1. Home
  2. Cybersecurity

Cybersecurity

9 Tech YouTube channels to follow

Discover nine tech-focused YouTube channels covering topics such as programming, machine learning, cybersecurity, blockchain and Web3.

Learning tech via YouTube channels can be a great way to supplement traditional learning methods, as it provides a more interactive and engaging experience. Many YouTube channels dedicated to tech provide in-depth tutorials and explanations of complex concepts in a way that is easy to understand, making it accessible to learners of all skill levels.

Additionally, YouTube channels often provide access to industry experts, giving learners the opportunity to learn from individuals with real-world experience and knowledge. For instance, Cointelegraph’s YouTube channel provides news, interviews and analysis on the latest developments in the cryptocurrency and blockchain industries. The channel’s content is well-produced and features engaging visuals, making it an accessible and entertaining way to learn about these topics.

Here are nine other YouTube channels to follow and learn beyond cryptocurrencies.

Ivan on Tech 

Ivan on Tech is a popular YouTube channel focused on blockchain technology, cryptocurrencies and decentralized applications (DApps). The channel is hosted by Ivan Liljeqvist, a software developer and blockchain expert.

Liljeqvist offers educational material on his YouTube channel on a range of subjects relating to blockchain technology, such as crypto trading, the creation of smart contracts, decentralized finance (DeFi) and more. Also, he offers updates on the most recent events and trends in the sector.

Liljeqvist also maintains an online school called Ivan on Tech Academy in addition to his YouTube channel. This school includes classes on blockchain development, cryptocurrency trading and other relevant subjects.

Andreas Antonopoulos

Andreas Antonopoulos’ YouTube channel is an invaluable resource for anyone seeking in-depth knowledge and insights into Bitcoin (BTC) and cryptocurrencies, featuring a wealth of informative talks, interviews and Q&A sessions.

Antonopoulos is a renowned advocate, speaker and author in the field of Bitcoin and cryptocurrencies. He is widely regarded as a leading expert on blockchain technology and has written several books on the subject, including Mastering Bitcoin and The Internet of Money.

He is renowned for his fervent defense of decentralized systems and his capacity to concisely and clearly convey difficult ideas. Since the beginning of cryptocurrencies and blockchain technology, Antonopoulos has been a vocal proponent of their development and use.

Crypto Daily 

Crypto Daily is a popular YouTube channel dedicated to providing daily news, analysis and commentary on the world of cryptocurrencies. With over 500,000 subscribers, the channel covers a broad range of topics, from the latest developments in cryptocurrencies to initial coin offerings and blockchain technology.

James, the host of the channel, makes his insights interesting for both inexperienced and seasoned crypto aficionados by combining wit, humor and intellect in his delivery. The channel also offers interviews with industry leaders, product reviews and educational content, making it a well-rounded resource for anybody interested in the world of cryptocurrency.

Cybersecurity Ventures 

Cybersecurity Ventures is a YouTube channel focused on providing educational content on cybersecurity, cybercrime and cyberwarfare. The channel offers in-depth analyses of new trends and technology, news updates on the most recent cyber threats and assaults, and interviews with top industry experts.

The channel, which has over 20,000 members, offers guidance and best practices for people and businesses wishing to safeguard themselves against online risks, making it a useful tool for both inexperienced and seasoned cybersecurity professionals.

Related: Top 10 most famous computer programmers of all time

Machine Learning Mastery

Machine Learning Mastery also has a YouTube channel that complements its website by providing video tutorials on machine learning topics. The channel, which is hosted by Jason Brownlee, provides a range of content, including lessons, interviews with business leaders, and discussions of the most recent developments and difficulties in the field of machine learning.

The videos are well-made and very educational, covering everything from the fundamentals of machine learning to more complex subjects, such as neural networks and computer vision. The channel, which complements the substantial materials already offered on the Machine Learning Masters website, has a growing subscriber base and is a great resource for anybody wishing to learn about machine learning in a visual format.

Two Minute Papers 

Two Minute Papers is a popular YouTube channel that summarizes and explains complex research papers in the fields of artificial intelligence, machine learning and computer graphics in two minutes or less. 

