Truebit is an Ethereum-based auxiliary protocol that helps smart contracts efficiently handle complex tasks. Its native token is TRU.
The attack resulted in a loss of approximately 8,535 ETH, worth about $26.6 million.
The attacker exploited a vulnerability in an old smart contract deployed five years ago within the Truebit protocol.
This contract had a logical error: when requesting to mint a large amount of TRU tokens, the calculated purchase price becomes abnormally low, even approaching zero.
The attacker's steps were roughly as follows:
1. The attacker calls the contract's buy/mint function to create a massive amount of TRU tokens at a very low ETH cost.
2. The protocol uses a pricing curve to manage TRU buy and sell prices. The attacker sells the freshly minted TRU tokens back to the contract.
3. Repeating the buy-sell cycle: by repeatedly executing "buy (mint) at low price → sell at high price," the attacker continuously drains funds from the contract's ETH reserves until approximately 8,535 ETH (worth about $26.6 million) are drained.
This vulnerability is essentially a pricing overflow or boundary condition error, causing price calculation failure during large minting operations. The incident involved at least two attackers, with the main attacker profiting about $26 million. The Truebit team has confirmed the incident and paused related contract interactions.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Truebit遭攻击,TRU币暴跌99.9%
Truebit is an Ethereum-based auxiliary protocol that helps smart contracts efficiently handle complex tasks. Its native token is TRU.
The attack resulted in a loss of approximately 8,535 ETH, worth about $26.6 million.
The attacker exploited a vulnerability in an old smart contract deployed five years ago within the Truebit protocol.
This contract had a logical error: when requesting to mint a large amount of TRU tokens, the calculated purchase price becomes abnormally low, even approaching zero.
The attacker's steps were roughly as follows:
1. The attacker calls the contract's buy/mint function to create a massive amount of TRU tokens at a very low ETH cost.
2. The protocol uses a pricing curve to manage TRU buy and sell prices. The attacker sells the freshly minted TRU tokens back to the contract.
3. Repeating the buy-sell cycle: by repeatedly executing "buy (mint) at low price → sell at high price," the attacker continuously drains funds from the contract's ETH reserves until approximately 8,535 ETH (worth about $26.6 million) are drained.
This vulnerability is essentially a pricing overflow or boundary condition error, causing price calculation failure during large minting operations. The incident involved at least two attackers, with the main attacker profiting about $26 million. The Truebit team has confirmed the incident and paused related contract interactions.
#TruebitHack #TRU #CryptoHack #DeFiExploit #Ethereum