Incident statement from LayerZero is out. As expected, the attacker was likely DPRK.


The DVN itself was not compromised as previously speculated, but rather TWO separate RPCs the DVN used to ingest state.
On top of that, attackers DDOS'd the DVN's primary RPCs to force it to fail over to the two compromised ones.
And the compromised RPCs served real state to anybody querying them, only serving malicious state to the DVNs. This enabled the attackers to bypass some of the other safeguards that were in place.
Do NOT underestimate Lazarus. This attack was sophisticated as fuck, make no mistake.
LZ DVN is back online and fully operational but I suspect there will be some serious introspection over the next weeks to months about further hardening security.
Feel for everybody that was affected these last few days. Sometimes you just get outplayed, and DPRK outplayed the good guys once again here.
ZRO2,24%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin