CoinDesk reports:
On July 2nd, Bittensor’s blockchain was violently attacked by hackers due to an attack on the PyPi package manager, resulting in a loss of $8 million.
As validators meditated on their nodes, attackers silently drained their wallets at a speed faster than saying “om”.
Funds were directly transferred to the hacker’s wallet, with approximately 32,000 TAO tokens experiencing unauthorized transfers.
The Bittensor team promptly responded to the situation by immediately halting all network operations and taking decisive action to address the current issue.
The network entered a “safe mode,” allowing for block generation but preventing the processing of any transactions.
This measure was taken to prevent further losses and protect users while conducting a thorough investigation.
The incident led to a rapid 15% decline in the value of TAO tokens, indicating that in the blockchain as in life, everything is fluid… including market capitalization.
According to Bittensor’s Telegram message, users and stakers were unharmed. Only some validators, subnets, and miners’ owners had funds stolen.
Are you ready to unravel this huge mystery?
Investigation of the Bittensor attack
Source: Bittensor, ZachXBT
Bittensor initially announced on its Discord that some of their wallets had been attacked and stated that they were investigating, taking precautionary measures by halting all on-chain transactions.
The attack on the Bittensor blockchain was as precise as a series of practiced qigong movements.
Within a short 3-hour period, attackers successfully invaded multiple high-value wallets, stealing approximately 32,000 TAO tokens.
When the Bittensor team responded urgently, the favorite on-chain detective of the crypto community had already joined the investigation.
Shortly after the theft occurred, ZachXBT identified the address where the stolen funds were sent: 5FbWTraF7jfBe5EvCmSThum85htcrEsCzwuFjG3PukTUQYot
Zach has been a cryptocurrency detective, and he may link this incident to one on June 1st when a TAO holder had over 28,000 TAO stolen, valued at $11.2 million during the theft.
On the second day of the attack, the Opentensor Foundation (OTF) released their post-attack analysis, revealing that the root cause of the attack was the PyPi package manager being compromised.
The evolution of this digital dumpster fire is as follows:
A malicious package disguised as a legitimate Bittensor package infiltrated PyPi version 6.12.2.
This Trojan horse contained code designed to steal unencrypted cold key details.
When unsuspecting users downloaded this package and decrypted their cold keys, the decrypted bytecode was sent to a remote server controlled by the attacker.
The vulnerability affected users who downloaded the Bittensor PyPi package or used Bittensor==6.12.2 between May 22nd and May 29th to perform staking, unstaking, transfers, delegation, or undelegation operations.
To counter this attack, the Bittensor team swiftly placed the chain in “safe mode,” pausing all transactions while continuing to generate blocks.
This swift action may have prevented further losses but also highlighted the team’s central control over what is supposed to be a decentralized network.
OTF immediately took steps to mitigate the loss:
Removed the malicious 6.12.2 package from the PyPi package manager repository.
Conducted a thorough review of the Subtensor and Bittensor code on Github.
Collaborated with exchanges to track the attackers and salvage funds wherever possible.
Looking ahead, OTF pledged to strengthen package verification, increase external audit frequency, enhance security standards, and improve monitoring.
OTF stated that the incident did not affect the blockchain or Subtensor code, and the underlying Bittensor protocol remains uncompromised and secure.
They also collaborated with multiple exchanges, providing them with detailed information about the attack to track the attackers and salvage funds wherever possible.
As the dust settles, the community begins to ponder how this malicious software breached PyPi’s defenses and whether this attack is related to the June 1st theft case.
In the world of Bittensor, the path to enlightenment seems to be paved with some empty stolen wallets.
Key Takeaways
The Bittensor hack exposed a serious vulnerability in the cryptocurrency ecosystem, namely the reliance on third-party package managers.
While blockchain protocols themselves may be secure, the tools developers use to interact with them can become unexpected points of failure.
This event raises questions about the security practices of PyPi and other software package repositories that the crypto community relies on.
Its timing and similarities with the June 1st theft case cannot be ignored.
Are these isolated incidents, or is there broader activity targeting Bittensor and similar projects?
As OTF collaborates with exchanges to track stolen funds, the community watches closely, hoping to reclaim tokens after such hacker attacks, although success in recovering stolen funds is rare.
Bittensor’s swift action to halt the network demonstrates the dual nature of centralized control in “decentralized” projects.
While it may have prevented further losses, it also underscores the vulnerability of the system.
In the world of crypto, the only constant is change, and occasionally, $8 million also disappears.
As Bittensor reflects on its security practices, will they find true blockchain enlightenment or are they destined to continue laying these expensive stepping stones on the path to a more perfect protocol?
Subscribe to Updates
Get the latest creative news from FooBar about art, design and business.
Analyzing the Bittensor Hack What Happened and What Cryptographic Vulnerabilities Were Revealed
Add A Comment