Array
(
[fid] => 6974
[description] => 专注于币圈最新最快资讯,数字货币应用及知识普及
[password] =>
[icon] => b1/common_6974_icon.png
[redirect] =>
[attachextensions] =>
[creditspolicy] => Array
(
[post] => Array
(
[usecustom] => 1
[cycletype] => 1
[cycletime] => 0
[rewardnum] => 5
[extcredits1] => 1
[extcredits2] => 1
[extcredits3] => 0
[extcredits4] => 0
[extcredits5] => 0
[extcredits6] => 0
[extcredits7] => 0
[extcredits8] => 0
[rid] => 1
[fid] => 6974
[rulename] => 发表主题
[action] => post
[fids] => 32,52,67,447,1120,1151,1156,6750,6762,6763,6766,6769,6772,6773,6787,6796,6808,6809,6810,6813,6814,6820,6829,6830,6846,6856,6864,6865,6827,6930,6931,6776,6858,6880,6764,6932,6871,6758,6905,1116,6788,6812,6798,6736,6759,6842,6966,6767,6828,6924,6935,6936,6938,6940,6941,6826,6909,6803,6919,6911,6908,6881,6920,6912,6913,6921,6925,6922,6789,6818,6819,6872,6928,6969,6889,6888,6917,6939,6947,6961,6937,6943,6970,6869,6900,6902,6783,6817,1111,6870,6821,6876,6952,6954,6960,6942,6910,6949,6962,6963,6964,6927,6926,6973,6728,6929,6874,6894,6896,6885,6857,6868,1113,6778,56,6844,6878,6802,6933,6811,6923,6877,6875,6918,6892,6757,6832,6833,6795,6793,6848,6837,6849,6850,6851,6852,6853,6854,6863,6882,6836,6790,6838,6794,6791,6873,555,6934,6958,6944,6945,6907,6779,6886,6950,6904,6956,6862,6957,6855,6955,6959,6914,6965,6971,6972,6953,6976,6824,6815,6891,6866,6979,6977,6765,6903,6948,6980,6981,6983,6799,6982,6951,6984,6975,6895,6845,6879,1121,6974
)
[reply] => Array
(
[usecustom] => 1
[cycletype] => 1
[cycletime] => 0
[rewardnum] => 0
[extcredits1] => 0
[extcredits2] => 1
[extcredits3] => 10
[extcredits4] => 0
[extcredits5] => 0
[extcredits6] => 0
[extcredits7] => 0
[extcredits8] => 0
[rid] => 2
[fid] => 6974
[rulename] => 发表回复
[action] => reply
[fids] => 32,52,67,447,1120,1151,1156,6750,6763,6766,6769,6772,6773,6787,6796,6808,6809,6810,6813,6814,6820,6829,6830,6846,6856,6864,6865,6827,6930,6931,6776,6858,6880,6764,6932,6871,6758,1116,6788,6812,6798,6736,6759,6842,6966,6767,6828,6924,6935,6936,6938,6940,6941,6826,6909,6803,6919,6911,6908,6881,6920,6912,6913,6921,6925,6922,6789,6818,6819,6872,6928,6969,6889,6888,6917,6939,6947,6961,6937,6943,6970,6869,6900,6902,6783,6817,1111,6870,6821,6876,6952,6954,6960,6942,6910,6949,6962,6963,6964,6927,6926,6973,6728,6929,6874,6894,6896,6885,6857,6868,1113,6778,56,6844,6878,6802,6933,6811,6923,6877,6875,6918,6892,6757,6832,6833,6795,6793,6848,6837,6849,6850,6851,6852,6853,6854,6863,6836,6790,6838,6794,6791,6873,555,6934,6958,6944,6945,6907,6779,6886,6950,6904,6956,6862,6957,6855,6955,6959,6914,6965,6971,6972,6953,6976,6824,6815,6891,6866,6979,6977,6765,6903,6948,6980,6981,6983,6799,6982,6951,6984,6975,6895,6845,6879,1121,6974
