EraLend, a decentralized lending protocol working on the zkSync Layer 2, has fallen sufferer to an exploit leading to a lack of $3.4 million. The assault was confirmed by safety analysts at BlockSec, who’ve been aiding the protocol in addressing the difficulty.
Following the assault, EraLend issued a statement acknowledging the safety incident and assuring its customers that the risk had been contained. The protocol has suspended all borrowing operations and suggested customers in opposition to depositing USDC till additional discover.
Re-Entrancy Assault Strikes EraLend
Based on BlockSec, the assault was a read-only re-entrancy assault. This assault includes a malicious actor repeatedly getting into and exiting a contract operate to govern the contract’s state and withdraw funds.
A reentrancy assault is an exploit that may happen in good contracts, that are self-executing pc packages that run on decentralized blockchain networks like Ethereum.
In a reentrancy assault, a malicious person exploits a vulnerability in a wise contract by repeatedly calling a operate inside the contract earlier than the earlier operate name has been accomplished, permitting them to govern the contract’s state and doubtlessly steal funds.
When a wise contract operate is named, the contract’s state is up to date earlier than the operate name is accomplished. Suppose the referred to as operate interacts with a second contract earlier than the primary operate name is accomplished. In that case, the second contract can name again into the primary contract’s operate, doubtlessly altering the contract’s state a number of occasions earlier than the unique operate name completes.
This will permit an attacker to govern the contract’s state and steal funds.
To forestall reentrancy assaults, builders can use a method referred to as “checks-effects-interactions.” Which means that a wise contract ought to at all times examine all of the inputs and circumstances earlier than executing any state adjustments, after which execute all state adjustments earlier than interacting with another contracts.
This ensures the contract’s state is up to date earlier than exterior interactions happen, stopping reentrancy assaults. On this case, the attacker exploited a vulnerability in EraLend’s contract code that repeatedly allowed them to withdraw funds with out the protocol’s data.
EraLend has recognized the foundation explanation for the assault and is working with companions and cybersecurity companies to handle the difficulty. The protocol has assured customers that it’s going to take all vital steps to mitigate the assault’s affect and stop comparable incidents from occurring sooner or later.
Whereas there have been no additional updates, it’s clear that EraLend is dedicated to sustaining the best safety requirements and taking proactive measures to safeguard its customers’ funds and knowledge.
Featured picture from Unsplash, chart from TradingView.com