Advertisement
Singapore markets closed
  • Straits Times Index

    3,293.13
    +20.41 (+0.62%)
     
  • S&P 500

    5,070.55
    +59.95 (+1.20%)
     
  • Dow

    38,503.69
    +263.71 (+0.69%)
     
  • Nasdaq

    15,696.64
    +245.33 (+1.59%)
     
  • Bitcoin USD

    66,376.83
    +250.87 (+0.38%)
     
  • CMC Crypto 200

    1,432.72
    +8.62 (+0.61%)
     
  • FTSE 100

    8,091.56
    +46.75 (+0.58%)
     
  • Gold

    2,330.80
    -11.30 (-0.48%)
     
  • Crude Oil

    83.01
    -0.35 (-0.42%)
     
  • 10-Yr Bond

    4.5980
    -0.0250 (-0.54%)
     
  • Nikkei

    38,460.08
    +907.92 (+2.42%)
     
  • Hang Seng

    17,201.27
    +372.34 (+2.21%)
     
  • FTSE Bursa Malaysia

    1,571.48
    +9.84 (+0.63%)
     
  • Jakarta Composite Index

    7,174.53
    +63.72 (+0.90%)
     
  • PSE Index

    6,572.75
    +65.95 (+1.01%)
     

Developers Block Potential ‘Eight-Figure’ Exploit Involving Cosmos-Based Ethermint

Mika Baumeister

Join the most important conversation in crypto and web3! Secure your seat today

A recent vulnerability affecting the Cosmos ecosystem and Ethermint was recently discovered by crypto trading firm Jump Crypto and blocked before it could cause an impact of as much as "eight figures" in U.S. dollars, Cosmos developers Evmos told CoinDesk.

The compromised network in this incident was Ethermint, which enables the use of Ethereum smart contracts within the Cosmo ecosystem and is employed by several chains, including Cronos, Kava and Canto.

The bug could have potentially allowed an attacker to bypass specific smart contract functions called handlers, leading to transaction fee theft and denial of service to users.

ADVERTISEMENT

Immediately upon receiving the report, the Evmos Core Development team and the Cronos team collaborated with Jump Crypto to address the issue. The implementation included a patch to block transactions with "MsgEthereumTx" messages, allowing to the elimination of the attack vector.

No malicious exploitation occurred, ensuring the continued stability and reliability of the affected chains.

The Cronos team awarded Jump Crypto a $25,000 bounty for discovering and disclosing the vulnerability.

Evmos said that the root cause of the vulnerability lay in the improper handling of transactional messages in the Ethermint implementation, specifically the interaction between the MsgEthereumTx message and the MsgExec message.

The MsgExec message is used in the Cosmos SDK to allow authorized message execution by allowing one account to grant authorization to another account. However, this feature was not properly secured, allowing the attacker to bypass the ‘EthGasConsumeDecorator,’ which is responsible for deducting gas fees from transactions.

The attacker exploited the vulnerability by embedding a MsgEthereumTx message inside a MsgExec message. This bypassed the EthGasConsumeDecorator, resulting in the attacker not paying gas fees for their transactions.