Wednesday, May 21, 2025
No Result
View All Result
Coins League
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Metaverse
  • Web3
  • Scam Alert
  • Regulations
  • Analysis
Marketcap
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Metaverse
  • Web3
  • Scam Alert
  • Regulations
  • Analysis
No Result
View All Result
Coins League
No Result
View All Result

Radiant Capital Hack Analysis

January 13, 2024
in DeFi
Reading Time: 11 mins read
0 0
A A
0
Home DeFi
Share on FacebookShare on TwitterShare on E Mail


Learn Time: 7 minutes

Decoding the Radiant Capital Heist: A Complete Evaluation of the $4.5 Million Cyberattack

Abstract

On January 3, 2024, Radiant Capital, a cross-chain lending protocol on Arbitrum, was exploited for about $4.5 million value of ETH. The hack primarily resulted from vulnerabilities within the sensible contract code and leveraged present rounding points within the codebase.

About Mission:

Radiant Capital (RDNT) is a decentralized finance (DeFi) venture that goals to consolidate fragmented liquidity throughout a number of lending protocols and chains. For extra data, take a look at their web site.

Vulnerability Evaluation & Influence:

On-Chain Particulars:

Attacker Tackle :- 0x826d5f4d8084980366f975e10db6c4cf1f9dde6d

Assault Contract:- 0x39519c027b503f40867548Fb0c890b11728faA8F

Weak Contract:- 0xF4B1486DD74D07706052A33d31d7c0AAFD0659E1

Assault Transaction:-0x1ce7e9a9e3b6dd3293c9067221ac3260858ce119ecb7ca860eac28b2474c7c9b

The Root Trigger :-

The foundation reason for the incident with the Radiant Capital venture was a flaw in the way in which they calculated token portions. This calculation concerned two predominant parts: precision enlargement and rounding. Right here’s a simplified rationalization of each the basis trigger and the way the vulnerability was exploited:

Precision Enlargement and Rounding in Calculation: The calculation technique utilized by Radiant Capital concerned increasing the precision of numbers (making them extra exact) after which rounding them. They used a method that may be summarized as (a * RAY + b/2) / b, the place RAY is a big quantity (10²⁷) used to broaden precision.

Exploitation of the System: The attacker took benefit of this method. The vulnerability lay within the dealing with of the variables ‘a’ and ‘b’. The important thing right here is the connection between the dimensions of ‘a’ and ‘b’. When ‘b’ is considerably smaller than ‘a’, the rounding error is tiny and negligible. Nevertheless, when ‘b’ is analogous in measurement to ‘a’, the error turns into substantial.

3. Manipulation of Values by Attacker: Within the assault, the perpetrator manipulated the worth of ‘b’ to be near ‘a’. This precipitated a major rounding error. As an example, if b = 3 and a * RAY = 10000, the computed result’s 3333, which is 1/10000 lower than the true worth. Within the case of a * RAY = 10000 and b = 3000, the computed result’s 3, which is 1/10 of the true worth. The computation on this occasion equals 3/2.0001 = 1, on account of the attacker manipulating the worth of b to have an analogous magnitude to a. There’s a 1/3 distinction between the calculated and precise values.

4. Influence of the Assault: By intentionally setting ‘a’ and ‘b’ to be shut in magnitude, the attacker made the system spherical off numbers in a method that was considerably completely different from their precise worth. This allowed the attacker to artificially broaden revenue margins.

Assault Course of

To start the assault, the attacker first obtained a 3 million USDC flash mortgage by way of AAVE.

2. The attacker obtained two million rUSDCn token certificates in change for the pledge of two million USDC to the Radiant contract.

3. The attacker borrowed two million USDC utilizing a flash mortgage obtained by way of the Radiant contract. Within the callback perform, the pledged USDC from the second step was extracted concurrently with the compensation of $2 million USDC. The attacker’s USDC was transferred into the contract by the flash mortgage perform, which is also called the transferfrom perform. A 9/10000 payment was collected as liquidity for the pool.

