Cellframe Network suffered a flash loan attack, with hackers profiting $76,000.

robot
Abstract generation in progress

Cellframe Network Flash Loan Attack Incident Analysis

On June 1, 2023, at 10:07:55 (UTC+8), Cellframe Network was attacked by hackers on a certain smart chain due to a token quantity calculation issue during the liquidity migration process. This attack resulted in hackers profiting approximately $76,112.

Web3 Security | Analysis of the attack incident on Cellframe Network due to Flash Loans manipulation of pool ratios

Reasons and Process of the Attack

The root cause of the attack lies in the calculation issues during the liquidity migration process. The hacker cleverly exploited the vulnerabilities in the token quantity calculations by manipulating the Flash Loans feature and the liquidity pool.

The attack process is as follows:

  1. The hacker first obtains a large amount of BNB and New Cell tokens through Flash Loans.
  2. Exchange all New Cell tokens for BNB, causing the amount of BNB in the pool to approach zero.
  3. Exchange a large amount of BNB for Old Cell tokens.
  4. Before the attack, the hacker added liquidity for Old Cell and BNB, acquiring Old lp.
  5. Call the liquidity migration function, at this point there is almost no BNB in the new pool, and almost no Old Cell tokens in the old pool.
  6. The migration process involves removing old liquidity and adding new liquidity according to the new pool ratio.
  7. Due to the imbalance in the proportion of tokens in the pool, hackers can obtain a large amount of liquidity with a minimal amount of BNB and New Cell tokens.
  8. Finally, the hacker removes the liquidity from the new pool and exchanges the acquired Old Cell tokens for BNB, completing the profit.

Web3 Security | Cellframe Network was attacked due to flash loan manipulation of pool ratios

Web3 Security | Cellframe Network Analyzes Attack Event Caused by Flash Loan Manipulation of Pool Proportions

Web3 Security | Analysis of the Attack Incident on Cellframe Network Due to Flash Loans Manipulating Pool Ratios

Web3 Security | Cellframe Network Analyzed Incident of Flash Loans Manipulating Pool Ratio

Security Recommendations

To prevent similar attacks, the project team should:

  1. Consider the changes in the quantity of the two tokens in the old and new pools comprehensively.
  2. Consider the current token price, rather than solely relying on the quantity of the two tokens in the trading pair for calculation.
  3. Conduct a comprehensive security audit before the code goes live.

This incident once again emphasizes the importance of strict security measures and comprehensive code audits in DeFi projects, particularly when it involves complex liquidity operations.

Web3 Security | Analysis of the Attack Incident on Cellframe Network Due to Flash Loans Manipulating Pool Ratios

CELL3.06%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 6
  • Repost
  • Share
Comment
0/400
LightningAllInHerovip
· 18h ago
Aha, the lightning attack only earns this little, not enough to fill the gaps in my teeth.
View OriginalReply0
AltcoinHuntervip
· 08-12 09:28
Copying homework, huh? The hacker is very skilled at this operation.
View OriginalReply0
ChainDoctorvip
· 08-10 06:32
Expert talks about DeFi vulnerabilities and often provides various professional analyses

Leave a comment in Chinese
View OriginalReply0
StealthDeployervip
· 08-10 06:32
Another fattening suckers pool...
View OriginalReply0
PumpDoctrinevip
· 08-10 06:30
Another company fails to meet safety standards.
View OriginalReply0
MetaEggplantvip
· 08-10 06:16
Again attacked... speechless fam
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)