Friend.tech copycat StarsArena patches exploit after some funds were drained

11 months ago

StarsArena announced that attackers were draining funds done a loophole, but the declaration has been patched to forestall further damage.

Friend.tech copycat StarsArena patches exploit aft  immoderate   funds were drained

The StarsArena Web3 app connected Avalanche has mislaid immoderate of its funds owed to a malicious attack, according to societal media reports connected October 5. 

StarsArena idiosyncratic Lilitch.eth discovered the exploit and announced it connected X, formerly known arsenic Twitter. Lilitch.eth claimed implicit $1 cardinal was mislaid successful the attack. The StarsArena squad confirmed the attack, calling it a “war” against the app. They said the onslaught lone resulted successful astir $2,000 successful losses and the exploit has present been patched.

THE EXPLOIT HAS BEEN FIXED.

BUT DON’T GET THIS WRONG WE ARE AT WAR.

We’re being targeted by malicious actors successful the abstraction that privation to bargain your money.

The small feline is nether attack.

You are nether attack.

Your close to level diverseness is nether attack.

Don’t get it… pic.twitter.com/DmbMdf9cAq

— Stars Arena (@starsarenacom) October 5, 2023

StarsArena is simply a Web3 societal media app moving connected the Avalanche network. Similar to Friend.tech, it allows users to bargain “shares” oregon tokenized assets issued by contented creators. The issuers tin assistance token owners entree to exclusive contented oregon different perks. Avalanche has seen a surge of activity since StarsArena was launched, arsenic the network’s regular transaction number accrued by implicit 186% from October 3-4.

On the greeting of October 5, Lilitch.eth declared connected X that StarsArena was being drained of funds. “1.1 cardinal dollars are being drained close present due to the fact that of noob devs who couldn't marque a transcript of http://Friend.tech that volition enactment properly,” Lilitch stated, adding “If you clasp ANY SHARES successful StarsArena you should merchantability portion you inactive can.” In the post, they showed an representation of a declaration astatine code 0xA481B139a1A654cA19d2074F174f17D7534e8CeC that contained astir 107,329 Avalanche (AVAX) tokens, worthy implicit $1 cardinal astatine the time.

— lilitch.eth (@0xlilitch) October 5, 2023

In response, immoderate users accused Lilitch of “fudding” (spreading fear, uncertainty, and doubt). For example, ZSwapDEX developer Mork claimed that “no exploiter tin nett from this due to the fact that the state to tally the tx is higher than the Avax extracted” and “they are proxy contracts - capable to beryllium updated.”

Related: Friend.tech gross surges implicit 10,000 ETH, TVL tops 30,000 ETH

The StarsArena squad responded with a station connected X stating that “THE EXPLOIT HAS BEEN FIXED.” It claimed that attackers had been spending $5 successful state to drain $1 from the app successful an effort to destruct its credibility. “We are astatine war,” the station stated, claiming that the app was experiencing “coordinated FUD.” The squad held a Twitter Spaces lawsuit to explicate to users what was happening. In the event, they explained that lone astir $2,000 had been mislaid successful the attack.

Responding to the team’s post, Lilitch denied that attackers had been spending $5 successful state to drain $1. “Nobody was spending 5$ to get 1$ from your TVL, chill,” they stated. They claimed alternatively that attackers stopped whenever state prices became excessively precocious to marque the onslaught profitable. Lilitch besides denied making “war” against the app. In different post, they claimed to enactment the app present that it has been patched, stating “the struggle was resolved, we are person present @starsarena to the moon.”

Friend.tech users person been facing a question of SIM-swap attacks, leaving its users and those of akin apps connected edge. On October 5, the Friend.tech squad implemented a relation to region login methods to assistance combat the problem.

View source