Main navigation

Error message

Warning: Undefined array key 0 in amp_entity_view_alter() (line 156 of modules/contrib/amp/amp.module).
amp_entity_view_alter(Array, Object, Object) (Line: 545)
Drupal\Core\Extension\ModuleHandler->alter('node_view', Array, Object, Object) (Line: 304)
Drupal\Core\Entity\EntityViewBuilder->buildMultiple(Array) (Line: 238)
Drupal\Core\Entity\EntityViewBuilder->build(Array)
call_user_func_array(Array, Array) (Line: 111)
Drupal\Core\Render\Renderer->doTrustedCallback(Array, Array, 'Render #pre_render callbacks must be methods of a class that implements \Drupal\Core\Security\TrustedCallbackInterface or be an anonymous function. The callback was %s. See https://www.drupal.org/node/2966725', 'exception', 'Drupal\Core\Render\Element\RenderCallbackInterface') (Line: 788)
Drupal\Core\Render\Renderer->doCallback('#pre_render', Array, Array) (Line: 377)
Drupal\Core\Render\Renderer->doRender(Array, ) (Line: 204)
Drupal\Core\Render\Renderer->render(Array, ) (Line: 238)
Drupal\Core\Render\MainContent\HtmlRenderer->Drupal\Core\Render\MainContent\{closure}() (Line: 583)
Drupal\Core\Render\Renderer->executeInRenderContext(Object, Object) (Line: 239)
Drupal\Core\Render\MainContent\HtmlRenderer->prepare(Array, Object, Object) (Line: 128)
Drupal\Core\Render\MainContent\HtmlRenderer->renderResponse(Array, Object, Object) (Line: 90)
Drupal\Core\EventSubscriber\MainContentViewSubscriber->onViewRenderArray(Object, 'kernel.view', Object)
call_user_func(Array, Object, 'kernel.view', Object) (Line: 111)
Drupal\Component\EventDispatcher\ContainerAwareEventDispatcher->dispatch(Object, 'kernel.view') (Line: 187)
Symfony\Component\HttpKernel\HttpKernel->handleRaw(Object, 1) (Line: 76)
Symfony\Component\HttpKernel\HttpKernel->handle(Object, 1, 1) (Line: 58)
Drupal\Core\StackMiddleware\Session->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\KernelPreHandle->handle(Object, 1, 1) (Line: 191)
Drupal\page_cache\StackMiddleware\PageCache->fetch(Object, 1, 1) (Line: 128)
Drupal\page_cache\StackMiddleware\PageCache->lookup(Object, 1, 1) (Line: 82)
Drupal\page_cache\StackMiddleware\PageCache->handle(Object, 1, 1) (Line: 48)
Drupal\Core\StackMiddleware\ReverseProxyMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\NegotiationMiddleware->handle(Object, 1, 1) (Line: 51)
Drupal\Core\StackMiddleware\StackedHttpKernel->handle(Object, 1, 1) (Line: 704)
Drupal\Core\DrupalKernel->handle(Object) (Line: 18)

34,200 Ethereum Contracts Vulnerable to Hackers, Containing Millions in Ether

Advertisement
Sat, 24/02/2018 - 21:35
34,200 Ethereum Contracts Vulnerable to Hackers, Containing Millions in Ether
Cover image via U.Today
Read U.TODAY on
Google News

Over 34,000 of Ethereum’s smart contracts — containing tens of millions of dollars — are vulnerable to hackers, according to researchers. Ilya Sergey, assistant professor at University College London, has co-authored a paper with colleagues from the National University of Singapore outlining the vulnerabilities.

In the beginning

Sergey’s interest in smart contract security began with the revelation last year that a hacker calling himself “DevOpps199” had exploited a vulnerability in order to make himself the “owner” of a library used by a number of Ethereum wallets, including the popular Parity wallet. DevOpps199 wasn’t able to steal users’ funds, but by deleting the critical library, he was able to forever lock the funds up and prevent their release. Ethereum users lost $150 mln as a result of this attack.

Amazingly, Parity knew of the flaw months before the attack, and chose not to fix it. The fix that would have kept $150 mln in users’ funds from getting forever locked was considered a “convenience enhancement.”

“Like a vending machine”

Researchers wanted to analyze Ethereum’s entire Blockchain to find which other smart contracts were vulnerable to hackers. They wanted to do so at scale, and they didn’t have access to the source code of every smart contract on the network. So Sergey came up with a clever idea: he’d clone the entire Ethereum Blockchain, essentially making a private fork of the network. This would allow him to execute attacks, see how the smart contracts reacted, and tweak his methods.

Sergey compared his research to deciphering a vending machine’s operations. He told Motherboard Vice:

Imagine your goal isn’t to interact with the vending machine in a proper way, but rather you want to break it or get it to serve you for free. Assume we put a few coins in the machine, and just start randomly pushing buttons hoping that the inner workings of the vending machine — which we have no knowledge about, springs and whatnot — eventually releases the latch so you can take the candy.

34,200

The researchers poked and prodded at over 1 mln smart contracts, and when one didn’t behave as expected, they flagged it for further research. Ultimately they discovered 34,200 contracts that were exploitable. A deeper examination of 3,000 of these contracts revealed they held $6 mln in Ether. That means that total amount of Ether at stake could be in the tens of millions of dollars.

Sergey said his researchers tried to find the owners of the vulnerable contracts to warn them, but have not been able to locate them. For now, the funds are safe. Sergey says:

If someone wants to exploit this idea, they’ll have to do at least as much work as we did.

Related articles

Advertisement
TopCryptoNewsinYourMailbox
TopCryptoNewsinYourMailbox
Advertisement
Advertisement

Recommended articles

Latest Press Releases

Our social media
There's a lot to see there, too

Popular articles

Advertisement
AD