Skip to content

HBAR Exploited

On March 10th, the HBAR Foundation confirmed that the network had been attacked through the Smart Contract Service code.

Table of Contents

On March 10th, the HBAR Foundation confirmed that the network had been attacked through the Smart Contract Service code.

The attackers were able to steal funds from users who provided liquidity on various decentralized exchanges (DEXs), including Pangolin, SaucerSwap, and HeliSwap.

According to a tweet by the HBAR Foundation, the attackers exploited the Smart Contract Service code to transfer Hedera Token Service tokens from victims’ accounts to their own.

The attackers targeted accounts used as liquidity pools on multiple DEXs that use Uniswap v2-derived contract code ported over to use the Hedera Token Service.

To prevent the attackers from stealing more tokens, Hedera turned off mainnet proxies, which removed user access to the mainnet. The team has identified the root cause of the issue and is working on a solution.

Once the solution is ready, Hedera Council members will sign transactions to approve the deployment of updated code on the mainnet to remove this vulnerability, and the mainnet proxies will be turned back on, allowing normal activity to resume.

The HBAR Foundation has assured its users it is taking this incident seriously and is working diligently to resolve the issue. It remains to be seen how long it will take for the network to fully recover from the attack and restore user confidence in its security measures.

At publishing time, there is yet to be a solution ready.

Comments

Latest