{"id":22923,"date":"2022-08-24T14:26:53","date_gmt":"2022-08-24T08:56:53","guid":{"rendered":"https:\/\/coinswitch.co\/switch\/?p=22923"},"modified":"2024-01-29T18:41:05","modified_gmt":"2024-01-29T13:11:05","slug":"near-protocol-thwarts-hacking-attempt","status":"publish","type":"post","link":"https:\/\/coinswitch.co\/switch\/crypto\/near-protocol-thwarts-hacking-attempt\/","title":{"rendered":"Near Protocol thwarts another hacking attempt; hackers pay"},"content":{"rendered":"<p>In a space where cross-bridge attacks are common and hackers often get away with no penalty, here\u2019s news of a victory\u2014however small. Near Protocol not only managed to block one such attack, but the attackers also lost 5 ETH in the process.<\/p>\n<p>Hackers tried exploiting Near\u2019s EVM-compatible Rainbow Bridge on 21 August 2022. They failed because the attack was blocked within 31 seconds. No user funds were lost, but the attackers had to part with the deposit they made to implement the attack.<\/p>\n<h2>What happened? And how?<\/h2>\n<p>Near\u2019s Rainbow Bridge allows users to migrate tokens across networks, including Near Protocol, Ethereum, and Aurora. The entire process is trustless and driven by smart contracts.<\/p>\n<p>What made the attack possible was the fact that anyone, including malicious actors, can interact with smart contracts, owing to their automated design. The attackers thus chose to use smart contracts to propose a false block within this particular blockchain. They planned an early morning attack in the hope that it wouldn\u2019t meet resistance given the time. They simply had to deposit 5 ETH to get the transaction verified.<\/p>\n<p>Things didn\u2019t go as smoothly as the hackers had hoped, though. The malicious transaction was flagged off, and the attackers lost the deposited ETH in the process.<\/p>\n<p><blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">\ud83e\uddf5 on the Rainbow Bridge attack during the weekend<br>TL; DR: similar to May attack; no user funds lost; attack was mitigated automatically within 31 seconds; attacker lost 5 ETH. <a href=\"https:\/\/t.co\/clnE2l8Vgz\">pic.twitter.com\/clnE2l8Vgz<\/a><\/p>&mdash; Alex Shevchenko \ud83c\uddfa\ud83c\udde6 (@AlexAuroraDev) <a href=\"https:\/\/twitter.com\/AlexAuroraDev\/status\/1561692371833667585?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">August 22, 2022<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Once the exploit attempt was defeated, Alex Shevchenko\u2014CEO at Aurora Labs\u2014notified the Twitter community about the same. He even rhetorically asked the attackers to focus on \u201cBug Bounty\u201d to earn instead of trying to breach the bridge.<\/p>\n<p>The 31-second attack block wasn\u2019t Near\u2019s first win. It blocked a similar attack on the Rainbow Bridge back in May 2022.<\/p>\n\n\n<h2 class=\"wp-block-heading\">FAQs<\/h2>\n\n\n<div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-question-1706533643838\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What is hacking in e-commerce?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Hacking in e-commerce refers to unauthorized access, manipulation, or exploitation of electronic systems and networks associated with online commerce. Cybercriminals employ various techniques to compromise e-commerce platforms for illicit gains.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1706533732656\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What are the 3 types of hackers?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p><strong>White Hat Hackers (Ethical Hackers):<\/strong> White hat hackers are cybersecurity professionals who use their skills to identify and fix security vulnerabilities. They work to strengthen systems and protect them from malicious attacks. White hat hackers often perform ethical hacking to enhance overall cybersecurity.<br \/><strong>Black Hat Hackers:<\/strong> Black hat hackers engage in malicious activities, exploiting vulnerabilities for personal gain, financial motives, or to cause harm. They are responsible for unauthorized access, data theft, and other cybercrimes. Black hat hackers are commonly associated with criminal activities.<br \/><strong>Grey Hat Hackers:<\/strong> Grey hat hackers fall between white hat and black hat hackers. They may initially exploit vulnerabilities without proper authorization but later disclose the issues to the affected party. Grey hat hackers often aim to raise awareness about security flaws rather than causing harm.