HomeEthereumAlpha Homora loses $37 million following Iron Bank exploit

Alpha Homora loses $37 million following Iron Bank exploit



In one of the largest exploits of the DeFi era, this morning an attacker successfully drained over $37 million from Alpha Homora by leveraging Cream’s Iron Bank protocol-to-protocol lending platform. 

Alpha Finance Lab, whose protocol was audited by Quantstamp and Peckshield, announced on Twitter this morning that they were aware of an attack, that the “loophole” that allowed it had been patched, and that the team had a “prime suspect”:

Dear Alpha community, we’ve been notified of an exploit on Alpha Homora V2. We’re now working with @AndreCronjeTech and @CreamdotFinance together on this.

The loophole has been patched.

We’re in the process of investigating the stolen fund, and have a prime suspect already.

— Alpha Finance Lab (@AlphaFinanceLab) February 13, 2021

The transaction from the exploit is notably complex. The attacker used Alpha Homora to borrow and lend repeatedly with Iron Bank, which allows for leveraged lending. Some analysts have speculated that a faked “spell” (Alpha’s branded term for a smart contract) is what enabled the exploit:

That contract is a faked Alpha Homora spell, Alpha Homora’s system thought it was one of their own;

That “contract” is “owned” by Alpha pic.twitter.com/5OHlWh9Mi1

— Arrundai (@arrundai) February 13, 2021

This “fake spell/contract” exploit conceptually echoes the “evil jar” attack on Pickle Finance that netted an attacker $20 million late last year. In both cases, the exploited protocols errantly responded to faked contracts. 

Shortly after the successful exploit, the attacker “tipped” the Alpha and Iron Bank deployers 1,000 Ether each, and also made a Gitcoin donation.

Cream Finance said in a statement on Twitter that the Iron Bank exploit did not impact any of their other contracts, and that their money markets were functioning normally:

C.R.E.A.M. contracts and markets were investigated and found to be functioning as normal. Markets have been re-enabled across both V1 and V2.

Post mortem to follow.

— Cream Finance (@CreamdotFinance) February 13, 2021

Protocol Bailout?

The question now turns to how users will be compensated in the event the protocols cannot pressure their “prime suspect” into returning the funds. 

The Yearn.Finance team and MakerDAO set a precedent with “DAOs bailing out DAOs” last week when MakerDAO allowed for the creation of a custom-built collateralized debt position from Yearn’s newly-minted treasury.

While the size of the exploit is larger than the $11 million Yearn suffered, some have speculated that Alpha will likewise print tokens to cover the loss — and some traders and institutions have already positioned themselves for such a dilution.

Intrepid chain activity monitors noticed that Three Arrows Capital sent over $3 million in ALPHA tokens to Binance this morning, possibly with the intention of selling:

3AC selling $Alpha? Oh man.. pic.twitter.com/4xjlhZrIze

— Jason La Finance (@Raez_x) February 13, 2021

Currently, ALPHA, the governance token of the protocol which suffered the losses, is down 20% to $1.83; CREAM, the governance token of the protocol that enabled the exploit, is down 16% to $222; AAVE, the governance token of the protocol that the exploiter used for a flash loan, is down 2% to $505. 


Source link


Cardano faces $1.60 resistance after ADA price hits 2-month highs

Cardano's ADA token came close to its highest in two months on Aug. 10 as daily gains neared 6%.Data from Cointelegraph Markets Pro and...

Teller Finance deploys mainnet on Polygon, migrates 2,200 NFTs

Teller Finance, a non-collateral lending protocol for the DeFi market, has officially deployed its mainnet on Polygon, marking a significant milestone in its quest...
[td_block_social_counter style="style8 td-social-boxed td-social-font-icons" facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" custom_title="Follow us" block_template_id="td_block_template_11" border_color="#fbb03b" f_header_font_size="eyJhbGwiOiIyMCIsInBvcnRyYWl0IjoiMTgifQ==" f_header_font_weight="600" f_header_font_family="702" f_header_font_transform="uppercase" tdc_css="eyJwb3J0cmFpdCI6eyJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3NjgsInBob25lIjp7Im1hcmdpbi1ib3R0b20iOiI0MCIsImRpc3BsYXkiOiIifSwicGhvbmVfbWF4X3dpZHRoIjo3NjcsImFsbCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn19"]

Most Popular