Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesCopyBotsEarn

Pump.fun was stolen in the early morning, a brief account of the incident

BlockBeats2024/05/17 03:14
By:BlockBeats
Original author: Charlemagne, crypto KOL
Original translation: Crypto Wei, AC Capital partner


Pump theft incident lazy package, thanks to @0x_charlemagne for his wonderful analysis of the cause of the accident, translated here and added my personal speculation.


How did the attack work?


First of all, the attacker @STACCoverflow is not a great hacker, but a former employee of @pumpdotfun. He has the wallet account that Pump uses to create each Tugou Raydium trading pair, which we call the "hacked account". And all the Bonding Curve LP pots created on Pump before they meet the Raydium standard are called "preparatory accounts".


The attacker borrowed a flash loan from @marginfi to fill all the pools that had been created but not filled to the state of being listed on Raydium. Originally, the operation that would happen at this time was that the $Sol originally in the virtual pool's "preparatory account" would be transferred to this "hacked account" because it met the standards for listing on Raydium. But at this time, the attacker withdrew the transferred $Sol, making these memecoins that should have been listed on Raydium and locked in the pool unable to be listed on Raydium (because the pool had no money)


So, whose money did the attacker hack?


In response to this, @0x_charlemagne explained:


First of all, it was definitely not @marginfi's. Because the flash loan money is returned in the same block, its purpose is only to trigger the operation of transferring money from the reserve account to the hacked account, so there will be no loss.


Secondly, the local dogs that have been sent to Raydium in the past should not be affected because the LP has been locked (personal speculation)


The unlucky ones should be the users who bought in all the unfilled pools in the entire Pump before this attack, and their $Sol was transferred away by the above attack. This also explains why the loss may be as much as $80M (Note: According to the latest information, the loss amount is about 2 million US dollars).


Why does the attacker have the private key of this "hacked account"?


First of all, it must be the improper management of the team. There is no way to wash it off, just like the patriotic network development general of North Korea in Blast.


Secondly, we can guess that filling the pool may be one of the attacker's previous jobs. Just like when Friendtech V1 was launched last year, there were a large number of robots rushing to buy your key. In the first few days, it was probably the official one, which played the role of market making for the key and guiding the initial heat.


It can be boldly speculated that at that time, in order to do the initial cold start, Pump asked the attacker to use the project's own money to fill the pool of coins issued (most of them are probably issued by themselves, such as $test $alon) and let them go to Raydium and then pull the market to create attention. It's just that I didn't expect that it would become the key of the insider in the end.


Lessons learned


First of all, copycats must pay attention, don't be stupid and just copy the fur, meaning that people will come to trade after the product is made and put it there. You have to provide an initial push for mutual assistance.


Then you must do a good job of permission management and pay attention to security.


Original link


欢迎加入律动 BlockBeats 官方社群:

Telegram 订阅群: https://t.me/theblockbeats

Telegram 交流群: https://t.me/BlockBeats_App

Twitter 官方账号: https://twitter.com/BlockBeatsAsia

0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

You may also like

UwU Lend offers a $5 million bounty to whoever catches its exploiter

Quick Take UwU Lend has established a bounty worth $5 million in ETH for “the first person to identify and locate” the exploiter. The protocol had offered to let the exploiter keep 20% of the stolen funds if they returned the remaining 80%, which the culprit did not do.

The Block2024/06/13 21:04

These Altcoin Projects Have Raised the Most Capital in 2024

BeInCrypto2024/06/13 20:58

Manta Foundation launches $50m ecosystem fund

Share link:In this post: Manta Foundation has announced a $50 million fund to accelerate growth in the Manta Network ecosystem. The EcoFund will prioritize projects that exhibit high growth potential. The initiative will span DeFi, DePin, NFTs, meme-coins, gaming, and ZK technology.Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consulta

Cryptopolitan2024/06/13 20:52

Meta Plans to Lay Off 50 VPs in Cost-Cutting Move to Boost Efficiency

Newscrypto2024/06/13 20:52

‌Spot copy trading

More
AIOnline
AIOnline
insight1000/1000
9735.71%
ROI
Total profit $49652.13
WhaleGo_YouTube
WhaleGo_YouTube
insight500/500
1307.14%
ROI
Total profit $3795.46

Bot copy trading

More
BGUSER-FFF8CNJ4
BGUSER-FFF8CNJ4
insight9/150
$6287.64
Total profit
Total subscriber profits $38.92
CJM
CJM
insight2/150
$5880.65
Total profit
Total subscriber profits $0