The channel, hosted by Károly Zsolnai-Fehér, provides an easy way to stay up-to-date on the most recent developments and discoveries in these areas. The professionally made videos include simple visual explanations and can help viewers understand even the most challenging studies.

In order to personalize the information, Two Minute Papers also includes interviews with researchers and subject-matter experts. Two Minute Papers, a popular and useful resource for people interested in cutting-edge research and advancements in AI and related subjects, has more than 1.5 million subscribers.

 Web3 Foundation

The Web3 Foundation is a nonprofit organization dedicated to supporting and building the decentralized web, also known as Web3. Its YouTube channel provides educational content and updates on the latest developments in Web3 technology, including blockchain, distributed systems and peer-to-peer networks.

Related: What are peer-to-peer (P2P) blockchain networks, and how do they work?

The channel offers talks by prominent authorities in the field, including programmers, researchers and businesspeople, as well as discussions and interviews on subjects pertaining to Web3 technology. Also, it provides updates on the progress of the Polkadot network, an open-source platform for constructing interoperable blockchain networks. Overall, the Web3 Foundation YouTube channel is a great resource for anyone interested in the decentralized web’s future because it has over 20,000 followers.

Dapp University 

Dapp University’s YouTube channel complements its educational platform by providing video tutorials on blockchain development, smart contracts and decentralized application (DApp) development. Hosted by developer and entrepreneur Gregory McCubbin, the channel features clear and concise explanations of complex topics in blockchain technology, making it accessible to beginners and experts alike.

The videos cover a wide range of topics, including Ethereum, Solidity and other blockchain tools and technologies. With over 300,000 subscribers, the Dapp University YouTube channel is a valuable resource for individuals looking to learn how to develop decentralized applications on the blockchain.

Tech With Tim

Tech With Tim is a popular YouTube channel dedicated to teaching programming and computer science concepts to beginners and intermediate learners. The channel offers tutorials on a range of programming languages, including Python, Java and C++, as well as web development, game development and machine learning.

It is hosted by Tim Ruscica, a software engineer and seasoned tutor. The well-produced videos have straightforward explanations and examples of programming topics, making them understandable to a variety of students. Tech With Tim is a great resource for anybody wishing to learn programming and computer science skills, with more than 800,000 members.

Is XRP price going to crash again?

KyberSwap announces potential vulnerability, tells LPs to withdraw ASAP

The developer stated that so far, no funds have been lost.

Kyber Network, developer of the Kyberswap Elastic decentralized crypto exchange, has announced on Apr. 17 that there is a potential vulnerability in the exchange's contracts. It has advised all liquidity providers to remove their funds as soon as possible.

The developer has stated that no funds have been lost. However, it has advised liquidity providers (LPs) to remove their funds as a precaution. Only Kyberswap Elastic funds are at risk. Kyberswap Classic smart contracts do not contain the vulnerability, the team said.

In a separate message, the team stated that farming rewards have been temporarily suspended until a new smart contract can be deployed. All rewards earned prior to 18 April 2023, 11pm (GMT+7) have already been dispersed and are unaffected by this pause.

The developer has stated that it will update the community soon with an explanation as to when funds can be safely deposited back into the protocol.

This is a developing story, and further information will be added as it becomes available.

Is XRP price going to crash again?

Hundred Finance loses $7 million in Optimism hack

The attacker reportedly manipulated the exchange rate between ERC-20 tokens and hTOKENS to steal over $7 million from the protocol.

Multichain lending protocol Hundred Finance has experienced a significant security breach on the Ethereum layer-2 blockchain Optimism. According to the protocol on Twitter, the losses sit at $7.4 million.

Hundred Finance announced the exploit on April 15, saying it had contacted the hacker and was working with various security teams on the incident. Although the protocol didn't reveal how the attack was executed, blockchain security firm Certik noted that it was a flash loan attack:

Flash loan attacks take place when a hacker borrows a large amount of funds via a flash loan (a type of uncollateralized loan) from a lending protocol. The hacker then combines it with other techniques to manipulate the price of an asset on a decentralized finance (DeFi) platform. 

In Hundred's case, the attacker manipulated the exchange rate between ERC-20 tokens and hTOKENS, allowing them to withdraw more tokens than originally deposited, according to Certik. The blockchain security firm continued:

"The exchange rate formula was manipulated through Cash value. Cash is the amount of WBTC that the hBTC contract has. The attacker manipulated it by donating large amounts of WBTC to the hToken contract so that the exchange rate goes up."

