Hacker makes off with $60 million in cryptocurrency

Attacker stole millions in Ether by exploiting flaws in 'smart contracts'

Hacking on keyboard

Hackers have made off with $60 million in cryptocurrency Ether, by exploiting a flaw in an investment collective's contract software.

The DAO - or Decentralised Autonomous Organisation - uses code-based 'smart contracts' to pay for goods and services. A flaw in the code left it open to a "recursive calling vulnerability", meaning the attacker initiated the payment transfer process many times within a single contract.

The co-founder of Ethereum - the blockchain platform that the money was stolen from - Vitalik Buterin has reassured users that the Ethereum platform itself is secure, stating that "miners and mining pools should resume allowing transactions as normal," and "exchanges should feel safe in resuming trading ETH".

Additionally, a software fork has been proposed that would prevent the funds from being used by the attacker while efforts are made to reclaim them.

However, while he advised that "DAO token holders and Ethereum users should sit tight and remain calm", he also urged contract authors to be wary of such bugs going forward.

The bug that allowed the thief to make off with the money was not a zero-day. In fact, it had been known about for some time.

Ethereum's former CCO Stephan Tual published a blog post in 12 June, stating that the problem had been identified and fixed. "This is NOT an issue that is putting any DAO funds at risk today," he wrote.

In another post following the attack, he reaffirmed his faith that the community would come together in order to fight the theft.

"Word to the wise, he said; "these attackers would do well to understand that all exchanges are currently cross referencing shorts information from the last 2 weeks, which could they could very well be traced and prosecuted".

Featured Resources

BCDR buyer's guide for MSPs

How to choose a business continuity and disaster recovery solution

Download now

The definitive guide to IT security

Protecting your MSP and your customers

Download now

Cost of a data breach report 2020

Find out what factors help mitigate breach costs

Download now

The complete guide to changing your phone system provider

Optimise your phone system for better business results

Download now

Recommended

TsuNAME vulnerability could enable DDoS attacks on major DNS servers
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

7 May 2021
Security researchers take control of a Tesla via drone
ethical hacking

Security researchers take control of a Tesla via drone

5 May 2021
New report highlights the need for diversity in cyber security recruitment
cyber security

New report highlights the need for diversity in cyber security recruitment

28 Apr 2021
Hackers could abuse legitimate Windows AD FS to steal data
Microsoft Windows

Hackers could abuse legitimate Windows AD FS to steal data

28 Apr 2021

Most Popular

KPMG offers staff 'four-day fortnight' in hybrid work plans
flexible working

KPMG offers staff 'four-day fortnight' in hybrid work plans

6 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

5 May 2021
16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

29 Apr 2021