- Concord’s cross-chain bridge Horizon has been exploited for round $100 million in numerous tokens.
- The attacker has offered all stolen funds for Ethereum, however is to launder them by way of a privacy-protocol like Twister Money.
- The Concord workforce is reportedly working with the Federal Bureau of Investigation and a number of cyber safety companies to determine the attacker.
Share this text
The Concord workforce has confirmed the Horizon bridge has been exploited for about $100 million in numerous tokens.
Concord Bridge Hit for $100M
Concord, an EVM-compatible Proof-of-Stake blockchain, has had its Horizon cross-chain bridge exploited in a significant safety breach.
1/ The Concord workforce has recognized a theft occurring this morning on the Horizon bridge amounting to approx. $100MM. We have now begun working with nationwide authorities and forensic specialists to determine the perpetrator and retrieve the stolen funds.
— Concord 💙 (@harmonyprotocol) June 23, 2022
The Concord workforce confirmed in a Friday morning Twitter submit that Horizon, the bridge that connects the Concord community to BNB Chain and Ethereum, had been exploited for round $100 million in numerous tokens. “The Concord workforce has recognized a theft occurring this morning on the Horizon bridge amounting to approx. $100MM,” a submit from the official Concord Twitter account stated, including that it’s already working with nationwide authorities and forensic consultants to determine the attacker and doubtlessly retrieve the stolen funds.
In response to on-chain information, the exploit started at round 12:02 UTC on Thursday and lasted for about 15 hours. The attacker executed 16 malicious transactions of assorted sizes, starting from 14,190 to 30 ETH earlier than the Concord workforce observed the assault and halted the Horizon bridge to forestall additional malicious transactions. After stealing roughly $100 million price of assorted tokens, together with Frax, Frax Shares, wrapped Ethereum, wrapped Bitcoin, Aave, Sushi, Tether, and Binance USD, the attacker despatched them to completely different wallets, swapped them for Ethereum on the decentralized change Uniswap, after which transferred the stolen funds again to the originating wallet.
Unusual for these kind of exploits, the attacker has not but tried to anonymize the stolen funds by way of a privacy-protocol like Twister Money. In a follow-up Tweet, the Concord workforce acknowledged that it’s working with the Federal Bureau of Investigation and a number of cyber safety companies to trace and determine the attacker. The involvement from U.S. authorities means there’s a risk that the Workplace of Overseas Belongings Management will add the attacker’s pockets to its sanctioned addresses blacklist, successfully disabling it from laundering the stolen funds by way of Twister Money.
Whereas Concord hasn’t but shared particular particulars about how the exploit occurred, blockchain safety consultants have speculated that the attacker probably gained entry to at the very least two of the 5 non-public keys of the multi-signature pockets controlling the Horizon bridge good contracts. This assault vector was already highlighted in April by Ape Dev, the pseudonymous founding father of the crypto-focused enterprise agency Chainstride Capital. They stated that they had investigated the Concord bridge on Ethereum and located that “if two of the 4 multisig signers are compromised, we’re going to see one other 9 determine hack,” which seems to be exactly what occurred yesterday.
Mudit Gupta, the chief info safety officer at Polygon, commented that this was not a “blockchain hack” however a “conventional hack,” and speculated that the attacker probably compromised the servers internet hosting the keys of Horizon’s multi-signature pockets. “As soon as contained in the server, they may entry the keys that had been stored in plaintext for signing legit transactions,” he stated, including that the exploit is “eerily comparable” to Axie Infinity’s $551.8-million Ronin Community exploit from March. In April, the U.S. Treasury Division confirmed that North Korea’s state-sponsored cybercrime group often called Lazarus Group was behind the Ronin Community exploit.
Concord acknowledged that its trustless Bitcoin bridge was unaffected by the exploit and that it could proceed to replace the general public with new info because it is available in.
Disclosure: On the time of writing, the creator of this piece owned ETH and several other different cryptocurrencies.