• Skip to primary navigation
  • Skip to main content
Evertas Logo Get in touch
  • Home
  • About Us
  • Insurance
  • Services
  • Blog
  • News
  • Resources & Education
  • Contact Us
    Instagram
    LinkedIn
    Twitter
    YouTube

Blog

Discover Four Risks Confronting Crypto Custodians

read
7 December 2022

Bitcoin was originally conceived as a “trustless” payment system because it doesn’t require counterparties to have faith in one another’s likelihood to make good on their agreements. Instead, math guarantees the settlement of the transaction.

Indeed, the original bitcoin whitepaper envisioned a thoroughly decentralized value exchange system between peers, with private keys stored locally on connected devices. In such a world, the main risk of losing access to one’s digital assets was losing keys due to hardware loss or failure. 

Of course, the entire concept put forth by Satoshi Nakamoto took on a life of its own and spawned centralized entities where private keys are held by a custodian for use on their platform. Under these circumstances, the biggest threat to accessing one’s assets is theft by a bad actor, though the means is not always network hacking.  

Read on to learn more about four different types of attacks that put custodial crypto at risk.

Smart Contract Vulnerability

A foundational DeFi protocol is the smart contract: a programmatically self-executing set of instructions stored on a blockchain used to automate transactions. As is the case with any code, security flaws can be exploited.

Example: Wintermute

  • Date: September 2022
  • Amount Lost: $160 million 
  • Means: Bug exploit

Wintermute is an algorithmic market maker that enables high-frequency crypto asset transactions. In September 2022, Wintermute suffered a serious hack, with initial losses exceeding $160 million. The stolen assets had been kept in hot wallets – meaning, wallets connected to the internet.

The post-mortem report showed that the attack occurred due to human error in a smart-contract’s logic tied to a protocol that allowed Wintermute customers to create personalized wallet addresses.

The exploit threatened the solvency of the platform as it quickly triggered a cumulative debt of $200 million. 

Evil.

Phishing

Phishing attacks are those in which the attacker gains access to a network by fooling an administrator into taking steps that ultimately reveal their access credentials, most often via social engineering or malware.

Example: Axie Infinity

  • Date: March 2022
  • Amount lost: $625 million
  • Means: Social engineering > malware > validator node takeover

The attackers, believed to be affiliated with the notorious North Korea-based Lazarus Group, targeted key employees of Sky Mavis, the parent company of Axie Infinity, a sidechain connected to the Ethereum network.

The attackers reportedly posed as recruiters reaching out to Sky Mavis engineers over LinkedIn. The targets were then put through an extensive and apparently realistic recruitment process, capped off with an “extremely generous” job offer, which was in fact a malware-infected PDF document.

With that, an engineer’s computer became compromised, and this ultimately gave the attackers control over a majority of validator nodes.

Evil, but clever.

51% Attack

Blockchains attain their immutability through protocols that require a majority of nodes to agree, which is to say, reach consensus, on what is the true state of the ledger. Should a bad actor attain control of at least 51% of voting power, they can alter the ledger arbitrarily and to their advantage – typically by permitting double-spending. 

In the case of proof of work protocols, this is done by either acquiring sufficient computing power or encumbering the capacity of other miners. In the case of proof of stake protocols, it’s done by acquiring at least 51% of the asset.

Example: Beanstalk protocol

  • Date: April 2022
  • Amount lost: $181 million
  • Means: Governance protocol exploits 

51% attacks are rare due to the vast amounts of resources required, be it financial or technical.

In the case of the Beanstalk attack, it took very few resources, thanks to an exploit of the protocol’s flash loan functionality, which allows for borrowing of large sums without collateral, if the funds are returned before the next block is mined – the goal being to capitalize on volatility.

By taking out a $1 billion flash loan, followed by a series of quickly executed conversions and transfers, the attacker was ultimately able to acquire nearly 80% of voting power within minutes. This was much more than the 67% required to make, approve and execute “emergency proposals” – two of which resulted in the theft.

Evil, but very clever.

Bridge Exploits 

Cross-chain bridges connect separate blockchains networks thereby enabling users to transfer their digital assets between platforms.

For example, Ren Protocol’s Badger Bridge allows users to deploy Bitcoin on the Ethereum network, by accepting BTC as collateral and minting a renBTC or wBTC on a 1:1 basis. The bridge then allows these to be swapped back into their original token.

Though very useful, bridges are considered high security risks.

Example: Wormhole Bridge 

  • Date: March 2022
  • Amount lost: $325 million
  • Means: Software bug exploit

The Wormhole bridge attack occurred after an update to the project’s GitHub repository inadvertently revealed a fix to a bug before the fix had been deployed. By the time the attacker was done exploiting that unpatched bug, they’d taken $325 million worth of wETH.

Evil, not terribly clever.

Protect Your Customers’ Crypto Assets

Gains from attacks on TradFi yield nothing close to these huge numbers, which is why crypto custodians are such attractive targets. This is also why crypto insurance is so vital. And yet, a tiny proportion of digital assets are insured.

Evertas is the only dedicated crypto insurance company, and offers A+ rated coverage to crypto custodians intent on protecting their projects and their customers’ assets. Contact us to learn how we can work together.

Related articles

Insight

Crypto insurance discussion on InsurTechTalk

Read More
Insight

High Profile Web3 Attacks and How they Happened

Read More
Insight

Quantum Computing in China: the Sky is not Falling

Read More
  • About Us
  • Careers
  • Insurance
  • Services
  • Instagram
  • LinkedIn
  • Twitter
  • YouTube

Call On An
Old Friend Today.

Contact Us

Evertas Logo ©Copyright 2023, Evertas Legal Notice | Privacy Policy | Terms of Service
This website uses cookies to ensure you get the best experience. Learn more.
DeclineAllow cookies
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
Cookie Duration Description
cookielawinfo-checkbox-analytics 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional 11 months The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary 11 months This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance 11 months This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy 11 months The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
1445