18/04/2022 North Korea, NFTs and a hit video game: inside a $500m cryptocurrency theft

Another high-profile hack has raised more questions about the vulnerabilities of the blockchain

“End users may not necessarily be cognizant of the security risks that they incur,” says Nicholas Christin.
Late last month, hackers made off with what was then worth more than $500m from the systems of cryptocurrency network Ronin, in what is believed to be the second-largest cryptocurrency theft on record.

Ronin was a juicy target for a hacker. The blockchain project supports the wildly popular Axie Infinity video game, which with an estimated8 million playershas drawn comparisons to action-driven collecting games like Pokémon Go.

Axie Infinity is hot and involves substantial sums of money. Players purchase creatures called Axies in the form ofNFTs, unique digital assets known as non-fungible tokens. The creatures can breed, battle and even be exchanged for cold, hard cash.

The game has swelled in popularity as players see the potential to earn real money. In 2020, one 22-year-old player from the Philippines reportedlybought two apartmentsin Manila with his earnings from the game. Last year, another player said heearned more through Axie Infinityand other online games than from his full-time job at Goldman Sachs.

But the underpinnings of the game face significant security challenges. To play, gamers must move their money from Ethereum to Ronin on a blockchain “bridge” system. Ronin is a “sidechain” of Ethereum – a scaling solution that allows transactions to happen faster than on Ethereum, which is congested by the amount of activity it hosts. Hosting the game on this sidechain ensures it can grow without losing functionality. Bridges can hold a lot of money at once, so by targeting the Ronin Bridge that transferred players’ assets between blockchains, hackers seized control of the assets and took off with the money.

In-game assets called ‘Axies’ are seen in this undated handout image from the blockchain-based game Axie Infinity

In-game assets called ‘Axies’ are seen in this undated handout image from the blockchain-based game Axie InfinityPhotograph: Sky Mavis/Reuters

The US governmentsaidthis week it believes North Korean hackers are behind the heist. But it’s just the latest in a string of brazen high-profile crypto thefts. In 2018, more than $530m was stolen from the crypto exchange Coincheck. In February, hackers made off with $320m from the decentralized finance platform Wormhole (though that loot was eventuallyreturned). And in that same month, in perhaps the most publicized cyber heist of the year, prosecutors charged odd couple Ilya “Dutch” Lichtenstein and his wife, Heather Morgan, – also known for her cringeworthy raps on TikTok under the name Razzlekhan – with conspiracy to launderbillions of dollars worth of bitcoinstolen from the crypto exchange Bitfinex in 2016.

It’s a trend.In 2021, $3.2bn in cryptocurrency was stolen from individuals and services, according to a crypto crime report by Chainalysis, a company that provides blockchain data and analysis to banks, governments and other businesses. (Ronin is alsoworking with Chainalysisto trace the funds stolen in the hack, according to Reuters.) The figure is almost six times this amount stolen in 2020. So far this year, more than $1bn has already been stolen, according to experts at Chainalysis and other security firms.

Vulnerabilities in smart contracts

The high-profile hacks and substantial sums of money involved have raised questions about how vulnerable the blockchain – long considered a secure place to store assets – is to such breaches.

Some experts say the rise in reports of cryptotheft come as cryptocurrency is more widely used and better understood than ever before.

“You basically have a lot of money on the table, and on a very public table,” said Nicholas Christin, an associate professor at Carnegie Mellon University who researches online crime and computer and network security. With large sums of money publicly moving around on these transparent systems, it can be enticing for a hacker to pounce.

To understand how these heists are possible, it’s important to distinguish between the blockchain and other programs that operate on top of it, experts say. The blockchain itself is a decentralized public ledger that allows for peer-to-peer transactions. It’s the foundational layer that bitcoin, Ethereum or Solana are built upon.

The second layer – the one that’s frequently exploited – are smart contracts that run on top of blockchains. Smart contracts are agreements in code that automatically execute when the terms of the contract are met. The common analogy is to a digital vending machine – select a product, put in the correct amount of money, and your item will be automatically dispensed. These contracts are irreversible.

The hackers weasel their way to the money through these second-layer systems by either taking advantage of bugs in the code, or getting hold of the private keys that will let them into the systems, explained Christin. Some hackers even subvert the smart contracts to redirect the funds into their hands.

