Clipper DEX Says Withdrawal Vulnerability Led to $450K Hack, Denies Private Key Leak

Last updated:

Author

Ruholamin Haqshanas

Author

Ruholamin Haqshanas

About Author

Ruholamin Haqshanas is a contributing crypto writer for CryptoNews. He is a crypto and finance journalist with over four years of experience. Ruholamin has been featured in several high-profile crypto…

Last updated:

Why Trust Cryptonews

For over a decade, Cryptonews has covered the cryptocurrency industry, aiming to provide informative insights to our readers. Our journalists and analysts have extensive experience in market analysis and blockchain technologies. We strive to maintain high editorial standards, focusing on factual accuracy and balanced reporting across all areas – from cryptocurrencies and blockchain projects to industry events, products, and technological developments. Our ongoing presence in the industry reflects our commitment to delivering relevant information in the evolving world of digital assets. Read more about Cryptonews

Ad Disclosure

We believe in full transparency with our readers. Some of our content includes affiliate links, and we may earn a commission through these partnerships.

Decentralized exchange Clipper has revealed that a vulnerability in its withdrawal function enabled a $450,000 hack on its platform, refuting claims of a private key leak as alleged by external parties.

The platform confirmed in a post on X that the exploit targeted two liquidity pools on December 1, affecting around 6% of its total value locked.

Other pools were not impacted, and the exploit has since been resolved.

“There have been third-party claims suggesting a private key leak,” Clipper stated. “We can confirm that this is not the case and is inconsistent with the design and security architecture of Clipper.”

Clipper Disables the Exploited Function

Clipper added that the ability to withdraw using a single token—a feature that combines swaps with deposit or withdrawal transactions—has been disabled, as it was identified as the exploited function.

Earlier, Chaofan Shou, co-founder of security firm Fuzzland, suggested on X that Clipper’s hack was due to an API vulnerability, potentially allowing attackers to sign unauthorized deposit and withdrawal requests.

“During the attack, the exploit involved a deposit request that acquired pool shares using a certain amount of tokens. In the same tx, those pool shares were withdrawn, but yielding a higher quantity of tokens than originally deposited,” Shou claimed.

However, Clipper’s statement challenges this narrative, emphasizing its robust security framework.

Following the incident, Clipper paused swaps and deposits while keeping withdrawals open under specific conditions: withdrawals must be executed as a mix of all assets in the pool.

The exchange is actively tracing the stolen funds and has invited the attacker to engage in communication if willing.

The hack contributes to the $1.48 billion in crypto stolen during 2024 up to November, representing a 15% year-over-year decline, according to a report by Immunefi.

Clipper is investigating the breach and promises to provide updates.

Attacks on Major Centralized Exchanges

The recent attack on Clipper comes amid a trend of increasing attacks on centralized exchanges in 2024.

Some major incidents this year include the $235 million breach of India’s WazirX exchange in July, a $52 million hack on Singapore’s BingX in September, and a $55 million exploit of Turkey’s BtcTurk in June.

More recently, XT.com, a Seychelles-based cryptocurrency exchange, paused withdrawals following reports of a suspected $1.7 million hack.

Last week, U.S. federal prosecutors charged five individuals in connection with a sophisticated hacking operation that allegedly stole $11 million in crypto and sensitive data from individuals and companies across multiple countries.

According to court filings, the alleged hackers targeted at least 29 individuals, with one victim losing over $6.3 million in cryptocurrency after their email and digital wallets were compromised.

Prosecutors claim the group also targeted 45 companies in the U.S., Canada, India, and the United Kingdom.

Among their targets was a U.S.-based cryptocurrency exchange whose employees were tricked by fake text messages into divulging sensitive credentials.

You May Also Like