Blockchain security firm CertiK received a $500,000 reward from the Sui network after flagging a threat that had the potential to disrupt Sui’s entire Layer 1 blockchain.
In an announcement sent to Cointelegraph, the CertiK team emphasized that the vulnerability, dubbed “HamsterWheel,” differs from traditional attacks that aim to shut down blockchains by crashing nodes.
This attack captures nodes and allows them to perform operations without processing new transactions, much like hamsters run on a bicycle. The attack has the ability to cripple networks and make them impossible to operate.
The security firm discovered the vulnerability and reported it to Sui before the mainnet was launched. In response to the security threat, the Sui network implemented patches to prevent the potential damage the attack could cause to the blockchain.
To recognize CertiK’s efforts, Sui awarded the security firm $500,000. According to CertiK, this highlights the importance of bug bounty programs and proactive security efforts.
Related: Here’s how hackers use mining pools as mixers: Chainalysis
Kang Li, chief security officer of CertiK, said threats to blockchain networks are constantly evolving. “The discovery of the HamsterWheel attack demonstrates the evolving sophistication of threats to blockchain networks,” Li explained.
According to the announcement, more technical details will be released and made available soon. Additionally, full reports will be announced once all mitigations have been implemented and thoroughly tested.
Meanwhile in decentralized finance (DeFi) space that has a cryptocurrency trading bot took a loan of 200 million dollars ensure a profit of $3. On June 14, the arbitrage bot made a series of complicated transactions, including lending 200 million DAI (DAI) in MakerDAO and ended up with a total profit of $3.24. A community member praised the bot’s efforts, saying “profit is profit,” while another said it’s a sign of how bad the crypto-bear market is.
Magazine: Should crypto projects ever negotiate with hackers? Probably