Back to Blog

BonqDAO 在 Polygon 上被利用,因逻辑缺陷损失 1.2 亿美元

Code Auditing
February 2, 2023
4 min read

2023年2月2日,Polygon上的BonqDAO遭到攻击,导致损失约9860万BEUR和1.13亿WALBT。经调查,我们发现导致攻击的原因是用于确定WALBT代币价格的逻辑存在缺陷。作为一家区块链安全公司,我们密切关注这些可能对DeFi领域产生深远影响的漏洞利用。

日期 攻击类型 损失 追回
2023/2/1 价格依赖性缺陷 Polygon 约1.2亿美元

项目介绍

BonqDAO(Bonq去中心化自治组织)是一个部署在Polygon上的DeFi借贷平台。用户可以向协议提供流动性或获得超额抵押贷款以赚取收益,然后可以铸造与欧元挂钩的稳定币BEUR。

此次攻击后,BonqDAO的TVL从1300万美元骤降至4.4万美元,跌幅高达99.66%。

BonqDAO随后宣布Bonq协议已暂停,AllianceBlockBonq团队铸造了新的ALBT代币并空投给受影响的用户。

攻击分析

TellorFlex是BonqDAO的预言机。它是去中心化的,任何人都可以通过质押仅10个TRB代币来成为价格提供者,并随意修改预言机价格。

攻击者在此次攻击中通过两种方式获利:

  • 提高WALBT的价格,然后借入大量的BEUR代币
  • 降低WALBT的价格,然后清算其他用户的WALBT。

攻击者的策略可细分为以下关键步骤:

  1. 准备资金
  2. 攻击者质押10个TRB代币,并通过 TellorPriceFeed (0x8f55) 提高WALBT代币的价格。
  1. 攻击者然后存入0.1 WALBT并直接使用更新后的价格获得1亿BEUR
  1. 攻击者使用相同的方法操纵WALBT价格使其降低,清算其他BonqDAO用户的WALBT抵押品,然后转售以获取进一步利润。

资金追踪

作为一家致力于维护区块链安全的公司,我们也一直在密切关注此次攻击的进展。(我们的官方Twitter账号持续报道此事件,感兴趣的读者可以关注我们的账号@BlockSecTeam@MetaSleuth一起追踪这些资金的去向。)

MetaSleuth是一款高性能的跨链资金流分析工具,能够增强区块链交易活动的透明度。它使用户能够近乎实时地追踪受影响数字资产的踪迹。通过利用MetaSleuth,我们可以清晰地看到此次攻击发生和后续过程中相关的资金流追踪信息。

  1. BonqDAO攻击者的利润约为9860万BEUR和1.13亿WALBT。具体来说,1.13亿WALBT被销毁,从而从ETH链解锁了1.13亿ALBT。约50万BEUR被兑换成534,535 USDC,然后兑换成以太坊(0xcacf...6642)。攻击者在Polygon账户中仍剩余9810万BEUR
  1. 关于以太坊地址0xcacf..6642,它使用0xExchange(@0xProject)将收到的USDC兑换成DAI。此外,WALBT正在通过0xExchange和Uniswap兑换成ETH/USDT。该账户目前持有711 ETH、534,481 DAI和8900万ALBT。
  1. 2023年2月3日,我们检测到攻击者已将DAI兑换成以太坊,并通过Tornado Cash洗钱了1105个以太坊

总结

此次攻击的根本原因在于修改TellorFlex预言机报价所需的成本过低,而Bonq借贷合约中抵押品的借贷金额仅与TellorFlex预言机报告的价格有关。因此,攻击者能够以相对较低的成本修改报价,并通过抵押品借贷获得可观的利润。

阅读更多

以上仅为代表性案例。事实上,我们有更多专注于区块链安全分析的案例。

DeFi漏洞分析:Euler损失2亿美元的根本原因

关于BlockSec

BlockSec为区块链项目提供全栈安全服务,涵盖从预上线到上线后以及事件响应等各个阶段。在开发和测试阶段,利用专家代码审计服务和Phalcon分叉测试平台,帮助识别潜在的安全问题。通过BlockSec Phalcon确保您区块链项目的上线后安全。该简化的SaaS平台提供事件警报和自动阻止功能,以防止加密货币被盗。它采用精确的攻击检测,扫描待处理和链上交易,让您能够迅速拦截黑客。此外,MetaSleuth是一个直观的加密资产追踪和调查平台,有助于提高资产的可追溯性和透明度。

Sign up for the latest updates
~$15.9M Lost: Trusted Volumes & More | BlockSec Weekly
Security Insights

~$15.9M Lost: Trusted Volumes & More | BlockSec Weekly

This BlockSec bi-weekly security report covers 11 notable attack incidents identified between April 27 and May 10, 2026, across Sui, Ethereum, BNB Chain, Base, Blast, and Berachain, with total estimated losses of approximately $15.9M. Three incidents are analyzed in detail: the highlighted $1.14M Aftermath Finance exploit on Sui, where a signed/unsigned semantic mismatch in the builder-fee validation allowed an attacker to inject a negative fee that was converted into positive collateral during settlement; the $5.87M Trusted Volumes RFQ authorization mismatch on Ethereum; and the $5.7M Wasabi Protocol infrastructure-to-contract-control compromise across multiple EVM chains.

Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit