<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=VETH_VirtualToken_Lending_Mechanism_Price_Logic_Error</id>
	<title>VETH VirtualToken Lending Mechanism Price Logic Error - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?action=history&amp;feed=atom&amp;title=VETH_VirtualToken_Lending_Mechanism_Price_Logic_Error"/>
	<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=VETH_VirtualToken_Lending_Mechanism_Price_Logic_Error&amp;action=history"/>
	<updated>2026-05-01T10:32:34Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.39.1</generator>
	<entry>
		<id>https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=VETH_VirtualToken_Lending_Mechanism_Price_Logic_Error&amp;diff=6398&amp;oldid=prev</id>
		<title>Azoundria: Created page with &quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/vethvirtualtokenlendingmechanismpricelogicerror.php}} {{Unattributed Sources}}  Ethereum FoundationvETH is lending contract token with a loan control mechanism which is part of an unknown project on Ethereum. On November 14th, the smart contract was exploited which allowed for cheaper minting of vETH tokens. There is no word on any intended recovery...&quot;</title>
		<link rel="alternate" type="text/html" href="https://quadrigainitiative.com/cryptocurrencyhackscamfraudwiki/index.php?title=VETH_VirtualToken_Lending_Mechanism_Price_Logic_Error&amp;diff=6398&amp;oldid=prev"/>
		<updated>2024-12-20T18:04:18Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/vethvirtualtokenlendingmechanismpricelogicerror.php}} {{Unattributed Sources}}  &lt;a href=&quot;/cryptocurrencyhackscamfraudwiki/index.php?title=File:Ethereumfoundation.jpg&quot; title=&quot;File:Ethereumfoundation.jpg&quot;&gt;thumb|Ethereum Foundationv&lt;/a&gt;ETH is lending contract token with a loan control mechanism which is part of an unknown project on Ethereum. On November 14th, the smart contract was exploited which allowed for cheaper minting of vETH tokens. There is no word on any intended recovery...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;{{Imported Case Study With About|source=https://www.quadrigainitiative.com/casestudy/vethvirtualtokenlendingmechanismpricelogicerror.php}}&lt;br /&gt;
{{Unattributed Sources}}&lt;br /&gt;
&lt;br /&gt;
[[File:Ethereumfoundation.jpg|thumb|Ethereum Foundation]]vETH is lending contract token with a loan control mechanism which is part of an unknown project on Ethereum. On November 14th, the smart contract was exploited which allowed for cheaper minting of vETH tokens. There is no word on any intended recovery of the funds or reimbursment for affected users.&amp;lt;ref name=&amp;quot;slowmistteamtwitter-17008&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscan-17009&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscan-17010&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscan-17011&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;coinmonksmedium-17012&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscan-17013&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;chaincatcher-17014&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;peckshieldalerttwitter-17015&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;surferstevetwitter-17016&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;etherscan-17017&amp;quot; /&amp;gt;&amp;lt;ref name=&amp;quot;solidityscanblog-17018&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== About VirtualToken ==&lt;br /&gt;
&amp;quot;The vETH token (VirtualToken) is an ERC-20 token designed to facilitate token lending, wrapping, and unwrapping functionalities. It features a controlled loan mechanism, allowing only authorized factory contracts to call its takeLoanfunction and manage user debt. The token also integrates access control through a whitelist and factory mechanism, ensuring that interactions are limited to approved entities.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== The Reality ==&lt;br /&gt;
This sections is included if a case involved deception or information that was unknown at the time. Examples include:&lt;br /&gt;
&lt;br /&gt;
* When the service was actually started (if different than the &amp;quot;official story&amp;quot;).&lt;br /&gt;
* Who actually ran a service and their own personal history.&lt;br /&gt;
* How the service was structured behind the scenes. (For example, there was no &amp;quot;trading bot&amp;quot;.)&lt;br /&gt;
* Details of what audits reported and how vulnerabilities were missed during auditing.&lt;br /&gt;
&lt;br /&gt;
== What Happened ==&lt;br /&gt;
&amp;quot;The vETH token suffered an attack, resulting in approximately $450K in losses.&amp;quot; &amp;quot;On November 14, 2024, the vETH token was exploited due to a business logic error in its lending mechanism. This exploit resulted in a loss of approximately $450k USD.&amp;quot;&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|+Key Event Timeline - vETH VirtualToken Lending Mechanism Price Logic Error&lt;br /&gt;
!Date&lt;br /&gt;
!Event&lt;br /&gt;
!Description&lt;br /&gt;
|-&lt;br /&gt;
|October 27th, 2024 3:08:11 AM MDT&lt;br /&gt;
|VirtualToken Created&lt;br /&gt;
|The VirtualToken smart contract is first created/launched on the Ethereum smart chain.&lt;br /&gt;
|-&lt;br /&gt;
|November 14th, 2024 12:37:47 AM MST&lt;br /&gt;
|Loading Exploiter Wallet With Ethereum&lt;br /&gt;
|Exploiter transfers some ethereum to their wallet for use with the exploit.&lt;br /&gt;
|-&lt;br /&gt;
|November 14th, 2024 1:35:47 AM MST&lt;br /&gt;
|Attack Transaction&lt;br /&gt;
|One of the attack transactions, according to Coinmonks.&lt;br /&gt;
|-&lt;br /&gt;
|November 14th, 2024 1:36:59 AM MST&lt;br /&gt;
|Attack Transaction&lt;br /&gt;
|One of the attack transactions, according to Coinmonks.&lt;br /&gt;
|-&lt;br /&gt;
|November 14th, 2024 1:39:23 AM MST&lt;br /&gt;
|Attack Transaction&lt;br /&gt;
|One of the attack transactions, according to Coinmonks.&lt;br /&gt;
|-&lt;br /&gt;
|November 14th, 2024 1:56:59 AM MST&lt;br /&gt;
|Exploit Transaction&lt;br /&gt;
|The price manipulation exploit occurs on the Ethereum smart chain.&lt;br /&gt;
|-&lt;br /&gt;
|November 14th, 2024 2:10:00 AM MST&lt;br /&gt;
|SlowMist Posts Tweet&lt;br /&gt;
|SlowMist posts a tweet about the suspicious activity on the vETH token/protocol.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== Technical Details ==&lt;br /&gt;
&amp;quot;The attack targeted interactions between the vETH token’s takeLoan function and a liquidity-adding function in the Factory contract, which manipulates the state of Uniswap pairs. The attacker leveraged this flaw to acquire vETH tokens without incurring the intended cost.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The root cause of the hack was a flawed interaction between the takeLoan function in the vETH contract and the liquidity-adding function in the Factory contract. This function allowed state manipulation of Uniswap pools, enabling the attacker to inflate the pool's constant product and mint vETH without proper cost.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
== Total Amount Lost ==&lt;br /&gt;
The total amount lost has been estimated at $450,000 USD.&lt;br /&gt;
&lt;br /&gt;
How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?&lt;br /&gt;
&lt;br /&gt;
== Immediate Reactions ==&lt;br /&gt;
How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?&lt;br /&gt;
&lt;br /&gt;
== Ultimate Outcome ==&lt;br /&gt;
What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?&lt;br /&gt;
&lt;br /&gt;
== Total Amount Recovered ==&lt;br /&gt;
There do not appear to have been any funds recovered in this case.&lt;br /&gt;
&lt;br /&gt;
What funds were recovered? What funds were reimbursed for those affected users?&lt;br /&gt;
&lt;br /&gt;
== Ongoing Developments ==&lt;br /&gt;
What parts of this case are still remaining to be concluded?&lt;br /&gt;
== Individual Prevention Policies ==&lt;br /&gt;
{{Prevention:Individuals:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Individuals:End}}&lt;br /&gt;
&lt;br /&gt;
== Platform Prevention Policies ==&lt;br /&gt;
{{Prevention:Platforms:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Platforms:End}}&lt;br /&gt;
&lt;br /&gt;
== Regulatory Prevention Policies ==&lt;br /&gt;
{{Prevention:Regulators:Placeholder}}&lt;br /&gt;
&lt;br /&gt;
{{Prevention:Regulators:End}}&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&amp;lt;references&amp;gt;&amp;lt;ref name=&amp;quot;slowmistteamtwitter-17008&amp;quot;&amp;gt;[https://twitter.com/SlowMist_Team/status/1856987988632457708 @SlowMist_Team Twitter] (Accessed Dec 13, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscan-17009&amp;quot;&amp;gt;[https://etherscan.io/tx/0x678d52842fb5dcc5246cff2e262182df0da22bb0f98880b0e47fb2adb2c41e4f Ethereum Transaction Hash (Txhash) Details | Etherscan] (Accessed Dec 13, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscan-17010&amp;quot;&amp;gt;[https://etherscan.io/tx/0x51e9313c1b2f44198a491939a23fd1c90d37f3ea1e4346268abc437497888144 Ethereum Transaction Hash (Txhash) Details | Etherscan] (Accessed Dec 13, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscan-17011&amp;quot;&amp;gt;[https://etherscan.io/tx/0x064e35562dc4bbf724ad50cdc6ab8dea5f1e055ce185f46667680cce2df81777 Ethereum Transaction Hash (Txhash) Details | Etherscan] (Accessed Dec 13, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;coinmonksmedium-17012&amp;quot;&amp;gt;[https://medium.com/coinmonks/decoding-veth-tokens-450k-exploit-3a2133166ab4 Decoding Veth Tokens 450k Exploit] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscan-17013&amp;quot;&amp;gt;[https://etherscan.io/tx/0x900891b4540cac8443d6802a08a7a0562b5320444aa6d8eed19705ea6fb9710b Ethereum Transaction Hash (Txhash) Details | Etherscan] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;chaincatcher-17014&amp;quot;&amp;gt;[https://www.chaincatcher.com/en/article/2152017 Slow Fog: Suspicious activity related to vETH detected, users remain vigilant - ChainCatcher] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;peckshieldalerttwitter-17015&amp;quot;&amp;gt;[https://twitter.com/PeckShieldAlert/status/1856992380034945071 @PeckShieldAlert Twitter] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;surferstevetwitter-17016&amp;quot;&amp;gt;[https://twitter.com/surfer_steve_/status/1855628598348075146 @surfer_steve_ Twitter] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;etherscan-17017&amp;quot;&amp;gt;[https://etherscan.io/token/0x280a8955a11fcd81d72ba1f99d265a48ce39ac2e ERC-20: vETH (vETH) Token Tracker | Etherscan] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ref name=&amp;quot;solidityscanblog-17018&amp;quot;&amp;gt;[https://blog.solidityscan.com/veth-token-hack-analysis-828f6b8f5fd7 vETH Token Hack Analysis. Overview: | by Shashank | Nov, 2024 | SolidityScan] (Accessed Dec 16, 2024)&amp;lt;/ref&amp;gt;&amp;lt;/references&amp;gt;&lt;/div&gt;</summary>
		<author><name>Azoundria</name></author>
	</entry>
</feed>