Omer Goldberg: Time locks are essential for multisig security, the Drift attack reveals vulnerabilities in DeFi, and admin key protection is critical to prevent exploits | Unchained
Multisig security flaws and sophisticated attacks reveal urgent need for stronger DeFi protection measures.
Key Takeaways
- Time locks are crucial in multisig setups to prevent unauthorized transactions.
- The Drift attack was executed by someone with deep system knowledge.
- Minimal signature requirements in multisig setups can lead to security vulnerabilities.
- Open-source packages can be exploited to gain root access to developers’ machines.
- Admin key security is vital to prevent unauthorized multisig creation.
- Scam tokens with unlimited parameters can manipulate markets and oracles.
- Sophisticated attacks often involve multiple manipulation techniques.
- Whitelisting assets as collateral is crucial in lending applications.
- Durable nonces can streamline user experience but pose security risks.
- Robust system architecture is essential for effective security and risk management.
- The Drift attack highlights the need for improved security measures in DeFi.
- Understanding the mechanics of token creation can prevent market manipulation.
- Sophisticated attacks require a combination of technical and social engineering tactics.
Guest intro
Omer Goldberg is the Founder and CEO of Chaos Labs. He previously served as Tech Lead at Instagram, building mobile experiences for Commerce Ads. At Chaos Labs, he has developed infrastructure like the Edge oracle system that processes over $200 billion in volume while securing major crypto protocols.
The importance of time locks in multisig setups
-
The lack of a time lock in the multisig setup can lead to significant security vulnerabilities.
— Omer Goldberg
- Time locks provide an additional security precaution by delaying transaction execution.
-
This multisig was a two zero five multisig notably it had zero time lock on any of the functions it could execute.
— Omer Goldberg
- Without time locks, transactions can be executed immediately after signing, increasing risk.
- Time locks help prevent unauthorized transactions by allowing time for intervention.
-
A time lock basically says after they sign it there’s a gap between when it actually executes.
— Omer Goldberg
- Implementing time locks can significantly enhance the security of smart contract systems.
- Multisig setups without time locks are more vulnerable to exploitation.
The methodical nature of the Drift attack
-
The attack on Drift was methodical and executed by someone with a deep understanding of the system.
— Omer Goldberg
- The attacker studied the program and planned the attack strategically.
-
This was not like a random person who stumbled upon the keys.
— Omer Goldberg
- The sophistication of the attack indicates a shift towards more organized adversaries in the crypto space.
- Such attacks require a deep understanding of the target system’s vulnerabilities.
-
They were methodical and strategic in how they planned everything and executed.
— Omer Goldberg
- The Drift attack exemplifies the increasing complexity of threats in the DeFi sector.
- Understanding the complexity of such attacks is crucial for developing effective security measures.
Security implications of minimal signature requirements in multisig
-
The compromise of the multisig setup was due to its minimal signature requirement, making it less secure.
— Omer Goldberg
- A two-of-five multisig setup is only one step above a single key in terms of security.
-
It wasn’t a single key it was a multisig however it was a two zero five multisig.
— Omer Goldberg
- Minimal signature requirements can make multisig setups more vulnerable to attacks.
- Increasing the number of required signatures can enhance security.
-
This is like the minimum amount of signatures that you would need in a multisig.
— Omer Goldberg
- The security of multisig setups is directly related to the number of signatures required.
- Understanding these vulnerabilities is critical for improving multisig security protocols.
Exploits in open-source packages and their impact
-
Exploits can be introduced into popular open-source packages, allowing attackers to gain root access to developers’ machines.
— Omer Goldberg
- Attackers can modify open-source software to introduce vulnerabilities.
-
If you can actually receive control on one of these packages you just make a tiny modification.
— Omer Goldberg
- These modifications can provide attackers with root access to compromised machines.
-
Once run on any developer’s machine gives you root access to the machine.
— Omer Goldberg
- The security of open-source software is critical to preventing supply chain attacks.
- Understanding these risks is essential for developers working with open-source dependencies.
- Vigilance and regular audits are necessary to maintain the security of open-source projects.
The role of admin keys in the Drift hack
-
The hack was likely facilitated by the hacker having prior access to the admin keys.