In the Axie Infinity hack, which targeted the Ronin Bridge, the hacker obtained enough private keys to control the bridge and drain the funds. Since so many users had their assets in the bridge, the payout was massive.

“Underlying blockchain protocol is secure,” said Ronghui Gu, founder and CEO of the blockchain security firm Certik. “But the programs – the smart contracts – running on top of them are still like other normal programs, which can have software bugs and vulnerabilities.”

It’s common for hackers to try to exploit the code of one of their targets. And it helps that much of the code for blockchain programs is open source, making it easily accessible for hackers who want to look over the code and find potential bugs.

“In this world people say ‘in code we trust,’ but the code itself is indeed not that trustworthy,” said Gu. When he started his blockchain security firm in 2018, Gu explained, only a few companies used third-party security services like his to audit and assess their code – a critical security backstop – but he’s seen the number gradually tick up.

Crypto exchanges are also major targets for hacks. Exchanges are like banks, they’re central entities that hold massive amounts of their users’ money and transactions are irreversible. Like bridges, they are a middleman program that tends to be targeted. “Those big exchanges have a huge target on their back,” said Christin.

Victims left withbig security burden

Once crypto assets are stolen it can be a challenge for thieves to cash out, especially if the heist is in the nine-figure range. That means funds are often left in limbo for years, or even indefinitely. During that time, the value of the stolen funds can fluctuate due to the volatile nature of the crypto market.

The Chainalysis crypto crime report estimates that criminals are currently holding at least $10bn worth of cryptocurrency, the vast majority obtained through theft. Thanks to transparency on the blockchain, it’s possible to trace these transactions and holdings, but the identity of the perpetrator is hard to nail down until the funds are cashed out.

One can look to theBitfinex scandalas a case study in attempted laundering. “The funds didn’t move for an extremely long time. And then when they tried to initiate the laundering process, this was an opportunity for law enforcement to get involved again, because people are following these hacks,” said Kim Grauer, director of research at Chainalysis.

For victims of the schemes, there are few ways to recover assets. “If a bank’s security fails, it’s not that bad for the bank,” said Ethan Heilman, a cybersecurity expert and co-founder of the cloud service BastionZero. “But if you’re a cryptocurrency exchange and someone empties out all your cryptocurrency that’s really bad for you.” Banks have measures in place to protect their clients that the blockchain lacks. If one’s credit card is stolen, insurance policies ensure that one will usually receive that money back. On the blockchain, however, transactions are irreversible – there is no undo button.

That means there is a tremendous security burden on individual users to keep their assets safe. “End users may not necessarily be cognizant of the security risks that they incur,” said Christin. “Quite frankly, even people in the field don’t have time to necessarily go and review some smart contract source code.”

If one entrusts their keys to the wrong second-layer intermediary, it’s possible that they could be a victim of a heist. Collectively, most aren’t used to this responsibility.

Crypto companies are beginning to get more serious about security, Heilman said, but a world without hacks is not realistic, he added. “You never become secure, you just become more secure,” he said. “So given the ease of monetizing a vulnerability in one of these systems, I think that it is likely that we will continue to see things get hacked, and the question will not be, ‘is there a new hack this month?’ It will be: ‘how frequent are the hacks this month?’”

“There are important things that the industry needs to overcome in order to actually really grow and scale,” said Grauer, “because you can’t have a healthy growing industry if everyone is afraid of getting hacked.”

Arts

https://amp.theguardian.com/technology/2022/apr/16/nft-blockchain-north-korea-hack-ronin-axie-infinity

