• About
  • FAQ
  • Landing Page
  • Buy JNews
Newsletter
cryptodailygists
Advertisement
  • Home
  • Bitcoin
  • Ethereum
  • Dogecoin
  • Blockchain
  • Market Analysis
  • Regulation
  • Business
  • Contact Us
No Result
View All Result
  • Home
  • Bitcoin
  • Ethereum
  • Dogecoin
  • Blockchain
  • Market Analysis
  • Regulation
  • Business
  • Contact Us
No Result
View All Result
cryptodailygists
No Result
View All Result
Home Blockchain

Stablecoin Protocol Beanstalk Loses $182M in Flash Loan Attack

admin by admin
April 18, 2022
in Blockchain
0
Stablecoin Protocol Beanstalk Loses $182M in Flash Loan Attack
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter

Ethereum-based stablecoin protocol, Beanstalk Farms has fallen to be victim to a cyberattack as hackers drained $182 million in  cryptocurrencies 
Cryptocurrencies

By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.

By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
Read this Term
from the platform on Sunday.

As confirmed by the protocol developers, the perpetrators exploited the platform by taking a $1 billion flash loan on the lending platform Aave denominated in three stablecoins, DAI, USD Coin and Tether. This enabled them to hoard a significant amount of Beanstalk’s native governance token, Stalk.

The hackers thus gained a majority voting power in the decentralized finance (DeFi) platform and executed malicious governance proposals, thus draining the liquidity.

“Beanstalk did not use a flash loan resistant measure to determine the % of Stalk that had voted in favor of the BIP. This was the fault that allowed the hacker to exploit Beanstalk,” the project leads of the exploited platform explained.

Keep Reading

According to the blockchain analytics firm, PeckShield, the hackers already got away with $80 million in the exploited funds and transferred them to the crypto mixer, Tornado Cash.

Interestingly, the hackers donated $250,000 in stolen cryptocurrencies to Ukraine’s relief wallet.

“It’s unfortunate that the same governance procedure that put beanstalk in a position to succeed was ultimately its undoing,” a spokesperson from Beanstalk said.

However, the exploited crypto project did not detail if it is going to compensate the victims of the attack. Meanwhile, the value of Beanstalk’s BEAN  stablecoin 
Stablecoin

Unlike other cryptocurrencies like Bitcoin and Ethereum, stablecoins are cryptocurrencies that have been designed to keep a stable value. Placing a greater emphasis on stability over volatility can be a huge draw for some investors. Many individuals can be turned off from large swings and uncertainty presented by cryptos relative to other traditional assets.Stablecoins control for this volatility by being pegged to another cryptocurrency, fiat money, or to exchange-traded commodities, including gold, silver, or others. Advantages of StablecoinsOf note, stablecoins redeemable in currency, commodities, or fiat money are also said to be backed, whereas those tied to an algorithm are not considered to be so.There are several advantages of asset backed crypto. First, these coins are stabilized by assets that fluctuate outside of the crypto space, that is. This can help mitigate the financial risk associated with these assets.For example, Bitcoin and altcoins are highly correlated, so that cryptocurrency holders cannot escape periodic price falls. Stablecoins control for this vulnerability, allowing for the diversification of risk in a portfolio.Stablecoins also possess a mechanism for redeeming the asset backing them. This grants an additional level of confidence associated with the coin and are unlikely to drop below the value of the underlying physical asset, due to the effects such as arbitrage.For example, fiat-pegged coins are coins that are tied to a specified amount of fiat currency, usually on a one-to-one ratio (i.e.1 StablecoinX = $1). The companies that issue these currencies must have fiat reserves in the equivalent amount of the stablecoins they have issued.Crypto-pegged stablecoins constitute coins that are tied to a specified amount of another cryptocurrency, such as Bitcoin or Ethereum. Algorithmic stablecoins use supply-and-demand to automatically maintain a stable value.

