Hyperbridge contract encounters MMR proof replay vulnerability, resulting in approximately $242k in losses

robot
Abstract generation in progress

Deep Tide TechFlow News, April 13, according to BlockSec Phalcon disclosure, the HandlerV1 contract managed by Hyperbridge saw a Merkle Mountain Range (MMR) proof replay vulnerability on the Ethereum network, resulting in losses of about $242k. The vulnerability arose because the proof was not bound to the request, allowing attackers to replay historical valid proofs and, together with newly forged requests, carry out actions such as changing administrator permissions. In a specific case, the attacker changed the Polkadot (DOT) Token administrator, then used the permissions to mint additional DOT and profited. Related attack transactions that have been observed include changing the DOT Token administrator and minting (loss of about $237.4k), changing the ARGN Token administrator and minting (loss of about $3,800), and host withdrawals. The vulnerability was discovered by PhalconSecurity and analyzed via PhalconExplorer.

Earlier reports indicate that the Hyperbridge gateway contract was attacked, with 1 billion DOT tokens minted on Ethereum and sold off.

ETH-0,17%
DOT-3,84%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin