Back to Blog

Factors Making Web3 More Vulnerable to Hacks and Our Mitigation Strategies

Phalcon
August 30, 2023

In a world where blockchain hacks and capital exploitation seem to occur almost weekly, the question arises: Can we effectively prevent these security breaches?

BlockSec, the expert in the blockchain security field, offers valuable insights. We acknowledge the complexity of the issue while actively working to enhance security measures. BlockSec Phalcon, one of our products, provides precise alerts before attack transactions are executed, and takes automatic actions to fight hackers back.

Here's our BlockSec founder, Professor Yajin Zhou, sharing his perspectives on the proactive approach to blockchain security during a monitoring panel.

Considering the frequent occurrence of hacks and capital exploitation on the blockchain almost every week, is it realistic to prevent them effectively?

In the world of blockchain security, the answer is a bit complex. Our team is constantly working on ways to spot DeFi hacks. If you ask us whether we can catch all ongoing attacks, the answer is yes. However, here's the catch: if we label every transaction as suspicious or an attack, we can find all hacks, but this creates a problem. We need to carefully balance between false alarms and missing real threats.

When we create products for our customers and set up monitoring systems, we have to make sure our alerts make sense. If our system generates too many alerts, like 50, 100, or even 200 a day, most users will ignore them because most of them turn out to be false alarms. So, our challenge is to maintain that balance effectively.

At Blocksec, we're actively working on strategies to spot attacks while reducing false alarms. Looking ahead, with the help of the security community, we hope to identify a large portion of attacks. While we might not prevent them all, we can certainly improve our detection abilities significantly.

What specific factors in Web3 make it more vulnerable to security attacks than Web2?

In the world of Web3 security, a few things stand out that can make Web3 more vulnerable to attacks compared to Web2.

  • Firstly, Web3 is very open. Everything, like smart contracts and source code, is out in the open for everyone to see. This openness can make it easier for both regular folks and attackers to spot vulnerabilities. In contrast, Web2 systems, like those in traditional banks, keep their code hidden, making it much harder to find weaknesses.

  • Secondly, some parts of the blockchain, like flash loans, actually make it easier for attackers. In regular finance systems, attackers often need a lot of money, like a million dollars, to execute an attack. But in the blockchain world, they can use flash loans to borrow a large amount of cash, like ten million dollars, and use it for attacks.

  • Lastly, Web3 lacks good tools to find vulnerabilities. I'm a university professor, and I've seen students creating tools to find tricky problems in regular software for Web2. But when it comes to Web3 and smart contracts, there's still a lot of work to be done. Finding logical bugs related to business rules is especially tough. It involves things like changing inputs, understanding how different inputs relate, and using reliable information sources – challenges we haven't fully tackled yet.

So, all of these factors together make Web3 a tempting target for attackers but a tough place for protocols to stay secure.

How do you view the connection between monitoring in Web3 security? Can it empower attackers while also offering an opportunity to integrate optional monitoring solutions?

I have encountered challenges related to audio debases and privacy transactions within Blocksec. Similar to flashbots, these services are susceptible to abuse by attackers. One proposed solution from a colleague suggests investing transactions within flashloans to prevent their misuse. However, I believe this solution may not be practical or accessible in a decentralized world.

Preventing the abuse of such services by attackers remains an open question. Nevertheless, there are a few actions we can take.

  • Firstly, if an attacker is identified, collaborating with authorities to share information can be beneficial in verifying the attackers' identities. This collaboration with authorities can be a step towards mitigating the issue.

  • Additionally, in the future, implementing community-based eventing systems within transactions could prove useful. By incorporating decentralized community-based mechanisms, we can delay transactions that appear malicious.

While these measures may not fully resolve the issue, they can help address the current challenges we face.

Could you please recommend any tools or resources specifically designed to detect security flaws in web3 applications?

When it comes to recommendations, I believe exploring the DeFi Hack Labs is an excellent starting point for transitioning from web2 to web3 security.

This resource offers a wealth of past hack transactions that can be analyzed to gain insights into the motives and methods behind these attacks. By understanding the underlying causes and triggers of these hacks, one can develop tools to analyze and detect similar attacks in the web3 ecosystem. Consider utilizing both static and dynamic analysis tools, which can be developed independently or by building upon existing solutions. Continuously improving and expanding your knowledge in this area will be crucial.

Could you explain the process of front-running malicious transactions, what would be the infrastructure setup?

In our experience with front-running attack transactions, the process involves setting up infrastructure to monitor the memory pool transactions.

A crucial aspect is developing an automated system that can swiftly synthesize front-running transactions. This involves replicating the attack behaviors from the malicious contracts within your own smart contracts. It becomes essential to replace critical variables, such as substituting the attack address with your own black hat addresses. Additionally, having a responsive infrastructure is crucial to ensure immediate execution as soon as your transaction is on the blockchain.

In conclusion, BlockSec's expertise in the realm of blockchain security reflects our commitment to addressing the evolving challenges of Web3. BlockSec's approach combines technological innovation with collaboration and community involvement, ensuring a safer blockchain ecosystem for all users.

Join our waitlist and be the first to experience our outstanding services!

Sign up for the latest updates
Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.