Certik says that large loans were taken out under the manipulated exchange rate. Hundred Finance is preparing a postmortem report on the incident.

This attack comes almost nearly 12 months after Hundred was exposed to another exploit on the Gnosis Chain. At that time, the hacker drained all the protocol's liquidity through a re-entrancy attack. Over $6 million was lost. In the same exploit, the hacker also stole funds from the Agave protocol.

Since last year, a number of perpetrators have used flash loan attacks to target DeFi protocols. Recent cases include attacks against Euler Finance ($196 million) and Mango Markets ($46 million). While Euler's hack returned most of the funds, Mango's thief has been arrested by United States authorities.

Magazine: Should crypto projects ever negotiate with hackers? Probably

Is XRP price going to crash again?

MetaMask third-party provider was hacked, exposing email addresses

The incident affected users who submitted a MetaMask customer service ticket between August 1, 2021 and February 10, 2023.

The email addresses of some MetaMask users may have been exposed to a malicious party due to a recently discovered cyber-security incident. According to parent company ConsenSys, the incident affected users who submitted a customer support ticket to MetaMask between August 1, 2021 and February 10, 2023.

According to the April 14 blog post, unauthorized actors gained access to a third party’s computer system that was used to process customer service requests, potentially allowing them to view customer support tickets submitted by MetaMask users.

These tickets did not ask for information other than what was necessary to help the user, including email address to facilitate replies. However, they did include a “free text-field,” which some users may have used to submit personally identifying information. This may have included “economic or financial information, name, surname, date of birth, phone number, and postal address,” the post stated.

Consensys emphasized that it does not ask for personally identifying information in customer conversations, but some may have provided it anyway.

The company estimates that the breach may have affected up to 7,000 MetaMask users who submitted customer support tickets.

In response to this incident, hardware wallet provider Keystone warned MetaMask users that some might receive more phishing emails due to the incident since the attacker may use this swiped email database to look for potential victims.

Phishing is a scam that tricks a user into providing sensitive information to an attacker. It is often performed by sending an email to the victim that appears to be from a trusted party or someone the victim knows.

Related: MetaMask launches new fiat purchase function for cryptocurrency

Consensys said it had taken steps to eliminate unauthorized access in the future. As a result, tickets submitted after February 10 should be unaffected by the incident. They have also contacted the Data Protection Commission of Ireland and the Information Commissioner’s Office of the United Kingdom to report the breach. In addition, the company’s third-party customer service provider is working with a cyber-security and forensics team to perform a more detailed investigation of the incident.

MetaMask came under fire from privacy advocates in late 2022 when it revealed that it sometimes logged users’ IP addresses. However, it updated its app in March to give users more control over which providers could obtain this information.

Is XRP price going to crash again?

DeFi tool to notify users about suspicious on-chain activity

In determining the success of Web3, security measures like PureFi’s SafeTransact, in addition to Web3 security companies, are an approach to secure transactions from cybercriminals.

The success of Web3 is dependent upon solutions to the security issues posed by distinct application structures.

Web3 security companies are responsible for ensuring that blockchain-based platforms and applications are protected from cyber threats. These companies offer a variety of services, including smart contract auditing, security testing and incident response. PureFi, a decentralized finance (DeFi) protocol for cryptocurrency onboarding, has introduced a new method called SafeTransact to improve the security of Web3 transactions.

Web3 security is heavily dependent on the unique ability of blockchains to establish promises and withstand human intervention. These software-controlled networks, however, are a potential hacking target because of the related trait of finality – the fact that transactions are often irreversible. This implies a need for more levels of prevention-oriented security. SafeTransact’s addition to the global crypto security arsenal helps in that regard.

SafeTransact examines blockchain transactions and promptly notifies users of any suspicious activities. It is designed to integrate with AMLSafe, a multi-crypto wallet from the same ecosystem.

