{"id":1459,"date":"2022-02-21T14:50:35","date_gmt":"2022-02-21T14:50:35","guid":{"rendered":"https:\/\/de.fi\/blog\/?p=1459"},"modified":"2023-06-28T21:38:19","modified_gmt":"2023-06-28T21:38:19","slug":"wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670","status":"publish","type":"post","link":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670","title":{"rendered":"Wormhole exploit: the second-largest DeFi hack ever"},"content":{"rendered":"<h2 id=\"2nd-place-on-the-rekt-database\">2nd place on the Rekt Database<\/h2>\n<p>The first half of February seems dramatic for the entire DeFi space. According to our native and several external sources, the Wormhole case is now the second-largest exploit within DeFi in terms of funds lost. Thereto, it is the second bridge hack after <a href=\"https:\/\/twitter.com\/Meter_IO\/status\/1490103308421255168\">Meter.io was exploited<\/a> and as a result, <a href=\"https:\/\/twitter.com\/HundredFinance\/status\/1490394875459682309\">affected Hundred Finance<\/a> on Moonriver, when regular users could use oversold BNB.bsc collateral asset by Meter hacker to drain funds from the lending protocol.<\/p>\n<h2 id=\"the-root-of-vulnerability\">The root of vulnerability<\/h2>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">The wormhole network was exploited for 120k wETH.<\/p>\n<p>ETH will be added over the next hours to ensure wETH is backed 1:1. More details to come shortly.<\/p>\n<p>We are working to get the network back up quickly. Thanks for your patience.<\/p>\n<p>\u2014 Wormhole\ud83c\udf2a (@wormholecrypto) <a href=\"https:\/\/twitter.com\/wormholecrypto\/status\/1489001949881978883?ref_src=twsrc%5Etfw\">February 2, 2022<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The attack was caused by a weakness in the signature verification function of the main Wormhole contract on Solana. Because of this issue, the attacker was able to fabricate a message from the Guardians (which verify transfers between chains) in order to mint Wormhole-wrapped Ether.<\/p>\n<p>Before minting Wormhole-wrapped tokens on Solana, Portal\u2019s token minting software employs the verify signatures function to validate the source chain message. This procedure is dependent on information in the instruction sysvar account, which is trusted since it is filled by the Solana runtime.<\/p>\n<p>When invoking a Solana function, users can provide any number of input accounts. Each program is responsible for ensuring that the accounts given are the ones they anticipated.<\/p>\n<p>An attacker might create an account and fill it with data to impersonate the instruction sysvar account. This bogus instruction sysvar may then be sent to Wormhole\u2019s verify signatures function, fooling it into believing the signatures had been correctly validated. An attacker might sign any arbitrary Wormhole message with Solana as the target chain, including messages to mint wrapped Wormhole tokens on Solana.<\/p>\n<h2 id=\"the-hacker-s-on-chain-steps\">The hacker\u2019s on-chain steps<\/h2>\n<h3 id=\"addresses-involved-in-exploit\">Addresses involved in exploit<\/h3>\n<p>Ethereum:<\/p>\n<p><a href=\"https:\/\/etherscan.io\/address\/0x629e7da20197a5429d30da36e77d06cdf796b71a\">https:\/\/etherscan.io\/address\/0x629e7da20197a5429d30da36e77d06cdf796b71a<\/a><\/p>\n<p>Solana:<\/p>\n<p><a href=\"https:\/\/solscan.io\/account\/CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka\">https:\/\/solscan.io\/account\/CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka<\/a><\/p>\n<p>The attacker:<\/p>\n<ol>\n<li>Bypassed Wormhole\u2019s Guardians and called \u2018<a href=\"https:\/\/solscan.io\/tx\/25Zu1L2Q9uk998d5GMnX43t9u9eVBKvbVtgHndkc2GmUFed8Pu73LGW6hiDsmGXHykKUTLkvUdh4yXPdL3Jo4wVS\">verify_signatures<\/a>\u2019 on the main bridge using a SignatureSet created at this <a href=\"https:\/\/solscan.io\/tx\/5fKWY7XyW6PTzjviTDvCTpsqgfoGAAqUs1mC6w4DZm25Ppw7fX7aWDmrnkknewyZ81qMSix3c18ZuvjoZUF34tpa\">transaction<\/a>.<\/li>\n<li>The \u2018verify_signatures\u2019 function provided the verification of the \u2018SignatureSet\u2019 to the Secp256k1 program. \u2018solana_program::sysvar::instructions\u2019 and the \u2018solana_program\u2019 contained disparity, because of this, the contract didn\u2019t verify the requested address.<\/li>\n<li>The attacker faked the \u2018SignatureSet\u2019 and call \u2018complete_wrapped\u2019 to <a href=\"https:\/\/solscan.io\/tx\/2zCz2GgSoSS68eNJENWrYB48dMM1zmH8SZkgYneVDv2G4gRsVfwu5rNXtK5BKFxn7fSqX9BvrBc1rdPAeBEcD6Es\">mint 120k whETH<\/a> on Solana using previously created VAA verification.