LendfMe (DForce) DeFi Protocol Breached

From Quadriga Initiative Cryptocurrency Hacks, Scams, and Frauds Repository
Jump to navigation Jump to search

Notice: This page is a freshly imported case study from the original repository. The original content was in a different format, and may not have relevant information for all sections. Please help restructure the content by moving information from the 'About' and 'General Prevention' sections to other sections, and add any missing information or sources you can find. If you are new here, please read General Tutorial on Wikis or Anatomy of a Case Study for help getting started.

Notice: This page contains sources which are not attributed to any text. The unattributed sources follow the initial description. Please assist by visiting each source, reviewing the content, and placing that reference next to any text it can be used to support. Feel free to add any information that you come across which isn't present already. Sources which don't contain any relevant information can be removed. Broken links can be replaced with versions from the Internet Archive. See General Tutorial on Wikis, Anatomy of a Case Study, and/or Citing Your Sources Guide for additional information. Thanks for your help!

Dforce/LendFMe

This is another exploit where one contract is run within another, enabling balances to be reduced before they are checked. This exploit was known since July of 2019, and never patched or investigated. It's part of the illustration of why smart contracts still have risks and exploits associated. In this case, we are lucky because the hacker gave the funds back after their identity was revealed through accidentally exposing their IP address.

This is a global/international case not involving a specific country.[1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][20][21][22][23][24][25][26][27][28][29][30][31]

About Dforce/LendFMe

"dForce is an integrated and interoperable platform of opening finance protocols, building a full stack DeFi protocols and creating an interconnected, interdependent protocol ecosystem." "Unlike most DeFi platforms focusing on a specific feature, dForce presents a full stack of DeFi protocols covering stablecoins, lending markets, derivative markets, liquidity protocol and oracles etc. We believe that stable-assets and financial protocols are inter-connected and should be interoperable with strong synergies. dForce centers around providing a variety of use cases for stable-assets, allowing them to transact across the network with increased liquidity stickiness and solidified network effect, and ultimately, growth potential will be captured by the dForce token (DF)."

"The wait is over! dForce is thrilled to announce our support for bringing BTC into our DeFi lending platform and the first move is to support imBTC in Lendf.Me."

"[A l]eading Chinese DeFi protocol has lost 99.95% of locked funds." "DForce DeFi Protocol was recently hacked and up to $25 million of customers’ crypto in Bitcoin and Ethereum was lost due to an entirely-known exploit that exists on an ETH token." "Compound CEO Robert Leshner claimed the attacker seized the full total." "Mindao Yang, the CEO of dForce, confirmed the attack on the project’s Telegram channel" "[T]he total value locked (in USD) in dForce, was reduced from around $25 million to almost nothing in a matter of hours." "DeFi Rate said that the vulnerability is not new since it resembles the 2016 attack on The DAO." "dForce has remained conspicuously quiet about the hacking on all their social medial channels." "On-chain data reveals that the attacker has transferred the assets to two other platforms, namely, Compound and Aave." "Returning the money to the owners is challenging since Aave is a decentralized finance platform." "The attack is believed to have targeted a vulnerability inherent to Ethereum’s (ETH) ERC-777 token standard." "DForce’s devastating attack comes less than one week after crypto venture capital firm, Multicoin Capital, announced it had led the DeFi protocol’s $1.5 million seed round." "According to investigators, hackers appear to have chained together bugs and legitimate features from different blockchain technologies to orchestrate a sophisticated "reentrancy attack."" "[T]he combination of using ERC777 tokens and Uniswap/Lendf.Me contracts enables [...] reentrancy attacks," "[Hackers] used the exploit against Uniswap first, and then used it again the next day against Lendf.me, with better results, draining about 99.5% of the platform's funds in the process."

"[DForce] learned of the attack at 9:15 am (UTC+8) through our internal monitoring system. Immediately following, we temporarily paused Lendf.Me and USDx and pulled down the website to investigate the attack and assess the situation."

"The hacker(s) attempted to contact [DForce]." "[DForce] contacted law enforcement in several jurisdictions, reached out to asset issuers and exchanges to track down and blacklist the hacker(s)’s addresses, and engaged [their] legal teams."

"Hackers have returned the stolen funds after leaking their IP address during the attack." "Over 90% of assets have been distributed to users in less than 24 hours. 100% users have been made whole in the recovery."

This is a global/international case not involving a specific country.

The background of the exchange platform, service, or individuals involved, as it would have been seen or understood at the time of the events.

Include:

  • Known history of when and how the service was started.
  • What problems does the company or service claim to solve?
  • What marketing materials were used by the firm or business?
  • Audits performed, and excerpts that may have been included.
  • Business registration documents shown (fake or legitimate).
  • How were people recruited to participate?
  • Public warnings and announcements prior to the event.

Don't Include:

  • Any wording which directly states or implies that the business is/was illegitimate, or that a vulnerability existed.
  • Anything that wasn't reasonably knowable at the time of the event.

There could be more than one section here. If the same platform is involved with multiple incidents, then it can be linked to a main article page.

The Reality

This sections is included if a case involved deception or information that was unknown at the time. Examples include:

  • When the service was actually started (if different than the "official story").
  • Who actually ran a service and their own personal history.
  • How the service was structured behind the scenes. (For example, there was no "trading bot".)
  • Details of what audits reported and how vulnerabilities were missed during auditing.

What Happened

The specific events of the loss and how it came about. What actually happened to cause the loss and some of the events leading up to it.

