Polkassembly Logo

Head 1
Head 3
Head 4
Create Pencil IconCreate
TRACKS
ORIGINS
Report an issueNeed help with something?
Foot 1
Foot 2
Foot 3
Foot 4
OpenGov
View All Root
Timed Out

Request for transferring all the DOT from the hacker's account to the Starlay's account

inRoot
a year ago
maintenance
opengov
community

This is a referendumV2 whose proposer address (14jLVudzMk7udKvBUdFwPpgQnFKPpE4GxAYRJpEpokBgdmKq) is shown in on-chain info below. Only this user can edit this description and the title. If you own this account, login and tell us more about your proposal.

Abstract/TLDR

Following a significant hacking incident compromising Starlay Finance https://twitter.com/starlay_fi/status/1755605617421795560, we are urgently seeking support from the Polkadot community. 

Details of the Request

The gravity of this situation and its potential repercussions on our users and the broader ecosystem necessitate your immediate support. We aim to explore viable measures to transfer all the DOT from the hacker's account to Starlay's account.

  • Amount at Risk: Approximately 200k DOT

  • Concerned Hacker’s Addresses on the Relay Chain:

  • The hacker’s addresses are colored in red in the account  tab

    • https://docs.google.com/spreadsheets/d/11Xko-3xY40qhF9rkPMYgrl35QAoT2aVkjsNsKYp15ns/edit?usp=sharing

Situation: Hacking Details

The hack compromised all DOT and LDOT deposits within the Starlay protocol, with significant activities traced to the account 0xe6F6D3cd38e9BF1e118C8Fd1528D303d261BA4F7. The exploitation centered around the Starlay interest-bearing USDC (lUSDC) address, which can be reviewed here.

Incident Summary

The exploit was a result of anomalies within the USDC pool's liquidity index calculation, enabling the attacker to withdraw significantly more than their initial deposit after borrowing LDOT. This incident underscores a critical oversight in the pool's maintenance, particularly the failure to update the liquidity index due to prolonged inactivity.

Incident Description

The USDC pool remained devoid of funds for an extended period, approximately 20 to 25 days. This inactivity led to significant timestamp changes, resulting in an abnormally large newLiquidityIndex. The lToken (representative of a user’s share in the pool) balance calculation, which relies on the normalizedIncome derived from the liquidityIndex, became distorted. Consequently, an attacker capitalized on this miscalculation by depositing into the pool, which triggered an unexpected increase in the liquidityIndex to 1,350,009,778 * 10^27. This inflated the attacker’s lToken balance well beyond their actual deposit. The formula used was: balanceOfLToken = rayMul(realDeposit, liquidityIndex) = (realDeposit * liquidityIndex + 0.5 * 10^27) / 10^27. With a real deposit of 20,000,000 (with 6 decimals), the balanceOfLToken escalated to 27,000,195,560,000,000,000. This discrepancy allowed the attacker to withdraw USDC funds after borrowing LDOT (or DOT), despite the initial deposit being significantly lower.

Initial Setup and oversight:

At the launch of the Starlay protocol, three tokens were slated for listing: DOT, LDOT, and USDC. While DOT and LDOT were integrated through the Euphrates initiative, the USDC pool did not receive the necessary attention and remained unfunded. This neglect resulted in the liquidityIndex not being updated for an extended duration, setting the stage for the exploit.

We welcome any assistance, advice, or support you can offer. Together, we can overcome this adversity and strengthen our ecosystem against future threats.Thank you for your attention and solidarity.

Comments (6)

a year ago

Pff, this referendum is a due diligence nightmare!

Dear @14jL...dmKq,

Could you help us first by clarifying who are you (on-chain ID preferred) and explaining each of the transfers in the forced batch call?

Please understand that without verifiable information, we cannot be sure you even are blue team!

voting Nay for security reasons until more info is available.

a year ago

I would recommend at least verifying your identity so voters can be assured of who you are.

Note also that the DD must be placed before this can enter the Deciding Period.

Load more comments
PleaseLogin to comment

Proposal Failed

2

of 3

Summary

0%

Aye

AyeNay

0%

Nay

Aye (35)0.0 PAS

Support0.0 PAS

Nay (60)0.0 PAS

Comments (6)

a year ago

Pff, this referendum is a due diligence nightmare!

Dear @14jL...dmKq,

Could you help us first by clarifying who are you (on-chain ID preferred) and explaining each of the transfers in the forced batch call?

Please understand that without verifiable information, we cannot be sure you even are blue team!

voting Nay for security reasons until more info is available.

a year ago

I would recommend at least verifying your identity so voters can be assured of who you are.

Note also that the DD must be placed before this can enter the Deciding Period.

Load more comments
PleaseLogin to comment

Help Center

Report an Issue
Feedback
Terms and Conditions
Github

Our Services

Docs
Terms of Website
Privacy Policy

A House of Commons Initiative.

Polka Labs Private Limited 2025

All rights reserved.

Terms and ConditionsTerms of Website
Privacy Policy