Interesting NFTs
The King
Part of a series of three artworks entitled "The Rulers". Inspired by the rulers of the animal kingdom, african mandalas & diamonds. A very complex digital illustration, each lion consists of hundreds of custom diamond shapes. Each background is an intricate custom mandala that compliments the lions facial features.
Pollen ( Part 1)
Botanist 6025 of The Panther Patrol, Cobra Division, spotted something she had never seen. A single rose that seemed to be burning with a continuous flame. Could this flower hold the answers they were searching for? Would this be the key to rid the pollen that plagued the planet for all these years? Was this the answer to save them all? To be continued... Hand drawn and traditionally animated digital motion illustration from the mind of Illustrator Anthony Ventura.
Alex in Wonderland
A figure, Alex, stands mostly naked in the midst of a physical and psychological maelstrom. He is clad only in nostalgic 80’s era socks, on a tenuous island between active waters and a variety of shark denizens. Sharks on the right side of the image are all beached, including a shark with a quartz crystal snout, an orange shark wrapped in a life buoy, and a shark further in the distance wearing an 80’s style shirt with the number “88”. On the left side is the largest shark, wearing bright glossy red lipstick and brandishing prominent teeth with braces. She is cordoned off from the figure by a roped float divider, and within her thought bubble is a warning symbol. Behind the figure, hovering in the air, are Grey aliens emerging from the distance, out of a series of elliptical UFO shaped interdimensional membranes. The Greys take on the visual form of spermazoa ostensibly impregnating the interdimensional thresholds. As is typical, these Greys inhabit a zone just behind the unconscious topology of Alex’s dissociative mind. Though Alex’s bottom half is representative, his top half mutates into a psychological cornucopia. In a manner akin to “Auto-Erotic Sphinx”, a predecessor work, the figure has self suctioned—an act of sensual infatuation, enjoyment, and exploration. Upward exists the figure’s primary conscious eye, adorned with a revolutionary beret emblazoned with a Bitcoin badge. The figure’s summit features the nose of a fighter jet facing off against video game Bullet Bills, one of whom is marked by a communist North Korean star. A cropped section of a UFO observes the contest. Alex’s mind branches both left and right. To the left is more singular embodied consciousness, manifesting two eyes and a Ganesh trunk grasping crayons. The right branch dissociates upward diagonally, emerging into an array of eyes, faces, teeth, tail, a unicorn horn, and much more—all of which participate in expressing his unconscious being; a democracy of psychic factions representing thought impressions and associations. All illumination and darkness– fernal, infernal, high consciousness and corporeal underbelly–reside in this realm. In the distance are relatively languid, light clouds, and against the firmament hovers a colossal distant eye peering over the scene and far beyond. This painting possesses underlying genetic traits with previous works such as “Auto-Erotic Sphinx with Toys”, “Dionysus”, and “Fuku-Shiva”. The work serves also as a nod to an earlier period of art inspiration during late teens and early twenties— born out of the nakedness, vulnerability, curiosity, and wonder inherent to coming of age and all subsequent psychedelic revelation.
Beautiful Worlds
Welcome to the ‘Beautiful worlds’ where nature and technology have merged into a single entity. These are Ai generated and hand finished visions of solarpunk future in which I would really like our future generations to live and prosper: the future we might have if we took the very “alternative route” which now lies before us: replacing states and corporations which free federations of communities and cooperatives, using decentralist and ecological technologies to create a world beyond economic scarcity and social hierarchy, defined by autonomy, mutual aid, diversity, and inclusiveness. The long-term goals of solarpunk are freedom and well-being for all by adopting and developing such ecological technologies as: solar, wind, wave and geothermal energy rather than oil or gas to generate electricity; a world of decentralized eco-cities, permaculture and vertical farming, free and open-source software, open-source hardware, small-scale fabrication laboratories, micro-manufacturing, 3D-printing, and countless examples of commons-based peer-production online: meeting the maximum amount of needs, in the shortest time, using the minimum possible amount of energy. It’s a world of decentralized and confederated eco-communities, using technology for human-centric and eco-centric ends rather than for accumulating power and profit – mending the metabolic rift between first nature (the natural world) and second nature (human culture) – and where social hierarchies of race, gender, sexuality, and disability are considered horror stories from the past “oil age”. Solarpunk desires societies of polycultural ethnic diversity and gender liberation, where each person is able to actualize themselves in societal environment of free experimentation and communal caring; This philosophy proposes that in order for the social and natural worlds to reconcile, humans must first transform their relations to each other – recreating society along egalitarian, cooperative, and democratic lines – and then transform their relations towards nature – adopting an attitude to cooperation, rather than domination, towards the planet and its nonhuman forms of life. Text by Connor Owens. This artwork took me a year to create and for you it will take a year to discover. Master autonomously updates once a day at 12am with one of 366 original artworks. Enjoy!
#53922
By OthersideDeployer