Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the multisite-clone-duplicator domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
[www-stage.newsbtc.com/news/breaking-cowswap-loses-150000-in-an-exploit/amp/]
[wp-includes/functions.php:6114 trigger_error(), wp-includes/functions.php:6054 wp_trigger_error(), wp-includes/l10n.php:1370 _doing_it_wrong(), wp-includes/l10n.php:1408 _load_textdomain_just_in_time(), wp-includes/l10n.php:194 get_translations_for_domain(), wp-includes/l10n.php:306 translate(), wp-content/plugins/multisite-clone-duplicator/include/lang.php:6 __(), wp-content/plugins/multisite-clone-duplicator/multisite-clone-duplicator.php:32 require_once('wp-content/plugins/multisite-clone-duplicator/include/lang.php'), wp-settings.php:471 include_once('wp-content/plugins/multisite-clone-duplicator/multisite-clone-duplicator.php'), wp-config.php:53 require_once('wp-settings.php'), wp-load.php:50 require_once('wp-config.php'), wp-blog-header.php:13 require_once('wp-load.php'), index.php:17 require('wp-blog-header.php')]

Breaking: CoWSwap Loses $150,000 In An Exploit

Breaking: CoWSwap Loses $150,000 In Exploit

Hacking CoWSwap

[vc_row][vc_column][vc_column_text]CoWSwap has been hacked for $150,000, according to a statement endorsed by the DeFi protocol.

CoWSwap Hacked For $150,000

According to the team, hackers took advantage of a code flaw in CoWSwap’s settlement contract and made away with $150,000. The amount lost was from fees collected by the DeFi platform.

The good news is that the hack didn’t affect any of the protocol’s user funds.

COW Price on February 7| Source: TradingView

CoWSwap reiterated that though their settlement contract was impacted, the non-custodial nature of their operation means traders don’t have to “worry or revoke” transactions. They added that all trading activities are atomic, seemingly to reassure traders that the hack was contained.

Before this hack, CoWSwap has collected approximately $17.3 million in fees, data from Dune shows.

At present, CoWSwap says they are investigating the hack.

However, according to analysts’ breakdown, the hacker was specific. Notably, their target was CoWSwap’s settlement contract which stores fees collected by the protocol over the week. As a safety measure, the contract doesn’t interact with user funds. For access, the wallet owner must sign an order approving the transaction. Only then will the hacker gain entry to the user’s “limit-buy amount.”

CoWSwap aggregates prices from decentralized exchanges like Uniswap and other aggregators on Gnosis Protocol v2. Orders are settled peer-to-peer or from on-chain liquidity sources for higher liquidity and protection against Maximal Extractable Value (MEV) attacks via batching, where transaction ordering becomes irrelevant. 

MEV attacks can be via sandwiching and front-running. It is common in account-based blockchains like Ethereum and the BNB Smart Chain.

CoWSwap Joins The Creative Alliance

The hack comes hours after CoWSwap joined other DeFi protocols, including Balancer, Yearn Finance, and MakerDAO, in a creative campaign to point out the advantages of DeFi. Participants would share each other’s tweets.

Draper, Yearn’s chief marketing officer (CMO), said the campaign celebrates DeFi, adding that:

There is something special happening in Decentralized Finance. This campaign celebrates what makes DeFi different from the systems it seeks to replace – executed in a way that could only work in this space. We hope it will serve as yet another reminder that, in the wake of CeFi blow-ups, DeFi stands apart through its technological composability and shared values.

Feature image from Flickr, chart from TradingView

[/vc_column_text][/vc_column][/vc_row]

Exit mobile version