<100 subscribers
原文:https://twitter.com/ParadigmEng420/status/1554249610574450688 译者:@Diamond 推特:https://twitter.com/D_TigerResearch
The Nomad bridge was just exploited for 165m
Currently, the details of the hack are unknown and this is not a post-mortem.
However, here are some details about the hack
👇🧵(1/12)
Nomad 跨链桥刚刚被盗走了 1.65 亿
目前黑客的详细信息尚不清楚,这条推文并不是事后分析
不过这里有一些关于这次攻击的细节
👇🧵(共 12 条)
Two hours ago, Nomad had a tvl of 165m dollars according to defillama. https://defillama.com/protocol/nomad
根据 DeFiLlama 的说法,两个小时前 Nomad 的总锁仓量为 1.65 亿美元。https://defillama.com/protocol/nomad

Currently, there are 18 million dollars left in the contract, which will probably be drained in the next few hours.
目前合约中还剩下 1800 万美元,而且可能接下来几个小时内就会耗尽(在发布时只剩约3600美元)。

Looking at the transactions that have interacted with the contract, we can see that all of these exploits have one thing in common, they call the process() function in the Nomad ERC20 Bridge Contract.
查看与合约交互的交易,可以看到所有的交易都利用了同一个漏洞,调用 Nomad ERC20 桥接合约中的 process()函数。

Now, the process function is as follows:
It checks that the domain of the message is correct(ie a transaction signed for evmos is meant for evmos)
It checks that the message has been proven by the prover
It calls the handler to do what the message wants(ie bridge tokens)
这个 process 函数如下:
检查消息的域是否正确(即为 evmos 签名的交易是为 evmos 准备的)
检查消息是否已被证明者证明
调用处理程序去做消息要做的事(即跨链 token)

Unfortunately, if you try to replay the same contract call the execution will be reverted. Why? You shouldn't be able to withdraw something twice.
但不妙的是,如果你尝试重复相同的合约调用,执行则会被恢复。为什么会这样?本不应该能够两次撤回某样东西。

According to this thread, the bridge seems to allow the user to pass in an arbitrary amount when they withdraw that does not necessarily correlate with the amount they deposited into nomad on the other chain.
根据这个系列推文,该桥似乎允许用户在提款时传递任意数量,与他们在另一条链上存入 Nomad 的数量不一定相关。
https://twitter.com/0xmagnetized/status/1554246763736813568
However, it seems like some generalized MEV frontrunning bots were able to replay the old attacks and withdraw massive amounts of WETH/WBTC
If you know how to do this, please DM me lmao
但是,好像一些通用的 MEV 前端机器人能够重复旧的攻击并提取大量 WETH 和 WBTC
如果你知道如何操作,请私信我 😂
If you have any funds in @nomadxyz_, @EvmosOrg, @MoonbeamNetwork, or @milkomeda_com, you need to swap out of nomad assets and use a different bridge to bridge back to Ethereum or another chain asap.
如果你在 @nomadxyz_、 @EvmosOrg、 @MoonbeamNetwork 或 @milkomeda_com 上存有资金,请尽快取出资产并使用其他跨链桥转回以太坊或其他链。
Nomad has been chosen as the canonical bridge for @EvmosOrg, @MoonbeamNetwork, and @milkomeda_com, you need to get all of your assets off these chains immediately.
Nomad 已被选为 @EvmosOrg、 @MoonbeamNetwork 和 @milkomeda_com 的标准跨链桥,请尽快将资产从这些链中取出。
Nomad has also paused the relayer and is trying to censor all bridging transactions using the watcher, however, this is likely little help since the exploit was on the contract side and not on the infra side.
Nomad 还暂停了中继器,并试图观测审查所有跨链交易。但是这可能没什么用,因为漏洞利用的是合约而不是基础设施。
If you have any more info about the hack, please DM me or post it in the nomad discord. We want this to be a good outcome for everyone(except the hackers)
如果你有更多关于这次攻击的信息,请给我发私信或公布在 Nomad Discord 中。我们希望这对大家都有一个好的结果(除了黑客)。
以上内容分析仅提供参考信息,不做为投资决策依据,请勿基于此报告进行任何投资决策,报告作者不对用户投资结果负责。
报告自所示日期起准备,由于随后的市场或经济状况可能发生变化,报告内容不一定能反映这些变化。提供的图形,图表和其他视觉辅助工具仅供参考。这些图形、图表或可视化辅助工具都不可用于制定投资决策。不代表会协助任何人做出投资决定,并且任何图形、图表或其他视觉辅助工具都无法捕获做出此类决定所需的所有因素和变量。
本⽂中涉及的某些陈述可能是对于未来预期的假设以及其他的前瞻性观点,⽽已知和未知的⻛险与不确定因素,可能导致实际结果、表现或事件与陈述中的观点和假设存在实质性差异。
本报告中包含的任何推测、预测和估计本质上都是推测性的,并且基于某些架设。这些前瞻性陈述可能被证明是错误的,并可能受到不正确的假设或已知或未知的风险,不确定性和其他因素的影响,而其中大多数是无法控制的。可以预料,某些或所有此类前瞻性假设将不会实现,或与实际结果有很大差距。
本文版权归D-Tiger Research Institute 所有。未经许可,任何机构或个人不得翻版、复制或再次分发他人等。
D-Tiger Research Institute
No comments yet