{"id":84007,"date":"2024-07-12T12:01:57","date_gmt":"2024-07-12T16:01:57","guid":{"rendered":"https:\/\/coinscreed.com\/staging\/?p=84007"},"modified":"2024-07-12T12:02:01","modified_gmt":"2024-07-12T16:02:01","slug":"dough-finance-faces-1-8m-flash-loan-exploit","status":"publish","type":"post","link":"https:\/\/coinscreed.com\/staging\/dough-finance-faces-1-8m-flash-loan-exploit\/","title":{"rendered":"Dough Finance Faces $1.8M Flash Loan Exploit"},"content":{"rendered":"\n<p>Decentralized Finance protocol Dough Finance experienced a <a href=\"https:\/\/coinscreed.com\/staging\/a-deep-dive-into-defis-flash-loan-attacks.html\">flash loan exploit <\/a>that resulted in losing $1.8 million in digital assets.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"809\" height=\"529\" src=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/12\/image-172.png\" alt=\"Dough Finance Faces $1.8M Flash Loan Exploit\" class=\"wp-image-15445\" srcset=\"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/12\/image-172.png 809w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/12\/image-172-300x196.png 300w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/12\/image-172-768x502.png 768w, https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/12\/image-172-750x490.png 750w\" sizes=\"(max-width: 809px) 100vw, 809px\" \/><figcaption class=\"wp-element-caption\">Dough Finance Faces $1.8M Flash Loan Exploit<\/figcaption><\/figure>\n\n\n\n<p>Cyvers, a security firm that operates on the Web3, reported on July 12 that they had identified numerous suspicious transactions. The organization corresponded with lending protocol Aave to determine whether pools were affected. Nevertheless, the security firm verified that the pools at Aave were secure.<\/p>\n\n\n\n<p>Nevertheless, Dough Finance was the most severely affected by the attack. The perpetrator was funded through the zero-knowledge (ZK) protocol Railgun, according to Cyvers, and exchanged the stolen USD Coin for Ether. The perpetrator obtained a total of 608 ETH, approximately $1.8 million.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Smart Contract Manipulation<\/h2>\n\n\n\n<p>Olympix, a provider of web3 security, emphasized that the exploit resulted from unvalidated calldata in the &#8220;ConnectorDeleverageParaswap&#8221; contract. The organization elaborated:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cThe contract didn't properly check the data it received during flash loan calls, allowing the attacker to manipulate it for their benefit.\u201d<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>As a result, the attacker was able to manipulate the data and steal the funds.<\/p>\n\n\n\n<p>According to Olympix, the exploited contract of the DeFi protocol may affect those who deposit funds. Nevertheless, the security provider observed that the breach did not affect Aave pools.<\/p>\n\n\n\n<p>The security provider also recommended that <a href=\"https:\/\/www.dough.finance\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Dough Finance<span class=\"wpil-link-icon\" title=\"Link goes to external site.\" style=\"margin: 0 0 0 5px;\"><svg width=\"24\" height=\"24\" style=\"height:16px; width:16px; fill:#000000; stroke:#000000; display:inline-block;\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" xmlns:svg=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"wpil-svg-outbound-7-icon-path\" fill=\"none\" clip-path=\"url(#clip0_31_188)\">\r\n                            <path d=\"M9.16724 14.8891L20.1672 3.88908\" stroke-linecap=\"round\"\/>\r\n                            <path d=\"M13.4497 3.53554L20.5208 3.53554L20.5208 10.6066\" stroke-linecap=\"round\" stroke-linejoin=\"round\"\/>\r\n                            <path d=\"M17.5 13.5L17.5 16.26C17.5 17.4179 17.5 17.9968 17.2675 18.4359C17.0799 18.7902 16.7902 19.0799 16.4359 19.2675C15.9968 19.5 15.4179 19.5 14.26 19.5L7.74 19.5C6.58213 19.5 6.0032 19.5 5.56414 19.2675C5.20983 19.0799 4.92007 18.7902 4.73247 18.4359C4.5 17.9968 4.5 17.4179 4.5 16.26L4.5 9.74C4.5 8.58213 4.5 8.0032 4.73247 7.56414C4.92007 7.20983 5.20982 6.92007 5.56414 6.73247C6.0032 6.5 6.58213 6.5 7.74 6.5L11 6.5\" stroke-linecap=\"round\"\/>\r\n                        <\/g>\r\n                        <defs>\r\n                            <clipPath id=\"clip0_31_188\">\r\n                                <rect fill=\"white\" height=\"24\" width=\"24\"\/>\r\n                            <\/clipPath>\r\n                        <\/defs><\/svg><\/span><\/a> users withdraw their funds to a secure wallet. Additionally, they advised users to refrain from engaging with the protocol until the situation is resolved and to monitor announcements from the Dough Finance team.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Over $1B loss due to Exploit in 2024<\/h2>\n\n\n\n<p>Although the Dough Finance breach resulted in nearly $2 million in losses, the crypto space had already experienced over $1 billion in digital asset losses due to numerous incidents.<\/p>\n\n\n\n<p>CertiK, a blockchain security company, released its security report on July 3, which indicated that losses resulting from on-chain incidents had already exceeded $1.19 billion in the first half of 2024. Phishing attacks and private key compromises were responsible for most of the losses.<\/p>\n\n\n\n<p>Phishing attacks resulted in losses of nearly $500 million for the space sector, while private key compromises resulted in losses of nearly $409 million, according to CertiK.<\/p>\n\n\n\n<p>Ronghui Gu, the co-founder of CertiK, emphasized the necessity of incorporating multifactor authentication methods, including security tokens and <a href=\"https:\/\/coinscreed.com\/staging\/two-factor-authentication-a-must-have-for-crypto-enthusiasts.html\">two-factor authentication<\/a> (2FA).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Decentralized Finance protocol Dough Finance experienced a flash loan exploit that resulted in losing $1.8 million in digital assets. Cyvers, a security firm that operates on the Web3, reported on July 12 that they had identified numerous suspicious transactions. The organization corresponded with lending protocol Aave to determine whether pools were affected. Nevertheless, the security [&hellip;]<\/p>\n","protected":false},"author":12,"featured_media":15445,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11476],"tags":[9304,20469,16721],"class_list":["post-84007","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hacks-and-scams","tag-smart-contract-2","tag-dough-finance","tag-flash-loan-exploit"],"jetpack_featured_media_url":"https:\/\/coinscreed.com\/staging\/wp-content\/uploads\/2021\/12\/image-172.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/84007","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/comments?post=84007"}],"version-history":[{"count":0,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/posts\/84007\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media\/15445"}],"wp:attachment":[{"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/media?parent=84007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/categories?post=84007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinscreed.com\/staging\/wp-json\/wp\/v2\/tags?post=84007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}