BNB Chain’s Cross-Chain Bridge Exploit Explained (2024)

Nansen's research team dives into the BNB Chain's Cross-Chain Bridge exploit and traces the attackers activity.

What Happened?

On Oct 7, 2022, the cross-chain bridge which powers the Binance Coin (BNB) ecosystem was hacked. BNB Chain paused Binance Smart Chain (BSC) after determining a vulnerability had been exploited, as confirmed by Changpeng Zhao (CZ), CEO of Binance. All 44 validators were asked to temporarily suspend BSC in order to contain the damage.

The Attacker illegally issued 2m BNB, worth approximately $566m, on Oct 6, 2022 from the address of BSC: Token Hub through two transactions of 1m BNB each. With quick actions taken by various parties, only ~$137m managed to be moved out to the other chains, while the rest were frozen in BSC.

How Did It Happen?

On Oct 5, 2022, a day before the attack, a ChangeNOW wallet sent 100 BNB to the Attacker, which was then used to register as a Relayer for BSC Token Hub.

BSC Token Hub acts as a vault, facilitating cross-chain transactions between BNB Beacon Chain (BEP2) and Binance Smart Chain (BEP20). When an Externally Owned Account (EoA) or smart contract calls the BSC: Cross-Chain Bridge, the Relayers are responsible for submitting Cross-Chain Communication Packages between the two blockchains.

By registering as a Relayer for BSC Cross-Chain Bridge, the Attacker’s relaying requests could be accepted by BSC, allowing the Attacker to exploit a bug through the way BSC Token Hub verifies proofs.
After registering as a Relayer, the Attacker forged arbitrary messages on block height 110217401 (while the legitimate withdrawals’ block heights were much higher). This enabled the creation and subsequent withdrawal of the 2m BNB in two transactions:

  1. At 6:26 PM UTC, the Attacker succeeded in delivering a 1m BNB package to its own address.
  2. Between 8:32 PM and 8:42 PM UTC, the Attacker continued to make 15 failed attempts to deliver similar packages to its own address (the transactions failed with an error log of 'sequence not in order').
  3. Finally at 8:43 PM UTC, the Attacker succeeded in delivering the last 1m BNB package to its own address.

What Was Lost and What Is The Current Situation?

In previous hacks, perpetrators directly off-ramped the amount to a centralized exchange or a mixer service such as Tornado Cash once successful. However, in this case, the Attacker utilized Venus, a popular lending protocol on BNB Chain, and put down 900k BNB as collateral to borrow various stablecoins, such as USDT, USDC and BUSD.

It was done in five transactions:

  1. At 6:30 PM UTC, 4 minutes after the first hack, the first lending transaction of 600k BNB happened, resulting in 27.5m vBNB tokens worth over $250m.
  2. Within 2 minutes of supplying the collateral, two borrowing transactions were made, the first amounting to 62.4m BUSD.
  3. Second borrowing transaction of 50m USDT.
  4. At 6:36 PM UTC, the second lending transaction of 300k BNB occurred, resulting in 13.7m vBNB (~$129m).
  5. Following this, the final borrowing of nearly 35m USDC was made.

These stablecoins were then routed to multiple EVM-compatible chains using bridges such as Stargate Finance and Multichain, in incremental amounts of $400k-5m USD each. As of Oct 7, 2022, the following total amounts were bridged to various chains:

BNB Chain’s Cross-Chain Bridge Exploit Explained (1)

In each chain, the Attacker utilized various liquidity providers and lending protocols such as Curve Finance, Uniswap and Geist. The actions ranged from providing collateral to borrow certain tokens, swapping between stablecoins and conducting cross-asset swaps from stablecoins to Ethereum. Below are the detailed list of platforms that the Attacker interacted with and the total volume in USD and in Tokens:

BNB Chain’s Cross-Chain Bridge Exploit Explained (2)

BNB Chain’s Cross-Chain Bridge Exploit Explained (3)

After the Attacker managed to bridge, swap, transfer and provide collateral in these chains, the news spread on Twitter. Following this, three hours after the hack, BSC announced that the chain would be halted due to “irregular activity”. This prevented the Attacker from moving more funds onto other chains. Currently, the balances in the Attacker’s wallet are as follows:

BNB Chain’s Cross-Chain Bridge Exploit Explained (4)

Using Nansen Portfolio, one would be able to follow the interactions made by the Attacker and verify the respective balances on multiple chains.

BNB Chain’s Cross-Chain Bridge Exploit Explained (5)

BNB Chain’s Cross-Chain Bridge Exploit Explained (6)

Furthermore, based on our-chain data and analysis, the following addresses are notable and/or connected to the Attacker:

BNB Chain’s Cross-Chain Bridge Exploit Explained (7)

ChangeNOW issued a statement following the hack, confirming that the exchange was used by the Attacker to send the initial funds needed to be registered as a BSC Cross-Chain Bridge Relayer. The address was assessed by its AML system for any suspicious or malicious activity prior to using its service, and as the system didn’t find any red flag in the address, the funds were sent to the recipient address successfully.

