On January 9th early morning, a sudden attack turned the Truebit Protocol contract deployed five years ago into a "cash machine"—the attacker drained 8,535.36 ETH from the contract in a short period, worth approximately $26.4 million at the time.



The security team's analysis uncovered the details of this incident. The attack method was not complicated but highly effective.

**The attack process was as follows:**

First, the attacker used the getPurchasePrice( function to probe price information. Then, they targeted a flawed function within the contract, initiating calls with a very small msg.value. Since the contract code was not open source, decompilation suggested that this function had an arithmetic logic vulnerability—most likely improper handling of integer truncation—allowing the attacker to mint a large amount of TRU tokens out of thin air.

The key step was then to use the burn function to "sell back" these artificially created tokens to the contract, extracting real ETH in the process. This operation was repeated five times, with msg.value gradually increasing each time, ultimately nearly draining the ETH reserves of the contract.

This incident served as a wake-up call for the industry—even projects deployed five years ago, if their contract logic contains vulnerabilities and is not promptly updated, can still become targets for hackers.
ETH-1.03%
TRU1.61%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • 5
  • Repost
  • Share
Comment
0/400
ChainWallflowervip
· 14h ago
Now it's settled, even a five-year contract can't be saved. A basic bug like integer truncation can cause a crash. No wonder so many old projects have become ATMs.
View OriginalReply0
SocialFiQueenvip
· 14h ago
Damn, the integer truncation vulnerability can still be exploited for five more years? How lazy is Truebit...
View OriginalReply0
RooftopVIPvip
· 14h ago
Damn, a five-year-old project can still be exploited like this... I'm really speechless, who would've thought?
View OriginalReply0
OvertimeSquidvip
· 14h ago
It's truly outrageous that a five-year-old contract can still be exploited. How has the low-level bug like integer overflow not been fixed yet?
View OriginalReply0
GateUser-9ad11037vip
· 14h ago
A contract that hasn't been updated in five years and still holds so much ETH? Isn't this just inviting hackers in?
View OriginalReply0
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)