$133K in TUR drained via Sybil attack on BSC staking contract

Another crypto exploit incident has been reported by blockchain investigator BlockSec Phalcon, citing nearly $133,000 worth of tokens drained in a suspected DeFi price manipulation.

Hackers drain TUR tokens on BNB Smart Chain 

Neary $133,000 worth of TUR tokens were drained through a staking contract exploit on BSC or BNB Smart Chain. At the core of this incident is a spot-price dependency; a design system, where the smart contract calculates rewards using actual prices from a decentralized exchange. 

The bad actor artificially pumped the price of TUR tokens in the TUR-NOBEL liquidity pool and drained $133,000 in tokens. Pools with thin liquidity are typically easy to exploit, and that’s what has happened here. And, having strong liquidity is one of the most important necessities for a crypto project, said XTrends co-founder Benjamin Notinini in an earlier interview with AltCoin Desk.   

To avoid mixing up some concepts in this incident, spot price dependency happens when a contract blindly trusts the price of a token from a trading pool to make decisions, such as assessing rewards. 

Join our newsletter
Get Altcoin insights, Degen news and Explainers!

DeFi price manipulation refers to artificially changing the price of a token to trick a smart contract, and a staking contract is a smart contract where users lock their tokens to earn rewards.

A DeFi exploit through Sybil attack

Initially, the attacker artificially inflated the price of the TUR token in the liquidity pool through a series of swaps. In the next step, they staked TUR tokens into vulnerable smart contracts. As the hacker manipulated the price, the system began releasing tokens with unevenly high returns.

To note, stake contracts hold the reward pool in TUR tokens. 

Instead of just using one account to claim rewards from the staking contract, the perpetrator used multiple accounts, including referred ones. To make it simpler, the attacker did not intrude into other user accounts; instead, they created multiple wallet addresses and linked them via their own referral codes. 

Each account interacts with the staking contract to earn rewards. The exploiter used these accounts as tools to drain more funds.  

This type of exploit is known as a Sybil attack, a security threat where a single exploiter pretends to be many users. Eventually, the malicious actor swapped the TUR tokens into USDT, draining nearly $133,000 in funds. 

Hackers are latching onto DeFi’s weaker sides

BSC is designed for building DeFi apps, NFTs, and games, and for running smart contracts. Although this part looks bright, the permissionless nature of most DeFi protocols makes it unable to tell if one attacker owns 10 wallets or 10 people own 10 wallets. For context, BSC itself is not a DeFi protocol, but several protocols like PancakeSwap run on BSC.

This type of incident is not new in DeFi. AltCoin Desk has reported several such incidents, causing millions of losses. The patterns in similar DeFi hacks are somewhat similar: low or thin liquidity pools, dependency on the contract using spot price, and a hacker who is an expert in moving markets.     

In DeFi, if math can be exploited, hackers will always find ways to take advantage of it.

Bottom Line

In another crypto exploit, a hacker drained nearly $133,000 in TUR funds from the TUR-NOBEL liquidity pool on BSC (BNB Smart Chain). The hacker created multiple fake accounts, linked them to referral codes, and drained funds from the staking contract. The bad actor manipulated the price of TUR tokens before the process began. Eventually, they swapped the funds to USDT.

Disclaimer: This article is for informational purposes only and does not constitute financial, investment, or trading advice. Cryptocurrency investments are subject to high market risk. Readers should conduct their own research or consult with a financial advisor before making any investment decisions. The views expressed here do not necessarily reflect those of the publisher.

Share this article