On The Wire: Today's Top Stories In Finance & Tech
Your daily briefing of some of the most important stories from the crypto, finance, and tech space.
A recent series of exploits have seen over 5,000 ETH drained from wallets by unknown means. While this is a worrying development, 5,000 ETH (currently around $10 million) is a drop in the ocean of crypto hacks and scams, through which users lose billions of dollars of digital tokens every year. These attacks use a wide range of means, from technical exploits to social engineering, and impact everyone, from newcomers through to seasoned DeFi veterans.
But how exactly do criminals steal your crypto? Here are seven common methods—and some of the things you can do to protect your digital wealth.
Strictly speaking, a rug pull is an exit scam, in which so-called founders collect investors' money for a specific purpose, such as building a DeFi platform, and then disappear with the cash.
🆘#zkSyncEra #DEX @TheMerlinDEX rugged
— Multichain Whale (@MultichainWhale) April 26, 2023
• Fully Certik audited
• Legit partner protocols
• Trusted by credible friends
• Working dex
⚠️More than 1.82 million dollars were stolen, LP was drained
🫡 Stay #SAFU folks! Avoid interacting with #MerlinDEX pic.twitter.com/bcvSzyPKyu
One common variation is to advertise a smart contract that turns out to be a "wallet drainer", which will steal everything in the connected wallet.
In practice, a "rug" has become a catch-all term for a broad spectrum of behaviors that range from launching a project that failed through no fault of the creators, through to the most cases of blatant fraud and theft.
In a phishing attack, scammers create fake websites or send emails that aim to trick users into giving up personal information like login details and passwords, or even private keys and seed phrases, or convince them to send crypto to the scammer's address. Phishing often involves a special "offer" designed to instill a sense of FOMO.
"Spear-phishing" is a variation on this, whereby scammers target a specific individual—such as a wealthy investor or CEO—often with a highly tailored and sophisticated approach.
Smart contracts are code that runs on the blockchain, exactly as written, with their execution enforced by the entire network. This means applications cannot be shut down or transactions reverted. However, it also means that any vulnerabilities in the code may be exploited by attackers, and by the time anyone has noticed, it will be too late. There are many ways that hackers can take advantages of "loopholes" in smart contracts.
One of the largest and most significant smart contract attacks occurred early in Ethereum's history, when a hacker drained tens of millions of dollars of ETH from The DAO, a pioneering decentralized VC fund that held around 14% of all ETH in existence. The episode led to both the Ethereum community and network controversially splitting, with the majority opting to fork the blockchain to roll back the theft and return funds to users.
Reentrancy attacks: A notorious attack vector for smart contracts.
— Chainlink (@chainlink) March 24, 2023
A reentrancy attack caused the infamous The DAO hack in 2016.
Here's what a reentrancy attack is and how it works ⬇️ pic.twitter.com/3NBQGcsiQe
A flash loan is an uncollateralized loan that must be paid back in the same block that it was taken out, or else the transaction is reverted. These can be used to take advantage of arbitrage opportunities on different DEXs. However, they can also be used to carry out economic attacks against DeFi protocols.
The attacker uses a flash loan to borrow a large amount of tokens. These are used to manipulate the price of a particular token on one protocol, while the attacker typically uses another protocol to profit from the change in price. The loan is paid back in the same block and the attacker keeps the profits, which have effectively been extracted from the targeted protocol. In March 2023, a flash loan attack was used to drain almost $200 million from Euler Finance. Flash loans can also be used in governance attacks, to push through proposals that benefit the attacker.
Blockchain protocols are built to eliminate points of trust. Unfortunately, CeFi platforms necessarily still require human decision-making, and employees or other insiders with access to sensitive information can exploit their positions in various ways. This has repeatedly happened in the history of crypto, as exchange founders have diverted customer funds for their own use—most notably and recently in the case of FTX.
Bitcoin Exchange ShapeShift’s Hack an Insider Job https://t.co/pYdZlm9Nss #Bitcoin pic.twitter.com/ZKLuzpSCv6
— CCN - Capital & Celeb News (@CapitalAndCeleb) April 16, 2016
ShapeShift, Livecoin, FTX and many other thefts from exchanges turned out to be inside jobs.
Pump and dump schemes involve scammers accumulating a large amount of a particular crypto, before artificially inflating ("pumping") its value by making strategic buys and/or by spreading information that make it appear underpriced. Traders pile in on the hope of quick gains, driving up the price, before the insiders take the opportunity to sell at a profit, dumping the price back down and leaving the latecomers holding the bag.
P&D schemes are not unique to crypto, but anonymity, ease of access to exchanges, and the speed with which information travels on social media make this a perennial favorite for crypto scammers.
Brought to global attention in the 1920s by Italian swindler Charles Ponzi, and again by in 2008 by Bernie Madoff, Ponzi schemes involve scammers creating fake investment opportunities that promise extremely high returns. In reality, existing "investors" are paid using funds deposited by more recent ones, until the stream of new money runs out and the Ponzi collapses.
The infamous OneCoin CEO Ruja Ignatova disappeared in October 2017, after defrauding billions of dollars in a Ponzi scheme 😰
— CoinMarketCap (@CoinMarketCap) May 13, 2022
Branded the "Bitcoin killer," OneCoin grew to be one of the largest crypto — but investors were not able to cash out 👇https://t.co/yjVZP9yHEq
If you're the victim of a hack or crypto theft, there are a couple of things that almost certainly aren't going on. The first is a 51% attack on the blockchain, resulting in a double spend. It's not impossible, and it's happened before, but only smaller proof-of-work chains and large accounts (like exchanges) are generally targeted due to the cost. It's practically unthinkable this would happen for a major blockchain, let alone for Bitcoin or Ethereum.
The second thing that is highly unlikely is a brute force attack on your private keys. Assuming you've generated them using a suitable wallet app, the amount of computational power required to crack standard 128-bit private keys in a useful time frame (before the end of the universe) is many orders of magnitude larger than is available. One day, quantum computers might change that—but at that point, we would have far bigger problems than crypto being stolen.
Subscribe to our newsletter and follow us on Twitter.
Everything you need to know about Blockchain, Artificial Intelligence, Web3 and Finance.