­
Breaches in Decentralized Systems: Exploiting DAOs and Hot Wallets By Gregory Pickett - All Articles - CISO Platform

Breaches%20in%20Decentralized%20Systems%20Exploiting%20DAOs%20and%20Hot%20Wallets.png?profile=RESIZE_710x

 

This content addresses two critical security breaches in decentralized systems. Firstly, it discusses how attackers exploited vulnerabilities in the governance token system of a decentralized autonomous organization (DAO) called The DAO. By acquiring more tokens, they gained control of governance operations and executed a proposal to mint and flood the market with Aqua tokens, causing significant disruptions.

Secondly, it explores a personal experience involving a hot wallet breach, where a trusted engineer abused their privileges to drain funds from the wallet. This incident underscores the importance of access management and monitoring in securing hot wallets.

 

 

Here is the verbatim discussion: 

By buying votes more tokens you have the more votes you have and the more say you have in the operations of the organization apparently the owners of the Dow well their owner they were they nominally owned it meaning they just barely did they didn't have a sufficient stake really to hold it right so should anyone want to buy more tokens and uh increased their share to the it wasn't too hard to increase their share to the point where they owned more than the current owner that's why I said nomic because it was just barely they able to uh buy enough of the governor's token outvote them I'm proposal mint more of the governor's token and then sell it on the open market to the point where it destroyed the value of the governance token screwed up a lot of uh people lots of different uh different contracts including Aqua at that time due to the flooding of the market by the aqua token all right so again a diagram here so you increase your stake if you're the attacker you then obviously have more than the existing uh stakeholders you can then get to V outvote right all right so now some personal experience this personal experience is not public at least not until today uh so have three events and uh being is that they're not public uh I will be sharing with you just enough uh to not get myself in legal trouble or anybody else for that matter the first hack here involved a hot wallet someone abused their privileges someone was trusted abused that trust and the Privileges they were given because they're trusted right there was no privilege access management as you can imagine but there also no compensating controls person was able to just log in to the node with the hot wallet and transfer the out of the hot wallet by draining the hot wallet very simple hack you can call it that trusted engineer log in send the money away I won't do any reimagining.

 

 

Highlights:

The DAO Governance Breach: By accumulating more governance tokens, attackers gained control over The DAO's operations, allowing them to propose the minting of Aqua tokens. This action devalued the governance token and impacted various contracts, including Aqua.

Hot Wallet Exploitation: In another instance, a trusted engineer abused their privileges to access and drain funds from a hot wallet. With no access management or compensating controls in place, the engineer could easily transfer funds out of the wallet undetected.

 

These incidents shed light on the vulnerabilities present in decentralized systems. From governance token exploits to hot wallet breaches, it's evident that robust security measures, including access management and continuous monitoring, are crucial for safeguarding decentralized platforms against malicious actors. By learning from these breaches, the community can strengthen security protocols and mitigate future risks effectively.

 

Speaker:

Gregory Pickett is a renowned expert in the field of cybersecurity, currently serving as the Head of Cybersecurity. With extensive experience in identifying and mitigating security threats, Pickett is recognized for his deep understanding of both offensive and defensive cybersecurity strategies.

His leadership and insights have been instrumental in safeguarding digital assets and ensuring robust security protocols across various organizations.

 

https://www.linkedin.com/in/gregpickettcisspgciagpen/

 
 
 
 
 
Votes: 0
E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

CISO Platform Talks : Security FireSide Chat With A Top CISO or equivalent (Monthly)

  • Description:

    CISO Platform Talks: Security Fireside Chat With a Top CISO

    Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.

    We’ve had the privilege of…

  • Created by: Biswajit Banerjee
  • Tags: ciso, fireside chat

CISO MeetUp: Executive Cocktail Reception @ Black Hat USA , Las Vegas 2025

  • Description:

    We are excited to invite you to the CISO MeetUp: Executive Cocktail Reception if you are there at the Black Hat Conference USA, Las Vegas 2025. This event is organized by EC-Council & FireCompass with CISOPlatform as proud community partner. 

    This evening is designed for Director-level and above cybersecurity professionals to connect, collaborate, and unwind in a relaxed setting. Enjoy…

  • Created by: Biswajit Banerjee
  • Tags: black hat 2025, ciso meetup, cocktail reception, usa events, cybersecurity events, ciso

6 City Playbook Round Table Series (Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata)

  • Description:

    Join us for an exclusive 6-city roundtable series across Delhi, Mumbai, Bangalore, Pune, Chennai, and Kolkata. Curated for top cybersecurity leaders, this series will spotlight proven strategies, real-world insights, and impactful playbooks from the industry’s best.

    Network with peers, exchange ideas, and contribute to shaping the Top 100 Security Playbooks of the year.

    Date : Sept 2025 - Oct 2025

    Venue: Delhi, Mumbai, Bangalore, Pune,…

  • Created by: Biswajit Banerjee

National Insider Risk Symposium, Washington DC, USA 2025

  • Description:

    We are excited to invite you to the 10th National Insider Risk Symposium, a premier forum bringing together leaders and experts from both the commercial and public sectors to address the evolving landscape of insider threats. CISOPlatform is a proud community partner for this event. 

    Event Details:
    Venue: National Housing Center, 1201 15th St NW, Washington, D.C. 20005
    Dates: September 17–18,…

  • Created by: Biswajit Banerjee
  • Tags: national insider risk symposium, ciso, cybersecurity events, usa events