­
Breaches in Decentralized Systems: Exploiting DAOs and Hot Wallets By Gregory Pickett - All Articles - CISO Platform

Breaches%20in%20Decentralized%20Systems%20Exploiting%20DAOs%20and%20Hot%20Wallets.png?profile=RESIZE_710x

 

This content addresses two critical security breaches in decentralized systems. Firstly, it discusses how attackers exploited vulnerabilities in the governance token system of a decentralized autonomous organization (DAO) called The DAO. By acquiring more tokens, they gained control of governance operations and executed a proposal to mint and flood the market with Aqua tokens, causing significant disruptions.

Secondly, it explores a personal experience involving a hot wallet breach, where a trusted engineer abused their privileges to drain funds from the wallet. This incident underscores the importance of access management and monitoring in securing hot wallets.

 

 

Here is the verbatim discussion: 

By buying votes more tokens you have the more votes you have and the more say you have in the operations of the organization apparently the owners of the Dow well their owner they were they nominally owned it meaning they just barely did they didn't have a sufficient stake really to hold it right so should anyone want to buy more tokens and uh increased their share to the it wasn't too hard to increase their share to the point where they owned more than the current owner that's why I said nomic because it was just barely they able to uh buy enough of the governor's token outvote them I'm proposal mint more of the governor's token and then sell it on the open market to the point where it destroyed the value of the governance token screwed up a lot of uh people lots of different uh different contracts including Aqua at that time due to the flooding of the market by the aqua token all right so again a diagram here so you increase your stake if you're the attacker you then obviously have more than the existing uh stakeholders you can then get to V outvote right all right so now some personal experience this personal experience is not public at least not until today uh so have three events and uh being is that they're not public uh I will be sharing with you just enough uh to not get myself in legal trouble or anybody else for that matter the first hack here involved a hot wallet someone abused their privileges someone was trusted abused that trust and the Privileges they were given because they're trusted right there was no privilege access management as you can imagine but there also no compensating controls person was able to just log in to the node with the hot wallet and transfer the out of the hot wallet by draining the hot wallet very simple hack you can call it that trusted engineer log in send the money away I won't do any reimagining.

 

 

Highlights:

The DAO Governance Breach: By accumulating more governance tokens, attackers gained control over The DAO's operations, allowing them to propose the minting of Aqua tokens. This action devalued the governance token and impacted various contracts, including Aqua.

Hot Wallet Exploitation: In another instance, a trusted engineer abused their privileges to access and drain funds from a hot wallet. With no access management or compensating controls in place, the engineer could easily transfer funds out of the wallet undetected.

 

These incidents shed light on the vulnerabilities present in decentralized systems. From governance token exploits to hot wallet breaches, it's evident that robust security measures, including access management and continuous monitoring, are crucial for safeguarding decentralized platforms against malicious actors. By learning from these breaches, the community can strengthen security protocols and mitigate future risks effectively.

 

Speaker:

Gregory Pickett is a renowned expert in the field of cybersecurity, currently serving as the Head of Cybersecurity. With extensive experience in identifying and mitigating security threats, Pickett is recognized for his deep understanding of both offensive and defensive cybersecurity strategies.

His leadership and insights have been instrumental in safeguarding digital assets and ensuring robust security protocols across various organizations.

 

https://www.linkedin.com/in/gregpickettcisspgciagpen/

 
 
 
 
 
Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

City Round Table Meetup - Mumbai, Bangalore, Delhi, Chennai, Pune, Kolkata

  • Description:
    CISO Playbook Round Table Overview : 
    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology Implementation: From…
  • Created by: Biswajit Banerjee
  • Tags: ciso, playbook, round table

Round Table Dubai 2025 | GISEC

  • Description:
    CISO Playbook Round Table Overview : 

    Our round tables are designed to bring together top CISOs and IT leaders in intimate, focused sessions. These closed-door discussions will provide a platform to explore key security challenges and solutions. These sessions aim to create a focused, closed-door environment where 08-10 CISOs will dive deeply into the practicalities of implementing specific technologies.
    • Technology…
  • Created by: Biswajit Banerjee

Fireside Chat With Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman))

  • Description:

    We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan) and Erik Laird (Vice President - North America, FireCompass). In this fireside chat, we'll decode the complexities of cyber insurance from a CISO’s lens and uncover how to make smarter, security-aligned decisions when it comes to policy design, claims, and ROI.

    As cyberattacks grow in…

  • Created by: Biswajit Banerjee
  • Tags: ciso, cyber insurance, dan bowden

CISO Platform: CISO 100 Awards & Future CISO Awards @ Atlanta

  • Description:

    Nominate for the CISOPlatform CISO 100 Awards & Future CISO Awards - Recognizing Cybersecurity Leaders. Recommend someone you know deserving of this prestigious accolade....Nominate your colleague, mentor, someone you admire or yourself !

    CISO Platform is collaborating as a community partner with EC-Council’s Global CISO Forum, supporting initiatives such as the CISO Platform…

  • Created by: Biswajit Banerjee