Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    501 jeans campaign: Levi’s celebrates 150 years of its iconic jeans with a global campaign to immortalize its history

    February 6, 2023

    Finally, Twitter will offer a free API, but only for specific cases

    February 6, 2023

    The 5 best tablets you can buy this 2023

    February 6, 2023
    Facebook Twitter Instagram
    Facebook Twitter Instagram
    Bullfrag Bullfrag
    Subscribe
    • Entertainment
      • Fashion
      • Lifestyle
        • Home Decor
    • Gaming
    • Health
    • News
      • Business
        • Marketing
      • Cryptocurrency
      • Sports
    • Recipes
    • Technology
      • Science
      • Automobiles
      • Internet
      • Software
    Bullfrag Bullfrag
    Home»News»Cryptocurrency»Ankr says a former employee caused a $5 million exploit and promises to improve its security

    Ankr says a former employee caused a $5 million exploit and promises to improve its security

    MatthewBy MatthewDecember 22, 2022No Comments3 Mins Read
    Ankr says a former employee caused a  million exploit and promises to improve its security
    Share
    Facebook Twitter LinkedIn Pinterest Email

    The Ankr protocol hack, which cost $5 million on December 1, was triggered by a former team member, the project team announced on December 20.

    The former employee conducted a “supply chain attack” by introducing malicious code into a package of future updates to the equipment’s internal software. After this software was updated, the malicious code created a security vulnerability that allowed the attacker to steal the device’s deployment key from the company’s server.

    After Action Report: Our Findings From the aBNBc Token Exploit

    We just released a new blog post that goes in-depth about this: https://t.co/fyagjhODNG

    A pic.twitter.com/d6psUbpxNY

    — Ankr Staking (@ankrstaking) December 20, 2022

    Previously, the team had announced that the exploit had been caused by a stolen deployer key that had been used to update the protocol’s smart contracts. But at that time, they hadn’t explained how the deployment key had been stolen.

    Ankr has alerted the local authorities and is trying to bring the attacker to justice. Also you are trying to strengthen your security practices to protect access to your keys in the future.

    Updatable contracts like those used in Ankr are based on the concept of an “owner account,” which is the only one that has the authority to make updates, according to an OpenZeppelin tutorial on the subject. Due to the risk of theft, most developers transfer ownership of these contracts to a gnosis vault or other multisig account. The Ankr team claims that they have not used a multisig account for the property in the past, but will from now on, stating:

    “The exploit was made possible in part because there was a single point of failure in our developer key. We will now implement multisig authentication for updates, which will require signing by all key custodians during restricted time intervals, making it extremely difficult to “It will, if not preclude, a future attack of this type. These features will enhance the security of the new ankrBNB contract and all Ankr tokens.”

    Ankr is also committed to improving HR practices. He will require “escalated” background checks on all employees, even those who work remotely, and will review access rights to make sure sensitive data is only accessible to workers who need it. The company will also implement new notification systems to more quickly alert the team when something goes wrong.

    Read:  "Centralization issues" are the biggest culprits in attacks on DeFi, says CertiK

    The Ankr protocol hack was first discovered on December 1. It allowed the attacker to mint 20 billion Ankr Reward Bearing Staked BNB (aBNBc), which was immediately traded on decentralized exchanges for some 5 million USD Coin (USDC) and bridged to Ethereum. The team has stated that it plans to reissue its aBNBb and aBNBc tokens to users affected by the exploit and spend $5 million of its own treasury to ensure these new tokens are fully supported.

    The developer too has deployed USD 15 million to recover the peg of the HAY stablecoin, which became under-guaranteed due to the exploit.

    Clarification: The information and/or opinions expressed in this article do not necessarily represent the views or editorial line of Cointelegraph. The information presented here should not be taken as financial advice or investment recommendation. All investment and commercial movement involve risks and it is the responsibility of each person to do their due research before making an investment decision.

    Keep reading:

    Investments in crypto assets are not regulated. They may not be suitable for retail investors and the entire amount invested may be lost. The services or products offered are not directed or accessible to investors in Spain.

    Related Posts

    Cryptocurrencies need “adult supervision” and turbulence to “grow,” says Microstrategy co-founder

    February 6, 2023

    Is it possible to achieve financial freedom with bitcoin?

    February 6, 2023

    a16z votes against the proposal to implement Uniswap v3 on BNB Chain

    February 6, 2023
    Add A Comment

    Leave a Reply Cancel reply

    Editors Picks

    501 jeans campaign: Levi’s celebrates 150 years of its iconic jeans with a global campaign to immortalize its history

    February 6, 2023

    Finally, Twitter will offer a free API, but only for specific cases

    February 6, 2023

    The 5 best tablets you can buy this 2023

    February 6, 2023

    This personality test will show you your fears just in seconds | MEXICO

    February 6, 2023
    Facebook Twitter Instagram
    © 2023 Bullfrag. Designed by Bullfrag.

    Type above and press Enter to search. Press Esc to cancel.