— Omer Goldberg
- Admin keys allowed the hacker to create a new multisig without the original signer’s knowledge.
-
It looks like this was a planned event and I think that the hacker had some type of access.
— Omer Goldberg
- The security of admin keys is crucial to prevent unauthorized access and actions.
-
He may have had access kind of to the rest of the keys and that’s where the two signatures came from.
— Omer Goldberg
- Ensuring the security of admin keys can prevent similar exploits in the future.
- Understanding the role of admin keys is essential for maintaining system integrity.
- The Drift hack underscores the importance of securing admin keys in decentralized systems.
The mechanics of market manipulation in DeFi
-
The exploit involved creating a scam token with unlimited parameters that allowed manipulation of the market and oracle.
— Omer Goldberg
- Scam tokens can be used to manipulate market conditions and exploit protocols.
-
The coin cbt itself is just like a a scam token that was created for the purpose of this attack.
— Omer Goldberg
- The attack exploited the ability to add the scam token as a new collateral asset.
-
What did have the unlimited parameters and infinite parameters and max parameters set was the market.
— Omer Goldberg
- Understanding token mechanics is crucial to preventing market manipulation.
- The exploit highlights vulnerabilities in the way collateral assets are managed in DeFi.
-
This enabled the user or the exploiter to add cbt as a new collateral asset on the drift protocol.
— Omer Goldberg
The sophistication of multi-technique attacks
-
The attack was sophisticated, utilizing multiple manipulation techniques including oracle and market manipulation.
— Omer Goldberg
- Sophisticated attacks often involve a combination of technical and social engineering tactics.
-
This is again why I say it’s sophisticated because this attacker was preparing.
— Omer Goldberg
- Oracle manipulation can be a critical component of complex DeFi attacks.
-
There was a social engineering component but then there was an oracle manipulation and then there was market manipulation.
— Omer Goldberg
- Understanding these techniques is crucial for developing comprehensive security measures.
- The complexity of such attacks emphasizes the need for robust security protocols.
- Multi-technique attacks require a deep understanding of both technical and social vulnerabilities.
The significance of collateral whitelisting in lending applications
-
The ability to whitelist assets as collateral in lending applications is crucial because it determines the credit line extended against those assets.
— Omer Goldberg
- Whitelisting determines which assets can be used as collateral in lending protocols.
-
In any kind of lending application or vault application it’s a pretty big deal which assets can be whitelisted.
— Omer Goldberg
- The process of whitelisting affects the credit lines available to users.
- Understanding collateral management is essential for maintaining the stability of lending applications.
-
You’re extending a credit line against those assets.
— Omer Goldberg
- Proper collateral management can prevent exploitation and maintain system integrity.
- The security of lending applications is closely tied to how collateral is managed and whitelisted.
The dual nature of durable nonces in blockchain
-
A durable nonce allows transactions to be signed without time expiration, which can streamline user experience but also creates security vulnerabilities.
— Omer Goldberg
- Durable nonces can improve user experience by removing time constraints on transactions.
-
The durable nonce basically like what it solves for is that you can sign transactions that don’t have time expiration.
— Omer Goldberg
- However, they can also be exploited if attackers gain access to signing keys.
-
As soon as the attacker had access to those keys they were able to sign on those transactions and not ring any alarms.
— Omer Goldberg
- Understanding the implications of durable nonces is crucial for balancing user experience and security.
- The use of durable nonces requires careful consideration of potential security risks.
- Balancing the benefits and risks of durable nonces is essential for secure blockchain implementations.
The foundational role of system architecture in security
-
A robust system architecture is essential for effective security and risk management.
— Omer Goldberg
- Sound architecture is the foundation of a secure and resilient system.
-
The way to solve this is actually having like a good setup sound architecture and robust system.
— Omer Goldberg
- Proactive security measures are critical to preventing security issues before they occur.
-
That’s number one this is like after the fact.
— Omer Goldberg
- Understanding the importance of system architecture is crucial for anyone involved in tech security.
- A well-designed system architecture can prevent many common security vulnerabilities.
- The Drift hack highlights the need for robust architecture in preventing security breaches.
Earn with Nexo