{"id":55214,"date":"2023-07-26T05:57:10","date_gmt":"2023-07-26T09:57:10","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=55214"},"modified":"2023-07-26T11:56:40","modified_gmt":"2023-07-26T15:56:40","slug":"defi-platform-era-lend-exploited-on-zksync","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/defi-platform-era-lend-exploited-on-zksync\/","title":{"rendered":"Defi Platform Era Lend Exploited on zkSync"},"content":{"rendered":"\n<p>According to <a href=\"https:\/\/coinscreed.com\/staging\/certik-freezes-160k-from-stolen-merlin-dex-funds.html\" target=\"_blank\" rel=\"noreferrer noopener\">security company CertiK<\/a>, the lending app Era Lend on zkSync was hacked for $3.4 million in cryptocurrency. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561-1024x576.jpg\" alt=\"Defi Platform Era Lend Exploited on zkSync\" class=\"wp-image-55218\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561-1024x576.jpg 1024w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561-300x169.jpg 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561-768x432.jpg 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561-750x422.jpg 750w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561-1140x641.jpg 1140w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Defi Platform Era Lend Exploited on zkSync<\/figcaption><\/figure>\n\n\n\n<p>The hacker employed a &#8220;read-only reentrancy attack,&#8221; a kind of assault that stops a multi-step process and then makes it resume after a malicious action has been carried out, to drain the cash. To be more precise, a &#8220;read-only&#8221; reentrancy does not change the status of a contract.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"embed-twitter\"><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/CertiKSkynetAlert?src=hash&ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">#CertiKSkynetAlert<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a>\ud83d\udea8<br><br>We are seeing reports that <a href=\"https:\/\/twitter.com\/Era_Lend?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">@Era_Lend<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> has been exploited on zkSync<br><br>Total losses appear to be $3.4 million in a read only reentrancy attack<br><br>See more below \ud83d\udc47<a href=\"https:\/\/t.co\/h8xrjccE5i\" target=\"_blank\">https:\/\/t.co\/h8xrjccE5i<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/p>&mdash; CertiK Alert (@CertiKAlert) <a href=\"https:\/\/twitter.com\/CertiKAlert\/status\/1683828335497867264?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">July 25, 2023<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/div>\n<\/div><\/figure>\n\n\n\n<p>The report claims the attacker used the externally held account 0xf1D076c9Be4533086f967e14EE6aFf204D5ECE7a to drain money in two transactions. <\/p>\n\n\n\n<p>The attacker used a flaw in &#8220;the callback and _updateReserves function&#8221; to trick a contract into reporting out-of-date values. The <a href=\"https:\/\/www.bing.com\/search?q=Defi+Platform+Era+Lend+Exploited+on+zkSync&form=ANNTH1&refig=c5fd0471cecd4645bbf4a3a45c704aa9\" target=\"_blank\" rel=\"noreferrer noopener\">Syncswap project<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><use href=\"#wpil-svg-outbound-7-icon-path\"><\/use><\/svg><\/span><\/a> was forked into Era Lend, and according to CertiK, additional Syncswap-based projects may also be vulnerable.<\/p>\n\n\n\n<p>The Syncswap function reportedly allows users to &#8220;burn, then callback before update_reserves is called,&#8221; which causes the oracle to return false values, according to on-chain sleuth and <a href=\"https:\/\/coinscreed.com\/staging\/twitter-user-self-incriminates-in-bayc-nft-theft.html\" target=\"_blank\" rel=\"noreferrer noopener\">Twitter user<\/a> Spreek.<\/p>\n\n\n\n<p>The Era Lend team confirmed the assault and suspended the protocol's zkSync contracts to stop additional attacks, according to Spreek. The hack hit the Overnight Finance protocol's stablecoin USDC+, according to another blockchain researcher who goes by the handle Saul on Twitter. <\/p>\n\n\n\n<p>According to Saul, the Overnight team has acknowledged the exposure and suspended its own contracts. It's possible that more than $261,000, or 7.86% of the collateral supporting the stablecoin, was lost.<\/p>\n\n\n\n<p>Pseudonymous blockchain researcher Officer's Notes explained read-only reentrancy attacks in a blog post on June 7. They claimed that auditors have a hard time finding these vulnerabilities because &#8220;typically, auditors and bug hunters are only concerned with entry points that modify state when looking for reentrancy.&#8221;<\/p>\n\n\n\n<p>Officer's Notes advises auditors to utilize specialist tools to help them uncover these vulnerabilities to help ease this issue. Era Lend is based on the zkSync network, an Ethereum layer-2 rollup with <a href=\"https:\/\/coinscreed.com\/staging\/eu-committee-approves-zero-knowledge-proofs-for-digital-ids.html\" target=\"_blank\" rel=\"noreferrer noopener\">zero-knowledge proof<\/a>. <\/p>\n\n\n\n<p>The network's total locked value surpassed $110 million in April. By the end of the year, the network's developers want to have built a &#8220;Hyperchains&#8221; ecosystem of cooperative chains.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to security company CertiK, the lending app Era Lend on zkSync was hacked for $3.4 million in cryptocurrency. The hacker employed a &#8220;read-only reentrancy attack,&#8221; a kind of assault that stops a multi-step process and then makes it resume after a malicious action has been carried out, to drain the cash. To be more [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":55218,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[21],"tags":[15466,12489],"class_list":["post-55214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-era-lend","tag-zksync"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2023\/07\/croc_1690363922561.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/55214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=55214"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/55214\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/55218"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=55214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=55214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=55214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}