To catch up, check out our previous 2020 in Review.
The world of cryptocurrency is as dangerous as ever and it’s hard to ignore. Before we get into the list that you’re waiting for, how can we help make this industry safer?
In the first half of 2021, we:
- Released the new MyCrypto to help the user experience and make the user journey of using and monitoring crypto easier and more straightforward.
- Published a report of bad actors abusing the famous ERC20 approve() method (something that most users just blindly trust) to steal assets.
- Extended our service offerings to help users who have sweepers on their accounts to save their staked assets.
- Written a guide to help you use MyCrypto much more privately.
- As the NFT market booms, we also published an educational piece about common scams targeting NFT buyers.
- Continued our anti-scam/anti-phishing efforts with CryptoScamDB.
Improving this industry’s awareness and prevention of scams, exploits, and hacks is a tall order, but we’re trying.
Let's take a deeper look at the overall industry to see if we, as a whole, have improved and learned from 2020.
What follows is a list of the major/noteworthy security incidents of 2021 Q1/Q2. However, we will NOT be recapping all the rug-pulls and events that occurred, as there are too many to count...
The first quarter of 2021 had some interesting events, from entire protocol shutdowns and DeFi hacks, to arrest confirmations. We saw targeted attacks on individuals that shook the industry purely because of the lengths bad actors will go to for a tidy payday.
Compared to previous years, the first quarter did not have as many cryptocurrency exchange hacks. This is either because attention is being drawn elsewhere or exchanges have learned from previous failures and adjusted their security controls.
Story: Yearn hacked for $11M
TL;DR: One of the biggest/OG automated yield farming protocols,Yearn, had one of their v1 vaults exploited to the tune of $11M, and users of the vault saw a direct loss of $2.8M. The Yearn team managed to mitigate the exploit in 10minutes 14seconds, including Tether freezing $1.7M USDT to prevent the bad actors from moving the assets.
TL;DR: A DAO that brought real-world assets to the blockchain, using Chainlink oracles, seized their operations citing an ongoing investigation with the SEC.
TL;DR: During February, a bad actor gained access to the push notification system used by Blockfolio and sent offensive material to all Blockfolio users. It was acknowledged and explained by SBF shortly after, with them pushing blame on a competitor exchange, stating "This offensive content was produced and published by a competitor exchange of ours."
TL;DR: SIM Swapping happens a lot in crypto (we've even written a large article on it!). This individual entity sued their mobile carrier after the loss of 15 Bitcoin from being SIM Swapped.
TL;DR: A clever flash loan attack allowed for the operator to effectively drain the vaults of AlphaFinance. FrankResearcher posted a twitter thread with a summary of what happened. Shortly after, AlphaFinance hints that they know who did it.
TL;DR: An event that awakened the community about the dangers of blindly trusting a UI and accepting that what you once thought was trusted became untrusted. This post-mortem shows the extreme efforts a bad actor would go to to get hold of your funds by compromising your local machine. After reviewing the malicious payload, we can confirm that it was "brilliantly" thought-out.
TL;DR: A platform issuing social tokens had an incident whereby one of their hot wallet private keys were compromised, and the attacker sold all the social tokens for ETH (which dumped the markets for those social tokens) and moved the ETH to another address via TornadoCash.
TL;DR: Last year there was a massive account takeover campaign using internal Twitter tools to post from high value accounts, promoting a trust trading scam. Less than a year later, the hacker - an 18 year old - was found and pleaded guilty.
TL;DR: According to developers, Binance processed a legitimate deposit twice and credited the double funds offchain. The mistake occurred due to a reported bug in Filecoin’s RPC code.
TL;DR: GitHub allows for servers to be spun up to run tests (CI/CD) on code. Entities are making use of these (free) servers to mine cryptocurrency - meaning they don't have the overheads of electricity/maintenance and instead profit from any block rewards.