<\/li>\n<li>93,750 ETH was bridged back to Ethereum at:<\/li>\n<\/ol>\n<p><a href=\"https:\/\/etherscan.io\/tx\/0x4d5201dd4a377f20e61fb8f42e6f929ec16bcec918f0584e39241d15b254a80f\">https:\/\/etherscan.io\/tx\/0x4d5201dd4a377f20e61fb8f42e6f929ec16bcec918f0584e39241d15b254a80f<\/a><\/p>\n<p><a href=\"https:\/\/etherscan.io\/tx\/0xd31b155e259a403ebe69831fae0ec2b4bd33dfa090c43b605a57d5c72c4fbbc7\">https:\/\/etherscan.io\/tx\/0xd31b155e259a403ebe69831fae0ec2b4bd33dfa090c43b605a57d5c72c4fbbc7<\/a><\/p>\n<p><a href=\"https:\/\/etherscan.io\/tx\/0xacd309b02e4b533484d148de9ab0adf367ed4e70ed751d1ff036152dc3bc0479\">https:\/\/etherscan.io\/tx\/0xacd309b02e4b533484d148de9ab0adf367ed4e70ed751d1ff036152dc3bc0479<\/a><\/p>\n<p>Stolen funds are still in the exploiter\u2019s wallets, 93,750 ETH on <a href=\"https:\/\/etherscan.io\/address\/0x629e7da20197a5429d30da36e77d06cdf796b71a\">Ethereum<\/a> and 432,661 SOL on <a href=\"https:\/\/solscan.io\/account\/CxegPrfn2ge5dNiQberUrQJkHCcimeR4VXkeawcFBBka\">Solana<\/a><\/p>\n<h2 id=\"aftermath\">Aftermath<\/h2>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">1\/2<\/p>\n<p>All funds have been restored and Wormhole is back up.<\/p>\n<p>We&#8217;re deeply grateful for your support and thank you for your patience.<\/p>\n<p>\u2014 Wormhole\ud83c\udf2a (@wormholecrypto) <a href=\"https:\/\/twitter.com\/wormholecrypto\/status\/1489232008521859079?ref_src=twsrc%5Etfw\">February 3, 2022<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Stolen funds have been restored by Wormhole to ensure a 1:1 token backing ratio.<\/p>\n<p>Wormhole team contacted attacker via transaction, offering $10m bug bounty for the exploit details and returning stolen funds:<\/p>\n<p><a href=\"https:\/\/etherscan.io\/tx\/0x2d8b7901bff18ae6abe1a50aebe44b70559f39ff357b21340843d368b9486859\">https:\/\/etherscan.io\/tx\/0x2d8b7901bff18ae6abe1a50aebe44b70559f39ff357b21340843d368b9486859<\/a><\/p>\n<p><img decoding=\"async\" class=\"legacymediumimages\" src=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/1aY7EoAhQXKF72HBiJstAJg.png\" alt=\"\" \/><\/p>\n<p>In addition, Wormhole announced that they offer a $10m reward for any information leading to the arrest and conviction of those responsible for the hack of the bridge on February 2<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">A $10,000,000 bug bounty for exploit details and a whitehat agreement is offered to the hackers in exchange for returning all funds. You can reach out to bounty@wormholenetwork.com<\/p>\n<p>7\/<\/p>\n<p>\u2014 Wormhole\ud83c\udf2a (@wormholecrypto) <a href=\"https:\/\/twitter.com\/wormholecrypto\/status\/1489715920436183040?ref_src=twsrc%5Etfw\">February 4, 2022<\/a><\/p><\/blockquote>\n<p><script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>As always, stay safe and DYOR!<\/p>\n<p>For more De.Fi updates you can visit us at Website <a href=\"https:\/\/de.fi\/\">https:\/\/de.fi\/<\/a> \ud83d\udcf1 Telegram <a href=\"https:\/\/t.me\/DeDotFi\">https:\/\/t.me\/de.fi<\/a> \ud83d\udc26Twitter <a href=\"https:\/\/twitter.com\/DeDotFi\">https:\/\/twitter.com\/DeDotFi<\/a><\/p>\n<h2 id=\"check-our-guides-\">Check our guides:<\/h2>\n<p><a href=\"https:\/\/de.fi\/blog\/tezos-ultimate-yield-farming-guide-infographics-b12c841e789\">Tezos Ultimate Yield Farming Guide [Infographics]<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-solana-network-infographics-985936db4392\">Solana Network Ultimate Yield Farming Guide [Infographics]<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/ultimate-yield-farming-guide-for-fantom-network-5c5dea0c719a\">Fantom Network Ultimate Yield Farming Guide [Infographics]<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-guide-for-yield-farming-with-huobi-eco-chain-cde009ed3457\">Huobi ECO Chain Ultimate Guide for Yield Farming<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-guide-for-yield-farming-with-polygon-network-373b77ccb1cf\">Polygon Network Ultimate Guide for Yield Farming<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-guide-for-yield-farming-with-binance-chain-dbc23beb6df4\">Binance Chain Ultimate Guide for Yield Farming<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-eos-9fe6d8d07f37\">EOS Ultimate Yield Farming Guide<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-at-arbitrum-infographics-6bdf4159b681\">Arbitrum Ultimate Guide<\/a> [Infographics]<br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-terra-blockchain-luna-infographics-ad2cedc9238c\">The Ultimate Yield Farming Guide For Terra Blockchain (Luna) [Infographics]<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/ultimate-yield-farming-guide-for-avalanche-network-7b85981aa18d\">The