Incident Report: $PORT3 Hacker Attack PORT3 aimed to support the development of multiple chains, and therefore adopted @nexa_network’s cross-chain token solution, CATERC20. However, CATERC20 contained a boundary-condition validation vulnerability. After the token’s ownership was renounced, the function returned a value of 0, which happened to match the owner-verification condition. As a result, the ownership check failed and unauthorized access became possible. This issue was not identified in the CATERC20 audit report. Since the Port3 Token had previously renounced ownership for greater decentralization, it was in exactly this vulnerable state. 🧶 (1/3)
(2/3) The hacker discovered this authorization-verification bug in the PORT3 contract. At 20:56:24 PM UTC, using address 0xb13A503dA5f368E48577c87b5d5AeC73d08f812E, the hacker initiated a RegisterChains operation, registering his own address as an address authorized to perform BridgeIn operations. At the same time, the hacker deployed a fake token on the Arbitrum One chain and initiated a cross-chain transaction. Due to the flaw in the BSC-side Port3 token contract, the validation incorrectly passed, resulting in the minting of 1 billion tokens. The hacker then sold these tokens on DEXs, causing a rapid price crash.
(3/3) The attacker subsequently repeated the same exploit from other addresses, including: 0x7C2F4Bbda350D4423fBa6187dc49d84D125551fF We have contacted major exchanges to suspend deposits and withdrawals. Moving forward, we will fix the issue by reissuing the token with a new contract.
6.88萬
104
本頁面內容由第三方提供。除非另有說明,OKX 不是所引用文章的作者,也不對此類材料主張任何版權。該內容僅供參考,並不代表 OKX 觀點,不作為任何形式的認可,也不應被視為投資建議或購買或出售數字資產的招攬。在使用生成式人工智能提供摘要或其他信息的情況下,此類人工智能生成的內容可能不準確或不一致。請閱讀鏈接文章,瞭解更多詳情和信息。OKX 不對第三方網站上的內容負責。包含穩定幣、NFTs 等在內的數字資產涉及較高程度的風險,其價值可能會產生較大波動。請根據自身財務狀況,仔細考慮交易或持有數字資產是否適合您。