...
Write
OneWriteup
  • Login
  • Register
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
  • Trending
  • Articles
  • Blog
  • Tutorials
  • News
  • Research
  • Top 10 Lists
  • Case Studies
  • Writeup
  • Interviews
  • Personal Stories
  • Infographics
No Result
View All Result
OneWriteup
No Result
View All Result

How WazirX Was Hacked by Lazarus Group? – Complete Case Study

FOUNDER by FOUNDER
July 25, 2024
Reading Time: 6 mins read
14
0
How Wazirx Was Hacked?
Share on FacebookShare on Twitter

How WazirX Was Hacked by Lazarus Group Due To Phishing Attack?

In one of the largest cryptocurrency hacks in India, WazirX, a prominent cryptocurrency exchange, faced a devastating security breach resulting in the theft of 50% of its user funds. On July 18, 2024, hackers infiltrated the exchange, making away with approximately $234 million worth of digital assets. This incident has sent shockwaves through the crypto community, highlighting significant vulnerabilities and the urgent need for enhanced security measures.

WazirX’s Proof of Reserve Report

In June, WazirX published its Proof of Reserve (PoR) report, showcasing a total holding of $503 million in various cryptocurrencies. The report aimed to reassure users about the exchange’s solvency and commitment to transparency. However, this recent hack has brought the adequacy and reliability of such reports into question, as nearly half of the reported reserves were compromised.

Specific Cryptocurrencies Affected

The hack predominantly targeted Ethereum (ETH) and Shiba Inu (SHIB) due to vulnerabilities in the associated smart contracts. These assets were quickly moved through decentralized finance (DeFi) protocols to avoid detection and seizure by centralized exchanges.

How the WazirX Hack Occurred

The hack unfolded over a period of 8-10 days, meticulously planned and executed by the attackers. They exploited a phishing contract during an upgrade to WazirX’s multi-sig wallet, which is designed to require multiple approvals for transactions, thereby providing an added layer of security. The attackers manipulated this system to bypass security checks and execute unauthorized transactions.

Initial Setup and Funding

  • Attacker’s Address: 0x6EeDF92Fb92Dd68a270c3205e96DCCc527728066
    • Funded with 5 transactions of 0.1 ETH each from Tornado Cash on Jul-10-2024 06:28:59 AM UTC.
  • Proxy Address: 0xab7f74fEbC2E13a7636c305794E1C0dDd9E0D779
    • Funded 16 minutes later with the same amount from Tornado Cash on Jul-10-2024 06:44:11 AM UTC.

Understanding Multi-Sig Wallets

Multi-signature (multi-sig) wallets are meant to enhance security by requiring multiple approvals for a transaction. WazirX’s wallet required six signatures, with three needed to approve any transaction, plus an additional final signature from Liminal services. This structure should theoretically prevent unauthorized access, yet it was compromised in this hack.

How Liminal Services Were Compromised

Liminal services, responsible for providing the final signature in WazirX’s multi-sig wallet, experienced a data mismatch. This discrepancy led to incorrect details being signed off, ultimately enabling the hack. The precise mechanism involved in this failure remains under investigation, but it underscores a critical lapse in the security protocol.

blockchain phishing

Execution of the Phishing Contract

The attackers utilized a phishing contract during the multi-sig wallet upgrade process. By sending small, seemingly innocuous transactions, they gathered legitimate signatures from WazirX and Liminal. This allowed them to change critical wallet data and execute large unauthorized transactions, siphoning off millions in cryptocurrency. Specifically, the attackers used the following methods:

