Crypto’s most ridiculous robbery? A hacker minted $1 billion in DOT tokens, but only stole $230k

DOT0.17%
ETH-0.54%

Hackers exploited a vulnerability in the Hyperbridge cross-chain bridge to mint 1 billion DOT tokens out of thin air. Although the token face-value amounted to 1.19 billion USD, due to severe market liquidity shortage, they ultimately cashed out only about 237k USD.

Crypto attack incidents are constantly happening, but cases like this—“taking a big risk for small profits”—are really rare. Earlier today (the 13th), a hacker exploited a vulnerability in the Hyperbridge cross-chain bridge to mint 1 billion Polkadot (DOT) tokens out of thin air on Ethereum. The token’s nominal value reached as high as 1.19 billion USD. However, when he tried to sell these tokens, severe liquidity shortage meant he ultimately swapped for only about 237k USD worth of Ethereum.

What needs clarification is that the target of the hacker attack was the “cross-chain bridge smart contract,” so the native DOT tokens on the Polkadot mainnet were not affected. The root cause of this vulnerability was that Hyperbridge’s EthereumHost contract failed to properly verify the authenticity of the message before passing the cross-chain message to TokenGateway.

Image source: X/@OnchainLens

Cross-chain bridges have always been the most vulnerable link in blockchain architecture, because they hold the administrative permissions for token contracts. Once the verification mechanism has a loophole, hackers can easily gain the power to mint tokens infinitely.

Attack method: Forging messages, taking over admin permissions, minting infinitely

On-chain tracking shows that the hacker submitted a forged message via dispatchIncoming and successfully routed it to TokenGateway.onAccept. The system was supposed to verify the authenticity of this message based on the state on the Polkadot chain, but the verification mechanism recorded the commitment value as “all zeros.” This means the verification process was completely bypassed or did not exist at all, so the system mistakenly treated this fake message as a valid instruction.

The accepted message then immediately executed the changeAdmin function on the Polkadot token bridge contract, transferring administrative rights to the attacker’s address. After obtaining the admin permissions, the attacker minted 1 billion DOT tokens in a single transaction and dumped these tokens into Uniswap V4’s DOT-ETH trading pool via Odos Router V3. After multiple swaps at slightly different prices, they ultimately extracted about 108.2 ETH.

“Insufficient liquidity” turned into a protective shield

In financial markets, “insufficient liquidity” is usually the nightmare of big whales, but ironically, this time, insufficient liquidity became an invisible protective shield, greatly limiting the attacker’s profit potential.

Because the DOT liquidity depth on Ethereum is extremely limited, it was impossible to absorb the 1 billion tokens that were minted out of thin air. When the attacker rushed to sell and cash out, severe slippage caused the actual price of each token to be less than even 1 cent.

If this same vulnerability were on a more liquid, or higher-value, bridged asset, it would likely result in losses dozens of times greater. As of the time of writing, the DOT trading price is about $1.17, down 5% over the past 24 hours.

This incident once again shows that even if hackers have “infinite minting rights,” whether they can successfully arbitrage still depends on market liquidity and trading depth. The well-known blockchain security firm CertiK subsequently confirmed the attack and stated that the attacker profited about 237k USD by minting and selling the bridged tokens.

As of now, Hyperbridge’s official team has not issued any public comments regarding the hacker incident.

Image source: X/@CertiKAlert

  • This article is reprinted with permission from: “Blocker”
  • Original title: “The dumbest robbery? Hacker mints $1 billion of $DOT, but only steals $230k for ‘this reason’”
  • Original author: Block Sister MEL
Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Fake Ledger Live App Steals $9.5M From 50+ Users Across Multiple Blockchains

A fraudulent Ledger Live app on Apple's App Store stole $9.5 million from over 50 users by compromising wallet information. The incident, involving significant losses for major investors, raises concerns about App Store security, prompting discussions of a possible lawsuit against Apple.

GateNews6h ago

Criticized for freezing USDC too slowly! Circle CEO: We will definitely wait for the court’s order before freezing—refusing to freeze privately/by ourselves without authorization

Circle CEO Jeremy Allaire said the company will not proactively freeze wallet addresses unless it receives a court order or a request from law enforcement. Even amid hacker money-laundering disputes and community backlash, Circle still insists on operating in accordance with the rule of law. Jeremy Allaire sets Circle’s law-enforcement bottom line ----------------------------- As the global cryptocurrency market roils, Circle’s CEO Jeremy Allaire, the stablecoin issuer, delivered a clear stance on the most sensitive issue in the market at a press conference in Seoul, South Korea. He pointed out that although Circle has the technical means to freeze specific wallet addresses, unless it receives a court order or a formal instruction from law-enforcement authorities, the company will not take such action on its own.

CryptoCity8h ago

Attacker Exploiting Bridged Polkadot Vulnerability Transfers $269K to Tornado Cash

On April 15, Arkham reported that the attacker who exploited a Bridged Polkadot vulnerability transferred around $269,000 in stolen funds to Tornado Cash, complicating asset tracking.

GateNews8h ago

Bitcoin Developers Propose BIP 361 to Protect Against Quantum Computing Threats

Bitcoin developers have proposed BIP 361 to safeguard the network against quantum computer risks by freezing vulnerable addresses. The proposal includes a phased plan to transition users to quantum-safe wallets, but it has sparked debate on user control and security.

GateNews9h ago

Hackers Exploit Obsidian Plugin to Spread PHANTOMPULSE Trojan with Blockchain C2

Elastic Security Labs revealed that threat actors impersonated venture capital firms on LinkedIn and Telegram to deploy a Windows RAT named PHANTOMPULSE, using Obsidian note vaults for attacks, which Elastic Defend successfully blocked.

GateNews10h ago

Zerion Hot Wallet Loses $100K in AI-Driven Social Engineering Attack by North Korea-Linked Hackers

Zerion confirmed a recent AI-driven social engineering attack by North Korean hackers, resulting in a $100,000 loss from corporate hot wallets. User funds remain safe, and the company has taken precautionary measures. This follows another significant attack on Drift Protocol.

GateNews10h ago
Comment
0/400
No comments