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-question-1706533737300\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What do hackers use for hacking?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p><strong>Metasploit:<\/strong> An open-source penetration testing framework used for developing, testing, and executing exploit code against a remote target.<br \/><strong>Nmap:<\/strong> A network scanning tool that helps hackers discover hosts and services on a computer network, highlighting potential vulnerabilities.<br \/><strong>Wireshark:<\/strong> A network protocol analyzer that allows hackers to capture and inspect the data traveling back and forth on a network in real time.<br \/><strong>John the Ripper:<\/strong> A widely used password-cracking tool that attempts to crack password hashes using various attack methods.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>In a space where cross-bridge attacks are common and hackers often get away with no penalty, here\u2019s news of a victory\u2014however small. Near Protocol not only managed to block one such attack, but the attackers also lost 5 ETH in the process. Hackers tried exploiting Near\u2019s EVM-compatible Rainbow Bridge on 21 August 2022. They failed [&hellip;]<\/p>\n","protected":false},"author":93,"featured_media":22924,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_ayudawp_aiss_exclude":false,"footnotes":""},"categories":[460,6530],"tags":[6467,6536],"class_list":["post-22923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crypto","category-news-2","tag-crypto","tag-news"],"acf":{"json_ld_schema":"\n[{\"@context\":\"https:\/\/schema.org\",\"@type\":\"FAQPage\",\"@id\":\"https:\/\/coinswitch.co\/switch\/us-stocks\/wall-street-jottings\/#FAQPage\",\"headline\":\"Wall Street jottings: A personal, guided tour to investing in US stocks\",\"keywords\":\"Personal Guide, US Investing, \",\"datePublished\":\"2022-07-22T13:28:55+05:30\",\"dateModified\":\"2022-07-22T13:28:55+05:30\",\"dateCreated\":\"2022-07-22T13:28:55+05:30\",\"author\":{\"@type\":\"Person\",\"name\":\"Praniket Nayka\",\"description\":\"\",\"url\":\"https:\/\/coinswitch.co\/switch\/author\/praniket\/\",\"sameAs\":[],\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4b22173b861c31fe922bbaf46c336561?s=96&d=mm&r=g\",\"height\":96,\"width\":96}},\"image\":[{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/coinswitch.co\/switch\/us-stocks\/wall-street-jottings\/#primaryimage\",\"url\":\"https:\/\/coinswitch.co\/switch\/wp-content\/uploads\/2022\/07\/Wall-Street-Jottings.jpg\",\"width\":\"1800\",\"height\":\"1080\"},{\"@type\":\"ImageObject\",\"url\":\"https:\/\/coinswitch.co\/switch\/wp-content\/uploads\/2022\/07\/Wall-Street-Jottings-1200x900.jpg\",\"width\":\"1200\",\"height\":\"900\"},{\"@type\":\"ImageObject\",\"url\":\"https:\/\/coinswitch.co\/switch\/wp-content\/uploads\/2022\/07\/Wall-Street-Jottings-1200x675.jpg\",\"width\":\"1200\",\"height\":\"675\"}]}]\n","json_ld_custom_schema":"","youtube_vodeo_url":"","seo":{"title":"","keywords":"","description":"","canonical":""},"blog_banner_image":false,"blog_coin":false,"download_the_app":{"button_value":"","button_url":""},"twitter_card":{"twitter_title":"","twitter_description":"","twitter_link":""},"maturity_tag":"Beginner","post_author":false,"guest_author":false,"hide_toc":true,"key_takeways":false,"select_disclaimer":"Article Default Disclaimer"},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/posts\/22923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/users\/93"}],"replies":[{"embeddable":true,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/comments?post=22923"}],"version-history":[{"count":7,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/posts\/22923\/revisions"}],"predecessor-version":[{"id":39237,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/posts\/22923\/revisions\/39237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/media\/22924"}],"wp:attachment":[{"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/media?parent=22923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/categories?post=22923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/coinswitch.co\/switch\/wp-json\/wp\/v2\/tags?post=22923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}