LogoLogo
  • Getting Started
    • 🚧The Gitbook is currently being updated
    • Official Links
  • Fantom Redeployment
    • Fantom Redeployment
  • Stablecoin
  • Migration
    • Claims and Migration
  • Contracts
    • Reimbursement Guide
      • Reimbursement Process
        • Waiver and Release Letter
      • Long-Term Reimbursement Plan
        • SYMM / DEUSmigration
        • bonded DEI (bDEI)
        • Users Who Purchased DEI
      • DEI - Depeg
        • Incident - Analytic Summary
          • Summary
          • Attack Details
          • The cause for the exploit
          • Reimbursement plan
          • Moving Forward
    • ⚖️Legals & Disclaimer
      • Bug Bounty
      • Terms of Service
  • Brand Assets
    • Logo
  • Bridge
    • How to Bridge
Powered by GitBook
On this page
  • Incident Analysis
  • Incident
  • Exploiter Profile
  • Impact Assessment
  • Technical Analysis
  • Recovery Plan
  • Moving forward
  1. Contracts
  2. Reimbursement Guide
  3. DEI - Depeg

Incident - Analytic Summary

PreviousDEI - DepegNextSummary

Last updated 1 year ago

Incident Analysis

Incident

On 5th May at approximately 19:52 Berlin Time, the DEUS Finance project and its DEI token listed on the Chronos Exchange on the Arbitrum platform experienced a significant security breach due to a bug in the DEI token implementation. An unknown attacker exploited the implementation and stole all funds from the underlying Liquidity Pool. Amidst the turmoil, numerous users bought, sold, and transferred their DEI tokens, exacerbating the situation. The projected loss for users of the DEUS Finance platform currently stands at approximately -5,838,827.80.

More details

Exploiter Profile

We postulate that the initial attack was a hurried and inadequately prepared exploit. The evidence that led us to this assumption includes the attacker's rushed development, as evidenced by an MEV bot front-running them on BSC. Interestingly, the attacker removed USDC from the pool but redeposited DEI back into the pool. This allowed participants to purchase DEI for cents and transfer it to other LP pools.

If the attacker had allocated more time for planning, they could have simultaneously targeted all LP pools across all chains. Moreover, they could have been the first to exhaust all bridge funds for movement to Fantom. However, their rushed actions created massive arbitrage opportunities for other participants rather than capitalizing on them themselves.

These actions resulted in losses for DEI holders. However, the losses didn't benefit the initial attacker, which leads us to believe that the attack was more of a quick and dirty solution. We conjecture that the attacker opted for a rushed approach, likely fearing that someone else might discover the bug or that his main target was causing maximum damage.

More about the attack itself.

Impact Assessment

The full extent of the damage is yet to be determined. However, as of the recent estimates, full recovery for LPs is estimated at 70%, restoring DEI to its total value, backing at 90% as before.

More about the recovery.

Technical Analysis

The technical cause of the exploit is tied to implementing a self-written permissionless burnFrom function within the DEI token contract. The DEI team had previously decided to implement the Lossless ERC20 contract, which created an issue when trying to implement a burnFrom due to LERC20's lack of a _spendAllowance function.

As a result, the DEI team implemented a custom-written burnable function, which led to the exploit.

Recovery Plan

The DEI team is working on a recovery plan, which includes thoroughly assessing the damage and restoring balances for DEI holders and LPs. In the mid-term, the team is looking at internal & external structural changes to ensure that such an incident do not occur again in the future.

Moving forward

  • Future Preventative Measures Lessons Learned.

  • Proposed Changes in security processes

More about the & the .

A detailed recovery plan will be released in the upcoming weeks

, we will formulate a strategic evaluation and blueprint designed to preempt and mitigate such errors in future operations.

here.
attack details
reasoning
here.
Here