TL;DR: The xFORCE contracts were not following the ERC20 standard too closely which allowed an exploit on the deposit mechanism, minting xFORCE tokens. One you had these xFORCE tokens (without actually depositing FORCE tokens), you could then withdraw FORCE tokens (for essentially free money).
TL;DR: Due to a software bug, a group of validators on the Stellar network suddenly dropped, resulting in transaction disruptions. After some 10 hours, the issue had been identified and fixed, and validators were coming online again.
Story: Class action lawsuit filed against crypto wallet firm Ledger, Shopify over 2020 customer data breach
TL;DR: A database of roughly 300,000 Ledger customer records (that detailed customer emails, physical shipping address, and full names) was dumped on a forum called RaidForums for free in 2020. A class action suit was filed April 06 2021.
TL;DR: Although a relatively rare occurrence, Circle (the authority behind USDC) issued 7 more blacklist events for a handful of addresses. This allows for token confiscation, including the ability for Circle to prevent the address from spending (read: `transfer()`) the token. This comes as the U.S. Department of The Treasury added them to the OFAC’s SDN List.
TL;DR: A Turkish exchange suddenly went quiet and it is speculated that the CEO fled to Thailand with the keys to $2B in cryptocurrency that belonged to the users of the exchange. Since then, a statement replaced the main webpage of Thodex detailing how they are going through negotiations with business partners and a cyber attack that modified some of their backend data. They state that the media is wrong about the $2B figure and it is much lower.
TL;DR: A math error occurred when UraniumFinance changed their swap fees from 0.20% to 0.16% and caused an unintended calculation error that affected permitted swap fees. A single character in the contract caused the smart contract sanity checks to be exploited on balance checks, causing the UraniumFinance reserves to be drained.
TL;DR: BitcoinFog was a popular tool used to mix outputs with each other to add some degree of obscurity to Bitcoin transactions. Allegedly, BitcoinFog laundered ~1,200,000 Bitcoin over a 10 year period.
TL;DR: With clever flash loans, an attacker was able to drain the liquidity pools of xTokenMarket by manipulating the price of SNX and BNT in various DEX price feeds. The attack was performed via MEV software called Flashbots.
Story: DeFi100 exit scams with $32M
TL;DR: A DeFi protocol exit-scammed with open messages taunting their users with “we scammed you guys and you can't do shit about it”. The next day, they issued a statement saying they did not exit scam and restored the website to its former state.
TL;DR: Following the data breach in 2020 and the class action lawsuit against Ledger in early 2021, users started reporting more physical phishing campaigns to try and steal users keys. Bad actors would send a modified device to the shipping address they obtained from the data dumps.
TL;DR: According to an official statement, the bank run started after some whales began to remove liquidity from IRON/USDC pools and then sold $TITAN -> $IRON -> $USDC directly instead of redeeming $IRON, which caused the coins to lose their peg.
TL;DR: Due to a logic error with handling duplicate symbols, an exploit was executed that resulted in a loss of funds of ~$140k. The network was halted by nodes and patched, and functionality restored 6 hours later. THORChain acknowledged the exploit quickly and stated that their treasury will cover the loss in full.
If we compare the observations from our 2020 edition, it seems the industry still has quite a bit of room to improve, and likely always will. We need continued education on DeFi “apeing” and DeFi admin keys, phishing vectors on everyday users, and the inherent risk of storing all your funds on centralised exchanges.
Compared to the first half of 2020, we have seen an improvement in centralised exchanges and their security, or at least there haven’t been as many publicised hacks taking place on their infrastructure. This is good, but also begs the question: where are bad actors focusing their attention? An easy, and probably correct guess, would be they are turning their attention to DeFi protocols and joining communities to pull easy rug pulls as it doesn’t require much effort and the monetary gain is noteworthy.
We have seen a significant rise of interest in the NFT scene, including big names adopting NFTs (ie: Christies, eBay, Sotheby’s). We can predict that there’ll be some expensive NFT heists coming - if not already occurring and just not reported too publicly.
Here’s hoping that the rest of 2021 is healthy!