Scan to download
BTC $75,125.71 +0.72%
ETH $2,336.94 +0.00%
BNB $627.67 +0.85%
XRP $1.44 +2.25%
SOL $88.27 +3.66%
TRX $0.3246 -0.42%
DOGE $0.0981 +1.96%
ADA $0.2561 +2.64%
BCH $449.75 +2.00%
LINK $9.48 +2.12%
HYPE $43.93 -2.94%
AAVE $113.15 +6.50%
SUI $0.9929 +2.09%
XLM $0.1671 +3.88%
ZEC $334.64 -1.49%
BTC $75,125.71 +0.72%
ETH $2,336.94 +0.00%
BNB $627.67 +0.85%
XRP $1.44 +2.25%
SOL $88.27 +3.66%
TRX $0.3246 -0.42%
DOGE $0.0981 +1.96%
ADA $0.2561 +2.64%
BCH $449.75 +2.00%
LINK $9.48 +2.12%
HYPE $43.93 -2.94%
AAVE $113.15 +6.50%
SUI $0.9929 +2.09%
XLM $0.1671 +3.88%
ZEC $334.64 -1.49%

Slow Fog: The Numbers Protocol token project has a serious vulnerability and has been attacked. Please revoke authorization as soon as possible

2022-11-23 18:01:39
Collection

ChainCatcher news, according to the Slow Mist security team's intelligence, the Numbers Protocol (NUM) token project on the ETH chain has been attacked, with the attacker profiting approximately $13,836.

The Slow Mist security team shared the following in a brief:

  1. The attacker created a malicious anyToken token, which is the attack contract (0xa68cce), and the underlying token of this malicious token contract points to the NUM token address;
  2. Then, they called the anySwapOutUnderlyingWithPermit function of the Router contract of the Multichain cross-chain bridge. This function takes anyToken as input and calls the permit function of the underlying token for signature approval, then exchanges the authorized user's underlying token to a specified address. However, since the NUM token does not have a permit function and has a callback feature, even if the attacker inputs a fake signature, it can still return normally, causing the transaction not to fail, resulting in the NUM tokens of the victim's address being ultimately transferred to the specified attack contract;
  3. The attacker then exchanged the profited NUM tokens for USDC through Uniswap and then converted them to ETH for profit;

The main reason for this attack is that the NUM token does not have a permit function and has a callback feature, allowing fake signatures to deceive the cross-chain bridge, leading to unexpected transfers of user assets. (Source link)

app_icon
ChainCatcher Building the Web3 world with innovations.