4. The result of this transaction was a manipulated liquidity index set at *271800000000.999999999999998631966035920 1e27. This worth considerably surpassed the preliminary 1e27 noticed earlier than the manipulative actions occurred.

5. The attacker then made a contemporary contract and funded it with 543,600 USDC. Rounding management is made simpler by the truth that this quantity is equal to twice the liquidityIndex worth from step 4. The attacker pledged all 543,600 USDC into the Radiant contract, acquiring an equal quantity of rUSDCn.

6. The assailant took out 407,700 USDC. As beforehand acknowledged, 407,700 rUSDCn ought to have been burned; nevertheless, the burn perform required actual enlargement and rounding computations. The result’s 1/3 lower than the precise worth, 40770000000000000000000000000000000/271800000000999999999999998631966035920 = 1.49999999, however rounding produces a 1. The attacker was in a position to withdraw 407,700 USDC as a result of, as will be seen beneath, solely 271,800 was burned versus 407,700.

7 . The attacker then returns 271 800 USDC (+ 1 wei) to the account. The rayDiv now equals one wei relatively than zero because of the further wei. By depositing 271 800 USDC, the attacker beneficial properties again 1 wei of the USDC aToken and is ready to repeat the withdraw and re-deposit cycle. For a complete of about 2.8 million USDC, the attacker should retrieve the two million USDC that was transferred into the contract in the first step, the 271k in flash mortgage charges, and the 543k that was deposited initially of step three. At a charge of 135 900 USDC (407k — 271k) per iteration, the restoration happens. There are 18 iterations netting 2 446 200 USDC and a closing withdraw of 369 200 USDC for a complete of two 815 400 USDC, so near 2.8 million which was the preliminary ballpark.

8. The hacker fled with the stolen ninety-plus WETH, recovered the entire USDC that was deposited, and paid again the AAVE flash loaHacks are repeated in two following transactions (right here and right here) with bigger quantities (906 WETH extraction every) for a complete of over 1900 WETH stolen.

After the Exploit➖

Following the exploit, the Radiant Capital acknowledged the hack by way of their Twitter determined to quickly droop lending and borrowing markets on the platform as a precautionary measure.

Funds Monitoring ➖Following the safety breach, the 1902 ETH that was stolen stayed within the hacker’s tackle with none exercise. As of now, the present stability is 419 ETH, because the hacker is step by step transferring the funds.

Timeline

Jan 02, 18:53:23: The pool initialization happens with inadequate information.

Jan 02, 18:53:38: The attacker executes a flash mortgage, manipulating the liquidity index.

Jan 02, 18:53:46 to 18:53:49: The attacker exploits a rounding error, withdrawing from the pool.

Jan 3, 2024, 00:14 AM UTC: The Radiant Capital crew receives notification of the exploit from the attacker. They promptly paused the protocol and initiated an investigation.

In the present day, we obtained a report of a problem with the newly created native USDC market on Arbitrum. After validation by Radiant builders and the broader Internet 3 safety group, the Radiant DAO Council paused lending/borrowing markets on Arbitrum quickly whereas that is…

— Radiant Capital (@RDNTCapital) January 3, 2024

Jan 3, 2024, 08:05 PM UTC: The Radiant Capital crew recognized the basis reason for the exploit.

Radiant Capital was topic to a flash-loan-based exploit upon launching the brand new native USDC market on Arbitrum on January 2nd at 06:53:29 PM +UTC, resulting in the protocol accruing unhealthy debt within the WETH market totaling about 1.3% of whole protocol TVL. 🧵1/10👇

— Radiant Capital (@RDNTCapital) January 3, 2024

Jan 4, 2024: The pool paused because the Radiant Capital crew continued to handle the exploit and assess needed remedial actions.

