Skip to main content

Explaining crypto’s billion-dollar bridge problem

Illustration by Alex Castro / The Verge

What are blockchain bridges, why do they keep getting hacked, and can we ever stop it from happening?

On March 23rd, the Ronin blockchain network underlying the popular NFT-driven game Axie Infinity was hit with a hack that saw the attackers walk away with an eye-popping $625 million in cryptocurrency.

The Ronin hack was the largest amount of money that had ever been stolen from the type of service called a “bridge,” which connects one blockchain to another so that value can be sent between them. Unfortunately, it was far from the only hack to hit a bridge: less than two months previously, another bridge platform called Wormhole was exploited for close to $325 million, and about six months before that, more than $600 million was stolen from another cross-chain bridge called Poly. (In a surprising twist, the hacker later returned Poly’s stolen funds.)

In short, bridges are the weak point in a lot of cryptocurrency systems, and hackers are targeting them for more than $1 billion in little over a year. So it’s worth laying out exactly what they are, why they’re important, and how crypto companies can try to plug the billion-dollar hole in their pockets.

If you don’t have time to read further, the short answer to the first part is “yes, they’re vulnerable but maybe less so over time.” For the second part, the story is more complex.

(We’re assuming you know what a blockchain is already; if not, you can start here.)

So what is a “blockchain bridge”?

Essentially, it’s a system for connecting different blockchains, allowing users to exchange one kind of coin or token for another. Every cryptocurrency runs on its own blockchain: there’s Bitcoin, Ethereum, and newer currencies like Tether, Ripple, Solana, and so on. There’s no simple way for these different blockchains to interact — they might all use the concept of “addresses” to send and receive currency transactions, but you can’t send ETH directly to a Solana address.

A blockchain bridge is what developers have built to make that crossover a little smoother. If you’re holding ETH and you need Solana’s SOL to sign up for a game, you can send your ETH into a bridge, get SOL in return, and use the same method to convert back when you’re done playing.

Why are bridges particularly vulnerable to hacks?

The short answer is that they’re handling a lot of complex requests and holding a lot of currency — and unlike the blockchains themselves, there’s no standard for how they’re supposed to keep everything secure.

Picture a blockchain bridge as an actual bridge between two islands. Each island has different rules about the type of car you can drive (maybe there’s an EV island and a regular gas island), so they won’t let you drive your car from one side to the other directly. In fact, you drive up to one side of the bridge, leave your vehicle in a parking garage, walk across, and pick up a rental car on the other side. Then, when you’re done driving around the other island, you bring your rental back to the bridge, walk across, and they hand you the keys to your car.

That means for every rental car driving around the island, there’s another car parked in the garage. Some are stored for hours, others for days, others for months, but they’re all just sitting there, and the company that operates the bridge has to keep them all safe. Meanwhile, other unscrupulous people know exactly how many cars are in the garage and are looking for ways to steal them.

Functionally, this means bridges are receiving incoming transactions in one type of cryptocurrency, locking it up as a deposit, and releasing an equivalent amount of cryptocurrency on another blockchain. When bridges get hacked, the attacker is able to withdraw money from one side of the bridge without putting anything in the other side.

Bridges are particularly tempting targets because of all the complex code, creating lots of opportunities for exploitable bugs. As CertiK founder Ronghui Gu explains: “If you’re trying to create a bridge between N different cryptocurrencies, the complexity of that is N squared,” — which means N more chances for bugs to creep in.

Crucially, these different cryptocurrencies aren’t just different units of money: they’re written in different programming languages and deployed in different virtual environments. Figuring out how these things should interact is very hard, especially for on-chain bridges that convert between multiple different coins.

Have bridges made cryptocurrency less secure overall?

Probably not. Attackers are targeting bridges right now because they’re the weakest point in the system — but that’s partially because the industry has done a good job securing the rest of it. Kim Grauer, director of research at Chainalysis — a company that has produced research on DeFi thefts — told The Verge that bridge hacks are taking the place of the previous generation of damaging hacks against exchanges like Coincheck, BitMart or Mt Gox.

“If you looked at our ecosystem just a few years ago, centralized exchanges were the main target of hacks. Every hack it was, ‘Centralized exchange goes down again,’ and the industry worked hard to have solutions that allowed us to overcome these hacking problems,” she says. “We’re seeing a lot of DeFi hacking, but I think the pace of it is actually slowing down. Definitely the rate at which this hacking is going on can’t continue for the industry to grow.”

Isn’t the whole point of the blockchain to prevent this kind of attack?

The problem is that many bridges aren’t on the blockchain at all. The Ronin bridge was set up to work “off-chain,” running as a system that interfaces with the blockchain but exists on servers that are not part of it. These systems are fast, flexible, and relatively lightweight — reducing some of the “N squared” complexity challenges — but can be hit with the same type of hacks that affect web services anywhere on the internet. (“This is not really blockchain,” Gu says. “These are ‘Web2’ servers.”)

Without the blockchain to settle transactions, the Ronin bridge relied on nine validator nodes, which were compromised through a combination of code hacks and unspecified social engineering.

