Validator service provider InfStones disagreed and told Cointelegraph that “nothing close to $1 billion in assets would be at risk,” even in the worst-case scenario.
Blockchain security firm dWallet Labs recently disclosed a vulnerability that it claims could affect up to $1 billion worth of crypto, with assets such as Ether (ETH), Aptos (APT), BNB (BNB) and Sui (SUI) at risk.
In a paper sent to Cointelegraph, dWallet Labs reported a potential vulnerability in validators hosted by an infrastructure provider called InfStones. According to dWallet Labs, it started a research paper covering attacks on blockchain networks and collecting private keys with Web2 attacks. During this research, dWallet Labs said it discovered vulnerabilities in InfStones validators. It wrote:
“A chain of vulnerabilities we discovered and exploited during our research allowed us to gain full control, run code and extract private keys of hundreds of validators on multiple major networks, potentially leading to direct losses equivalent to over one billion dollars in cryptocurrencies such as ETH, BNB, SUI, APT and many others.”
According to dWallet Labs, an attacker who exploits the vulnerability can acquire the private keys of validators across different blockchain networks. “Over one billion dollars of staked assets were staked on all of these validators, and such an attacker would have been able to gain full control of all of them,” it added.
On Nov. 21, InfStones responded to Cointelegraph’s request for comment, denying that the bug could affect $1 billion in assets. Darko Radunovic, a representative from InfStones, told Cointelegraph that the potential vulnerability could only affect a small fraction of the live nodes it already launched.
According to Radunovic, the potential vulnerability was discovered in 237 instances, including 212 cases designated for testing and 25 instances as freshly launched nodes in the production environment. “The instances identified in production constitute a fraction below 0.1% of the live nodes we have launched to date,” Radunovic said in a statement. The company also published a blog post saying the vulnerability was resolved.
Radunovic also highlighted that in response to the vulnerability, it has done internal reviews and had an accredited security firm audit its systems and company policies. The company also launched a bug bounty program to encourage any third party to work with it directly on any bugs they may find.