DeFi Protocol Conic Finance hacked for 1,700 Ether.

DeFi Protocol Conic Finance hacked for 1,700 Ether.

The Exploit of Conic Finance: A Closer Look at the Decentralized Finance (DeFi) Protocol

Blockchain technology has revolutionized various industries, with decentralized finance (DeFi) being one of the most prominent beneficiaries. However, recent events have highlighted the vulnerability of DeFi protocols to malicious attacks. One such incident occurred with Conic Finance, a DeFi protocol that suffered an exploit, resulting in the loss of over 1,700 ether (ETH), equivalent to more than $3.6 million at current prices.

Security firm BlockSec, in its analysis of the attack, identified the root cause as “read-only reentrancy,” a form of price manipulation. Reentrancy is a common bug that allows attackers to deceive smart contracts by repeatedly calling a protocol, thereby stealing assets. In this case, the attacker manipulated the price to gain unauthorized access to the assets held in one of Conic Finance’s Omnipools.

To understand the context of this incident, it is crucial to delve into the workings of Conic Finance. Launched on March 1, Conic Finance offers users the opportunity to deposit tokens into its Omnipools. These Omnipools are a novel product designed to diversify exposure across the Curve ecosystem while increasing rewards. The protocol gained significant traction within a short period, indicating substantial demand for such a product.

Each Omnipool within Conic Finance allocates liquidity of a single asset into different Curve pools. Curve is an established decentralized exchange protocol that specializes in stablecoin trading. By staking all Curve liquidity provider (LP) tokens on Convex, another Curve ecosystem token, users can enhance their Curve (CRV) rewards earnings. In addition, Conic Finance rewards its users with its native token, Conic (CNC).

The exploit that affected Conic Finance underscores the importance of addressing potential vulnerabilities in DeFi protocols. While the developers of Conic Finance are actively investigating the root cause of the exploit, it is important to consider measures that can enhance the security of such protocols.

One possible approach is to implement stricter authorization mechanisms within smart contracts. By carefully designing calls between smart contract addresses and user wallet addresses, developers can reduce the risk of unauthorized access. Additionally, auditing the code by third-party security firms can help identify and resolve potential vulnerabilities before malicious actors exploit them.

Furthermore, the incident with Conic Finance highlights the need for continuous monitoring and swift action in response to potential exploits. The developers of Conic Finance promptly closed the faulty pool that allowed the hack to occur. This immediate response demonstrates the commitment of the team to safeguarding user funds and mitigating the impact of the exploit.

To summarize the key points discussed: – Conic Finance, a DeFi protocol, suffered an exploit that led to the loss of over 1,700 ETH. – The root cause of the attack was identified as “read-only reentrancy,” a form of price manipulation. – Conic Finance’s Omnipools offer users the opportunity to diversify exposure across the Curve ecosystem and increase rewards. – Strict authorization mechanisms and third-party audits are essential for enhancing the security of DeFi protocols. – Continuous monitoring and prompt action are crucial in mitigating the impact of exploits.

In conclusion, while the incident with Conic Finance is unfortunate, it serves as a valuable lesson for the blockchain industry as a whole. By addressing potential vulnerabilities, implementing robust security measures, and maintaining vigilance, we can create a safer and more resilient DeFi ecosystem. The future of decentralized finance lies in our ability to learn from incidents like these and continually improve the security of blockchain protocols.

We will continue to update Phone&Auto; if you have any questions or suggestions, please contact us!


Was this article helpful?

93 out of 132 found this helpful

Discover more


Safety 100% | How to use tools to track disappeared coins?

For investors and investigators, it is essential to consider how to anticipate threats before risky activities occur,...


FATF reports poor implementation of Crypto Travel Rule.

The Financial Action Task Force of the United Nations has once again recommended that member countries enforce its Tr...


From Crypto Chair to Prison Cell Former Bithumb Chair Slapped with 8-Year Sentence

Bithumb's ex-chair Lee Jeong-hoon could face 8 years in prison if his appeal is unsuccessful.


MKR Soars 120% in 3 Months as Whales and New Wallets Accumulate

According to on-chain data, there is an increasing interest from whales and new wallets in acquiring Maker (MKR), whi...


Curve's value increases by 22% as the founder sells CRV tokens to repay an Aave loan.

Curve experiences significant growth, with a 22% increase, thanks to the founder's successful sale of CRV to influent...


Magnate Finance rug-pulls users of $6.5M, as predicted by on-chain sleuth.

The individual responsible for the rugpull has successfully transferred the majority of the profits to popular Ethere...