The SafeTransact system considers the token address, sender address, spender address and amount to gauge transaction risk for approved transactions. The system analyses input data such as “from,” “to,” and “amount” addresses to determine risk levels for token transfer transactions. For swap transactions, it analyzes decentralized exchange (DEX) addresses, fund senders, tokens in and out, and amounts sent to provide a comprehensive assessment of risk.

According to the most recent Chainalysis report, the DeFi industry experienced the highest number of hacks and data breaches. The DeFi space is yet to develop security measures to help users navigate the Web3 world.

Related: No ‘respite’ for exploits, flash loans or exit scams in 2023: Cybersecurity firm

Security companies perform security audits of Web3 applications to identify vulnerabilities and potential risks. Developing blockchain-specific security tools that can help detect and prevent attacks on blockchain networks is included in their functions. These security companies also implement secure coding practices to prevent vulnerabilities in Web3 applications.

Overall, security companies are constantly innovating and developing new approaches to protect Web3 transactions, given the unique challenges and risks associated with blockchain-based transactions.

Magazine: North Korean crypto hacking: Separating fact from fiction

Is XRP price going to crash again?

South Korean crypto exchange GDAC hacked for nearly $14M

The exchange said that all deposits and withdrawals are temporarily suspended as it performs emergency server maintenance.

South Korean crypto exchange GDAC has been hacked for approximately $13.9 million worth of crypto. The exchange has halted all deposits and withdrawals and is performing emergency server maintenance in response to the attack, according to an April 10 announcement from GDAC CEO Han Seunghwan.

According to the announcement, the attacker gained control of some of the exchange’s hot wallets on the morning of April 9 and, at 7 am Korean Standard Time, began moving crypto into wallets under the attacker’s control. Around 61 Bitcoin (BTC), 350.5 Ether (ETH), 10 million of the WEMIX gaming currency, and $220,000 worth of Tether (USDT) was stolen in the attack. This totals around $13.9 million worth of crypto at April 10 prices.

The amount stolen is “approximately 23% of Gdac’s current total custodial assets,” the announcement said. The exchange has alerted the police, reported the hack to the Korea Internet & Security Agency (KISA), and notified the Financial Intelligence Unit (FIU) of the loss caused by the attack.

Related: Here’s how much was lost to crypto hacks and exploits in Q1 2023

GDAC is also asking crypto exchanges not to honor deposits made from the address that performed the attack.

Seunghwan said that the exchange does not know when withdrawals will be resumed. “We ask for your understanding that it is difficult to confirm the resumption point of deposit and withdrawal as the investigation is currently underway,” he said, according to Google Translate.

Centralized exchange hacks continue to be a problem in the crypto industry. Case in point: Crypto.com was hacked for over $15 million in January 2022. Amid a liquidity crisis at FTX, an attacker drained $663 million from the failed crypto exchange. The GDAC attack may be the first major centralized crypto exchange hack of 2023.

Is XRP price going to crash again?

SushiSwap approval bug leads to $3.3 million exploit

Only users who have traded on the decentralized exchange in the last four days are apparently affected.

A bug on a smart contract on the decentralized finance (DeFi) protocol SushiSwap led to over $3 million in losses in the early hours of April 9, according to several security reports on Twitter. 

Blockchain security companies Certik Alert and Peckshield posted about an unusual activity related to the approval function in Sushi's Router Processor 2 contract — a smart contract that aggregates trade liquidity from multiple sources and identifies the most favorable price for swapping coins. Within a few hours, the bug led to losses of $3.3 million.

According to DefiLlama pseudonymous developer 0xngmi, the hack should only affect users who swapped in the protocol in the past four days.

Sushi's head developer Jared Grey urged users to revoke permissions for all contracts on the protocol. "Sushi's RouteProcessor2 contract has an approval bug; please revoke approval ASAP. We're working with security teams to mitigate the issue," he noted. A list of contracts on GitHub with different blockchains requiring revocation has been created to address the problem.

Hours after the incident, Grey took to Twitter to announce that a "large portion of affected funds'' had been recovered through a whitehat security process. "We've confirmed recovery of more than 300ETH from CoffeeBabe of Sifu's stolen funds. We're in contact with Lido's team regarding 700 more ETH."

The Sushi's community has had an intense weekend. On April 8, Grey and his counsel provided comments on the recent subpoena from the United States Securities and Exchange Commission (SEC).