Key Event Timeline - LendfMe (DForce) DeFi Protocol Breached
Date Event Description
April 19th, 2020 Main Event Expand this into a brief description of what happened and the impact. If multiple lines are necessary, add them here.

Technical Details

This section includes specific detailed technical analysis of any security breaches which happened. What specific software vulnerabilities contributed to the problem and how were they exploited?

Total Amount Lost

The total amount lost has been estimated at $25,000,000 USD.

How much was lost and how was it calculated? If there are conflicting reports, which are accurate and where does the discrepancy lie?

Immediate Reactions

How did the various parties involved (firm, platform, management, and/or affected individual(s)) deal with the events? Were services shut down? Were announcements made? Were groups formed?

Ultimate Outcome

What was the end result? Was any investigation done? Were any individuals prosecuted? Was there a lawsuit? Was any tracing done?

Total Amount Recovered

The total amount recovered has been estimated at $25,000,000 USD.

What funds were recovered? What funds were reimbursed for those affected users?

Ongoing Developments

What parts of this case are still remaining to be concluded?

General Prevention Policies

This type of attack can be mitigated through hot wallet insurance. An exchange would make sure that they either have cold storage balances to cover a full breach of any smart contracts, or comprehensive insurance to protect investors.

Individual Prevention Policies

No specific policies for individual prevention have yet been identified in this case.

For the full list of how to protect your funds as an individual, check our Prevention Policies for Individuals guide.

Platform Prevention Policies

Policies for platforms to take to prevent this situation have not yet been selected in this case.

For the full list of how to protect your funds as a financial service, check our Prevention Policies for Platforms guide.

Regulatory Prevention Policies

No specific regulatory policies have yet been identified in this case.

For the full list of regulatory policies that can prevent loss, check our Prevention Policies for Regulators guide.

References

  1. DForce DeFi Protocol Breached, $25 Million in BTC and ETH Lost (Jun 10, 2020)
  2. Chinese DeFi Protocol dForce Reportedly Loses $25 Million Of Its Total Locked Value In An Attack (Jun 11, 2020)
  3. DForce Loses 99.95% of Funds in Latest Test of DeFi's Resilience (Jun 20, 2020)
  4. WooParadog on Twitter: "@Rewkang @tomhschmidt This is the same exploit, hacker... (Jun 21, 2020)
  5. Hackers steal $25 million worth of cryptocurrency from Lendf.me platform | ZDNet (Jun 21, 2020)
  6. GitHub - OpenZeppelin/exploit-uniswap: Exploiting a Uniswap exchange that uses an ERC777 token by leveraging the reentrant microtrading attack vector (Jun 21, 2020)
  7. dForce brings imBTC to DeFi Lending (Jun 21, 2020)
  8. Weekend Attack Drains Decentralized Protocol dForce of $25M in Crypto - CoinDesk (Jun 21, 2020)
  9. Andrew Kang on Twitter: "@dForcenet’s @LendfMe $20M money market pool currently under attack (Jun 21, 2020)
  10. Millions Lost: The Top 19 DeFi Cryptocurrency Hacks of 2020 | Crypto Briefing (May 22, 2021)
  11. CipherTrace Cryptocurrency Crime and Anti-Money Laundering Report 2020 (Jun 20, 2021)
  12. Crypto Whale Warns Of Growing DeFi Scams As Another Protocol Exits Market With Funds Worth $20M ⋆ ZyCrypto (Jun 13, 2021)
  13. SlowMist Hacked - SlowMist Zone (May 18, 2021)
  14. List of Ethereum Smart Contracts Post-Mortems - Security - OpenZeppelin Community (Jun 23, 2021)
  15. Uniswap Lendf Me Hacks Root Cause And Loss Analysis (Jun 22, 2021)
  16. @dForcenet Twitter (Jul 12, 2021)
  17. lendfme/ dForce protocol drained - largest DeFi hack so far ~ $10M : ethereum (Jul 12, 2021)
  18. A Summary Of The Attack On Lendf Me On April 19 2020 (Jul 12, 2021)
  19. Lendf Me Asset Recovery User Manual (Jul 12, 2021)
  20. Dforce Announces Support For Imbtc (Jul 12, 2021)
  21. Launch Of Multiple Asset Support Across Dforce Network (Jul 12, 2021)
  22. dForce首个社区项目Lendf.Me正式上线 - 知乎 (Jul 12, 2021)
  23. LendfMe · GitHub (Jul 12, 2021)
  24. Lendf.me exchange set to return funds following $25M hack - CoinGeek (Jul 12, 2021)
  25. Hackers just tapped China's dForce for $25 million in Ethereum exploit - Decrypt (Jul 12, 2021)
  26. Is DeFi Now Dead? Inside the dForce / LendfMe 25 Million USD Hack! | Hacker Noon (Jul 12, 2021)
  27. Blockchain Hacks: 2020 | $15 billion lost, how can we mitigate hacks in 2021? | CertiK Foundation Blog (Jul 23, 2021)
  28. Comprehensive List of DeFi Hacks & Exploits - CryptoSec (Jan 8, 2022)
  29. Multicoin Capital-backed DeFi protocol dForce loses ~$25M total locked value in an exploit (Jan 9, 2022)
  30. Timeline of Cyber Incidents Involving Financial Institutions - Carnegie Endowment for International Peace (Dec 12, 2022)
  31. Security Risks in Ethereum DeFi | ConsenSys Codefi (Nov 15, 2023)