Close Menu
  • Home
  • News
  • Bitcoin
  • Blockchain
  • Market
  • Exchanges
  • Opinion
  • Regulatory
  • Mining
  • Report
  • All Posts
What's Hot

Jamie Dimon of JPMorgan States That Bitcoin Should Not Be Included in U.S. Stockpiles

Jun. 11, 2025

Pro-Bitcoin Scott Bessent Announces Candidacy for Next Federal Reserve Chair

Jun. 11, 2025

VanEck, 21Shares, and Canary Call on SEC to Reinstate ‘First to File, First to Approve’ Standard for Crypto ETFs

Jun. 11, 2025
Facebook X (Twitter) Instagram
X (Twitter) Telegram
Fin Date
  • Home
  • News
  • Bitcoin
  • Blockchain
  • Market
  • Exchanges
  • Opinion
  • Regulatory
  • Mining
  • Report
  • All Posts
Subscribe
Fin Date
You are at:Home ยป Analysis of UwU Lends Blacklisting
News

Analysis of UwU Lends Blacklisting

By adminJan. 1, 2023No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
Analysis of UwU Lends Blacklisting
Analysis of UwU Lends Blacklisting
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Background
On June 10, 2024, according to the MistEye security monitoring system, the UwU Lend platform, which provides digital asset lending services on the EVM chain, was attacked, resulting in a loss of approximately $19.3 million. The SlowMist security team conducted an analysis of the incident and shared the following results:


Related Information
Attacker Address:
0x841ddf093f5188989fa1524e7b893de64b421f47
Vulnerable Contract Address:
0x9bc6333081266e55d88942e277fc809b485698b9
Attacking Transactions:
0xca1bbf3b320662c89232006f1ec6624b56242850f07e0f1dadbe4f69ba0d6ac3
0xb3f067618ce54bc26a960b660cfc28f9ea0315e2e9a1a855ede1508eb4017376
0x242a0fb4fde9de0dc2fd42e8db743cbc197ffa2bf6a036ba0bba303df296408b
Attack Core
The core of this attack lies in the fact that the attacker was able to manipulate the price oracle directly by conducting large exchanges in the CurveFinance pool, affecting the price of the sUSDE token, and using the manipulated price to drain other assets from the pool.
Attack Process
1. Borrow assets through flash loans and manipulate the price of USDE: The attacker first borrowed a large amount of assets through flash loans and exchanged a portion of the borrowed USDE tokens for other tokens in the Curve pool that could impact the price of sUSDE.


2. Create a large number of lending positions: With the sUSDE price plummeting, the attacker deposited other underlying tokens to borrow a large amount of sUSDE tokens.


3. Manipulate the oracle again to raise the price of sUSDE: By performing a reverse exchange operation in the previous Curve pool, the price of sUSDE was quickly raised.


4. Liquidate a large amount of debt positions: Due to the rapid increase in the price of sUSDE, the attacker was able to liquidate a large amount of borrowed positions to obtain uWETH.


5. Deposit the remaining sUSDE and borrow other underlying tokens in the contract: The attacker deposited the sUSDE, which was now at a high price, to borrow more underlying asset tokens for profit.


It is evident that the attacker primarily manipulated the price of sUSDE repeatedly, borrowing extensively at low prices, and liquidating and re-mortgaging for profit at high prices. We followed up to examine the sUSDE price oracle contract, sUSDePriceProviderBUniCatch:


It can be seen that the price of sUSDE is determined by obtaining different prices of 11 USDE tokens from the USDE pool on CurveFinance and UNI V3 pool, sorting and calculating the median based on these prices.
In this calculation logic, 5 prices of USDE are directly obtained using the get_p function to retrieve the spot prices from the Curve pool, which allowed the attacker to directly influence the calculation result of the median price through a large exchange in a single transaction.


