More

    Hope Finance exploit results in $2M stolen from users’ funds

    Prospective users of an Arbitrum-based decentralized finance (DeFi) project have been left out of pocket following a $2 million exploit.

    Web3 security firm CertiK flagged the incident on Feb. 21, following an announcement from the Hope Finance Twitter account notifying users of the scam.

    Details of the project are difficult to come by. The platform’s Twitter account was launched in January 2023 and outlined plans for an algorithmic stablecoin called Hope token (HOPE), which dynamically adjusts its supply relative to the price of Ether (ETH).

    Posts on the account allege that a Nigerian national had executed the scam and transferred over $1.86 million to Tornado Cash shortly after the platform went live on Feb. 20. A member of the CertiK team told Cointelegraph that the scammer had changed the details of the smart contract, which led to funds being drained from Hope Finance genesis protocol:

    “It appears that the scammer changed the TradingHelper contract which meant that when 0x4481 calls OpenTrade on the GenesisRewardPool the funds are transferred to the scammer.”

    According to a tweet dated Feb. 13, the Hope Finance smart contract was audited by a Cognitos official. Cointelegraph reviewed the audit summary, which flagged two major contract function vulnerabilities. 

    Cognitos audit of Hope Finance’s smart contract. Source: Cognitos

    This included an incorrect modifier and the possibility of reentrancy attacks. Despite flagging these vulnerabilities, Cognitos found that the smart contract code had passed the audit successfully.

    Following the scam, Hope Finance shared information with users to withdraw staked liquidity from the protocol through an emergency withdrawal function.

    Arbitrum is an Ethereum layer 2 roll-up network that enables exponential scaling of smart contracts. Alongside Optimism, the two layer-2 protocols continue to handle an increasing amount of transactions within the Ethereum ecosystem.