

Verichains detailed report reveals vulnerabilities behind Ronin chain attack, resulting in $10 million in losses
Blockchain cybersecurity company Verichains has revealed details of the Ronin chain attack that occurred on August 6th, revealing that it caused losses of approximately $10 million.
Cybersecurity firm Verichains revealed details on August 6 about the Ronin chain attack, which resulted in an approximate loss of $10 million. The attack was carried out by an MEV (maximum extractable value) bot controlled by a white hat hacker who later returned the funds. However, the incident raised significant concerns.
Cybersecurity firm Verichains revealed details on August 6 about the Ronin chain attack, which resulted in an approximate loss of $10 million. The attack was carried out by an MEV (maximum extractable value) bot controlled by a white hat hacker who later returned the funds. However, the incident raised significant concerns.
An update to the Ronin bridge's contracts introduced a vulnerability that the bot exploited, according to the Verichains report. This bridge connects Ethereum to the Ronin blockchain, a gaming network that hosts popular titles such as Axie Infinity. The contract update overlooked a critical function, allowing anyone to withdraw funds from the bridge without validation.
An update to the Ronin bridge's contracts introduced a vulnerability that the bot exploited, according to the Verichains report. This bridge connects Ethereum to the Ronin blockchain, a gaming network that hosts popular titles such as Axie Infinity. The contract update overlooked a critical function, allowing anyone to withdraw funds from the bridge without validation.
Every transaction is validated by network participants and processed through a consensus, enabled by the minimumVoteWeight variable. This variable uses the totalWeight variable as input. But during the update, totalWeight's value was set to zero, rather than the value in the previous contract. As a result, users could withdraw funds without a signature, as the updated contract permitted.
Every transaction is validated by network participants and processed through a consensus, enabled by the minimumVoteWeight variable. This variable uses the totalWeight variable as input. But during the update, totalWeight's value was set to zero, rather than the value in the previous contract. As a result, users could withdraw funds without a signature, as the updated contract permitted.
In an X post on August 7, Composable Security auditor Damian Rusniek stated, "The signer is 0x27120393D5e50bf6f661Fd269CDDF3fb9e7B849f but this address is not on the bridge operators list. This means that only ONE signature was required and it could by ANY valid signature." They concluded with the same finding as Verichains, "The root cause was that the minimum votes of the operators was 0. Anyone has 0!"
In an X post on August 7, Composable Security auditor Damian Rusniek stated, "The signer is 0x27120393D5e50bf6f661Fd269CDDF3fb9e7B849f but this address is not on the bridge operators list. This means that only ONE signature was required and it could by ANY valid signature." They concluded with the same finding as Verichains, "The root cause was that the minimum votes of the operators was 0. Anyone has 0!"
Ronin Offered $500,000 of the Exploited Funds to the White Hat Hacker
Ronin Offered $500,000 of the Exploited Funds to the White Hat Hacker
The MEV bot discovered this through simulations and executed the transaction, leading to the $10 million exploit. The white hat hacker's return of these funds ensured that Ronin developers discovered the issue before malicious actors could介入. The network allowed the individual to keep $500,000 of the exploited value as a bug bounty reward.
The MEV bot discovered this through simulations and executed the transaction, leading to the $10 million exploit. The white hat hacker's return of these funds ensured that Ronin developers discovered the issue before malicious actors could介入. The network allowed the individual to keep $500,000 of the exploited value as a bug bounty reward.
The above is the detailed content of Verichains detailed report reveals vulnerabilities behind Ronin chain attack, resulting in $10 million in losses. For more information, please follow other related articles on the PHP Chinese website!

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











In a devastating blow to investors, the OM Mantra cryptocurrency has collapsed by approximately 90% in the past 24 hours, with the price plummeting to $0.58.

This new financial instrument would track the token's market price, with a third-party custodian holding the underlying AVAX

Have you noticed the meteoric rise of meme coins in the cryptocurrency world? What started as an online joke has quickly evolved into a lucrative investment opportunity

Zcash was one of the top gainers during the latest market rally, reaching a high of $35.69 as traders moved a record amount of tokens out of circulation.

A group of former Kraken executives acquired U.S.-listed company Janover, which secured $42 million in venture capital funding to begin building a Solana (SOL) treasury.

The crypto market has witnessed a rebound following the recent sheer downturn. As per the exclusive market data, the total crypto market capitalization has reached $2.71Ts

As fear drives selling in the crypto market, major coins like Cardano and Solana face tough times.

Bitcoin (BTC) has outperformed Ethereum by over 85% in realized market capitalization growth, according to data provided by on-chain analytics platform Glassnode on April 10.