)
)
[formulaperm] => a:5:{i:0;s:0:"";i:1;s:0:"";s:7:"message";s:0:"";s:5:"medal";N;s:5:"users";s:0:"";}
[moderators] => 实习版主1
[rules] =>
[threadtypes] => Array
(
[required] => 1
[listable] => 1
[prefix] => 1
[types] => Array
(
[1590] => 论坛公告
[1752] => 公司优惠
[1603] => 虚拟币交流
[1753] => 数字钱包
[1754] => 虚拟币存提
[1755] => 交易所
[1655] => 虚拟币资讯
[1756] => 银行卡
[1757] => 第三方支付
[1760] => 币圈大佬
[1758] => 科技前沿
[1759] => 天策嗨聊
[1661] => 入驻合作
)
[icons] => Array
(
[1590] =>
[1752] =>
[1603] =>
[1753] =>
[1754] =>
[1755] =>
[1655] =>
[1756] =>
[1757] =>
[1760] =>
[1758] =>
[1759] =>
[1661] =>
)
[moderators] => Array
(
[1590] => 1
[1752] =>
[1603] =>
[1753] =>
[1754] =>
[1755] =>
[1655] =>
[1756] =>
[1757] =>
[1760] =>
[1758] =>
[1759] => 1
[1661] =>
)
)
[threadsorts] => Array
(
)
[viewperm] => 9 26 22 11 12 13 14 15 27 43 44 60 61 62 63 64 19 31 67 68 69 73 75 76 83 84 87 90 91 92 33 38 57 58 65 66 74 77 79 80 85 86 1 2 3 7 8
[postperm] => 22 11 12 13 14 15 27 43 44 60 61 62 63 64 19 67 68 69 73 75 76 83 84 87 90 91 92 33 38 57 58 65 66 74 77 79 80 85 86 1 2 3
[replyperm] => 26 22 11 12 13 14 15 27 43 44 60 61 62 63 64 19 67 68 69 73 75 76 83 84 87 90 91 92 33 38 57 58 65 66 74 77 79 80 85 86 1 2 3
[getattachperm] => 26 22 11 12 13 14 15 27 43 44 60 61 62 63 64 19 67 68 69 73 75 76 83 84 87 90 91 92 33 38 57 58 65 66 74 77 79 80 85 86 1 2 3
[postattachperm] => 26 22 11 12 13 14 15 27 43 44 60 61 62 63 64 19 67 68 69 73 75 76 83 84 87 90 91 92 33 38 57 58 65 66 74 77 79 80 85 86 1 2 3
[postimageperm] => 26 22 11 12 13 14 15 27 43 44 60 61 62 63 64 19 67 68 69 73 75 76 83 84 87 90 91 92 33 38 57 58 65 66 74 77 79 80 85 86 1 2 3
[spviewperm] =>
[seotitle] =>
[keywords] =>
[seodescription] =>
[supe_pushsetting] =>
[modrecommend] => Array
(
[open] => 0
[num] => 10
[imagenum] => 0
[imagewidth] => 300
[imageheight] => 250
[maxlength] => 0
[cachelife] => 0
[dateline] => 0
)
[threadplugin] => Array
(
)
[replybg] =>
[extra] => a:2:{s:9:"namecolor";s:0:"";s:9:"iconwidth";s:2:"60";}
[jointype] => 0
[gviewperm] => 0
[membernum] => 0
[dateline] => 0
[lastupdate] => 0
