Background
On March 14, 2024, according to the early warning of the Slow Mist MistEye security monitoring system, the decentralized lending protocol MOBOX on the Optimism chain was attacked, causing losses of approximately $750,000. The SlowMist security team analyzed the attack incident and shared the results as follows:
(https://twitter.com/SlowMist_Team /status/1768167772230713410)
##Related information
Attacker address:
0x4e2c6096985e0b2825d06c16f1c8cdc559c1d6f8
0x96f004c81d2c7b907f92c45922d38ab870a53945
Attacked contract address:
0xae7b6514af26bcb2332fea53b8dd57bc13a7838e
Attack transaction:
##0x4ec3061724ca9f0b8d400866dd83b92647ad8c943a1c0ae9ae6c9bd1ef789417There are two main core points of this attack. One is that the attacker exploits the borrow() function vulnerability in the contract, and each time it is called The function will trigger the distribution of rewards to the recommender's address. Since the reward calculation is based on the number of transferred tokens, the attacker can increase the amount of the next borrowing by transferring the reward to the referrer back to the attacked contract again. The second is that each time the borrow() function is called, a part of the MO tokens in the pool will be burned, so the price of MO tokens is continuously raised. In the end, the attacker can make profits by continuously borrowing and superimposing rewards. We can find that the entire attack process mainly involves calling the vulnerable borrow() function in a loop, and then immediately calling redeem() performs a redemption and then transfers the tokens allocated to the referrer back to the attack contract. Following up the analysis of the borrow() function, we can find that every time this function is called, part of the MO tokens in the pool will be burned. However, the amount of USDT loaned out is calculated based on the price of MO tokens in the pool. Since the price of MO tokens is burned due to The continuous increase eventually led to the attacker using a small amount of MO tokens to lend out a large amount of USDT tokens. In addition, each time a loan is borrowed, a referrer address will be given a dividend reward, and this function is based on the number of MO tokens passed in. computational. However, since the recommender address is also controlled by the attacker (0x96f004c81d2c7b907f92c45922d38ab870a53945), the attacker can reward this part after completing the loan operation. Transfer it back to superimpose the next borrowing amount and dividend rewards. After the above cycle operation, the attacker increased the price of MO tokens, and finally could use a very small number of MO tokens to lend out large amounts of money in the contract. amount of USDT, and directly exchange all USDT in the unbalanced pool to make a profit. The core of this attack is that the attacker uses the borrow() function to burn the pool The mechanism of partial tokens in the middle continuously borrows assets to increase the price of tokens in the pool and obtains referrer rewards, and then transfers the tokens back and borrows them again, thereby continuously adding rewards and manipulating prices. The SlowMist security team recommends that project parties add lock-up time limits to similar functions and consider multiple factors when designing the price model of lending to avoid similar incidents from happening again. Attack Core
Transaction Analysis
Summary
The above is the detailed content of Review: MOBOX Hacked Analysis. For more information, please follow other related articles on the PHP Chinese website!

Gate.io can be set as the Chinese interface through the following steps: 1. APP: Log in, enter the Personal Center, find "Settings", select "Language", select "Simplified Chinese" or "Traditional Chinese", confirm, restart. 2. Web version: Visit the official website, log in, find the language selection button, select "Simplified Chinese" or "Traditional Chinese", refresh the page, and improve the transaction experience.

The steps to register an Ouyi account are as follows: 1. Prepare a valid email or mobile phone number and a stable network; 2. Visit Ouyi official website; 3. Enter the registration page; 4. Select the registration method and fill in the information; 5. Obtain and fill in the verification code; 6. Agree to the user agreement; 7. Complete registration and log in, carry out KYC and set security measures.

The steps to register a Binance account include: 1. Prepare a valid email or mobile phone number and a stable network; 2. Visit Binance official website; 3. Enter the registration page; 4. Select the registration method; 5. Fill in the registration information; 6. Agree to the user agreement; 7. Complete verification; 8. Obtain and fill in the verification code; 9. Complete registration. After registering, it is recommended to log in to your account, conduct KYC verification, and set up security measures.

To register a Sesame Door account, you need to prepare a valid email or mobile phone number and a stable network. The steps include: 1. Visit the official website, 2. Enter the registration page, 3. Select the registration method, 4. Fill in the registration information, 5. Get and fill in the verification code, 6. Agree to the user agreement, 7. Complete the registration. After successful registration, you need to log in to your account, perform KYC identity verification, and set security measures.

The principles of choosing a cryptocurrency exchange include: 1. Security, 2. Compliance, 3. User experience, 4. Transaction fees, 5. Currency selection, 6. Liquidity. Tutorials include: 1. Register an account, 2. Identity authentication (KYC), 3. Security settings, 4. Recharge, 5. Spot transactions, 6. Withdrawal.

Can. The two exchanges can transfer coins to each other as long as they support the same currency and network. The steps include: 1. Obtain the collection address, 2. Initiate a withdrawal request, 3. Wait for confirmation. Notes: 1. Select the correct transfer network, 2. Check the address carefully, 3. Understand the handling fee, 4. Pay attention to the account time, 5. Confirm that the exchange supports this currency, 6. Pay attention to the minimum withdrawal amount.

Since its birth in 2009, Bitcoin’s price has experienced many fluctuations. 1. 2009-2010: From worthless to $0.3. 2. 2011-2013: From $1 to $1,000. 3. 2014-2017: From $200 to nearly $20,000. 4. 2018-2021: From bear market to highs of $64,000. 5. 2022-2024: From falling below $20,000 to the rise after the ETF is approved.

There is no "best" digital currency exchange, only the "most suitable" ones because everyone has different needs. 1. Newbies should choose simple and easy-to-understand exchanges, such as Coinbase. 2. Users who focus on security should choose Coinbase or Kraken. 3. Users who pursue rich trading options should choose Binance or Ouyi. 4. Users who like to trade derivatives should choose Bybit or Ouyi. 5. Users interested in new coins should choose Sesame to open the door.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Dreamweaver Mac version
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

PhpStorm Mac version
The latest (2018.2.1) professional PHP integrated development tool

WebStorm Mac version
Useful JavaScript development tools