- Concord’s cross-chain bridge Horizon has been exploited for round $100 million in varied tokens.
- The attacker has bought all stolen funds for Ethereum, however is to launder them via a privacy-protocol like Twister Money.
- The Concord group is reportedly working with the Federal Bureau of Investigation and a number of cyber safety companies to determine the attacker.
The Concord group has confirmed the Horizon bridge has been exploited for about $100 million in varied tokens.
Concord Bridge Hit for $100M
Concord, an EVM-compatible Proof-of-Stake blockchain, has had its Horizon cross-chain bridge exploited in a serious safety breach.
1/ The Concord group has recognized a theft occurring this morning on the Horizon bridge amounting to approx. $100MM. We’ve begun working with nationwide authorities and forensic specialists to determine the perpetrator and retrieve the stolen funds.
— Concord 💙 (@harmonyprotocol) June 23, 2022
The Concord group confirmed in a Friday morning Twitter publish that Horizon, the bridge that connects the Concord community to BNB Chain and Ethereum, had been exploited for round $100 million in varied tokens. “The Concord group has recognized a theft occurring this morning on the Horizon bridge amounting to approx. $100MM,” a publish from the official Concord Twitter account mentioned, including that it’s already working with nationwide authorities and forensic consultants to determine the attacker and probably retrieve the stolen funds.
In accordance with on-chain knowledge, the exploit started at round 12:02 UTC on Thursday and lasted for about 15 hours. The attacker executed 16 malicious transactions of assorted sizes, starting from 14,190 to 30 ETH earlier than the Concord group seen the assault and halted the Horizon bridge to forestall additional malicious transactions. After stealing roughly $100 million price of assorted tokens, together with Frax, Frax Shares, wrapped Ethereum, wrapped Bitcoin, Aave, Sushi, Tether, and Binance USD, the attacker despatched them to totally different wallets, swapped them for Ethereum on the decentralized alternate Uniswap, after which transferred the stolen funds again to the originating pockets.
Unusual for a majority of these exploits, the attacker has not but tried to anonymize the stolen funds via a privacy-protocol like Twister Money. In a follow-up Tweet, the Concord group acknowledged that it’s working with the Federal Bureau of Investigation and a number of cyber safety companies to trace and determine the attacker. The involvement from U.S. authorities means there’s a chance that the Workplace of Overseas Property Management will add the attacker’s pockets to its sanctioned addresses blacklist, successfully disabling it from laundering the stolen funds via Twister Money.
Whereas Concord hasn’t but shared particular particulars about how the exploit occurred, blockchain safety consultants have speculated that the attacker doubtless gained entry to at the very least two of the 5 personal keys of the multi-signature pockets controlling the Horizon bridge good contracts. This assault vector was already highlighted in April by Ape Dev, the pseudonymous founding father of the crypto-focused enterprise agency Chainstride Capital. They mentioned that they had investigated the Concord bridge on Ethereum and located that “if two of the 4 multisig signers are compromised, we’re going to see one other 9 determine hack,” which seems to be exactly what occurred yesterday.
Mudit Gupta, the chief info safety officer at Polygon, commented that this was not a “blockchain hack” however a “conventional hack,” and speculated that the attacker doubtless compromised the servers internet hosting the keys of Horizon’s multi-signature pockets. “As soon as contained in the server, they might entry the keys that had been stored in plaintext for signing legit transactions,” he mentioned, including that the exploit is “eerily related” to Axie Infinity’s $551.8-million Ronin Community exploit from March. In April, the U.S. Treasury Division confirmed that North Korea’s state-sponsored cybercrime group generally known as Lazarus Group was behind the Ronin Community exploit.
Concord acknowledged that its trustless Bitcoin bridge was unaffected by the exploit and that it could proceed to replace the general public with new info because it is available in.
Disclosure: On the time of writing, the creator of this piece owned ETH and a number of other different cryptocurrencies.