Ultimate Guide to Avalanche Network<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/ultimate-guide-to-yield-farming-on-harmony-with-infographics-25fb724a70d7\">Ultimate Guide to Yield Farming on Harmony (with infographics)<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/ultimate-yield-farming-guide-for-tron-network-ba29ad83f620\">Ultimate Guide to Tron Network<\/a> [Infographics]<br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-moonriver-network-7dfd3e367f19\">The Ultimate Yield Farming Guide For Moonriver Network<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-celo-5f4d80404e5a\">The Ultimate Yield Farming Guide For Celo<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-kucoin-community-chain-5905b3c1db40\">The Ultimate Yield Farming Guide For KuCoin Community Chain<\/a><br \/>\n<a href=\"https:\/\/de.fi\/blog\/the-ultimate-yield-farming-guide-for-near-protocol-ce27046d8218\">The Ultimate Yield Farming\u00a0 Guide For NEAR Protocol<\/a><\/p>\n<p>And join us on <a href=\"https:\/\/twitter.com\/DeDotFi\">twitter <\/a>and <a href=\"https:\/\/t.me\/DeDotFi\">telegram!<\/a><\/p>\n<p><strong>Good luck in farming!<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2nd place on the Rekt Database The first half of February seems dramatic for the entire DeFi space. According to our native and several external sources, the Wormhole case is now the second-largest exploit within DeFi in terms of funds lost. Thereto, it is the second bridge hack after Meter.io was exploited and as a [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":1460,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9],"tags":[34,15],"class_list":["post-1459","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defi","tag-bridge","tag-solana-network"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wormhole exploit: the second-largest DeFi hack ever<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wormhole exploit: the second-largest DeFi hack ever\" \/>\n<meta property=\"og:description\" content=\"2nd place on the Rekt Database The first half of February seems dramatic for the entire DeFi space. According to our native and several external sources, the Wormhole case is now the second-largest exploit within DeFi in terms of funds lost. Thereto, it is the second bridge hack after Meter.io was exploited and as a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\" \/>\n<meta property=\"og:site_name\" content=\"De.Fi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-21T14:50:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-28T21:38:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/1tw7RiL2L0p6N_ld94sptnw.png\" \/>\n\t<meta property=\"og:image:width\" content=\"720\" \/>\n\t<meta property=\"og:image:height\" content=\"378\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"De.Fi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dedotfi\" \/>\n<meta name=\"twitter:site\" content=\"@dedotfi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"De.Fi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\"},\"author\":{\"name\":\"De.Fi\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/person\/b74f4c4292d073a06e46a670c8f6aa97\"},\"headline\":\"Wormhole exploit: the second-largest DeFi hack ever\",\"datePublished\":\"2022-02-21T14:50:35+00:00\",\"dateModified\":\"2023-06-28T21:38:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\/\/de.fi\/blog\/#organization\"},\"keywords\":[\"Bridge\",\"Solana Network\"],\"articleSection\":[\"De.Fi\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\",\"url\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\",\"name\":\"Wormhole exploit: the second-largest DeFi hack ever\",\"isPartOf\":{\"@id\":\"https:\/\/de.fi\/blog\/#website\"},\"datePublished\":\"2022-02-21T14:50:35+00:00\",\"dateModified\":\"2023-06-28T21:38:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/de.fi\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wormhole exploit: the second-largest DeFi hack ever\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.fi\/blog\/#website\",\"url\":\"https:\/\/de.fi\/blog\/\",\"name\":\"De.Fi Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.fi\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.fi\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.fi\/blog\/#organization\",\"name\":\"De.Fi\",\"url\":\"https:\/\/de.fi\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp\",\"contentUrl\":\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp\",\"width\":223,\"height\":234,\"caption\":\"De.Fi\"},\"image\":{\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/dedotfi\",\"https:\/\/t.me\/dedotfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/person\/b74f4c4292d073a06e46a670c8f6aa97\",\"name\":\"De.Fi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d088fd6e8b50c63c7ea20cab37eeb12dc5f7b1e3806b5bb4640bb3d8bf41034?