Hedera, the workforce behind the distributed ledger Hedera Hashgraph, has confirmed a sensible contract exploit on the Hedera mainnet that led to the theft of a number of liquidity pool tokens.
In accordance with Hedera, the attacker focused liquidity pool tokens on decentralized exchanges (DEXs) that had derived their code from Uniswap v2 on Ethereum, which was ported to be used on the Hedera Token Service.
In the present day, attackers have exploited the Hedera mainnet’s sensible contract service code to switch Hedera Token Service tokens held by victims’ accounts to their very own account. (1/6)
— Hedera (@hedera) March 10, 2023
The Hedera workforce defined that the suspicious exercise was found when the attacker tried to maneuver the stolen tokens throughout the Hashport bridge, which consisted of liquidity pool tokens on SaucerSwap, Pangolin, and HeliSwap. Operators acted promptly to quickly halt the bridge.
Hedera didn’t verify the quantity of tokens stolen.
On February third, Hedera upgraded the community to transform Ethereum Digital Machine (EVM) suitable sensible contract code to the Hedera Token Service (HTS).
A part of this course of includes decompiling the Ethereum contract bytecode to the HTS the place the Hedera-based DEX SaucerSwap resides believes the assault vector got here from. Nonetheless, Hedera didn’t verify this in his final submit.
Beforehand, Hedera managed to close down community entry by shutting down IP proxies on March ninth. The workforce stated it had recognized the “root trigger” of the exploit and was “engaged on a repair.”
To forestall the attacker from stealing extra tokens, Hedera disabled mainnet proxies, eradicating consumer entry to the mainnet. The workforce has recognized the reason for the issue and is engaged on an answer. (5/6)
— Hedera (@hedera) March 10, 2023
“As soon as the answer is full, Hedera Council members will signal transactions to authorize the deployment of up to date code to mainnet to handle this vulnerability. At that time, the mainnet proxies shall be turned again on, permitting regular exercise to renew,” the workforce added.
As a result of Hedera shut down proxies shortly after discovering the potential exploit, the workforce recommended Token holders examine the balances on their account ID and Ethereum Digital Machine (EVM) deal with on hashscan.io for their very own “comfort”.
All HashPack features are unavailable throughout this downtime https://t.co/ngaRmg00Zi
— HashPack pockets (@HashPackApp) March 9, 2023
Associated: Hedera Governing Council buys Hashgraph IP and code from open supply challenge
The value of the community’s Hedera (HBAR) token is down 7% because the incident roughly 16 hours in the past, in step with the broader market decline over the previous 24 hours.
Nonetheless, the Whole Worth (TVL) on SaucerSwap fell practically 30% from $20.7 million to $14.58 million over the identical interval:

The drop suggests {that a} important variety of token holders acted rapidly and withdrew their funds after preliminary dialogue of a potential exploit.
The incident might have spoiled a serious milestone for the community because the Hedera mainnet surpassed 5 billion transactions on March ninth.
#Hedera: 5 BILLION mainnet transactions!
Actual Transactions. Actual Functions. actual world #utility. are you watching
we’re witness #DLT Adoption on an unprecedented scale.
That is only the start. pic.twitter.com/n0TbWTJmC0
— Hedera (@hedera) March 8, 2023
This seems to be the primary reported community exploit on Hedera since its inception in July 2017.