{"id":35525,"date":"2022-09-08T06:57:48","date_gmt":"2022-09-08T10:57:48","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=35525"},"modified":"2022-09-08T06:57:51","modified_gmt":"2022-09-08T10:57:51","slug":"flash-loan-attack-causes-defi-protocol-token-nfd-to-crash-by-99","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/flash-loan-attack-causes-defi-protocol-token-nfd-to-crash-by-99\/","title":{"rendered":"Flash loan attack causes DeFi protocol token NFD to crash by 99%"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\" id=\"h-flash-loans-allow-users-to-borrow-large-amounts-of-assets-without-upfront-collateral-miscreants-use-them-to-exploit-defi-protocols\">Flash loans allow users to borrow large amounts of assets without upfront collateral; miscreants use them to exploit DeFi protocols.<\/h5>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"614\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-1024x614.jpg\" alt=\"Flash loan attack causes DeFi protocol token NFD to crash by 99%\" class=\"wp-image-35535\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-1024x614.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-300x180.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-768x460.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-150x90.jpg 150w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-750x450.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover-1140x683.jpg 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover.jpg 1201w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption>Flash loan attack causes DeFi protocol token NFD to crash by 99%<\/figcaption><\/figure>\n\n\n\n<p>On September 8, a series of flash loan assaults targeted the <a href=\"https:\/\/coinscreed.com\/staging\/defi-protocol-phases-out-months-after-rari-fuse-breach.html\" target=\"_blank\" rel=\"noreferrer noopener\">decentralized finance (DeFi) <\/a>protocol New Free DAO, causing a reported loss of $1.25 million. In the wake of the attack, the native token's price has decreased by 99%.<\/p>\n\n\n\n<p>Several DeFi protocols provide flash loans, which let users borrow substantial amounts of assets without making upfront collateral deposits, unlike regular loans. The only requirement is that the loan must be paid back in one transaction within a predetermined time frame. However, bad adversaries frequently take use of this capability to amass significant resources in order to carry out expensive attacks against DeFi protocols.<\/p>\n\n\n\n<p>On Thursday, the cryptocurrency community was informed by blockchain security company Certik about the 99% price slippage of the NFD token brought on by a flash <a href=\"https:\/\/www.google.com\/search?q=Flash+loan+attack+causes+DeFi+protocol+token+NFD+to+crash+by+99%25&oq=Flash+loan+attack+causes+DeFi+protocol+token+NFD+to+crash+by+99%25&aqs=chrome..69i57.966j0j9&sourceid=chrome&ie=UTF-8\" target=\"_blank\" rel=\"noreferrer noopener\">loan assault<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>. According to reports, the attacker utilized the function &#8220;addMember()&#8221; to add themself as a member and then deployed an unconfirmed contract. The attacker later used the unconfirmed contract to carry out three flash loan attacks.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/CertiKSkynetAlert?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#CertiKSkynetAlert<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> \ud83d\udea8<br><br>New Free Dao &#8211; <a href=\"https:\/\/twitter.com\/search?q=%24NFD&src=ctag&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">$NFD<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> was exploited via flash loan attack gaining the attacker 4481 WBNB (approx. ~$1.25M) causing the token to slip in price 99%.<br><br>The attacker has connections to Neorder &#8211; $N3DR attack from 4 months ago where they took 930 BNB at the time. <a href=\"https:\/\/t.co\/5Rcht3YiIK\" target=\"_blank\">pic.twitter.com\/5Rcht3YiIK<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; CertiK Alert (@CertiKAlert) <a href=\"https:\/\/twitter.com\/CertiKAlert\/status\/1567735913223946243?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 8, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>The attacker first took out a flash loan for 250 WBNB worth $69,825 before exchanging them all for the local token NFD. The contract was subsequently used to generate numerous attack contracts in order to continually claim airdrop prizes. The attacker then exchanged all of the airdrop prizes for WBNB, resulting in a profit of 4481 BNB.<\/p>\n\n\n\n<p>The attacker exchanged 2,000 BNB for 550,000 BSC-USD and refunded the borrowed loan (250 BNB) out of the total amount of 4481 BNB. Later, the attacker transferred 400 BNB to Tornado Cash, a well-known coin mixer service.<\/p>\n\n\n\n<p>The hacker that attacked NFD with flash loans was linked to those who hacked Neorder (N3DR) in May of this year, according to Certik. Later, Beosin, a different <a href=\"https:\/\/coinscreed.com\/staging\/prasaga-receives-u-s-patent-for-blockchain-computer-operating-system.html\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain security company<\/a>, said that the hackers responsible for both breaches might be the same.<\/p>\n\n\n\n<p>Beosin also called attention to a flaw in the NFD protocol that might be exploited for yet another kind of flash loans attack. The security company claimed that because the prices are determined &#8220;using the balance of USDT in the pair, hence it may lead to flash loan attack if exploited,&#8221; they might be manipulated.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">2\/ The attack contract was then used to repeatedly create multiple attack contracts to claim (0x8b068e22e9a4a9bca3c321e0ec428abf32691d1e) airdrop rewards, which were swapped for <a href=\"https:\/\/twitter.com\/search?q=%24WBNB&src=ctag&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">$WBNB<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a>. Finally the attacker returned flashloan and currently all profits sit at attacker&#39;s address. <a href=\"https:\/\/t.co\/zJJty0TdY6\" target=\"_blank\">pic.twitter.com\/zJJty0TdY6<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; Beosin Alert (@BeosinAlert) <a href=\"https:\/\/twitter.com\/BeosinAlert\/status\/1567757259677265923?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 8, 2022<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p><a href=\"https:\/\/coinscreed.com\/staging\/hackers-attempt-to-sell-alleged-stolen-passport-of-belarus-leader.html\" target=\"_blank\" rel=\"noreferrer noopener\">Hackers <\/a>are increasingly using flash loan assaults because of their low risk, low cost, and big payoff characteristics. Nereus Finance, an Avalanche-based lending protocol, was attacked by a cunning flash loan on September 7 and lost $371,000 in USDC as a result. Inverse Finance suffered a loss of $1.2 million in a different flash loan attack earlier in June.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Flash loans allow users to borrow large amounts of assets without upfront collateral; miscreants use them to exploit DeFi protocols. On September 8, a series of flash loan assaults targeted the decentralized finance (DeFi) protocol New Free DAO, causing a reported loss of $1.25 million. In the wake of the attack, the native token&#8217;s price [&hellip;]<\/p>\n","protected":false},"author":38,"featured_media":35535,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[8502,11294,11293],"class_list":["post-35525","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-defi-token","tag-flash-loan","tag-nfd"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2022\/09\/defi_hack_cover.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/35525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/38"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=35525"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/35525\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/35535"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=35525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=35525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=35525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}