[activity] => 0
[founderuid] => 0
[foundername] =>
[banner] =>
[groupnum] => 0
[commentitem] =>
[relatedgroup] =>
[picstyle] => 0
[widthauto] => 0
[noantitheft] => 0
[noforumhidewater] => 0
[noforumrecommend] => 0
[livetid] => 0
[price] => 0
[fup] => 6729
[type] => forum
[name] => 虚拟币讨论大厅
[status] => 1
[displayorder] => 3
[styleid] => 0
[threads] => 29713
[posts] => 483536
[todayposts] => 0
[yesterdayposts] => 243
[rank] => 2
[oldrank] => 2
[lastpost] => 2807920 比特币和山寨币100倍加密货币回报的时代已经结束(转) 1771602601 叫我十三
[domain] =>
[allowsmilies] => 1
[allowhtml] => 1
[allowbbcode] => 1
[allowimgcode] => 1
[allowmediacode] => 0
[allowanonymous] => 0
[allowpostspecial] => 21
[allowspecialonly] => 0
[allowappend] => 0
[alloweditrules] => 1
[allowfeed] => 0
[allowside] => 0
[recyclebin] => 1
[modnewposts] => 2
[jammer] => 1
[disablewatermark] => 0
[inheritedmod] => 0
[autoclose] => 0
[forumcolumns] => 3
[catforumcolumns] => 0
[threadcaches] => 0
[alloweditpost] => 1
[simple] => 16
[modworks] => 1
[allowglobalstick] => 1
[level] => 0
[commoncredits] => 0
[archive] => 0
[recommend] => 0
[favtimes] => 0
[sharetimes] => 0
[disablethumb] => 0
[disablecollect] => 0
[ismoderator] => 0
[threadtableid] => 0
[allowreply] =>
[allowpost] =>
[allowpostattach] =>
)
|
卷土重来?黑客获利约130万美元,FEGexPRO合约被攻击事件分析
[复制链接]
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 183 小时
本月在线: 0 分钟
|
|
2022年5月16日,成都链安链必应-区块链安全态势感知平台舆情监测显示,Ethereum和BNB Chain上FEGtoken项目的FEGexPRO合约遭受黑客攻击,黑客获利约3280 BNB 以及144 ETH,价值约130万美元。成都链安技术团队对事件进行了分析,结果如下。; q. p/ x7 L+ @1 p
& u7 D" \7 E! I9 c" C4 @. @3 T; u& }2 h& X4 m
1 K+ D5 j6 k8 H8 F. Q( D
- z- s5 i& T& e
+ [1 R0 c) W: [5 D! c, g#1 事件相关信息9 Y( f9 H2 E! k; v7 m
4 D2 }% u+ q' k* W$ i) e! M. p6 H+ k) c4 u9 Y
6 [3 ^8 u5 ~; k9 B! V
本次攻击事件包含多笔交易,部分交易信息如下所示:& H3 M' Z' a- k" q4 N1 F' J
; ]/ \. n5 Z2 g3 k* Y" l
1 v8 _+ g* Q% M7 y( A! c6 {# ?& |2 A" S- B4 ]( e
攻击交易 (部分)6 M- m8 h5 ^# y- I4 m! b
! t/ c/ s; d$ Q* Z( \) c. g4 y$ W
0x77cf448ceaf8f66e06d1537ef83218725670d3a509583ea0d161533fda56c063 (BNB Chain)6 R1 I e# j: Z+ K" |3 k1 G
% U z5 F8 p2 ~5 K6 ^1 H+ q0x1e769a59a5a9dabec0cb7f21a3e346f55ae1972bb18ae5eeacdaa0bc3424abd2 (Ethereum)) m8 O- |$ d7 {" L* o* N4 d' n
" M; k5 O( S+ ^7 H
+ E* K% P, H6 ^& `" `( u3 R) Q7 ~' y6 K4 u4 e, X
攻击者地址
) @# p9 E" t% `# ]" Y& ]5 Y$ d. t1 w) b3 `3 {
0x73b359d5da488eb2e97990619976f2f004e9ff7c3 a/ L: U# A( w' _/ R- l
