- Blockbasis
- Posts
- Bittensor: Decrypting the $8 Million Hack
Bittensor: Decrypting the $8 Million Hack
Understanding Bittensor's $8 Million Hack: Decrypting the Security Breach, Implications for Blockchain Stability, and Lessons Learned in Crypto Security
TL;DR
Bittensor faced an $8 million hack due to a compromised PyPi Package Manager, resulting in the theft of 32,000 TAO tokens. The attack prompted swift action, including halting network operations and implementing enhanced security measures. This incident underscores vulnerabilities in third-party tools and raises broader concerns in the crypto community about package manager security.
Make Sure This Hack Doesn’t Happen To You 🫵
Subscribe to Blockbasis and get access to our premium scanner to check whether your the funds in your wallet is safeguarded from hacks 🔐
For a limited period only, you can get a 7 day FREE trial!
Tried to scan your wallet for any exploited contracts connected to your wallet?
If not, you probably should. Better be safe than sorry 🙏
— Blockbasis (@Blockbasis)
1:19 PM • May 6, 2022
All for just $50/month after the trial.
Don't miss out! Grab your FREE trial today 👇
On July 2, Bittensor's blockchain faced a significant disruption due to an $8 million hack originating from a compromised PyPi Package Manager.
Validators, deeply engaged in their node activities, were blindsided as an attacker swiftly drained their wallets.
Approximately 32,000 TAO tokens were illicitly transferred to the hacker's wallet, exploiting the path of the TAO.
In response, the Bittensor team acted promptly, halting all network operations to address the breach.
In response to this breach, the Bittensor team acted swiftly, halting all network operations to address the issue.
The network was placed in "safe mode," allowing block production but suspending all transactions to prevent further losses and protect users during the investigation.
This swift action resulted in a 15% decline in the TAO token's value, illustrating the volatility of the blockchain market.
While users and stakers remain unaffected, owners of some validators, subnets, and miners suffered significant losses, as stated in Bittensor’s Telegram channel.
Ready to unpack this complex and cosmic-level crisis?
Receive weekly Bitcoin summaries with news, insights and analysis on all things Bitcoin, all for free.
In an announcement on Discord, Bittensor revealed that several of their wallets had been targeted in a sophisticated attack. The team is currently investigating the breach and has halted all on-chain transactions as a precautionary measure.
The attack on Bittensor's blockchain was executed with remarkable precision.
Within a mere three-hour window, the perpetrator compromised multiple high-value wallets, absconding with approximately 32,000 TAO tokens.
As the Bittensor team mobilized to address the breach, renowned crypto investigator ZachXBT quickly identified the address responsible for the theft:
ZachXBT's investigation suggests a potential connection to a previous incident on June 1, where another TAO holder lost over 28,000 TAO tokens, valued at $11.2 million at the time.
The day following the attack, the Opentensor Foundation (OTF) released a post-mortem report, pinpointing the root cause of the breach to a compromised PyPi Package Manager.
Here's how this digital disaster developed
The attack on Bittensor began with a malicious package disguised as a legitimate Bittensor update, which infiltrated the PyPi repository in version 6.12.2.
This trojan horse contained code specifically crafted to steal unencrypted coldkey details.
When users unsuspectingly downloaded the compromised package and decrypted their coldkeys, the decrypted bytecode was transmitted to a remote server under the attacker’s control.
This vulnerability affected users who downloaded the Bittensor PyPi package between May 22 and May 29 or those using Bittensor==6.12.2, especially when performing operations such as staking, unstaking, transferring, delegating, or undelegating.
@ejorejorson23 - If you hold TAO on exchanges you are not at risk.
- If you installed Bittensor 6.12.2 from source you are not at risk.
- If you used a web wallet you are not at risk.
- If you installed Bittensor 6.12.2 from PyPy but did not run any commands you are not at risk.
- If you… x.com/i/web/status/1…
— const (@const_reborn)
10:32 PM • Jul 3, 2024
In response to the breach, the Bittensor team swiftly put the blockchain into "safe mode," halting all transactions while continuing to produce blocks.
This decisive action may have mitigated further losses but also underscored the centralized control the team exerts over the ostensibly decentralized network.
The OTF has swiftly implemented measures to mitigate the damage
In the wake of the attack, the Opentensor Foundation (OTF) has implemented swift measures to mitigate the damage.
The malicious 6.12.2 package was promptly removed from the PyPi Package Manager repository.
Additionally, a thorough review of the Subtensor and Bittensor code on GitHub was conducted to ensure no further vulnerabilities remained.
Collaborating with various exchanges, the OTF has been working to trace the attacker and potentially recover the stolen funds.
Looking ahead, the OTF has committed to enhanced package verification, increased frequency of external audits, improved security standards, and heightened monitoring to prevent similar incidents in the future.
The OTF clarified that the attack did not compromise the blockchain or Subtensor code, affirming that the underlying Bittensor protocol remains secure.
The cooperation with exchanges continues as detailed information about the attack is shared in the hopes of tracking the perpetrator and recovering the stolen assets.
As the community reflects on the incident, questions arise about how the malicious package bypassed PyPi's defenses and whether there is a connection to the June 1st theft.
In the world of Bittensor, the pursuit of blockchain enlightenment appears to be fraught with unexpected challenges, leaving some with lighter wallets along the way.
Get Ahead In Crypto. Join 15,000+ subscribers and get our free 5-min daily newsletter
The Bittensor hack highlights a critical vulnerability within the crypto ecosystem: the dependence on third-party package managers.
While blockchain protocols themselves may be inherently secure, the tools developers use to interact with these protocols can become unforeseen points of failure.
This incident prompts serious questions about the security practices of PyPi and other package repositories that the crypto community relies upon.
The ease with which a malicious package infiltrated PyPi underscores the need for more stringent security measures within these repositories.
The timing and similarity to the June 1st theft cannot be overlooked.
It raises the question of whether these are isolated incidents or part of a broader campaign targeting Bittensor and similar projects.
This uncertainty adds a layer of urgency for the crypto community to reassess and strengthen their security protocols, ensuring that the pursuit of innovation does not come at the expense of security.
As the Opentensor Foundation (OTF) collaborates with exchanges to trace the stolen funds, the crypto community waits anxiously, hoping for a recovery that often eludes victims of such hacks.
Bittensor's decisive action in halting the network reveals the paradox of centralized control within ostensibly decentralized projects.
While it effectively mitigated further losses, it also underscores the inherent fragility of the system.
In the Tao of crypto, change is constant, occasionally punctuated by unexpected $8 million disappearances.
As Bittensor reevaluates its security practices, the quest for true blockchain enlightenment intensifies. Will these challenges forge a more resilient protocol, or are they costly lessons on the journey toward greater security and reliability?