  • execTransaction Method Exploit:
    • Method Signature: execTransaction(address to, uint256 value, bytes data, uint8 operation, uint256 safeTxGas, uint256 baseGas, uint256 gasPrice, address gasToken, address refundReceiver, bytes signatures)
    • Execution:
      0x804e1f0a
      000000000000000000000000ef279c2ab14960aa319008cbea384b9f8ac35fc6 // operation
      0000000000000000000000000000000000000000000000000000000000000081 // uint8 14 (operation)
      0000000000000000000000000000000000000000000000000000000000000005 // safeTxGas uint256
      0000000000000000000000000000000000000000000000000000000000000006 // baseGas uint256
      0000000000000000000000000000000000000000000000000000000000000007 // gasPrice uint256
      0000000000000000000000000000000000000000 // gasToken address
      0000000000000000000000000000000000000000 // refundReceiver address
      0000000000000000000000000000000000000000000000000000000000000000 // signatures bytes
  • Second Transaction Execution:
    • Method: 0x2d8a122e
    • Input Data:
      0x2d8a122e00000000000000000000000095ad61b0a150d79219dcf64e1e6cc01f0b64c4ce0000000000000000000000006eedf92fb92dd68a270c3205e96dccc527728066ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff

The North Korean Lazarus Group

The attack has been attributed to the North Korean Lazarus Group, a notorious hacking collective known for its involvement in numerous high-profile cyber heists. Their sophisticated methods and state-level protection make them a formidable adversary in the realm of cybersecurity.

Previous Hacks by the Lazarus Group

The Lazarus Group has a storied history of high-value cyber thefts, including:

  • Infinity Game Hack: $600 million stolen.
  • Harmony Horizon Hack: $100 million stolen.
  • Atomic Wallet Hack: $100 million stolen.

Their involvement in the WazirX hack adds another chapter to their extensive record of cybercrime.

Security Negligence by WazirX

WazirX’s failure to detect the breach for over a week points to significant security shortcomings. The exchange’s reliance on a single security service, inadequate monitoring, and insufficient contingency planning contributed to the success of the hack. Specific areas of negligence include:

  • Lack of Real-Time Monitoring: No real-time alerts for unusual transaction patterns.
  • Single Point of Failure: Reliance on Liminal for the final signature without adequate cross-checks.
  • Inadequate Audit Practices: Failure to conduct thorough security audits and stress tests on multi-sig wallets.

wazirx 230M $ hack

User Funds and Impact on Users

The immediate impact on users has been severe, with many losing significant portions of their crypto holdings. The emotional and financial toll on users cannot be overstated, as trust in the exchange has been fundamentally shaken.

Steps for Fund Recovery

Recovering the stolen funds poses a complex challenge. Potential measures include:

  • Blockchain Analysis: Tracking the movement of stolen assets through blockchain forensics.
  • Legal Action: Pursuing legal channels to hold the perpetrators accountable.
  • Collaborations with Other Exchanges: Freezing funds moved to other platforms to prevent further laundering.

WazirX’s Response to the Hack

WazirX has issued statements blaming the breach on Liminal’s security failure. However, the exchange must take responsibility for its own security lapses and provide clear communication and support to affected users. Key steps in their response include:

  • Strengthening Security Protocols: Implementing more robust multi-sig protocols and enhancing internal security measures.
  • User Compensation: Developing a plan to compensate users for their losses.
  • Transparent Communication: Keeping users informed about ongoing recovery efforts and security improvements.

Lessons for Other Exchanges

This incident serves as a stark reminder for all cryptocurrency exchanges about the critical importance of robust security measures. Regular audits, diversified security services, and prompt response protocols are essential to safeguard user funds. Exchanges should consider:

  • Diversified Security Services: Avoiding reliance on a single provider for critical security functions.
  • Enhanced Monitoring: Implementing real-time monitoring and anomaly detection systems.
  • Regular Audits: Conducting frequent, comprehensive security audits to identify and mitigate vulnerabilities.

Protecting Your Crypto Assets

Given the inherent risks associated with centralized exchanges, users are increasingly considering self-custody options. Hardware wallets, cold storage solutions, and personal multi-sig wallets offer higher security by reducing reliance on third-party services. Best practices for users include:

  • Using Hardware Wallets: Storing assets in hardware wallets to minimize online exposure.
  • Cold Storage Solutions: Keeping a significant portion of holdings in cold storage.
  • Personal Multi-Sig Wallets: Setting up personal multi-sig wallets to enhance security.