"The SEC’s investigation is a non-public, fact-finding inquiry trying to determine whether there have been any violations of the federal securities laws. To the best of our knowledge, the SEC has not (as of this writing) made any conclusions that anyone affiliated with Sushi has violated United States federal securities laws," he stated.

Grey claims to be cooperating with the investigation. A legal defense fund in response to the subpoena was proposed on Sushi's governance forum on March 21.

Magazine: Crypto audits and bug bounties are broken: Here’s how to fix them

Is XRP price going to crash again?

Trustwave Spiderlabs Researchers Warn of New Strain of Malware That Drains Crypto Funds

Trustwave Spiderlabs Researchers Warn of New Strain of Malware That Drains Crypto FundsAccording to researchers at Trustwave Spiderlabs, a strain of malware known as Rilide is believed to be helping cybercriminals steal funds from cryptocurrency exchanges. Although the steps being taken to tackle this malware are likely to make life more difficult for cybercriminals, two researchers — Pawel Knapczyk and Wojciech Cieslak — said this alone may […]

Is XRP price going to crash again?

Euler Finance attack: How it happened, and what can be learned

The Euler Finance exploit was the largest of Q1 2023, and the risk of a similar attack on other protocols remains.

The March 13 flash loan attack against Euler Finance resulted in over $195 million in losses. It caused a contagion to spread through multiple decentralized finance (DeFi) protocols, and at least 11 protocols other than Euler suffered losses due to the attack.

Over the next 23 days, and to the great relief of many Euler users, the attacker returned all of the exploited funds.

But while the crypto community can celebrate the return of the funds, the question remains whether similar attacks may cause massive losses in the future.

An analysis of how the attack happened and whether developers and users can do anything to help prevent these kinds of attacks in the future may be helpful.

Luckily, Euler’s developer docs clearly explain how the protocol works, and the blockchain itself has preserved a complete record of the attack. 

How Euler Finance works

According to the protocol’s official docs, Euler is a lending platform similar to Compound or Aave. Users can deposit crypto and allow the protocol to lend it to others, or they can use a deposit as collateral to borrow crypto.

The value of a user’s collateral must always be more than what they borrow. Suppose a user’s collateral falls below a specific ratio of collateral value to debt value. In that case, the platform will allow them to be “liquidated,” meaning their collateral will be sold off to pay back their debts. The exact amount of collateral a user needs depends upon the asset being deposited vs. the asset being borrowed.

eTokens are assets, while dTokens are debts

Whenever users deposit to Euler, they receive eTokens representing the deposited coins. For example, if a user deposits 1,000 USD Coin (USDC), they will receive the same amount of eUSDC in exchange.

Since they become worth more than the underlying coins as the deposit earns interest, eTokens don’t have a 1:1 correspondence with the underlying asset in terms of value.

Euler also allows users to gain leverage by minting eTokens. But if they do this, the protocol will send them debt tokens (dTokens) to balance out the assets created.

For example, the docs say that if a user deposits 1,000 USDC, they can mint 5,000 eUSDC. However, if they do this, the protocol will also send them 5,000 of a debt token called “dUSDC.”

The transfer function for a dToken is written differently than a standard ERC-20 token. If you own a debt token, you can’t transfer it to another person, but anyone can take a dToken from you if they want to.

Related: Liquidity protocol Sentiment exploited for over $500K

According to the Euler docs, a user can only mint as many eTokens as they would have been able to by depositing and borrowing over and over again, as it states, “The Mint function mimics what would happen if a user deposited $1,000 USDC, then borrowed $900 USDC, then redeposited that $900 USDC, to borrow $810 more USDC, and so on.”

Users liquidated if health scores drop to 1 or below

According to a blog post from Euler, each user has a “health score” based on the value of the eTokens held in their wallets vs. the value of the dTokens held. A user needs to have a greater dollar value of eTokens than dTokens, but how much more depends on the particular coins they are borrowing or depositing. Regardless, a user with enough eTokens will have a health score greater than 1.

If the user barely falls below the required number of eTokens, they will have a health score of precisely 1. This will subject them to “soft liquidation.” Liquidator bots can call a function to transfer some of the user’s eTokens and dTokens to themselves until the borrower’s health score returns to 1.25. Since a user who is barely below the collateral requirements will still have more collateral than debt, the liquidator should profit from this transaction.

