HomeEthereumPAID Network exploiter nets $3 million in infinite mint attack

PAID Network exploiter nets $3 million in infinite mint attack

-

[ad_1]

Paid Network, a DeFi platform aimed at real-world businesses, has been exploited today in an “infinite mint” attack that has sent PAID token prices plunging upwards of 85%.

While the exploit netted nearly $180 million in PAID tokens at the time of the attack — what would have comfortably been the largest exploit of a DeFi protocol — the hacker’s payday will end up being far less. One observer noted that the attacker’s wallet only converted some of their tokens to wrapped ether, leaving the rest in rapidly-devaluing PAID tokens: 

Summary of $PAID incident:

Total PAID swapped to WETH: 2079.603371141493
= $3,104,887.33

Total PAID left in account: 594,717,455.71
= $24,313,147

Total amount in attacker account = $27,418,034.33

Stay Safe. pic.twitter.com/Lz93qGKAq0

— vasa (@vasa_develop) March 5, 2021

The attacker’s wallet still has over 57 million PAID tokens worth $37 million. 

The exploit is conceptually similar to an attack on insurance protocol Cover that took place in late December last year. In that instance, the team took a “snapshot” of holders prior to the attack and issued a new token, returning the supply of the token to pre-exploit levels.

The team confirmed on Twitter that they are currently planning for a snapshot and restoration:

We are investigating the issue. We pulled liquidity, are creating a new smart contract, & will be restoring everyone’s original balances to before the hack.

Those with staked, Lpool & UniFarm $PAID will have their tokens be sent to them manually.

We will share more updates soon

— PAID NETWORK (@paid_network) March 5, 2021

However, token holders anxious for a resolution may be out of luck. Some in the community are speculating that the attack on PAID wasn’t an exploit at all, but instead a “rugpull” — a colloquial term for an insider designing contracts to specifically make them exploitable and swiping user funds. 

Nick Chong of Parafi Capital noted on Twitter that Paid’s deployer contract, an externally controlled account, transferred ownership of the deployer to the attacker shortly before the mint, indicating that a member of the team either rugpulled, or errantly allowed the attack to take place with a security lapse:

Paid Network’s deployer, an EOA, transferred ownership of a contract to the attacker 30 mins before the minthttps://t.co/h14GdV4fCf

— Nick Chong (@n2ckchong) March 5, 2021

Additionally, a DeFi risk analysis account @WARONRUGS warned of exactly this exploit in late January, noting that the contract owner can mint PAID tokens at any time:

❌ Scam Advisory #86- PAID Network $PAID (0x8c8687fC965593DFb2F0b4EAeFD55E9D8df348df)

Reason: The owner can mint tokens and did mint tokens to fresh wallets who never bought the presale. Contract is behind a proxy.

Likeliness of losing all funds: Very High

DYOR. #WARONRUGS❌ pic.twitter.com/YQunjpWuxY

— #WARONRUGS❌ (@WARONRUGS) January 25, 2021

An on-chain note sent to the attacker has ominously warned that “the LAPD will be in contact with Kyle Chasse very shortly.” Kyle Chasse is the CEO of Paid Network.

Paid Network did not respond to a request for comment by the time of publication. 



[ad_2]

Source link

LATEST POSTS

Cardano faces $1.60 resistance after ADA price hits 2-month highs

Cardano's ADA token came close to its highest in two months on Aug. 10 as daily gains neared 6%.Data from Cointelegraph Markets Pro and...

Teller Finance deploys mainnet on Polygon, migrates 2,200 NFTs

Teller Finance, a non-collateral lending protocol for the DeFi market, has officially deployed its mainnet on Polygon, marking a significant milestone in its quest...
[td_block_social_counter style="style8 td-social-boxed td-social-font-icons" facebook="tagdiv" twitter="tagdivofficial" youtube="tagdiv" custom_title="Follow us" block_template_id="td_block_template_11" border_color="#fbb03b" f_header_font_size="eyJhbGwiOiIyMCIsInBvcnRyYWl0IjoiMTgifQ==" f_header_font_weight="600" f_header_font_family="702" f_header_font_transform="uppercase" tdc_css="eyJwb3J0cmFpdCI6eyJkaXNwbGF5IjoiIn0sInBvcnRyYWl0X21heF93aWR0aCI6MTAxOCwicG9ydHJhaXRfbWluX3dpZHRoIjo3NjgsInBob25lIjp7Im1hcmdpbi1ib3R0b20iOiI0MCIsImRpc3BsYXkiOiIifSwicGhvbmVfbWF4X3dpZHRoIjo3NjcsImFsbCI6eyJtYXJnaW4tYm90dG9tIjoiMzAiLCJkaXNwbGF5IjoiIn19"]

Most Popular

spot_img