The Urgency of Web3 Safety within the Present State of affairs

As 2024 begins, now we have witnessed 4 high-value theft circumstances. (Discover QuillMonitor, the web3 hacks & vulnerability device, and analyze actual assaults from 2020 onwards.) This collection of occasions serves as a reminder that within the Web3 ecosystem, safety precautions stay essential! To forestall such vulnerabilities, the perfect Sensible Contract auditors should look at the Sensible Contracts for logical points. QuillAudits stands on the forefront of this area, providing top-notch cybersecurity options that safeguard tens of millions in property. Our crew of specialists is adept at using superior instruments and methods to make sure the best degree of safety to your Web3 initiatives.

Associate with QuillAudits :

Excited about collaborating with QuillAudits? Discover our partnership alternatives designed to reinforce Web3 safety throughout the ecosystem:

14 Views



Source link

Tags: AnalysisCapitalhackRadiant
Previous Post

IBM Cloud patterns: Private wireless network on IBM Cloud Satellite 

Next Post

Gary Vaynerchuk Dives into Children’s Literature with ‘Meet Me in the Middle’ | NFT CULTURE | NFT News | Web3 Culture

Related Posts

Bancor Files Patent Infringement Lawsuit Against Uniswap Over
Unlicensed Use of Foundational Technology Behind Decentralized Exchanges | by Bancor | May, 2025
DeFi

Bancor Files Patent Infringement Lawsuit Against Uniswap Over Unlicensed Use of Foundational Technology Behind Decentralized Exchanges | by Bancor | May, 2025

May 20, 2025
Finastra Sells Off Treasury and Capital Markets Division
DeFi

Finastra Sells Off Treasury and Capital Markets Division

May 20, 2025
Lloyds Bank Taps Moneyhub for Data Categorization
DeFi

Lloyds Bank Taps Moneyhub for Data Categorization

May 18, 2025
Credit Risk Analytics Provider Carrington Labs Partners with Decisioning Platform Oscilar
DeFi

Credit Risk Analytics Provider Carrington Labs Partners with Decisioning Platform Oscilar

May 15, 2025
Synthetix sUSD Peg Update
DeFi

Synthetix sUSD Peg Update

May 16, 2025
SNXweave Weekly Recap 181
DeFi

SNXweave Weekly Recap 181

May 18, 2025
Next Post
Gary Vaynerchuk Dives into Children’s Literature with ‘Meet Me in the Middle’ | NFT CULTURE | NFT News | Web3 Culture

Gary Vaynerchuk Dives into Children's Literature with 'Meet Me in the Middle' | NFT CULTURE | NFT News | Web3 Culture

Boost Productivity and Save 20% Off This 6-in-1 Laptop Stand

Boost Productivity and Save 20% Off This 6-in-1 Laptop Stand

BlackRock CEO Larry Fink says Bitcoin "Is An Asset Class That Protects You"

BlackRock CEO Larry Fink says Bitcoin "Is An Asset Class That Protects You"

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Twitter Instagram LinkedIn RSS Telegram
Coins League

Find the latest Bitcoin, Ethereum, blockchain, crypto, Business, Fintech News, interviews, and price analysis at Coins League

CATEGORIES

  • Altcoin
  • Analysis
  • Bitcoin
  • Blockchain
  • Crypto Exchanges
  • Crypto Updates
  • DeFi
  • Ethereum
  • Metaverse
  • NFT
  • Regulations
  • Scam Alert
  • Uncategorized
  • Web3

SITEMAP

  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact us

Copyright © 2023 Coins League.
Coins League is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • Bitcoin
  • Crypto Updates
    • Crypto Updates
    • Altcoin
    • Ethereum
    • Crypto Exchanges
  • Blockchain
  • NFT
  • DeFi
  • Metaverse
  • Web3
  • Scam Alert
  • Regulations
  • Analysis

Copyright © 2023 Coins League.
Coins League is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In