Skip to main content

As the sale was coming to its end, a blog post titled “A Call for a Temporary Moratorium on The DAO” was published by Dino Mark, Vlad Zamfir and Emin Gun Sirer.The post highlighted several possible attacks, including The Stalking Attack. This attack involved the splitting functionality (the only way to extract ether from the contract) and the recursive nature of sub-contracts, “effectively trapping the victim’s funds and prohibiting conversion back to ether." More flaws related to the recursive nature of theDAO had been highlighted by various group and plans had been made to address some of the problems, when suddenly it became evident that someone had figured out a way to exploit a vulnerability.

In the early morning of June 17 2016, at block 1718497, the account at theDAOAttacker.aetheriablockmuseum.eth started draining theDAO.

One of the advertised properties of theDAO was that it was possible, by anyone, to retrieve their initial investment in theDAO. For example: if they weren’t happy with the direction that the organization was going with a certain proposal. This would be executed by calling splitDAO() which would refund the money and burn theDAO tokens. However, the balance on the initial theDAO contract would only be updated after the ETH had been sent, thus exposing the contract to recursive attacks. In this case, the contract would calculate the funds to be moved; then payout would occur, then the balances would be updated. During payout, the funds would be transferred from theDAO treasury to the recipient. What if the recipient was a contract address? What if the default behavior on that contract was to call splitDAO too? Since balances were only updated later, this would allow someone to get payouts multiple times before their balance is updated. The attacker did exactly that via "The Dark DAO", their own malicious child DAO (theDarkDAO.aetheriablockmuseum.eth).

Future token sales were designed after learning from theDAO contract flaws. In particular, the lack of separation of concern was addressed by dividing the logic in multiple contracts (for example: one contract dedicated for the sale, and another one to implement the ERC20 interface). Another common improvement for future sales was to transfer the funds to a dedicated contract (mostly a multi-signature wallet controlled by the team) as opposed to keeping the funds within the sale contract. As of January 2019, theDao contract had processed over 173,000 transactions.

Source: https://coincodex.com/article/50/the-dao-hack-what-happened-and-what-followed/ https://ethereum.stackexchange.com/questions/6224/which-accounts-are-involved-in-mounting-the-recursive-call-vulnerability-attacks/6225#6225 http://hackingdistributed.com/2016/05/27/dao-call-for-moratorium http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/

Block Parks collection image

Exploring Decentraland scene ownership through NFTs and generative art. The PARKs tokens can be used in Decentraland to certify that the scene you are hosting on your LAND is an original scene from artist Sebastian Brocher.

合約地址0x4008...6af8
代幣 ID1
代幣標準ERC-721
區塊鏈Ethereum
創作者收益
0%

theDAO is drained

visibility
57 檢視次數
  • 價格
    美元價格
    數量
    到期日
  • 價格
    美元價格
    數量
    底價差額
    到期日
keyboard_arrow_down
活動
價格
日期

theDAO is drained

visibility
57 檢視次數
  • 價格
    美元價格
    數量
    到期日
  • 價格
    美元價格
    數量
    底價差額
    到期日

As the sale was coming to its end, a blog post titled “A Call for a Temporary Moratorium on The DAO” was published by Dino Mark, Vlad Zamfir and Emin Gun Sirer.The post highlighted several possible attacks, including The Stalking Attack. This attack involved the splitting functionality (the only way to extract ether from the contract) and the recursive nature of sub-contracts, “effectively trapping the victim’s funds and prohibiting conversion back to ether." More flaws related to the recursive nature of theDAO had been highlighted by various group and plans had been made to address some of the problems, when suddenly it became evident that someone had figured out a way to exploit a vulnerability.

In the early morning of June 17 2016, at block 1718497, the account at theDAOAttacker.aetheriablockmuseum.eth started draining theDAO.

One of the advertised properties of theDAO was that it was possible, by anyone, to retrieve their initial investment in theDAO. For example: if they weren’t happy with the direction that the organization was going with a certain proposal. This would be executed by calling splitDAO() which would refund the money and burn theDAO tokens. However, the balance on the initial theDAO contract would only be updated after the ETH had been sent, thus exposing the contract to recursive attacks. In this case, the contract would calculate the funds to be moved; then payout would occur, then the balances would be updated. During payout, the funds would be transferred from theDAO treasury to the recipient. What if the recipient was a contract address? What if the default behavior on that contract was to call splitDAO too? Since balances were only updated later, this would allow someone to get payouts multiple times before their balance is updated. The attacker did exactly that via "The Dark DAO", their own malicious child DAO (theDarkDAO.aetheriablockmuseum.eth).

Future token sales were designed after learning from theDAO contract flaws. In particular, the lack of separation of concern was addressed by dividing the logic in multiple contracts (for example: one contract dedicated for the sale, and another one to implement the ERC20 interface). Another common improvement for future sales was to transfer the funds to a dedicated contract (mostly a multi-signature wallet controlled by the team) as opposed to keeping the funds within the sale contract. As of January 2019, theDao contract had processed over 173,000 transactions.

Source: https://coincodex.com/article/50/the-dao-hack-what-happened-and-what-followed/ https://ethereum.stackexchange.com/questions/6224/which-accounts-are-involved-in-mounting-the-recursive-call-vulnerability-attacks/6225#6225 http://hackingdistributed.com/2016/05/27/dao-call-for-moratorium http://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/

Block Parks collection image

Exploring Decentraland scene ownership through NFTs and generative art. The PARKs tokens can be used in Decentraland to certify that the scene you are hosting on your LAND is an original scene from artist Sebastian Brocher.

合約地址0x4008...6af8
代幣 ID1
代幣標準ERC-721
區塊鏈Ethereum
創作者收益
0%
keyboard_arrow_down
活動
價格
日期