search
Homeweb3.0Liminal Blames WazirX for July Hack, Says Its UI Was Not Responsible

Multiparty computation (MPC) wallet provider Liminal released a July 19 post-mortem report on the July 18 WazirX hack, claiming that its user interface

Liminal Blames WazirX for July Hack, Says Its UI Was Not Responsible

Multiparty computation (MPC) technology provider Liminal has released a July 19 post-mortem report on the July 18 WazirX hack, disputing the exchange’s claim that its user interface was responsible for the attack.

According to Liminal's report, the hack occurred because three WazirX devices were compromised. The devices were used to initiate transactions that were then modified by the attacker before being sent to Liminal's servers for approval.

Liminal also claimed that its multisignature wallet was set up to provide a fourth signature if WazirX provided the other three. This meant that the attacker only needed to compromise three devices to perform the attack. The wallet was set up this way at the behest of WazirX, the wallet provider claimed.

In a July 18 social media post, WazirX claimed that its private keys were secured with hardware wallets. However, WazirX said the attack “stemmed from a discrepancy between the data displayed on Liminal’s interface and the transaction’s actual contents.”

According to the Liminal report, one of WazirX’s devices initiated a valid transaction involving the Gala Games (GALA) token. In response, Liminal’s server provided a “safeTxHash,” verifying the transaction's validity. However, the attacker then replaced this transaction hash with an invalid one, causing the transaction to fail.

In Liminal’s view, the fact that the attacker was able to change this hash implies that the WazirX device had already been compromised before the transaction was attempted.

The attacker then initiated an additional two transactions: one GALA and one Tether (USDT) transfer. In each of these three transactions, the attacker used a different WazirX admin account, for a total of three accounts used. All three of the transactions failed.

After initiating these three failed transactions, the attacker extracted signatures from the transactions and used them to initiate a new, fourth transaction. The fourth transaction “was crafted in such a way that the fields used to verify policies were using legit transaction details” and “used the Nonce from the failed USDT transaction because that was the latest transaction.”

Because it used these “legit transaction details,” the Liminal server approved the transaction and provided a fourth signature. As a result, the transaction was confirmed on the Ethereum network, resulting in a transfer of funds from the joint multisig wallet to the attacker’s Ethereum account.

Liminal denied that its servers caused incorrect information to be displayed through the Liminal UI. Instead, it claimed that the incorrect information was provided by the attacker, who had compromised WazirX computers. In an answer to the posed question “How did the UI show a different value from the actual payload within the transaction?” Liminal said:

Liminal also claimed that its servers were programmed to automatically provide a fourth signature if WazirX admins provided the other three. “Liminal only provides the final signature once the required number of valid signatures are received from the client’s side,” it stated, adding that in this case, “the transaction was authorised and signed by three of our client’s employees.”

The multisig wallet “was deployed by WazirX as per their configuration well before onboarding with Liminal,” and was “imported” into Liminal “per WazirX's request.”

Related: WazirX breach post-mortem: Dismantling the $230M attack

WazirX’s post claimed that it had implemented “robust security features.” For example, it had required that all transactions be confirmed by four out of five keyholders. Four of these keys belonged to WazirX employees and one to the Liminal team. In addition, it required three of the WazirX keyholders to use hardware wallets. All destination addresses were required to be added to a whitelist ahead of time, WazirX stated, which was “earmarked and facilitated on the interface by Liminal.”

Despite taking all of these precautions, the attacker “appear[s] to have possibly breached such security features, and the theft occurred.” WazirX called the attack a “a force majeure event beyond [its] control.” Even so, it vowed that it was “leaving no stone unturned to locate and recover the funds.”

An estimated $235 million was lost in the WazirX attack. It was the largest centralized exchange hack since the DMM exploit of May 31, which resulted in even greater losses of $305 million.

Magazine: WazirX hackers prepped 8 days before attack, swindlers fake fiat for USDT: Asia Express

The above is the detailed content of Liminal Blames WazirX for July Hack, Says Its UI Was Not Responsible. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
Bitcoin (BTC) Holds Firm at 120-Day PeaksBitcoin (BTC) Holds Firm at 120-Day PeaksMay 11, 2025 am 11:38 AM

Bitcoin (BTC) price climbed to a 120-day high of $103,890 on Friday, propelled by favorable macro conditions and renewed institutional appetite.

A trader is getting attention from the crypto community for massive returns on the decentralized exchange Hyperliquid.A trader is getting attention from the crypto community for massive returns on the decentralized exchange Hyperliquid.May 11, 2025 am 11:36 AM

In a post on X, Lookonchain disclosed that the trader known as James Wynn has made up to $46.5 million in profits trading on the platform.

SUI/USDT Forms Symmetrical Triangle Pattern, Targeting a 8% Price MoveSUI/USDT Forms Symmetrical Triangle Pattern, Targeting a 8% Price MoveMay 11, 2025 am 11:34 AM

A symmetrical triangle pattern forming on the SUI/USDT 1-hour chart is capturing the attention of market analysts and traders, signaling a possible price movement of up to 8%.

Kaanch Network: The Utility Token That's Already LiveKaanch Network: The Utility Token That's Already LiveMay 11, 2025 am 11:32 AM

Most presale tokens don't do anything yet. They sell a promise. A pitch deck. A vision of what might happen. But Kaanch Network is different.

Solana (SOL) price started gaining traction after the Federal Open Market Committee (FOMC) announced interest rates would remain unchanged.Solana (SOL) price started gaining traction after the Federal Open Market Committee (FOMC) announced interest rates would remain unchanged.May 11, 2025 am 11:30 AM

This news boosted the crypto market’s bullish run. It has also taken SOL price back above $150.

title: BlackRock's Bitcoin ETF Records 19 Consecutive Days of Inflows.title: BlackRock's Bitcoin ETF Records 19 Consecutive Days of Inflows.May 11, 2025 am 11:28 AM

It’s the longest streak of the year, signaling strong institutional demand. Momentum shows rising smart money interest in Bitcoin.

A Hyperliquid trader is making headlines for massive returnsA Hyperliquid trader is making headlines for massive returnsMay 11, 2025 am 11:26 AM

A trader is getting attention from the crypto community for massive returns on the decentralized exchange Hyperliquid.

Could the next breakout in crypto come from a project still in its presale stage, quietly solving real-world problems while others chase scalability?Could the next breakout in crypto come from a project still in its presale stage, quietly solving real-world problems while others chase scalability?May 11, 2025 am 11:24 AM

As blockchain ecosystems expand and the market shifts its attention toward functionality and long-term use cases, the search for the next crypto to hit $1 is gaining urgency.

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

SublimeText3 English version

SublimeText3 English version

Recommended: Win version, supports code prompts!