Balancer has supplied a 20% bounty to white hats and the hacker in the event that they return the stolen crypto. However as of now, the bounty stays unclaimed.
The Balancer v2 exploit on November third resulted in losses of round $120 million throughout its principal protocol and a number of forks. In response to the SlowMist safety staff’s post-incident evaluation, the exploit stemmed from a precision loss flaw within the integer fixed-point arithmetic used to calculate scaling components inside Composable Secure Swimming pools, that are designed for near-parity asset pairs akin to USDC/USDT or WETH/stETH.
Within the newest replace, SlowMist confirmed that this flaw prompted small however constant worth discrepancies throughout swaps, particularly when attackers used the batch swap perform to chain a number of operations inside a single transaction. The attackers’ technique was executed throughout a number of steps.
SlowMist Postmortem
The attacker swapped BPT for liquidity tokens to scale back the pool’s liquidity reserves, making ready for small-amount swaps. They carried out swaps between liquidity tokens (osETH → WETH) to arrange for exact management of small-swap precision errors. They executed rigorously managed $osETH → swaps to build up precision errors. They swapped between liquidity tokens (WETH → osETH) to revive liquidity. They repeated steps 2-4 to amplify the error constantly. They swapped the liquidity tokens again into BPT to revive the pool steadiness.
The attacker first swapped BPT for liquidity tokens to empty and cut back the pool’s liquidity reserves in a bid to arrange for small-amount swaps. They then performed swaps between liquidity tokens (osETH → WETH) to arrange management over small-swap precision errors. Subsequent, they executed extremely managed osETH → WETH swaps to deliberately construct up precision errors.
Afterwards, the attacker swapped between liquidity tokens once more (WETH → osETH) to revive sufficient liquidity. After repeating the steps 2-4 in loops to constantly broaden the gathered error, they lastly swapped the liquidity tokens again into BPT to return the pool to a balanced state. By repeatedly leveraging the precision flaw with small-sized swaps, the attacker pushed the system into settling a closing “amountOut” that exceeded the true amountIn owed, and allowed them to pocket a large revenue.
SlowMist managed to hint the attacker’s operations throughout addresses and a number of chains. It discovered preliminary funds had been routed by means of Twister Money, then by means of intermediate nodes and cross-chain fuel.zip utilization, earlier than being assembled on Ethereum-based addresses holding hundreds of ETH and WETH.
Remediation Efforts
As a part of the remediation efforts, CSPv6 swimming pools throughout the affected community had been paused, CSPv6 manufacturing unit disabled was disabled, gauges had been killed for affected swimming pools, and main LPs safely withdrew, amongst different steps.
You may additionally like:
The Balancer staff coordinated with whitehats in addition to cybersecurity companions and numerous networks to retrieve or freeze parts of the stolen funds. This included 5,041 StakeWise osETH value about $19 million and 13,495 osGNO, estimated to be round $2 million.
To challenge groups and auditors going through comparable situations, SlowMist stated that the main target must be on enhancing take a look at protection for excessive circumstances and boundary circumstances. Moreover, the agency urged the initiatives to pay specific consideration to precision dealing with methods underneath low-liquidity circumstances.
SECRET PARTNERSHIP BONUS for CryptoPotato readers: Use this hyperlink to register and unlock $1,500 in unique BingX Trade rewards (restricted time provide).

