new type of cryptocurrency scam. This scam uses the remote procedure call (RPC) function of modified Ethereum nodes to commit fraud. The specific process of the scam is as follows: the scammer induces the user to download the imToken wallet and gain the user's trust by using 1 USDT and a small amount of ETH as bait. Then, the scammer guides the user to change their ETH's RPC URL to the node controlled by the scammer. The node uses Tenderly's fork function to falsify the user's USDT balance. When the user sees the incorrect balance, they may attempt a transfer, but the scammer has already disappeared. According to SlowMist Technology's report, this type of scam exploits users' trust and negligence, resulting in asset losses. The SlowMist security team reminds users to remain vigilant when trading and avoid using untrusted RPC nodes.

  • Philippines SEC: Remove Binance App from Google and Apple App Stores

    Philippine Securities and Exchange Commission stated that we have taken action to remove the Binance app from the Google and Apple app stores.

  • BTC falls below $66,000

    The market shows that BTC has fallen below $66,000, currently trading at $65,997.14, with a daily decline of 0.02%. The market is volatile, please be prepared for risk control.

  • Hong Kong Shatin District Councillor Deng Zhaofeng: ETF allows individual investors to participate in the virtual currency market with small investments

    Hong Kong Sha Tin District Councilor Deng Zhaofeng published an article entitled "Grasping Financial Innovation Opportunities and Not Forgetting to Exclude Risks" in the A14 edition of Hong Kong Wen Wei Po, pointing out that the launch of Hong Kong's virtual currency ETF brings three opportunities to the market:

  • Ethereum on-chain DEX transaction volume yesterday was $1.796 billion

    According to DeFiLlama data, the trading volume of DEX on the Ethereum blockchain was 1.796 billion US dollars on April 22, ranking first. In addition, the trading volume of DEX on the Solana blockchain was 1.534 billion US dollars yesterday, ranking second; the trading volume of DEX on the BSC blockchain was 772.09 million US dollars yesterday, ranking third.

  • HKEX: The uniform margin rate for non-constituent virtual asset spot ETFs will be set at 30%

    The Hong Kong Stock Exchange (HKEX) and Hong Kong Securities Clearing Company Limited issued a notice on the "Margin Rates for Trading Virtual Asset Spot Exchange Traded Funds (ETFs)". It was pointed out that the following risk management arrangements, which refer to the announcement issued on April 17, 2024 (No. ETP/001/24), will take effect on the same day as the launch of the virtual asset spot ETF:

  • Tether issued USDT worth $508 million yesterday and redeemed USDT worth $165 million

    According to ChainArgos monitoring, Tether conducted a large-scale issuance and redemption activity on April 22. A total of 508 million USDT was issued that day, while 165 million USDT was redeemed.