What Is a Cross-Chain Bridge and How Are Bridges Hacked? (2024)

Many blockchains, such as Bitcoin and Ethereum, were designed to be standalone systems. They provided an immutable digital ledger for recording transactions as well as other features, such as support for smart contracts.

However, all blockchain platforms have their pros and cons, and recent trends have moved toward integration. With a cross-chain bridge, it is possible for a user to transfer their assets between blockchains to take advantage of each one’s unique benefits.

For example, Bitcoin offers a more stable and secure environment for storing cryptocurrency, but transferring value to the Ethereum blockchain enables a user to take advantage of the smart contracts deployed within that environment.

Cross-chain bridges have their advantages, but they also have their downsides. Numerous hacks of cross-chain bridges in recent months (see below for examples) demonstrate that not only are they not completely secure but also that hacks of cross-chain bridges can have knock-on effects on other DeFi projects.

What Are Cross-Chain Bridges?

A cross-chain bridge is designed to integrate two blockchains that — in most cases — were never designed to be integrated.

With the exception of blockchains built using a Layer 0 protocol such as Cosmos or Polkadot, blockchains are typically designed as standalone systems that support external integrations via APIs and smart contracts.

Cross-chain bridges are often implemented using smart contracts. To transfer assets across a bridge, a user sends them to a specific account on the blockchain. This triggers a transfer across the bridge which, if approved, causes the assets to be released and sent to the user’s account on the other blockchain.

How Cross-Chain Bridges Are Hacked

Hacks of blockchain bridges are typically designed to cause tokens to be released on one blockchain without a corresponding deposit on the other. The main ways in which this can be accomplished are:

  • False Deposit Events: Often, a cross-chain bridge will monitor for deposit events on one blockchain to initiate a transfer to the other. If an attacker can generate a deposit event without making a real deposit or by making a deposit with a valueless token, then they can withdraw value from the bridge at the other end. This was what happened in the Qubit hack where a legacy deposit function in the code enabled fake deposits to the bridge contract.
  • Fake Deposits: Cross-chain bridges perform validation of a deposit before allowing a transfer to go through. If an attacker can create a fake deposit that validates as a real one, then they can defeat the validation process. This was the case with the Wormhole hack, where the attacker exploited a flaw in digital signature validation to steal $326 million.
  • Validator Takeover: Some cross-chain bridges have a set of validators that vote whether or not to approve a particular transfer. If the attacker controls a majority of these validators, then they can approve fake and malicious transfers. This is what happened in the Ronin Network hack, where the attacker took over 5 of the bridge’s 9 validators.

Blockchain Bridge Hacks Have Far-Reaching Effects

A hack of a cross-chain bridge can have a significant impact on the bridge itself. A successful attack involves withdrawing value from the bridge without a corresponding deposit, meaning that the bridge project loses money.

However, the fact that cross-chain bridges span multiple blockchain platforms means that they can have complex effects. By creating interrelationships between blockchains, cross-chain bridges also cause their security to be intertwined. Additionally, the complex relationships between “wrapped” assets on different blockchains make tracking the “true” value of an asset difficult in the wake of an attack.

For example, a successful attack on a blockchain bridge could cause a particular asset to be devalued on one platform but not others, creating significant arbitrage opportunities. This occurred in the case of the Meter.io hack. The hack caused BNB.bsc to be devalued on the BNB chain, but Hundred Finance used the global Chainlink price for the asset. This discrepancy allowed attackers to buy BNB.bsc for cheap and use it as collateral to take out loans of more valuable assets.

How to Secure Weak Cross-Chain Bridges

Cross-chain bridges link blockchains together often through the use of smart contracts. This makes smart contract audits a vital component of the bridge security process. By identifying and remediating vulnerabilities before code is released onto the blockchain, a smart contract security audit could have prevented many of the largest hacks of cross-chain bridges.

However, security audits of bridge projects shouldn’t stop at just the code. Cross-chain bridges create complex environments, and the interactions between the contracts deployed on various platforms should be taken into account as well. An effective audit requires expert knowledge of all of the affected platforms and in validating the logic of the bridge project and assessing the risks that it poses and faces.

What Is a Cross-Chain Bridge and How Are Bridges Hacked? (2024)
Top Articles
How The Non-Salaried Can Increase Their Chances Of Securing A Home Loan
5 steps to protect your credit score during a pandemic | CNN Business
Hometown Pizza Sheridan Menu
123 Movies Black Adam
Unity Stuck Reload Script Assemblies
Mopaga Game
Prosper TX Visitors Guide - Dallas Fort Worth Guide
Achivr Visb Verizon
What's New on Hulu in October 2023
Irving Hac
Myunlb
The Blind Showtimes Near Showcase Cinemas Springdale
How To Delete Bravodate Account
Edible Arrangements Keller
Miss America Voy Forum
8 Ways to Make a Friend Feel Special on Valentine's Day
Enderal:Ausrüstung – Sureai
The Witcher 3 Wild Hunt: Map of important locations M19
SXSW Film & TV Alumni Releases – July & August 2024
Urban Dictionary: hungolomghononoloughongous
Wsop Hunters Club
Viha Email Login
Puss In Boots: The Last Wish Showtimes Near Cinépolis Vista
Cincinnati Adult Search
Dragger Games For The Brain
The best brunch spots in Berlin
Cognitive Science Cornell
Star Wars Armada Wikia
Pixel Combat Unblocked
Cylinder Head Bolt Torque Values
Funky Town Gore Cartel Video
Stouffville Tribune (Stouffville, ON), March 27, 1947, p. 1
Top Songs On Octane 2022
Bursar.okstate.edu
Sf Bay Area Craigslist Com
Emiri's Adventures
Nicole Wallace Mother Of Pearl Necklace
De beste uitvaartdiensten die goede rituele diensten aanbieden voor de laatste rituelen
Log in or sign up to view
Omnistorm Necro Diablo 4
Caderno 2 Aulas Medicina - Matemática
Labyrinth enchantment | PoE Wiki
Vocabulary Workshop Level B Unit 13 Choosing The Right Word
Seminary.churchofjesuschrist.org
Gym Assistant Manager Salary
Scythe Banned Combos
Take Me To The Closest Ups
Abigail Cordova Murder
Lightfoot 247
German American Bank Owenton Ky
Buildapc Deals
Latest Posts
Article information

Author: Ms. Lucile Johns

Last Updated:

Views: 6355

Rating: 4 / 5 (61 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Ms. Lucile Johns

Birthday: 1999-11-16

Address: Suite 237 56046 Walsh Coves, West Enid, VT 46557

Phone: +59115435987187

Job: Education Supervisor

Hobby: Genealogy, Stone skipping, Skydiving, Nordic skating, Couponing, Coloring, Gardening

Introduction: My name is Ms. Lucile Johns, I am a successful, friendly, friendly, homely, adventurous, handsome, delightful person who loves writing and wants to share my knowledge and understanding with you.