DeFi developer Banteg: LayerZero was not attacked through RPC poisoning

robot
Abstract generation in progress

Gold Finance reports that on April 20th, LayerZero released a KelpDAO report stating that KelpDAO was attacked through hackers poisoning the RPC of LayerZero DVN. Yearn Finance anonymous developer Banteg questioned that the attack was not RPC poisoning; network poisoning refers to attackers tampering with shared lookups (DNS, ARP, cache) outside the trust boundary. In such cases, the recipient has no reason to doubt the source. But this attack was not like that. The attacker entered LayerZero’s internal trust boundary, accessed the RPC list, compromised two nodes relied on by DVN, and replaced the op-geth binary. This constitutes an infrastructure intrusion within the boundary, with the attack targeting the supply chain level rather than the network level. Moreover, the malicious payload was delivered with great precision. The malicious binary disguised itself as an IP address, sent forged payloads only to DVN, displayed real information to scanners and all other callers, then self-destructed to erase logs and binaries. RPC poisoning can easily be mistaken for an external attack on the infrastructure. But in reality, the attacker implanted targeted malicious programs inside the trust boundary. This is far more terrifying than its name suggests.

ZRO-3.63%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin