DeFi Protocol Qubit Finance Hacked, Lost $80 Million
https://ift.tt/3g4PzbZ
Qubit Finance, a Binance Smart Chain-based decentralized finance (DeFi) protocol, was recently attacked, resulting in the theft of more than $80 million worth of
cryptocurrencies
Cryptocurrencies
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
Read this Term, the team behind the project confirmed on Friday.
The developers detailed that the attackers minted an unlimited amount of xETH without depositing enough collateral to borrow on the blockchain.
The protocol was exploited by;
0xd01ae1a708614948b2b5e0b7ab5be6afa01325c7
The hacker minted unlimited xETH to borrow on BSC.
The team is currently working with security and network partners on next steps.
We will share further updates when available.— Qubit Finance (@QubitFin) January 28, 2022
Qubit is a DeFi protocol that allows users to borrow loans against crypto collateral for fixed interest rates. The protocol also functions across blockchains, and thus allows borrowers to collateralize their assets without moving them from chain to chain. The protocol does not have any central authority and functions using smart contracts.
The attacker used the deposit function in QBridge and tricked the protocol without sufficient deposit to illicitly mint 77,162 qXETH. These steps were repeated several times.
“In summary, the deposit function was a function that should not be used after deposit ETH was newly developed, but it remained in the contract,” the Qubit team wrote in an official report. The team is still monitoring the compromised assets and is cooperating with security and network partners, including Binance.
As a security measure, the developers also disabled most of the functions of the protocol including supply, redeem, borrow, repay, bridge, and bridge redemption, but claiming is still available.
Vulnerabilities in DeFi
DeFi is seen as the real decentralized challenger to the existing banking industry. But despite the promises, these protocol remains extremely vulnerable to security breaches. Over the recent months, several DeFi platforms like Grim Finance, Cream Finance, pNetwork were hacked.
The latest attack on Qubit was the seventh-largest crypto theft- based on the fiat value, from any DeFi platform to date. As a result of it, the market value of Qubit’s QBT token slipped by almost 25 percent in the past 24 hours.
Qubit Finance, a Binance Smart Chain-based decentralized finance (DeFi) protocol, was recently attacked, resulting in the theft of more than $80 million worth of
cryptocurrencies
Cryptocurrencies
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
Read this Term, the team behind the project confirmed on Friday.
The developers detailed that the attackers minted an unlimited amount of xETH without depositing enough collateral to borrow on the blockchain.
The protocol was exploited by;
0xd01ae1a708614948b2b5e0b7ab5be6afa01325c7
The hacker minted unlimited xETH to borrow on BSC.
The team is currently working with security and network partners on next steps.
We will share further updates when available.— Qubit Finance (@QubitFin) January 28, 2022
Qubit is a DeFi protocol that allows users to borrow loans against crypto collateral for fixed interest rates. The protocol also functions across blockchains, and thus allows borrowers to collateralize their assets without moving them from chain to chain. The protocol does not have any central authority and functions using smart contracts.
The attacker used the deposit function in QBridge and tricked the protocol without sufficient deposit to illicitly mint 77,162 qXETH. These steps were repeated several times.
“In summary, the deposit function was a function that should not be used after deposit ETH was newly developed, but it remained in the contract,” the Qubit team wrote in an official report. The team is still monitoring the compromised assets and is cooperating with security and network partners, including Binance.
As a security measure, the developers also disabled most of the functions of the protocol including supply, redeem, borrow, repay, bridge, and bridge redemption, but claiming is still available.
Vulnerabilities in DeFi
DeFi is seen as the real decentralized challenger to the existing banking industry. But despite the promises, these protocol remains extremely vulnerable to security breaches. Over the recent months, several DeFi platforms like Grim Finance, Cream Finance, pNetwork were hacked.
The latest attack on Qubit was the seventh-largest crypto theft- based on the fiat value, from any DeFi platform to date. As a result of it, the market value of Qubit’s QBT token slipped by almost 25 percent in the past 24 hours.
Cryptocurrency