MistTrack Analysis
According to the on-chain tracking tool MistTrack analysis, the attacker 0x841ddf093f5188989fa1524e7b893de64b421f47 profited approximately $19.3 million in this attack, with currencies including ETH, crvUSD, bLUSD, USDC, subsequently exchanged for ETH.


By tracing the transaction fees of the attacker’s address, it was found that the initial funds on this address came from 0.98 ETH transferred from Tornado Cash, followed by 5 transactions of funds from Tornado Cash.


Expanding the transaction graph, it was discovered that the attacker transferred 1,292.98 ETH to address 0x48d7c1dd4214b41eda3301bca434348f8d1c5eb6, with the current balance of 1,282.98 ETH; the remaining 4,000 ETH was transferred to address 0x050c7e9c62bf991841827f37745ddadb563feb70, with the current balance of 4,010 ETH.


MistTrack has blacklisted the relevant addresses and will continue monitoring the movement of stolen funds.
Conclusion
The core of this attack involved the attacker exploiting the price oracle’s vulnerability in obtaining spot prices directly and calculating median prices, manipulating the price of sUSDE to engage in lending and liquidation for unexpected profits under significant price differentials. The SlowMist security team recommends that projects enhance the anti-manipulation capabilities of price oracles, design more secure price feeding mechanisms to prevent similar incidents from occurring again.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

SEC Ends Investigation into Ethereums Security Status

Nov. 1, 2024

Is a Solana ETF on the way followed by a DeFi summer

Nov. 1, 2024

Approval of an Ethereum Spot ETF by the SEC Anticipated Next Month

Nov. 1, 2024
Leave A Reply Cancel Reply

Top Posts

Open and Friendly Germanys Taxation and Regulatory System for Cryptocurrency Assets

Feb. 27, 2018

Exploring Covenants: How to Bring Native Programmability to Bitcoin

May. 29, 2019

Major Fund Invests in Changelight Technology Packaging Giant Sees New Opportunities

Oct. 22, 2019

The Biggest Advantage for Bitcoin Will It Materialize This Year

Mar. 3, 2020
Don't Miss
Bitcoin

Jamie Dimon of JPMorgan States That Bitcoin Should Not Be Included in U.S. Stockpiles

Jun. 11, 2025

Key Takeaways Jamie Dimon believes the US should prioritize military assets over Bitcoin in its s…

Pro-Bitcoin Scott Bessent Announces Candidacy for Next Federal Reserve Chair

Jun. 11, 2025

VanEck, 21Shares, and Canary Call on SEC to Reinstate ‘First to File, First to Approve’ Standard for Crypto ETFs

Jun. 11, 2025

Guggenheim Treasury of Wall Street Launches Its Premier Tokenized Debt Instrument on the XRP Ledger

Jun. 11, 2025
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
About Us
About Us

Fin Date is your ultimate companion for exploring the world of cryptocurrency. We offer comprehensive and in-depth news coverage along with expert analysis to help you stay abreast of the latest developments in the cryptocurrency market.

X (Twitter) Telegram
Our Picks

Jamie Dimon of JPMorgan States That Bitcoin Should Not Be Included in U.S. Stockpiles

Jun. 11, 2025

Pro-Bitcoin Scott Bessent Announces Candidacy for Next Federal Reserve Chair

Jun. 11, 2025

VanEck, 21Shares, and Canary Call on SEC to Reinstate ‘First to File, First to Approve’ Standard for Crypto ETFs

Jun. 11, 2025
Most Popular

Open and Friendly Germanys Taxation and Regulatory System for Cryptocurrency Assets

Feb. 27, 2018

Exploring Covenants: How to Bring Native Programmability to Bitcoin

May. 29, 2019

Major Fund Invests in Changelight Technology Packaging Giant Sees New Opportunities

Oct. 22, 2019
© 2025 Fin Date All rights reserved.
  • Home
  • News
  • Bitcoin
  • Blockchain
  • Market
  • Exchanges
  • Opinion
  • Regulatory
  • Mining
  • Report
  • All Posts

Type above and press Enter to search. Press Esc to cancel.