-
Notifications
You must be signed in to change notification settings - Fork 70
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Create 2023-07-11-Rodeo-Finance.md (#379)
* Create 2023-07-11-Rodeo-Finance.md * Update 2023-07-11-Rodeo-Finance.md * Update 2023-07-11-Rodeo-Finance.md * Update 2023-07-11-Rodeo-Finance.md
- Loading branch information
Showing
1 changed file
with
40 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,40 @@ | ||
--- | ||
date: 2023-07-11 | ||
target-entities: Rodeo Finance | ||
entity-types: | ||
- DeFi | ||
- Yield Aggregator | ||
- Lending Platform | ||
attack-types: | ||
- Smart Contract Exploit | ||
- Flash Loan Attack | ||
title: "Rodeo Finance Exploit on Arbitrum Leads to $888,000 Loss" | ||
loss: 880000 | ||
--- | ||
|
||
## Summary | ||
|
||
On July 11, 2023, Rodeo Finance on Arbitrum was breached, losing around 472 ETH ($888,000) due to an attacker exploiting the [TWAP Oracle](https://www.halborn.com/blog/post/what-are-twap-oracles). By manipulating the oracle's price calculation, through a "sandwich" attack, they inflated asset prices. This allowed them to mislead the protocol, borrow against the inflated prices from the USDC Pool, and conduct swaps to profit from the manipulated price discrepancies, effectively bypassing Rodeo's security checks. | ||
|
||
## Attackers | ||
|
||
The identity of the attacker is unknown. | ||
|
||
Hacker Arbitrum Wallet: | ||
|
||
- [0x2f3788f2396127061c46fc07bd0fcb91faace328](https://arbiscan.io/address/0x2f3788f2396127061c46fc07bd0fcb91faace328) | ||
|
||
## Losses | ||
|
||
The loss amounted to 472 ETH worth $880,000. | ||
|
||
## Timeline | ||
|
||
- **July 11, 2023, 07:54 AM UTC:** The [first malicious](https://arbiscan.io/tx/0x98f1e234faac8b7f7ceaffe4e8e0581038678d95710b646db45ec3de47e6c3af) transaction occurred. | ||
- **July 11, 2023, 04:05 PM UTC:** Rodeo Finance [reported](https://twitter.com/Rodeo_Finance/status/1678782465421213697) about the exploit. | ||
- **July 11, 2023, 05:26 PM UTC:** Rodeo Finance sent an [on-chain message](https://etherscan.io/tx/0x3045cd1d7314400ba5eac173a1f7348cebe5bdc6145a212524a85df6d6fd59ed) to the attacker to negotiate the return of the stolen funds. | ||
- **July 12, 2023:** Rodeo Finance [published](https://medium.com/@Rodeo_Finance/rodeo-post-mortem-overview-f35635c14101) an exploit Post-Mortem. | ||
|
||
## Security Failure Causes | ||
|
||
- **Price Oracle Manipulation:** The exploit combined a smart contract vulnerability, exploiting TWAP Oracle's pricing mechanism, and using flash loans to manipulate asset prices significantly. This led to the protocol making decisions based on incorrect asset prices, ultimately compromising the system's integrity. |