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d088fd6e8b50c63c7ea20cab37eeb12dc5f7b1e3806b5bb4640bb3d8bf41034?s=96&d=mm&r=g\",\"caption\":\"De.Fi\"},\"url\":\"https:\/\/de.fi\/blog\/author\/defi\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wormhole exploit: the second-largest DeFi hack ever","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670","og_locale":"en_US","og_type":"article","og_title":"Wormhole exploit: the second-largest DeFi hack ever","og_description":"2nd place on the Rekt Database The first half of February seems dramatic for the entire DeFi space. According to our native and several external sources, the Wormhole case is now the second-largest exploit within DeFi in terms of funds lost. Thereto, it is the second bridge hack after Meter.io was exploited and as a [&hellip;]","og_url":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670","og_site_name":"De.Fi Blog","article_published_time":"2022-02-21T14:50:35+00:00","article_modified_time":"2023-06-28T21:38:19+00:00","og_image":[{"width":720,"height":378,"url":"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/1tw7RiL2L0p6N_ld94sptnw.png","type":"image\/png"}],"author":"De.Fi","twitter_card":"summary_large_image","twitter_creator":"@dedotfi","twitter_site":"@dedotfi","twitter_misc":{"Written by":"De.Fi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670#article","isPartOf":{"@id":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670"},"author":{"name":"De.Fi","@id":"https:\/\/de.fi\/blog\/#\/schema\/person\/b74f4c4292d073a06e46a670c8f6aa97"},"headline":"Wormhole exploit: the second-largest DeFi hack ever","datePublished":"2022-02-21T14:50:35+00:00","dateModified":"2023-06-28T21:38:19+00:00","mainEntityOfPage":{"@id":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670"},"wordCount":810,"publisher":{"@id":"https:\/\/de.fi\/blog\/#organization"},"keywords":["Bridge","Solana Network"],"articleSection":["De.Fi"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670","url":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670","name":"Wormhole exploit: the second-largest DeFi hack ever","isPartOf":{"@id":"https:\/\/de.fi\/blog\/#website"},"datePublished":"2022-02-21T14:50:35+00:00","dateModified":"2023-06-28T21:38:19+00:00","breadcrumb":{"@id":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/de.fi\/blog\/wormhole-exploit-the-second-largest-defi-hack-ever-237ed5c81670#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/de.fi\/blog\/"},{"@type":"ListItem","position":2,"name":"Wormhole exploit: the second-largest DeFi hack ever"}]},{"@type":"WebSite","@id":"https:\/\/de.fi\/blog\/#website","url":"https:\/\/de.fi\/blog\/","name":"De.Fi Blog","description":"","publisher":{"@id":"https:\/\/de.fi\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.fi\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.fi\/blog\/#organization","name":"De.Fi","url":"https:\/\/de.fi\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp","contentUrl":"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp","width":223,"height":234,"caption":"De.Fi"},"image":{"@id":"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/dedotfi","https:\/\/t.me\/dedotfi"]},{"@type":"Person","@id":"https:\/\/de.fi\/blog\/#\/schema\/person\/b74f4c4292d073a06e46a670c8f6aa97","name":"De.Fi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.fi\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d088fd6e8b50c63c7ea20cab37eeb12dc5f7b1e3806b5bb4640bb3d8bf41034?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d088fd6e8b50c63c7ea20cab37eeb12dc5f7b1e3806b5bb4640bb3d8bf41034?s=96&d=mm&r=g","caption":"De.Fi"},"url":"https:\/\/de.fi\/blog\/author\/defi"}]}},"_links":{"self":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/comments?post=1459"}],"version-history":[{"count":7,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts\/1459\/revisions"}],"predecessor-version":[{"id":2775,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts\/1459\/revisions\/2775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/media\/1460"}],"wp:attachment":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/media?parent=1459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/categories?post=1459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/tags?post=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}