03.01.2022 Views

Cyber Defense eMagazine January Edition for 2022

Cyber Defense eMagazine January Edition for 2022 CDMG is fully owned and operated by team Miliefsky in our 10th anniversary. We believe the letter Q stands for 'Q'uestion. Are you Questioning your InfoSec posture right now? The cybercriminals are not resting. They are asking themselves this very Q.uestion... Will you stay one step ahead of Cyber Father Time this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is behind us...Identity Defense Protection month has arrived. Defeat Cyber Father Time! Cyber Defense Magazine January Edition for 2022 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES RSA Conference 2022 has moved to June 6-9, 2022 so we have something awesome in store planned to bridge Q1/Q2 See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG CDMG is a Carbon Negative and Inclusive Media Group.

Cyber Defense eMagazine January Edition for 2022

CDMG is fully owned and operated by team Miliefsky in our 10th anniversary. We believe the letter Q stands for 'Q'uestion. Are you Questioning your InfoSec posture right now? The cybercriminals are not resting. They are asking themselves this very Q.uestion...

Will you stay one step ahead of Cyber Father Time this year? Learn new ways to protect your family, job, company & data. December Cyber Defense eMagazine: Cyber Deception Month is behind us...Identity Defense Protection month has arrived. Defeat Cyber Father Time!

Cyber Defense Magazine January Edition for 2022 in online format #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, International Editor-in-Chief and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

RSA Conference 2022 has moved to June 6-9, 2022 so we have something awesome in store planned to bridge Q1/Q2

See you at RSA Conference 2022 - Our 10th Year Anniversary - Our 10th Year @RSAC #RSACONFERENCE #USA - Thank you so much!!! - Team CDMG

CDMG is a Carbon Negative and Inclusive Media Group.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Consequences of flash loan attacks<br />

Depending on the scale of the attack, consequences can vary. But one thing is certain, the reputational<br />

damage is great, and the other protocol users pay the adverse effects. Seemingly never out of the<br />

spotlight, C.R.E.A.M. has been attacked three times in 2021, two of which were flash loan attacks. In the<br />

case of flash loans, lightning can and does strike the same place twice.<br />

The primary and most important consequence is the impact that flash loan attacks can have on other<br />

users. DeFi would be nothing without the loyalty and money of the users who are all key players in an<br />

intricate autonomous ecosystem. It is presumptuous to assume that victims have available cash to put<br />

back into a system that has failed to protect their assets adequately.<br />

Questions about whose responsibility it is to ensure that flash loan attacks don’t occur will continue<br />

to rise and protocols will rightfully be expected to defend themselves. Is taking preventative<br />

measures enough to adequately prove that the plat<strong>for</strong>m isn’t responsible if an exploit occurs? A<br />

prudent protocol or exchange should also consider a post-exploit action plan, if the worst is to<br />

occur.<br />

5 Steps <strong>for</strong> protocols to take to minimize the likelihood and impact of flash loan exploits<br />

The recommendations here align with the three pillars of cyber security: security, vigilance and<br />

resilience.<br />

1. Design of the protocol matters<br />

Complexity comes with risk. While developing a large smart contract or building a dApp it is difficult to<br />

pinpoint loopholes. There<strong>for</strong>e, all external calls should be located, to explore if these could serve as a<br />

path <strong>for</strong> the malicious actors in the contracts. In older versions of Solidity, even reading a public field<br />

could lead to unsafe external calls that can be easily manipulated. There<strong>for</strong>e, developers should always<br />

use the stable and updated versions of Solidity.<br />

2. Use a decentralized oracle<br />

Oracle manipulations are the biggest cause of flash loan attacks. Smart contracts heavily rely on oracles<br />

which provide an effective interface between the contracts and the external source to push the required<br />

data. Decentralized Oracles like Chainlink, gather data about prices from multiple sources, which reduces<br />

the likelihood of a single data point influencing the oracle. If a plat<strong>for</strong>m relies solely on the data of one<br />

particular DEX, then its data is at risk of being flawed. Mal Intended users could directly manipulate the<br />

price of the singular DEX where the loan price is based off, resulting in loans issued with an inaccurate<br />

average price. On the other hand, limited data could <strong>for</strong>m an inaccurate representation of the average<br />

market price and thus promote excessive slippage exploitation.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>January</strong> <strong>2022</strong> <strong>Edition</strong> 84<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!