The likely perpetrator of one the largest crypto heists did it for âfun.â On Tuesday, an anonymous hacker or group stole some $600 million worth of crypto from Poly Network, apparently to teach the multi-chain platform a lesson (thatâs what they said in a Q&A about their motivations and plans).Â
They identified a bug â or rather, a part of the code that enabled them to transfer money to themselves â and acted on it. The developers didnât intend to put in a âfree moneyâ button, but it was there ready to be exploited. And praise be it was: Itâs one more mistake that (hopefully) wonât be repeated.
This article is excerpted from The Node, CoinDesk's daily roundup of the most pivotal stories in blockchain and crypto news. You can subscribe to get the full newsletter here.Â
âI am not very interested in money! I know it hurts when people are attacked, but shouldnât they learn something from those attacks?â the exploiter posted Wednesday in Ethereum blockchain data. At press time, approximately half of the stolen funds have been returned.
Itâs not really my place to say whether theyâre genuinely a âwhite hatâ hacker or a black hat that realized it would be impossible to cash out. For what itâs worth, Tor Ekeland, an attorney who built a career out of defending computer miscreants, said: âHacking is often more about the thrill of the hack than any object obtained in the hack.âÂ
Hacks and exploits are not uncommon in the growing, multi-billion dollar decentralized finance (DeFi) ecosystem, of which Poly Network was a part. Often the result of hastily designed scripts or deeper flaws in at the protocol level, attacks are also an important part of how any computer network grows more secure. Thatâs doubly true in the world of blockchain.Â
In fact, some would say hacks lead to unhackable code. Itâs a controversial point, especially because hackers donât always return the stolen funds, and undoubtedly people are harmed in the process.
âIn the world of blockchain, when somebody deploys a smart contract â like on Ethereum â that has a vulnerability, hundreds of millions of dollars disappear overnight and thereâs no recourse,â legendary former Google computer scientist and founder of Agoric, Mark Miller, said at a Foresight Institute conference in 2018. âThere are these huge bug bounties, effectively. And when one of these things gets collected, the software with these vulnerabilities dies.â In other words, blockchain-based systems face evolutionary pressure. Weak projects face âan early deathâ so the entire system becomes populated by secure code.
Blockchain technology has only been around for a little over a decade. DeFi, as we know it, is even younger. Thereâs a case to be made weâre just at the beginning stages of adoption, with many more mistakes likely along the way.Â
Hacks arenât the only way for projects or protocols to evolve. People can build simple things slowly, as in the case of Bitcoin, which has only ever been down twice over its 12-year lifespan. There are external audits and a potential role for policy-makers or government regulators to play.
But searching for flaws in a codebase or finding exploiters after the fact is like âhunting the wolves,â Zooko Wilcox-OâHearn, computer security specialist and brainchild behind Zcash, said in a direct message, borrowing a line from Vitalik Buterin.Â
He should know. In 2015, his auditing company, Least Authority, was hired by a group of devs to do a security audit of the soon-to-be-launched Ethereum network. Many of the vulnerabilities they found were fixed, but not the one having to do with âreentrancy,â which enabled people to deploy smart contracts that could be exploited.
Just years later that same vulnerability was exploited in âThe DAO hack,â a $55 million headache that led to the contentious fork between Ethereum and Ethereum Classic. At the time it filed its report, Least Authority even provided a hypothetical example of a smart contract that could be exploited: a crowd-funding smart contract, like The DAO.Â
As more money piles into smart contracts, itâs going to become harder and harder to âhunt the wolvesâ or individual exploiters. With hacks entire communities learn together what should and should not be repeated. Over time this leads to more âreliableâ code. Itâs one way to âarmor the sheep.â
âIf we as humans are going to rely on computers to do important things for us â and we are! â then we really require those programs to be unhackable. And despite the cynicism and despair among my fellow security experts, it is actually achievable!â Wilcox said.
âFor every program like The DAO and Poly that got exploited because it had a vulnerability, you can point to another program that did the same thing but did not have that vulnerability. So progress is possible!â
UPDATE (Aug. 12, 2021, 18:35 UTC): Corrects Agoricâs name. We regret the error.