Unlike other cryptocurrencies like Bitcoin and Ethereum, stablecoins are cryptocurrencies that have been designed to keep a stable value. Placing a greater emphasis on stability over volatility can be a huge draw for some investors. Many individuals can be turned off from large swings and uncertainty presented by cryptos relative to other traditional assets.Stablecoins control for this volatility by being pegged to another cryptocurrency, fiat money, or to exchange-traded commodities, including gold, silver, or others. Advantages of StablecoinsOf note, stablecoins redeemable in currency, commodities, or fiat money are also said to be backed, whereas those tied to an algorithm are not considered to be so.There are several advantages of asset backed crypto. First, these coins are stabilized by assets that fluctuate outside of the crypto space, that is. This can help mitigate the financial risk associated with these assets.For example, Bitcoin and altcoins are highly correlated, so that cryptocurrency holders cannot escape periodic price falls. Stablecoins control for this vulnerability, allowing for the diversification of risk in a portfolio.Stablecoins also possess a mechanism for redeeming the asset backing them. This grants an additional level of confidence associated with the coin and are unlikely to drop below the value of the underlying physical asset, due to the effects such as arbitrage.For example, fiat-pegged coins are coins that are tied to a specified amount of fiat currency, usually on a one-to-one ratio (i.e.1 StablecoinX = $1). The companies that issue these currencies must have fiat reserves in the equivalent amount of the stablecoins they have issued.Crypto-pegged stablecoins constitute coins that are tied to a specified amount of another cryptocurrency, such as Bitcoin or Ethereum. Algorithmic stablecoins use supply-and-demand to automatically maintain a stable value.
Read this Term
collapsed after the attack, trading almost 80 percent below its pegged value of $1, as of press time, according to CoinGecko.

Vulnerable DeFis

DeFi platforms have been touted as the real challenger to the traditional finance industry. But, these platforms have numerous vulnerabilities, making them easy targets for hackers. Several DeFi platforms have been attacked in recent years, draining hundreds of millions of dollars from these platforms.

Last month, the cross-chain bridge, Ronin Network was exploited resulting in the theft of almost $600 million worth of cryptocurrencies. It was the backbone of one of the largest decentralized games, Axie Infinity.

Ethereum-based stablecoin protocol, Beanstalk Farms has fallen to be victim to a cyberattack as hackers drained $182 million in  cryptocurrencies 
Cryptocurrencies

By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.

By using cryptography, virtual currencies, known as cryptocurrencies, are nearly counterfeit-proof digital currencies that are built on blockchain technology. Comprised of decentralized networks, blockchain technology is not overseen by a central authority.Therefore, cryptocurrencies function in a decentralized nature which theoretically makes them immune to government interference. The term, cryptocurrency derives from the origin of the encryption techniques that are employed to secure the networks which are used to authenticate blockchain technology. Cryptocurrencies can be thought of as systems that accept online payments which are denoted as “tokens.” Tokens are represented as internal ledger entries in blockchain technology while the term crypto is used to depict cryptographic methods and encryption algorithms such as public-private key pairs, various hashing functions, and an elliptical curve. Every cryptocurrency transaction that occurs is logged in a web-based ledger with blockchain technology.These then must be approved by a disparate network of individual nodes (computers that maintain a copy of the ledger). For every new block generated, the block must first be authenticated and confirmed ‘approved’ by each node, which makes forging the transactional history of cryptocurrencies nearly impossible. The World’s First CryptoBitcoin became the first blockchain-based cryptocurrency and to this day is still the most demanded cryptocurrency and the most valued. Bitcoin still contributes the majority of the overall cryptocurrency market volume, though several other cryptos have grown in popularity in recent years.Indeed, out of the wake of Bitcoin, iterations of Bitcoin became prevalent which resulted in a multitude of newly created or cloned cryptocurrencies. Contending cryptocurrencies that emerged after Bitcoin’s success is referred to as ‘altcoins’ and they refer to cryptocurrencies such as Bitcoin, Peercoin, Namecoin, Ethereum, Ripple, Stellar, and Dash. Cryptocurrencies promise a wide range of technological innovations that have yet to be structured into being. Simplified payments between two parties without the need for a middle man is one aspect while leveraging blockchain technology to minimize transaction and processing fees for banks is another. Of course, cryptocurrencies have their disadvantages too. This includes issues of tax evasion, money laundering, and other illicit online activities where anonymity is a dire ingredient in solicitous and fraudulent activities.
Read this Term
from the platform on Sunday.