As an experienced hacker, the Attacker used new, clean addresses, as can be seen in the table above with the usage of different “burner” addresses in multiple chains.

Using Nansen’s various features such as Portfolio, Wallet Profiler, Watchlist and Smart Alerts, you will be able to monitor the movement of funds in these addresses too. Sign up for free today.

Flowchart of the Hack

Below are the detailed flowcharts of transactions conducted from and to the Attacker’s address for clarity:

BNB Chain’s Cross-Chain Bridge Exploit Explained (8)

BNB Chain’s Cross-Chain Bridge Exploit Explained (9)

What’s Next?

At the time of writing this report, BNB Chain had released an official exploit response and is compiling a thorough post-mortem report. They also proposed on-chain governance votes for the following:

  1. Whether to freeze the hacked funds;
  2. Whether to use BNB Auto-Burn to cover the remaining hacked funds;
  3. Whitehat program to find bugs in the smart contracts, $1m rewards for each significant bug found;
  4. Bounty reward program for catching hackers, up to 10% of the recovered funds.

A temporary urgent patch was announced by the developers of BNB Chain on Oct 12, 2022 called Moran Hardfork, intended to reinstate the cross-chain infrastructure. The changes occured at block height 22,107,423 on the Mainnet, which includes IAVL hash check vulnerability fix, sequential block header check in BSC: Cross-Chain Bridge and relayer would be whitelisted to genesis candidates.

Once the points of vulnerability from this attack could be properly determined, BNB Chain also planned to introduce a new on-chain governance mechanism that will fight and defend against future attacks.

Conclusion

The BNB Cross-Chain Bridge attack extended the list of bridge attacks in the past two years and was executed with careful planning and expertise in the field.

Based on our on-chain analysis, the Attacker was familiar with how cross-chain relayers work and managed to exploit a bug in the code. They also did not immediately off-ramp the funds to exchanges due to the risk of exposure, but utilized a sophisticated range of DeFi products within a short time to move the funds, to avoid detection instead.

Despite the swift response from BSC validators to halt the chain and minimize damage, over $100m had been moved to other chains, swapped into various assets and transferred to different burner addresses. The post-mortem report from the BNB Chain team might offer deeper insights into the technicality of the attack.

Interested in doing your own on-chain investigations?Sign up today!

Disclaimer

The authors of this content and members of Nansen may be participating or invested in some of the protocols or tokens mentioned herein. The foregoing statement acts as a disclosure of potential conflicts of interest and is not a recommendation to purchase or invest in any token or participate in any protocol. Nansen does not recommend any particular course of action in relation to any token or protocol. The content herein is meant purely for educational and informational purposes only and should not be relied upon as financial, investment, legal, tax or any other professional or other advice. None of the content and information herein is presented to induce or to attempt to induce any reader or other person to buy, sell or hold any token or participate in any protocol or enter into, or offer to enter into, any agreement for or with a view to buying or selling any token or participating in any protocol. Statements made herein (including statements of opinion, if any) are wholly generic and not tailored to take into account the personal needs and unique circ*mstances of any reader or any other person. Readers are strongly urged to exercise caution and have regard to their own personal needs and circ*mstances before making any decision to buy or sell any token or participate in any protocol. Observations and views expressed herein may be changed by Nansen at any time without notice. Nansen accepts no liability whatsoever for any losses or liabilities arising from the use of or reliance on any of this content.

BNB Chain’s Cross-Chain Bridge Exploit Explained (2024)

FAQs

How are cross-chain bridges hacked? ›

‍Validator Takeover: On some cross-chain bridges, a group of validators votes on whether or not to approve a specific transfer. If the attacker controls most of these validators, they can approve fraudulent and malicious transfers.

What is BNB bridge exploiter? ›

What Exactly Happened? To recap, the hacker(s) exploited the BSC Token Hub cross-chain bridge – the bridge between the BNB Beacon Chain/BEP2 and BNBChain/BEP20 chains – essentially minting 2 million new BNB (value of about $580 million) that they sent to themselves in two separate transfers.

What is the vulnerability of cross-chain bridges? ›

The biggest risk for cross-chain bridges, of course, is being exploited by hackers for various reasons such as smart contract vulnerabilities or the private key compromise of validators. These exploits due to hacking can occur in any type of bridge, but are especially frequent in lock-and-mint bridges.

How do cross-chain bridges work? ›

A cross-chain bridge is an application that facilitates the transfer of digital assets between two different blockchain networks. Cross-chain bridges operate via smart contracts and function as a cross-chain messaging protocol that enables blockchain interoperability.

How are cross bridges broken? ›

The cross bridge cycle can be broken down as follows: Hydrolysis of ATP to ADP and Pi, with products still covalently bonded to myosin, cause it to enter an energised state. ATP binds to myosin, causing cross bridge to detach.

Who controls BNB chain? ›

BNB Chain is a blockchain created by Binance (BNB -1.5%), the world's largest cryptocurrency exchange by trading volume. The blockchain is fueled by BNB, formerly known as Binance coin. It's a decentralized, open-source ecosystem that helps users create, store, and exchange data.

