Executive Summary
WazirX Crypto Exchange Suffers Multi-Million Dollar Security Breach
On July 18, 2024, a cyberattack compromised a multi-signature Ethereum (ETH) and ERC-20 token wallet belonging to the Indian cryptocurrency exchange WazirX. The attackers siphoned off approximately $230 million worth of digital assets, representing nearly half of WazirX's total holdings according to their most recent proof-of-reserve report (approximately $503 million).
Potential North Korean Involvement
The attack bears hallmarks of previous campaigns by the Lazarus Group, a North Korean state-sponsored hacking group. This suspicion stems from similarities in tactics and the identification of the attacker's KYC wallet on the Binance exchange.
Exploiting the Multi-Signature Wallet
The perpetrators gained unauthorized access to multiple keys required for authorizing transactions within the targeted multi-signature wallet. They employed various techniques to obfuscate their movements, including:
- Transferring stolen funds across multiple blockchain networks (chain hopping)
- Fragmenting large sums into transactions involving various cryptocurrencies
- Executing transactions resulting in zero ETH balances or generating spoofed transaction tokens
Blockchain analysis indicates that the attackers may have been preparing for this assault for eight days prior to its execution.
Lookalike Domain Scam
Capitalizing on the confusion surrounding the breach, a separate group of fraudsters has deployed lookalike domains that mimic the legitimate WazirX platform. These deceptive websites utilize similar naming conventions to lure unsuspecting victims, particularly those impacted by the initial security breach. The objective is to trick users into surrendering any remaining cryptocurrency holdings within their wallets.
Limited Recovery Potential and User Impact
A full recovery of the stolen funds by WazirX appears unlikely. This incident is expected to have significant negative consequences for WazirX users who had invested in cryptocurrencies through the platform.
Recommendations
CloudSEK researchers strongly advise against clicking on suspicious links promising refunds or asset recovery, as these tactics are likely further scams designed to exploit the situation.
Analysis and Attribution
Information from the Post
- On 18 July 2024, WazirX made a post about one of their multisig wallet getting compromised. They also stopped cash and crypto withdrawals from the platform. [3]
- This was followed by investigations by independent researchers and evangelists from the Web3 space. [4] [5]
- Preliminary investigations revealed that about ~$230 Million worth of crypto assets from their wallet were transferred to an unknown malicious wallet. Affected WazirX Wallet Address: 0x27fD43BABfbe83a81d14665b1a6fB8030A60C9b4
This was super critical as this is almost 50% of all assets owned by WazirX based on their recent asset inventory filing. WazirX, as per its latest proof-of-reserve report, was holding $503 million of assets.
How did the attack unfold?
WazirX claims that the cyber attack stemmed from a discrepancy between the data displayed on Liminal’s interface and the transaction’s actual contents.
“During the cyber attack, there was a mismatch between the information displayed on Liminal’s interface and what was actually signed. We suspect the payload was replaced to transfer wallet control to an attacker.” - WazirX [3]
The provided information suggests a potential phishing attack. In the past, we have observed instances where attackers injected malicious JavaScript code into web pages. This code manipulates the displayed information on the website's interface, while the actual transaction value remains undisclosed.[8]
A similar tactic is known as signature phishing. This method involves attackers tricking users into signing an off-chain message. This signature can then be exploited later to steal the user's assets. [6]
What is a multi-sig wallet?
A multi-signature wallet, often abbreviated as multi-sig, necessitates the use of multiple private keys to authorize cryptocurrency transactions. This security measure can be likened to a safe requiring two or more keys for access.
In this specific instance, the wallet employed a 6 key multi-signature configuration. Five keys were held by authorized WazirX personnel, while the remaining key was entrusted to a Liminal signatory. To execute a transaction, a minimum of three keys from the WazirX contingent, along with Liminal's key, were required. This multi-layered security approach aimed to mitigate potential financial losses arising from compromised or stolen credentials, effectively preventing single points of failure attacks.
Unfortunately, according to reports, attackers gained unauthorized access to two of the keys and employed phishing techniques to compromise an additional two.
Cashout Process:
The perpetrators are reportedly leveraging Tornado Cash, an open-source, decentralized cryptocurrency mixing service built on the Ethereum Virtual Machine (EVM) network. This technology facilitates the obfuscation of transaction trails by commingling potentially identifiable or compromised cryptocurrency funds with those from other users. In this instance, the objective appears to be the concealment of the final destination of the stolen assets.
To further complicate tracking efforts, the threat actors are employing a technique known as "chain hopping." This involves transferring illicit funds across multiple blockchains, fragmenting the overall transaction and making it more challenging to trace the complete path of the stolen cryptocurrency.
The perpetrators are further obfuscating their movements by executing a high volume of transactions that ultimately result in either zero ETH balances or the generation of spoofed transaction tokens. This tactic injects a layer of abstraction, making visual transaction history analysis exceptionally challenging.
People are trying to make the most of this situation by further attacking the people in distress
These deceptive websites mimic the legitimate WazirX platform through similar naming conventions. The goal is to lure unsuspecting victims, likely those affected by the initial security breach, to unwittingly surrender any remaining cryptocurrency holdings within their wallets.
Whois records, a publicly accessible registry of domain name ownership information, reveal that the fraudulent domain was registered on the same day as the attack. This swift action underscores the perpetrators' opportunistic and active nature. This tactic exemplifies another form of signature phishing attack, where seemingly trusted sources are exploited to deceive victims. Further information regarding such impersonation attempts can be found here [6]
A compromised Twitter gold account impersonation WazirX was sharing this, more about such accounts here - [7]
- Bots on Twitter started advertising scammers' services, who claim they will be able to help with refunds but are actually in the business of scamming people.
References
- *Intelligence source and information reliability - Wikipedia
- #Traffic Light Protocol - Wikipedia
- Preliminary Report: Cyber Attack on WazirX Multisig Wallet ( Official statement from wazirx )
- https://x.com/Mudit__Gupta/status/1813881385800913327 (Technical Analysis of the attack)
- https://x.com/zachxbt/status/1813896332022882686 (Attacker wallet and Identity )
- Signature phishing | MetaMask Help Center 🦊♥️
- Gold Rush on the Dark Web: Threat Actors Target X (Twitter) Gold Accounts | CloudSEK (Spreading fake domains through Twitter gold accounts )
- Cryptocurrency Racket: The Growing Perils of Investing in Mysterious Cryptocurrencies | CloudSEK
Appendix
- Flow of funds before the actual attack happened on the wallet.
- Primary Hacker’s address: 0x04b21735E93Fa3f8df70e2Da89e6922616891a88
- Secondary Address: 0x35febC10112302e0d69F35F42cCe85816f8745CA
- Tertiary address: 0x90ca792206eD7Ee9bc9da0d0dF981FC5619F91Fd
- List of stolen assets from the Wallet.