As confirmed by the protocol developers, the perpetrators exploited the platform by taking a $1 billion flash loan on the lending platform Aave denominated in three stablecoins, DAI, USD Coin and Tether. This enabled them to hoard a significant amount of Beanstalk’s native governance token, Stalk.

The hackers thus gained a majority voting power in the decentralized finance (DeFi) platform and executed malicious governance proposals, thus draining the liquidity.

Related articles

Is Cloud Mining a Scam?

Is Cloud Mining a Scam?

February 8, 2023
How Blockchain Technology Will Strengthen Value Chains in 2023

How Blockchain Technology Will Strengthen Value Chains in 2023

February 8, 2023

“Beanstalk did not use a flash loan resistant measure to determine the % of Stalk that had voted in favor of the BIP. This was the fault that allowed the hacker to exploit Beanstalk,” the project leads of the exploited platform explained.

Keep Reading

According to the blockchain analytics firm, PeckShield, the hackers already got away with $80 million in the exploited funds and transferred them to the crypto mixer, Tornado Cash.

Interestingly, the hackers donated $250,000 in stolen cryptocurrencies to Ukraine’s relief wallet.

“It’s unfortunate that the same governance procedure that put beanstalk in a position to succeed was ultimately its undoing,” a spokesperson from Beanstalk said.

However, the exploited crypto project did not detail if it is going to compensate the victims of the attack. Meanwhile, the value of Beanstalk’s BEAN  stablecoin 
Stablecoin

Unlike other cryptocurrencies like Bitcoin and Ethereum, stablecoins are cryptocurrencies that have been designed to keep a stable value. Placing a greater emphasis on stability over volatility can be a huge draw for some investors. Many individuals can be turned off from large swings and uncertainty presented by cryptos relative to other traditional assets.Stablecoins control for this volatility by being pegged to another cryptocurrency, fiat money, or to exchange-traded commodities, including gold, silver, or others. Advantages of StablecoinsOf note, stablecoins redeemable in currency, commodities, or fiat money are also said to be backed, whereas those tied to an algorithm are not considered to be so.There are several advantages of asset backed crypto. First, these coins are stabilized by assets that fluctuate outside of the crypto space, that is. This can help mitigate the financial risk associated with these assets.For example, Bitcoin and altcoins are highly correlated, so that cryptocurrency holders cannot escape periodic price falls. Stablecoins control for this vulnerability, allowing for the diversification of risk in a portfolio.Stablecoins also possess a mechanism for redeeming the asset backing them. This grants an additional level of confidence associated with the coin and are unlikely to drop below the value of the underlying physical asset, due to the effects such as arbitrage.For example, fiat-pegged coins are coins that are tied to a specified amount of fiat currency, usually on a one-to-one ratio (i.e.1 StablecoinX = $1). The companies that issue these currencies must have fiat reserves in the equivalent amount of the stablecoins they have issued.Crypto-pegged stablecoins constitute coins that are tied to a specified amount of another cryptocurrency, such as Bitcoin or Ethereum. Algorithmic stablecoins use supply-and-demand to automatically maintain a stable value.

Unlike other cryptocurrencies like Bitcoin and Ethereum, stablecoins are cryptocurrencies that have been designed to keep a stable value. Placing a greater emphasis on stability over volatility can be a huge draw for some investors. Many individuals can be turned off from large swings and uncertainty presented by cryptos relative to other traditional assets.Stablecoins control for this volatility by being pegged to another cryptocurrency, fiat money, or to exchange-traded commodities, including gold, silver, or others. Advantages of StablecoinsOf note, stablecoins redeemable in currency, commodities, or fiat money are also said to be backed, whereas those tied to an algorithm are not considered to be so.There are several advantages of asset backed crypto. First, these coins are stabilized by assets that fluctuate outside of the crypto space, that is. This can help mitigate the financial risk associated with these assets.For example, Bitcoin and altcoins are highly correlated, so that cryptocurrency holders cannot escape periodic price falls. Stablecoins control for this vulnerability, allowing for the diversification of risk in a portfolio.Stablecoins also possess a mechanism for redeeming the asset backing them. This grants an additional level of confidence associated with the coin and are unlikely to drop below the value of the underlying physical asset, due to the effects such as arbitrage.For example, fiat-pegged coins are coins that are tied to a specified amount of fiat currency, usually on a one-to-one ratio (i.e.1 StablecoinX = $1). The companies that issue these currencies must have fiat reserves in the equivalent amount of the stablecoins they have issued.Crypto-pegged stablecoins constitute coins that are tied to a specified amount of another cryptocurrency, such as Bitcoin or Ethereum. Algorithmic stablecoins use supply-and-demand to automatically maintain a stable value.
Read this Term
collapsed after the attack, trading almost 80 percent below its pegged value of $1, as of press time, according to CoinGecko.