How much BNB was hacked? ›

In total, hackers drained 2 million BNB tokens — about $570 million at current prices — from the network, Binance's BNB Chain said in a blog post on Friday.

Is cross chain bridge safe? ›

While cross-chain bridges are generally provided by honest parties, cybercriminals and hackers sometimes target and exploit cross-chain bridges for their vulnerabilities. Users should be cautious of the risks involved with using cross-chain bridge software.

What is an example of cross the bridge? ›

idiom. I don't know how we'll pay the bills if you quit your job, but we'll cross that bridge when we come to it.

What is cross chain risk? ›

Security Risks

At its essence, crosschain communication creates a dependency relationship between two or more networks. Such dependency relationships typically involve state change in one network driving state change in another. These relationships can be unidirectional or bidirectional, transient or persistent.

What's the weakest link in the blockchain world? ›

Humans are the Weakest Link in the Blockchain

If a human employee needs to authenticate any transaction or change of custody and enter it into a system, that link is prone to errors or potential fraud. For example, humans with good intentions can simply forget to log a transaction or change of custody.

How do cross bridges work? ›

Actin-myosin cross-bridge is formed when actin and myosin heads become linked together. In general, a myosin head flexes and delivers a power stroke when it binds to an actin filament. The force which is generated from the power stroke is due to the moving of the actin filament past the myosin.

What happens to your Bitcoin if you use a token-based bridge to make your Bitcoin operable on Ethereum? ›

Cross-chain bridges don't actually move your BTC from the Bitcoin blockchain to the Ethereum blockchain. Instead, the bridge will create equivalent tokens that represent your BTC but are usable on the Ethereum blockchain.

Why are blockchain bridges vulnerable? ›

🔓 Blockchain bridges are susceptible to attacks due to their reliance on third-party data handling in centralized bridges and the absence of regulatory oversight in decentralized bridges.

What are common bridge security vulnerabilities? ›

Common vulnerabilities in bridges include: False Deposits: Bad actors generate fake deposit events on one blockchain, prompting unwarranted transfers on another. This method was used in the Qubit Finance raid. Validator Flaws: Hackers exploit flaws in deposit validation processes.

How are hackers able to steal cryptocurrency? ›

Hackers can gain access to cryptocurrency owners' cryptocurrency wallets, exchange accounts, or the exchanges themselves. Ransomware and scams are also used to steal cryptocurrency.

Top Articles
Are trading cards a form of gambling?
Pourquoi le 7 est un chiffre fétiche - Edition du soir Ouest-France - 09/03/2016
Funny Roblox Id Codes 2023
Www.mytotalrewards/Rtx
San Angelo, Texas: eine Oase für Kunstliebhaber
Golden Abyss - Chapter 5 - Lunar_Angel
Www.paystubportal.com/7-11 Login
Gore Videos Uncensored
Craigslist Greenville Craigslist
Top Hat Trailer Wiring Diagram
World History Kazwire
R/Altfeet
George The Animal Steele Gif
Nalley Tartar Sauce
Chile Crunch Original
Teenleaks Discord
Immortal Ink Waxahachie
Craigslist Free Stuff Santa Cruz
Mflwer
Costco Gas Foster City
Obsidian Guard's Cutlass
Mission Impossible 7 Showtimes Near Marcus Parkwood Cinema
Sprinkler Lv2
Uta Kinesiology Advising
Kcwi Tv Schedule
Nesb Routing Number
Olivia Maeday
Random Bibleizer
10 Best Places to Go and Things to Know for a Trip to the Hickory M...
Receptionist Position Near Me
Black Lion Backpack And Glider Voucher
Gopher Carts Pensacola Beach
Duke University Transcript Request
Nikki Catsouras: The Tragic Story Behind The Face And Body Images
Kiddie Jungle Parma
Lincoln Financial Field, section 110, row 4, home of Philadelphia Eagles, Temple Owls, page 1
The Latest: Trump addresses apparent assassination attempt on X
In Branch Chase Atm Near Me
Appleton Post Crescent Today's Obituaries
Craigslist Red Wing Mn
American Bully Xxl Black Panther
Ktbs Payroll Login
Jail View Sumter
Thotsbook Com
Funkin' on the Heights
Caesars Rewards Loyalty Program Review [Previously Total Rewards]
Marcel Boom X
Www Pig11 Net
Ty Glass Sentenced
Game Akin To Bingo Nyt
Ranking 134 college football teams after Week 1, from Georgia to Temple
Latest Posts
Article information

Author: Foster Heidenreich CPA

Last Updated:

Views: 5769

Rating: 4.6 / 5 (76 voted)

Reviews: 83% of readers found this page helpful

Author information

Name: Foster Heidenreich CPA

Birthday: 1995-01-14

Address: 55021 Usha Garden, North Larisa, DE 19209

Phone: +6812240846623

Job: Corporate Healthcare Strategist

Hobby: Singing, Listening to music, Rafting, LARPing, Gardening, Quilting, Rappelling

Introduction: My name is Foster Heidenreich CPA, I am a delightful, quaint, glorious, quaint, faithful, enchanting, fine person who loves writing and wants to share my knowledge and understanding with you.