WazirX Exploit: Dissecting the Breach & the Blame

On July 18, 2023, WazirX reported  a cyberattack on one of its multisig wallets, resulting in a loss of over $230 million. According to a tweet by WazirX, the wallet, which was operated using Liminal’s digital asset custody and wallet infrastructure since February 2023, was compromised due to a sophisticated attack that exploited discrepancies in transaction data.

Wallet Configuration & Breach Mechanics

The wallet in question had six signatories: five were from WazirX and one was from Liminal. To make a transaction, three WazirX team members using secure Ledger Hardware Wallets needed to approve it, followed by approval from the Liminal signatory. Additionally, transactions could only be made to specific, pre-approved addresses (whitelisted addresses) set up by Liminal.

Here’s a simplified breakdown of the attack: 

  1. The wallet required multiple people to approve a transaction. This ensured that, no single person could move the money on their own.

  2. Whitelisting Addresses: Transactions were limited to go only to certain pre-approved addresses to prevent money from being sent to unknown places.

  3. Discrepancy Exploited: The attackers found a way to manipulate the information shown on Liminal’s interface, which is what the signatories used to approve transactions. This means what the signatories saw on their screens wasn't the actual transaction that was happening.

  4. Payload Replacement: During the approval process, the attackers managed to replace the legitimate transaction data with their own malicious data. This tricked the system into approving a transaction that sent the money to the attackers instead of the intended safe address.

  5. Breach Success: Despite the robust security measures, the attackers successfully gained control of the wallet by exploiting this discrepancy, leading to the theft of over $230 million.

In essence, the attack was a sophisticated trick that made the transaction look legitimate to the people approving it, while secretly redirecting the funds to the hackers.

The Blame Game: WazirX vs. Liminal Custody

In the wake of the $230 million cyberattack, WazirX and Liminal Custody have found themselves entangled in a public blame game, each pointing fingers at the other for the breach.

WazirX asserts that the attack stemmed from a discrepancy on Liminal’s interface. They argue that this mismatch between the displayed data and the actual transaction contents allowed the hacker to manipulate the transaction and gain control of the multisig wallet.

Liminal Custody maintains that their platform was not breached and that their infrastructure remains secure. They suggest that the issue lies within WazirX’s operational security.

The exact mechanics of the breach are still under investigation, and both WazirX and Liminal Custody have provided different perspectives on the cause. 

Liminal's Report: Key Insights & Findings

In response to the exploit of WazirX's Gnosis SAFE wallet, Liminal has released a detailed report summarizing their investigation into the incident. The report underscores that Liminal’s infrastructure was not breached and that all wallets on their platform, including WazirX’s other Gnosis SAFE wallets, remain secure. The compromised wallet was a self-custodial, multisig Gnosis SAFE smart contract wallet deployed by WazirX before it was imported into Liminal's platform.

According to Liminal, the genesis of the hack stems from three compromised devices within WazirX. The attackers executed a series of sophisticated exploits to gain access to the required signatures, manipulating the transaction payloads to redirect funds. Despite the robust security measures in place, such as whitelisting and multisig configurations, the attackers leveraged client-side compromises to complete the breach. This incident highlights the importance of comprehensive security practices and the need for continuous vigilance against evolving cyber threats in the cryptocurrency space.

What is a Multisig Wallet? 

A multisig wallet is set up to require multiple private keys to authorize a transaction. For example, a 3-of-5 multisig wallet requires three out of five designated private keys to sign off on a transaction before it can be executed. This added layer of security ensures that even if one key is compromised, the assets remain secure as long as the remaining keys are safe.

The WazirX attack indicates that even with multisig security, vulnerabilities in how data is displayed and verified can be exploited.

Conclusion

The WazirX exploit serves as a stark reminder for the cryptocurrency community to relentlessly improve security measures and maintain vigilance against sophisticated cyber threats. As demonstrated by the WazirX incident, even cutting edge security measures can be vulnerable if not properly managed and monitored.