If a user’s health score falls below 1, then an increasing discount is given out to the liquidator based on how bad the health score is. The worse the health score, the greater the discount to the liquidator. This is intended to make sure that someone will always liquidate an account before it accumulates too much bad debt.

Euler’s post claims that other protocols offer a “fixed discount” for liquidation and argues why it thinks variable discounts are superior.

How the Euler attack happened

Blockchain data reveals that the attacker engaged in a series of attacks that drained various tokens from the protocol. The first attack drained around $8.9 million worth of Dai (DAI) from the Dai deposit pool. It was then repeated over and over again for other deposit pools until the total amount was drained.

The attacker used three different Ethereum addresses to perform the attack. The first was a smart contract, which Etherscan has labeled “Euler Exploit Contract 1,” used to borrow from Aave. The second address was used to deposit and borrow from Euler, and the third was used to perform a liquidation.

To avoid having to repeatedly state the addresses that Etherscan has not labeled, the second account will be referred to as “Borrower” and the third account “Liquidator,” as shown below:

Ethereum addresses used by the hacker. Source: Etherscan

The first attack consisted of 20 transactions in the same block.

First, Euler Exploit Contract 1 borrowed 30 million DAI from Aave in a flash loan. It then sent this loan to the borrower account.

After receiving the 30 million DAI, borrower deposited 20 million of it to Euler. Euler then responded by minting approximately 19.6 million eDAI and sending it to borrower.

These eDAI coins were a receipt for the deposit, so a corresponding amount of dDai was not minted in the process. And since each eDAI can be redeemed for slightly more than one DAI, the borrower only received 19.6 million instead of the full 20 million.

After performing this initial deposit, borrower minted approximately 195.7 million eDAI. In response, Euler minted 200 million dDAI and sent it to borrower.

At this point, borrower was near their eDAI mint limit, as they had now borrowed about 10 times the amount of DAI they had deposited. So their next step was to pay off some of the debts. They deposited the other 10 million DAI they had held onto, effectively paying back $10 million of the loan. In response, Euler took 10 million dDAI out of borrower’s wallet and burned it, reducing borrower’s debt by $10 million.

Related: Allbridge offers bounty to exploiter who stole $573K in flash loan attack

The attacker was then free to mint more eDAI. Borrower minted another 195.7 million eDAI, bringing their eDAI total minted to around 391.4 million. The 19.6 million eDAI in deposit receipts brought borrower’s eDAI total to about 411 million.

In response, Euler minted another 200 million dDai and sent it to borrower, bringing borrower’s total debt to $400 million.

Once borrower had maximized their eDAI minting capacity, they sent 100 million eDai to the null address, effectively destroying it.

This pushed their health score well below 1, as they now had $400 million in debt vs. approximately $320 million in assets.

This is where the liquidator account comes in. It called the liquidate function, entering borrower’s address as the account to be liquidated.

Liquidation event emitted during the Euler attack. Source: Ethereum blockchain data

In response, Euler initiated the liquidation process. It first took around 254 million dDAI from borrower and destroyed it, then minted 254 million new dDai and transferred it to liquidator. These two steps transferred $254 million worth of debt from borrower to liquidator.

Next, Euler minted an additional 5.08 million dDAI and sent it to liquidator. This brought liquidator’s debt to $260 million. Finally, Euler transferred approximately 310.9 million eDAI from borrower to liquidator, completing the liquidation process.

In the end, borrower was left with no eDAI, no DAI, and 146 million dDAI. This meant that the account had no assets and $146 million worth of debt.

On the other hand, liquidator had approximately 310.9 million eDAI and only 260 million dDAI.

Once the liquidation had been completed, liquidator redeemed 38 million eDAI ($38.9 million), receiving 38.9 million DAI in return. They then returned 30 million DAI plus interest to Euler Exploiter Contract 1, which the contract used to pay back the loan from Aave.

In the end, liquidator was left with approx. $8.9 million in profit that had been exploited from other users of the protocol.

This attack was repeated for multiple other tokens, including Wrapped Bitcoin (WBTC), Staked Ether (stETH) and USDC, amounting to $197 million in exploited cryptocurrencies.

