Protect Your Project Today
Strengthen your project with the largest web3 security provider.
A CertiK security expert will review your request and follow up shortly.

Exploiting a Smart Contract without Security Vulnerabilities: Analysis of True Seigniorage Dollar Attack Event

Reports ·Incident Analysis ·
Exploiting a Smart Contract without Security Vulnerabilities: Analysis of True Seigniorage Dollar Attack Event

On March 14th, the CertiK Security Team discovered a novel type of attack which was leveraged against the DeFi stablecoin project; True Seigniorage Dollar. The attack resulted in a total loss of approximated $16,600. In order to conduct this, the attacker took advantage of the principle of the Decentralized Autonomous Organization (DAO) mechanism in order to conduct an attack without manipulating conventional ‘vulnerabilities’.

Technical Analysis

The Attack Process:

The attacker (0x50f753c5932b18e9ca28362cf0df725142fa6376) acquired a large number of True Seigniorage Dollar tokens (TSD) at a low price. They then leveraged those tokens for voting power and forcibly passed proposal No. 2

  1. In proposal No. 2, the attacked proposed the replacement of the current token implementation smart contract, which is pointed to by the proxy contract at the address of 0xfc022cda7250240916abaa935a4c589a1f150fdd, with a malicious token implementation created by the attacker and owned by address 0x2637d9055299651de5b705288e3525918a73567f, and deployed at 0x26888ff41d05ed753ea6443b02ada82031d3b9fb

  2. Following the approval of proposal No.2, the attacker committed the malicious token implementation contract through the proxy contract. The token implementation contract was upgraded to the malicious contract during this upgrade process.

  3. Simultaneously, the initialize() method in the malicious contract address was to be called during the upgrade process. By decompiling the malicious contract, we can learn that the initialize() method of the malicious contract will mint about 11.6 billion TSD to another address of the attacker,0x2637d9055299651de5b705288e3525918a73567f

  4. After the prior steps were executed, the attacker converted the obtained TSD into BUSD and left the market with a profit.

Summary

No security vulnerabilities were exploited in the TSD smart contract or dApps. Through an understanding of the DAO mechanism, the attacked continued to purchase TSD at a low price and leveraged the mechanism by which token holders could no longer vote on proposals after they unbonded their tokens; doing so because they could no longer profit from the protocol. Taking into consideration the project owner has a very low proportion of voting rights, the attacker took control of the governance surrounding proposal No. 2 with absolute advantage, thereby ensuring that the malicious proposal was passed.

Although the entire attack was conducted through the use of a malicious contract implanted in the backdoor, the DAO mechanism was the main contributing factor which enabled the attack to be conducted throughout the entire implementation process.

The CertiK Security Team recommends the following: starting from the DAO mechanism, the project party should have the right to vote to ensure that the governance proposal is not “kidnapped”, there, they can avoid recurrence of the attack.

Related Blogs

The Enterprise DLT Oracle Challenge

The Enterprise DLT Oracle Challenge

In DeFi, oracle failures can cause financial losses within a system that broadly accepts risk. Enterprise DLT operates in a different world. The assets are physical. The counterparties are regulated. The consequences are legal.

Hack3d: The Web3 Security Report 2024

Hack3d: The Web3 Security Report 2024

Welcome to Hack3d: The Web3 Security Report for 2024. CertiK’s Hack3d reports offer deep dives into the exploits, vulnerabilities, and trends that define blockchain and smart contract security. They’re an invaluable resource for anyone seeking to understand the current landscape of Web3 security.

Secure Smart Contract Programming in Tact: Popular Mistakes in the TON Ecosystem

Secure Smart Contract Programming in Tact: Popular Mistakes in the TON Ecosystem

The Open Network (TON) continues to push the boundaries of blockchain technology with its innovative features and robust smart contract capabilities. Building on the insights and lessons learned from previous blockchain platforms like Ethereum, TON offers developers a more efficient and flexible environment. One of the key components driving this advancement is the Tact language.