On December 4, 2024, Vestra_DAO was hacked due to a logic error in in the staking contract’s unStake() function. The function failed to check whether a staking position was still active before allowing it to be unstaked, enabling the attacker to repeatedly claim yield from an already unstaked position. Exploiting this flaw, the attacker prepared for a month by initially staking VSTR tokens, then calling the unStake()function multiple times to siphon yield repeatedly. The attack drained approximately $500,000 worth of tokens from the Vestra DAO contract.
About Project:VSTR is a token that provides semi-decentralized, Web2+Web3 hybrid services, launched and developed by the NFT community “CMLE” (Crypto Monster Limited Edition). Simultaneously, it operates as a Decentralized Autonomous Operation (DAO) project providing DeFi (Decentralized Finance) solutions. The project, built on the Ethereum platform, adheres to ERC20 standards.
Join @CoinCodeCap on TelegramExploit Details:Attack Transactions: 0x213991ca, 0xa0dcf9b
Vulnerable Contract: 0x8A30d6
Attacker Address: 0x954386
Attacker Contract Address: 0x81AD99
Attack Process:See the funds flow here:
Post Exploit ScenesVestra DAO addressed the hack incident via their official Twitter (X) account:
How could they have prevented the Exploit?Choosing a reputable audit firm like QuillAudits ensures that your protocol undergoes rigorous scrutiny from experienced security professionals. QuillAudits specializes in uncovering critical vulnerabilities and providing actionable remediation strategies. Our expertise helps safeguard your project from attacks, ensuring that security issues are addressed proactively.
Breaking Down CloberDEX’s Costly $501K Exploit was originally published in Coinmonks on Medium, where people are continuing the conversation by highlighting and responding to this story.