Losses from Euler attack. Source: Blocksec

What went wrong in the Euler attack

Blockchain security firms Omniscia and SlowMist have analyzed the attack to try and determine what could have prevented it.

According to a March 13 report from Omniscia, the primary problem with Euler was its “donateToReserves” function. This function allowed the attacker to donate their eDAI to Euler reserves, removing assets from their wallet without removing a corresponding amount of debt. Omnisica says that this function was not in the original version of Euler but was introduced in Euler Improvement Proposal 14 (eIP-14).

The code for eIP-14 reveals that it created a function called donateToReserves, which allows the user to transfer tokens from their own balance to a protocol variable called “assetStorage.reserveBalance.” Whenever this function is called, the contract emits a “RequestDonate” event that provides information about the transaction.

Blockchain data shows that this RequestDonate event was emitted for a value of 100 million tokens. This is the exact amount that Etherscan shows were burned, pushing the account into insolvency.

Euler’s RequestDonate event being emitted during the attack. Source: Ethereum blockchain data

In their March 15 analysis, SlowMist agreed with Omniscia about the importance of the donateToReserve function, stating:

“Failure to check whether the user was in a state of liquidation after donating funds to the reserve address resulted in the direct triggering of the soft liquidation mechanism.”

The attacker might have also been able to carry out the attack even if the donate function had not existed. The Euler “EToken.sol” contract code on GitHub contains a standard ERC-20 “transfer” function. This seems to imply that the attacker could have transferred their eTokens to another random user or to the null address instead of donating, pushing themselves into insolvency anyway.

Euler eToken contract transfer function. Source: GitHub

However, the attacker did choose to donate the funds rather than transfer them, suggesting the transfer would not have worked.

Cointelegraph has reached out to Omniscia, SlowMist and the Euler team for clarification on whether the donateToReserves function was essential to the attack. However, it has not received a response by publication time.

Related: Euler team denies on-chain sleuth was a suspect in hack case

The two firms agreed that another major vulnerability in Euler was the steep discounts offered to liquidators. According to SlowMist, when a lending protocol has a “liquidation mechanism that dynamically updates discounts,” it “creates lucrative arbitrage opportunities for attackers to siphon off a large amount of collateral without the need for collateral or debt repayment.” Omniscia made similar observations, stating:

“When the violator liquidates themselves, a percentage-based discount is applied [...] guaranteeing that they will be ‘above-water’ and incur only the debt that matches the collateral they will acquire.”

How to prevent a future Euler attack

In its analysis, SlowMist advised developers on how to prevent another Euler-style attack in the future. It argued that lending protocols should not allow users to burn assets if this will cause them to create bad debt, and it claimed that developers should be careful when using multiple modules that may interact with each other in unexpected ways:

“The SlowMist Security Team recommends that lending protocols incorporate necessary health checks in functions that involve user funds, while also considering the security risks that can arise from combining different modules. This will allow for the design of secure economic and viable models that effectively mitigate such attacks in the future.”

A representative from DeFi developer Spool told Cointelegraph that technological risk is an intrinsic feature of the DeFi ecosystem. Although it can’t be eliminated, it can be mitigated through models that properly rate the risks of protocols.

According to Spool’s risk management white paper, it uses a “risk matrix” to determine the riskiness of protocols. This matrix considers factors such as the protocol’s annual percentage yield (APY), audits performed on its contracts, time since its deployment, total value locked (TVL) and others to create a risk rating. Users of Spool can employ this matrix to diversify DeFi investments and limit risks.

The representative told Cointelegraph that Spool’s matrix significantly reduced investor losses from the Euler incident.

“In this incident, the worst affected Smart Vaults, those designed by users to seek higher (and riskier) yields, were only affected for up to 35%. The lowest affected vault with exposure to Euler strategies (via Harvest or Idle), in comparison, was only affected by 6%. Some vaults had zero exposure and were thus not impacted,” they stated.

Spool continued, “While this is not ideal, it clearly demonstrates the ability of the Smart Vaults to provide tailored risk models and to distribute users’ funds among multiple yield sources.”