% @" C( s, R- J5 s. a# p6 o* B: L6 S
$ u* q+ J+ s h# }& E9 P+ S
6 D" c: Q m) X- j z攻击合约
( E2 g; A6 s/ E! P# K# N$ V8 M2 d
0x9a843bb125a3c03f496cb44653741f2cef82f445* K1 j7 K1 J& p; x; J
( R. P3 q$ q; E- v" ]8 A! f) v+ V0 v' f; x+ Z& X5 k9 Q+ e1 L& A
# Z& ]3 }- V& }+ P# D2 D
被攻击合约(部分)
. N9 p8 `1 I; z( l! q6 V
( q, O2 U+ j+ Z" M0x818e2013dd7d9bf4547aaabf6b617c1262578bc7 (BNB Chain)
e1 j0 o# d& O+ I! [) E: m
3 u1 }" v Q! a' A4 d: R0xf2bda964ec2d2fcb1610c886ed4831bf58f64948 (Ethereum)
- A$ E7 q5 Z- h% u6 R
$ d" i% U: @6 F1 V8 a
, I& M4 s, M$ z/ b
! \( ^, C/ ^& P7 I4 }7 Q#2 攻击流程. X) N1 G: N$ T+ y2 s
8 v* ]" N9 l5 _6 P) [7 l* X( S1 ~2 t% U* [
Ethereum和BNB Chain上使用攻击手法相同,以下分析基于BNB Chain上攻击:
8 f Q2 O# K& {! D2 L- |" u" B
0 v( i& b$ R$ M2 c) U( q' X( G' i, l3 T% N: Q( W9 S/ V% t
" e0 W' j5 z( @$ `+ z K; i1 b$ y1. 攻击者调用攻击合约(0x9a84...f445)利用闪电贷从DVM合约(0xd534...0dd7)中借贷915.84 WBNB,然后将116.81 WBNB兑换成115.65 fBNB为后续攻击做准备。) K% n3 D4 `2 x& ~5 g! ~* U
! |! h0 I, e2 `( Y1 z
+ ^7 |0 A' _$ S. {6 m1 b, o4 s5 f3 b; v% Y) R3 Y# G
2. 攻击者利用攻击合约创建了10个合约,为后续攻击做准备。2 \% X+ l r& T& o: g! ~4 h$ D0 d
# w6 @* c& `8 k+ f! _& M
0 T D6 O% \* Q( j I2 ^' D! W
. ~7 I$ |7 F$ H3 D5 q, G
# P/ z, R7 U0 E, K! R" E
+ J6 y' f( k+ _6 e3 s
3. 攻击者接下来将兑换得到的fBNB代币抵押到FEGexPRO合约(0x818e...8bc7)中。
& b9 T/ J X; \ f+ v: d
( O9 a: c4 A" _# {0 c; J3 _7 d [; \0 R" ^/ n3 N3 C- M
! I/ m0 M+ X* C4 R3 h7 Y4. 然后攻击者重复调用depositInternal和swapToSwap函数,让FEGexPRO合约授权fBNB给之前创建好的其他攻击合约。( m. _' p& e5 \- S
+ N% P' i1 Z+ y, F+ O8 |) T
3 K8 w% R, {# U9 s1 J
. A8 T g6 m& B
( G0 I( \9 f" M6 o+ a& }
; A; `7 O( F* C5 w! X5. 然后利用其他攻击合约调用transferFrom函数将FEGexPRO合约中fBNB全部转移到攻击合约(0x9a84...f445)中。+ a! Q t; T) h; M
* N% g- K% F% a) w
( ^4 `" K" Z8 I
, A `2 v4 m! P/ m: b* L8 M
( Q$ N8 u6 q6 m& J$ t3 J" u- \' U4 ]1 T2 G F2 o$ `
6. 接下来又在LP交易对合约(0x2aa7...6c14)中借贷31,217,683,882,286.007211154 FEG代币和423 WBNB。
: a6 d8 b2 k+ A( Q; A
- s. E$ s/ [# l( r' m/ ~$ f
# j5 E# l+ I% k' y3 `
* ^, U% r3 w/ {# Y, b4 V7. 然后重复3、4、5步骤的攻击手法,将FEGexPRO合约中大量FEG代币盗取到攻击合约中。) O7 K/ ^4 v/ o' m" L9 z& n
0 T) `: Z n5 B w- j: N2 w2 y1 t, M+ @/ o4 q; ?/ Q, F3 s
- _ D* s9 _/ D; R' X- ?/ f
- t, Q' W' O: W9 E4 P5 S5 i+ c, Z% W0 Y |0 g% C' D
8 d( m q- ^0 [! e6 u& |
Q6 B8 s. s( j- F. l& J; o; }, e8. 然后归还闪电贷,将获得的WBNB转入攻击合约中完成此笔攻击。$ J6 r, |5 T% }- s) z
. G) I' Z4 M3 J
: \/ V; A* k: S; {! t
; |0 a2 t7 q$ C5 ?8 z
7 z/ W3 T. g" @' F# u, |2 ?
