White Hat Hacker Helps Recover $1.8M in Foom Cash Exploit
In a heartening turn of events, a white hat hacker has helped Foom Cash recover over $1.8 million of the funds lost to a devastating exploit that drained $2.3 million from the decentralized, anonymous lottery protocol.
The Foom Cash exploit, which occurred due to a misconfigured Groth16 verifier, resulted in the theft of $2.26 million in funds. However, thanks to the intervention of an ethical hacker named Duha, who identified the vulnerability and secured the funds on Base before malicious actors could exploit them, the protocol was able to recover 81% of the stolen funds.
Foom Cash announced the recovery efforts in a Monday post on X, stating that Decurity handled the recovery process on Ethereum. As a token of appreciation for their help, Foom Cash awarded Duha a $320,000 bounty and crypto security platform Decurity was awarded a $100,000 security fee.
Duha's identification of the vulnerability was instrumental in preventing further exploitation. The white hat hacker explained that the exploit stemmed from a "fatal deployment oversight" involving a missing command-line interface (CLI) step during the Phase 2 trusted setup process. This error enabled the attacker to trick the protocol into accepting forged proofs because a placeholder was never randomized.
In Groth16, if you skip the circuit-specific contribution setup in snarkjs, the parameters γ (gamma) and δ (delta) remain set to the same default value (the G2 generator), which makes it easier for attackers to manipulate the protocol. Foom Cash's response explained that this deployment error allowed the attacker to "trick" the protocol into accepting forged proofs because a placeholder was never randomized.
The incident highlights the growing role of white hat hackers in Web3 incident response, particularly as exploiters move quickly to bridge funds across chains or into privacy tools. White hat interventions have become an increasingly common feature of DeFi incident response, and this case serves as a testament to their effectiveness.
According to Samczsun, a white hat hacker and Paradigm researcher who established the SEAL (Security Alliance) initiative in August 2023, the incident underscores the importance of bug bounty policies in ensuring protocol security. By honoring their bug bounty policy, @foomclub_ has proven that they take protocol security seriously and value the researchers helping them.
As we move forward in the world of Web3, it's essential to acknowledge the critical role that white hat hackers play in preventing similar exploits from occurring. Their contributions are vital in maintaining the integrity of decentralized protocols like Foom Cash.
In conclusion, the recovery of $1.8 million by Foom Cash thanks to the intervention of a white hat hacker is a heartening example of the power of collaboration and bug bounty policies in securing Web3 protocols. It's a reminder that even in the face of devastating exploits, there are heroes like Duha who work tirelessly to protect our digital assets.
Stay tuned for more updates on Foom Cash and its continued commitment to protocol security, as well as follow us for more stories on hacking, cybersecurity, and Web3 innovation.