Vulnerable DeFis

DeFi platforms have been touted as the real challenger to the traditional finance industry. But, these platforms have numerous vulnerabilities, making them easy targets for hackers. Several DeFi platforms have been attacked in recent years, draining hundreds of millions of dollars from these platforms.

Last month, the cross-chain bridge, Ronin Network was exploited resulting in the theft of almost $600 million worth of cryptocurrencies. It was the backbone of one of the largest decentralized games, Axie Infinity.

Share76Tweet47

Related Posts

Is Cloud Mining a Scam?

Is Cloud Mining a Scam?

by admin
February 8, 2023
0

Cloud mining is a term that refers to the process of renting computing power from a remote data center in...

How Blockchain Technology Will Strengthen Value Chains in 2023

How Blockchain Technology Will Strengthen Value Chains in 2023

by admin
February 8, 2023
0

Blockchain technology has the potential to disrupt traditional value chains by enabling more secure, transparent, and efficient transaction and value...

HIVE Blockchain Mined 4,752 Bitcoins in 2022

Argo Produces More BTC in January due to Lighter Winter

by admin
February 8, 2023
0

Argo Blockchain (NASDAQ:ARBK), a publicly-listed crypto mining Crypto Mining Cryptocurrency mining is defined as the process through which the transactions...

Hut 8 Merges with US Bitcoin to Fight Crypto Winter

Hut 8 Merges with US Bitcoin to Fight Crypto Winter

by admin
February 8, 2023
0

Hut 8 Mining Corp. (NASDAQ:HUT), a digital asset mining company from North America, has announced an all-stock merger Merger A...

Crypto Market Cap Fell by 64.1% to $829 Billion in 2022: Report

Dutch Crypto Exchange Bitvavo Expects at Least 80% Recovery from DCG

by admin
February 7, 2023
0

Bitvavo, an Amsterdam-based cryptocurrency exchange Cryptocurrency Exchange A cryptocurrency exchange is an online platform that supports the exchange of various...

Load More
Plugin Install : Widget Tab Post needs JNews - View Counter to be installed
  • Trending
  • Comments
  • Latest
3AC Co-Founder Kyle Davies Fails to Respond to Liquidators’ Subpoena Despite Twitter Delivery – Bitcoin News

3AC Co-Founder Kyle Davies Fails to Respond to Liquidators’ Subpoena Despite Twitter Delivery – Bitcoin News

February 8, 2023
Indonesian Central Bank To Rollout The Digital Rupiah

Bank of England Denies Digital Pound Similarity to Cryptocurrency

February 8, 2023
The Importance Of Monero Anonymity For Online Casino Players

The Importance Of Monero Anonymity For Online Casino Players

February 8, 2023
CHZ Experiences 30% Growth with Release of Improved Technology (Chain 2.0)

CHZ Experiences 30% Growth with Release of Improved Technology (Chain 2.0)

February 8, 2023
cryptodailygists

© 2022 All Rights Reserved Cryptodailygists

Navigate Site

  • Home
  • Bitcoin
  • Ethereum
  • Dogecoin
  • Blockchain
  • Market Analysis
  • Regulation
  • Business
  • Contact Us

Follow Us

No Result
View All Result
  • Home
  • Bitcoin
  • Ethereum
  • Dogecoin
  • Blockchain
  • Market Analysis
  • Regulation
  • Business
  • Contact Us

© 2022 All Rights Reserved Cryptodailygists

en_USEnglish
en_USEnglish