There are other bridge systems that operate as smart contracts — basically, the “on-chain” alternative. It’s less likely that an attacker could subvert the code of an on-chain system through social engineering, and getting majority power over the network is extremely unlikely. The drawback is that the smart contracts themselves are highly complex, and if bugs do exist, it can be hard to update the system in a timely way. (Wormhole used an on-chain system, and the big theft occurred after hackers spotted security updates that were uploaded to GitHub but had not been deployed to the live smart contract.)

How do we stop bridges from getting hacked?

It’s hard. The answer that came up time and time again was “code auditing.” In the type of case described above, where a project’s development team might be working across different programming languages and computing environments, bringing in outside expertise can cover blind spots that in-house talent might miss. But right now, a surprisingly large number of projects don’t have any auditor listed.

Nick Selby, director of assurance practice at specialist security auditing company Trail of Bits, said that this is partly because of how fast the market has sprung up. Most companies are under huge pressure to grow, scale, and build new features to fend off competitors — which can sometimes come at the expense of diligent security work.

“We’re in, I wouldn’t call it necessarily a bubble, but it’s certainly a gold rush,” says Selby. “I think a lot of times, executives who are trying to innovate in the space will look at the desired feature outcome and say, ‘Well, this [product] does have the features I want. Therefore, it’s good.’ And there’s a lot of things they’re not looking at, so they’re not seeing them, which is where the code audit comes in.”



Source: The Verge

Popular posts from this blog

Apple and Meta Reportedly Discussed AI Partnership for iOS 18

Apple has held discussions with Meta about integrating the Facebook owner's AI model into iOS 18 as part of its Apple Intelligence feature set, according to a report over the weekend. Meta launched Llama 2, its large language model, in July 2023, and in April, the company released the latest versions of its AI models, called Llama 3 . The Wall Street Journal reports that the two longtime rivals have held talks about offering Meta's model as an additional option to OpenAI's ChatGPT. The paywalled report notes that the discussions haven't been finalized and could fall through. As part of Apple Intelligence, Apple has announced a partnership with OpenAI that will allow Siri to access ChatGPT directly in iOS 18, iPadOS 18, and macOS Sequoia to provide better responses in relevant situations. Using ChatGPT will be optional, so users with concerns about the technology can abstain and still make use of Apple's own new AI features. Speaking at WWDC 2024, Apple's

Here Are the macOS Sequoia Features Intel Macs Won't Support

When Apple released macOS Monterey in 2021, some key features required a Mac with Apple silicon. The same scenario played out with macOS Ventura in 2022, and then again the following year with the release of macOS Sonoma. With macOS Sequoia set to arrive in the fall, which new features can Intel Mac owners expect to be unavailable to them this time around? Apple says that macOS Sequoia is compatible with the same Macs as macOS Sonoma, but Apple's fine print reveals that certain new features won't work on Intel machines. If you're still on an Intel Mac, here's what you won't have access to. Apple Intelligence Apple Intelligence , a deeply integrated, personalized AI feature set for Apple devices that uses cutting-edge generative artificial intelligence to enhance the user experience, won't be available on Intel Macs. Apple says the advanced features require its M1 chip or later, so if your Mac was released before November 2020, you're out of luck. T

iPhone 16 Pro Models to Adopt 'M14' Advanced Samsung OLED Panels for Improved Brightness and Lifespan

The upcoming iPhone 16 Pro and iPhone 16 Pro Max will be the first Apple smartphones to adopt Samsung's high performance "M14" OLED display panel, claims a new report coming out of South Korea. According to ETNews , Samsung's "M" series of OLED panels are made for flagship smartphones, while "14" refers to the number of high-performance materials used to produce them. "M14" is the first series of its kind, and the panel is said to have been developed to deliver superior brightness and longevity. Samsung has reportedly placed orders for the M14 materials and is preparing to mass produce the displays in the second half of the year for Apple's iPhone 16 Pro models. Google's Pixel 9 smartphone is the only other device that is expected to adopt the high-performance displays in 2024. A previous report out of China claimed that this year's ‌iPhone 16 Pro‌ models will feature up to 1,200 nits of typical SDR brightness – a 20%

Apple Boosts A18 Chip Orders in Anticipation of High iPhone 16 Demand

Apple is said to have upped its order of next-generation chips from TSMC to between 90 million and 100 million units, following heightened demand expectations for its iPhone 16 series. Last year's initial chip order volume for the iPhone 15 series launch is believed to have been in the region of 80-90 million units, suggesting Apple is anticipating higher demand for its 2024 devices, according to Taiwanese outlet CTEE . The arrival of Apple Intelligence in iOS 18 is expected to boost initial sales of the devices. One of the reasons is that Apple Intelligence requires at least an iPhone 15 Pro to run, which means owners of last year's iPhone 15 and iPhone 15 Plus will miss out on Apple's new AI features unless they upgrade to an iPhone 15 Pro or plump for one of the iPhone 16 models. Last year, the iPhone 15 and iPhone 15 Plus were equipped with the A16 Bionic chip – the same chip that was in the iPhone 14 Pro models – whereas the iPhone 15 Pro and iPhone 15 Pro Max f