Future Security Measures for WazirX

In the wake of the hack, WazirX must implement comprehensive security enhancements, including:

  • Enhanced Multi-Sig Protocols: Strengthening multi-sig wallet security with additional verification steps.
  • Regular Security Audits: Conducting frequent, rigorous security reviews to ensure all systems are secure.
  • User Education: Providing users with information on best security practices and how to protect their assets.

 

 

 

FAQs

What exactly happened in the WazirX hack? The WazirX hack involved the theft of approximately $234 million worth of cryptocurrency through a compromised multi-sig wallet, exploited by the North Korean Lazarus Group.

ADVERTISEMENT

How did the hackers manage to compromise WazirX’s multi-sig wallet? The hackers utilized a phishing contract during an upgrade to the multi-sig wallet, sending small transactions to gather legitimate signatures and eventually manipulate wallet data to execute unauthorized transactions.

Who is responsible for the hack? The hack has been attributed to the North Korean Lazarus Group. Both WazirX and Liminal services share responsibility due to security lapses and failure to detect the breach in a timely manner.

What are multi-sig wallets, and how do they work? Multi-sig wallets require multiple approvals for a transaction to be executed, providing an added layer of security. In the case of WazirX, six signatures were required, with three needed to approve any transaction and an additional final signature from Liminal services.

Can stolen funds be recovered? Recovering stolen funds is challenging but not impossible. Measures such as blockchain analysis, legal action, and collaboration with other exchanges may help in tracking and potentially recovering the assets.

What steps should users take to protect their crypto assets? Users should consider self-custody options, such as hardware wallets and cold storage, to reduce reliance on centralized exchanges. Regularly updating security practices and being vigilant against phishing attempts are also crucial.

ADVERTISEMENT
FOUNDER

FOUNDER

Cybersecurity aficionado committed to disseminating expertise, crafting articles that empower others to resolve errors and fortify online defenses with ease.

Recently Posted

HOW To BECOME AN ETHICAL HACKER ROADMAP

Free Cybersecurity Roadmap for Ethical Hacking Career in 2025

November 15, 2024
736
What is As-Rep Roasting attack in Active Directory and How does it work?

What is As-Rep Roasting attack in Active Directory and How does it work?

October 16, 2024
174
What is Access Control List (ACL) and How to exploit it in Active Directory?

What is Access Control List (ACL) and How to exploit it in Active Directory?

October 13, 2024
175
Understanding Cyberbullying in 2024:  Issues, causes and Precaution

Understanding Cyberbullying in 2024: Issues, causes and Precaution

October 9, 2024
182
Load More

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Recommended

onewriteup.com

How to Configure OpenVPN Server for Multi Clients Setup in Windows?

August 20, 2024
212
100 Most Asked Soc Analyst Interview Questions For Freshers

100 Most Asked SOC Analyst Interview Questions For Freshers

August 19, 2024
550

Popular Story

  • Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    Download the Top 100 Free Cybersecurity Courses, Resources, and Study Materials for 2024

    820 shares
    Share 328 Tweet 205
  • How To Setup Cybersecurity HomeLab for Red Team and Blue Team?

    161 shares
    Share 64 Tweet 40
  • Termux Top 10 Most Powerful Tools in 2024

    312 shares
    Share 125 Tweet 78
  • Top Cyber Security VAPT Interview Preparation Questions in 2024

    86 shares
    Share 34 Tweet 22
  • How to Download and Install Windows Server 2022 on VirtualBox?

    39 shares
    Share 16 Tweet 10
ADVERTISEMENT
OneWriteup

Discover expert cybersecurity articles, tutorials, and the latest trends to protect your digital world.

  • OneWriteup Labs
  • About Us
  • Feedback
  • Contact Us
  • Report
  • Privacy Policy
  • Community Guidelines
  • Terms Of Service

© 2024 OneWriteup

No Result
View All Result
  • Trending
  • Articles
  • News
  • Blog
  • Tutorials
  • Research
  • Top 10 Lists
  • Case Studies
  • Interviews
  • Login
  • Sign Up

© 2024 OneWriteup

Welcome Back!

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Fill the forms below to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Seraphinite AcceleratorOptimized by Seraphinite Accelerator
Turns on site high speed to be attractive for people and search engines.