7 O% |# f. }6 Q+ m" W# p$ v9. 此后,又利用相同的原理,执行了50余笔相同的攻击,最获利约144 ETH和3280 BNB。' H6 r4 q" z n5 ^7 \/ g3 `
* k+ n- X' c# u+ C! a+ q# H* J
, A" J" d( ?4 K Z, C3 o: E# Q+ W8 S1 ]: L1 `$ k
5 U& q5 F! T4 o' n
y: V, E+ X4 l! }' L, B- Z8 b
/ ~: b5 }) Q: J( a/ t ?) G( t! }) l# x- L# z' p. l
8 U I, Y/ ?0 V0 ^8 G; x7 a" [+ c+ d4 C# D+ `- N2 w; ]" \3 U8 X3 _
#3 漏洞分析0 \2 |) L L9 y+ d4 m( S8 X
9 @1 l$ A* g' w7 S# V" y
; `+ J2 o$ v* {9 Y! V本次攻击主要利用了FEGexPRO合约中swapToSwap函数中path地址可控且合约中未对path地址进行有效性校验的漏洞。由于合约中depositInternal函数中更新用户余额时依赖于合约中当前代币余额,攻击者通过传入一个恶意的path地址,调用swapToSwap函数时合约中代币余额并未发生变化,导致攻击者可以反复重置攻击合约在FEGexPRO合约中记录的代币数量,从而让FEGexPRO合约将自身代币反复授权给攻击者所控制的多个恶意合约。
5 h- [- b9 `. ~& L [5 {: O. @/ A( l. V. P
) x3 F; t1 {2 u/ j/ [3 q
6 v. x& F g8 ]' x- u' ~: O
. C7 Q0 K e* V2 x1 N- k+ g$ W/ L ^9 E( J4 B$ q
6 k, y: k) t3 e. |+ x- a% o7 C: C# {# C7 }
#4 资金追踪- P8 V2 ~0 |% p4 E
" V7 c( Z* E1 u# F: {
3 C" }7 E$ T" o截止发文时,被盗资金仍在攻击者地址(0x73b3...ff7c)中并未转移。1 C3 K3 a) R, z8 j6 s8 z( b
9 @8 m- p- G; X* k% h# Z% W
" y4 j6 V9 z9 z6 L9 [5 \! e+ O2 t
) D. o( F# d/ I$ r; x7 `6 C( l& ~$ h6 Q3 L
9 G# b* [% r. ]! b5 \- P
7 k C; ^, k7 m, z
. s* [* U3 A5 A2 Y6 X6 t
+ P* i7 H& i& c, ^. y2 Z3 I* q
2 W9 k3 M. }8 z a& h0 M" W; G; r) Q7 m5 e/ s g/ a
: }( p: {$ ]) h8 X# h, \1 a+ w#5 总结
) n; r+ x M* d \ r) o- F) C; `6 a4 _. s
. c% |- H7 n: T/ _% v3 M) w
针对本次事件,成都链安技术团队建议:
1 E3 ^( l7 X, v6 f9 S8 N
0 i- ]( r7 j. t; B
6 _3 G7 F. e9 h2 ~" v+ \+ I2 G% m6 `4 Q: ^+ \/ W
项目开发时,应该注意与其他合约交互时可能存在的安全风险,尽量避免将关键参数设置为用户可控。如果业务需求如此,则需要严格判断用户输入的参数是否存在风险。此外建议项目上线前选择专业的安全审计公司进行全面的安全审计,规避安全风险。3 A4 @* F2 D& \) G3 e
9 z; C! X( {% H& J, j! A7 b8 g |
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 19687 小时
本月在线: 56 小时
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 11441 小时
本月在线: 5 小时
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 6691 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 6156 小时
本月在线: 14 小时
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 4861 小时
本月在线: 9 小时
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 2359 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 10422 小时
本月在线: 23 小时
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 9610 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 290 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 8094 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 21114 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 19429 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 10535 小时
本月在线: 1 小时
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 8669 小时
本月在线: 0 分钟
|
|
|
|
|
|
|
|
|
|
当前离线
经验:
天策币:
活跃币:
策小分:
总在线: 13712 小时
本月在线: 38 小时
|
|
|
|
|
|
|
|
|
|