Cointelegraph got a similar answer from SwissBorg, another DeFi protocol that aims to help users limit risk through diversification. SwissBorg CEO Cyrus Fazel stated that the SwissBorg app has “different yield strategies based on risk/timeAPY.”

Some strategies are listed as “1: core = low,” while others are listed as “2: adventurous = risky.” Because Euler was given a “2” rating, losses from the protocol were limited to only a small portion of SwissBorg’s total value locked, Fazel stated.

SwissBorg head of engineering Nicolas Rémond clarified further that the team employs sophisticated criteria to determine what protocols can be listed in the SwissBorg app.

“We have a due-diligence process for all DeFi platforms before entering any position. And then, once we’re there, we have operation procedures,“ he said, adding, ”The due diligence is all about TVL, team, audits, open-source code, TVL, oracle manipulation attack, etc. […] The operation procedure is about platform monitoring, social media monitoring and some emergency measures. Some are still manual, but we’re investing to automatize everything based so that we can be extremely reactive.”

In a March 13 Twitter thread, the SwissBorg team stated that although the protocol had lost 2.2% of the funds from one pool and 29.52% from another, all users would be compensated by SwissBorg should the funds not be recoverable from Euler.

The Euler attack was the worst DeFi exploit of Q1 2023. Thankfully, the attacker returned most of the funds, and most users should end up with no losses when all is said and done. But the attack raises questions about how developers and users can limit risk as the DeFi ecosystem continues to expand.

Some combination of developer diligence and investor diversification may be the solution to the problem. But regardless, the Euler hack may continue to be discussed well into the future, if for no other reason than its sheer size and illustration of the risks of DeFi exploits.

Is XRP price going to crash again?

Euler team denies on-chain sleuth was a suspect in hack case

The investigator claimed to be targeted as a suspect because they maintained a crypto security repo on GitHub.

The pseudonymous Twitter user and blockchain investigator Officer’s Notes believes they may have been a suspect in the $195 million Euler Finance hack. In an April 4 Twitter thread, the security researcher stated, “Seems like I was a suspect in this case, as usual.”

The Euler team has denied that Officer's Notes was a suspect, claiming instead that the researcher was helpful in the investigation.

Officer’s Notes, also known as Officer_cia, is a security researcher, blogger, and auditor for blockchain security firm Pessimistic, according to the user’s Twitter bio. Their blog posts are featured on Pessimistic’s official website and contain in-depth explanations of crypto security topics. They also maintain the Crypto Op Sec Self Guard GitHub repo, which features privacy tools for crypto users.

In their Twitter thread, Officer’s Notes stated that the Euler team woke them up “in the middle of the night,” asking for access data logs from the Op Sec repo, including IP addresses of people who have visited it. Officer's Notes complied with the request after being told “This data was crucial in the investigation.”

Officer’s Notes expressed remorse for handing out this information, seeing it as a violation of readers’ privacy:

So if you've ever interacted with my repositories, I hope you've done it under a VPN. I have no way of knowing what will happen to that data. I’m sorry.

The blogger stated they might have been seen as a suspect in the Euler hacking case but protested the notion because they were too busy to commit any such crime: 

“Really, if I wanted to hack the protocol, would I be in my third year of blogging and working? Please think about it. I'm glad you like my nickname, but you can't exaggerate jokes like that.”

Related: Sentiment recovers $870K after negotiations with hacker

In a conversation with Cointelegraph, a representative from Euler stated that Officer’s Notes was never a suspect and that the team later thanked them for their help with the case:

“The investigation reached out to Officer CIA for help at a point when it believed some of his security tools were being used by the attacker to avoid detection. At no point was he believed by anyone at Euler to have played a part in the exploit. He was later thanked for the help he gave, even though he had been inadvertently left off the initial communications list.”

Euler Finance was the victim of a flash loan exploit on March 13. Over $195 million worth of crypto was stolen in the attack. On March 20, the attacker attempted to open negotiations with the Euler team to return the stolen funds. On March 18, they posted an apology letter to the Ethereum network saying, “I didn’t want to, but I messed with others’ money, others’ jobs, others’ lives […] I’m sorry."

Euler exploiter’s publicly posted apology. Source: Ethereum transaction hash.

The attacker returned all of the recoverable funds by April 4.

Is XRP price going to crash again?