<p><span style="font-weight: 400;">Rarely has a job application backfired more spectacularly than in the case of one senior engineer at Axie Infinity, whose interest in joining what turned out to be a fictitious company led to one of the crypto sector’s biggest hacks. </span><span style="font-weight: 400;"> </span></p> <p><span style="font-weight: 400;">Ronin, the Ethereum-linked sidechain that underpins play-to-earn game Axie Infinity, </span><a href="https://www.theblock.co/post/139761/axie-infinitys-ethereum-sidechain-ronin-hit-by-600-million-exploit"><span style="font-weight: 400;">lost $540 million</span></a><span style="font-weight: 400;"> in crypto to an exploit in March. While the US government later </span><a href="https://www.coindesk.com/policy/2022/04/14/us-officials-tie-north-korean-hacker-group-to-axies-ronin-exploit/"><span style="font-weight: 400;">tied the incident</span></a><span style="font-weight: 400;"> to North Korean hacking group Lazarus, full details of how the exploit was carried out have not been disclosed. </span></p> <p><span style="font-weight: 400;">The Block can now reveal that a fake job ad was Ronin’s undoing. </span></p> <p><span style="font-weight: 400;">According to two people with direct knowledge of the matter, who were granted anonymity due to the sensitive nature of the incident, a senior engineer at Axie Infinity was duped into applying for a job at a company that, in reality, did not exist. </span></p> <p><span style="font-weight: 400;">Axie Infinity was huge. At its peak, workers in Southeast Asia were even </span><a href="https://restofworld.org/2021/axie-infinity/"><span style="font-weight: 400;">able to earn a living</span></a><span style="font-weight: 400;"> through the play-to-earn game. It boasted </span><a href="https://afkgaming.com/esports/news/report-axie-infinity-was-losing-player-count-even-before-the-crypto-hack"><span style="font-weight: 400;">2.7 million daily active users</span></a><span style="font-weight: 400;"> and </span><a href="https://www.theblock.co/linked/150320/pay-to-earn-game-axie-infinitys-revenue-continues-to-slide"><span style="font-weight: 400;">$214 million</span></a><span style="font-weight: 400;"> in weekly trading volume for its in-game NFTs in November last year — although both numbers have since plummeted.</span></p> <p><span style="font-weight: 400;">Earlier this year, staff at Axie Infinity developer Sky Mavis were approached by people purporting to represent the fake company and encouraged to apply for jobs, according to the people familiar with the matter. One source added that the approaches were made through the professional networking site LinkedIn. </span></p> <p><span style="font-weight: 400;">After what one source described as multiple rounds of interviews, a Sky Mavis engineer was offered a job with an extremely generous compensation package. </span></p> <p><span style="font-weight: 400;">The fake “offer” was delivered in the form of a PDF document, which the engineer downloaded — allowing spyware to infiltrate Ronin’s systems. From there, hackers were able to attack and take over four out of nine validators on the Ronin network — leaving them just one validator short of total control. </span></p> <p><span style="font-weight: 400;">In </span><a href="https://roninblockchain.substack.com/p/back-to-building-ronin-security-breach"><span style="font-weight: 400;">a post-mortem</span></a><span style="font-weight: 400;"> blog post on the hack, published April 27, Sky Mavis said: “Employees are under constant advanced spear-phishing attacks on various social channels and one employee was compromised. This employee no longer works at Sky Mavis. The attacker managed to leverage that access to penetrate Sky Mavis IT infrastructure and gain access to the validator nodes.”</span></p> <p><span style="font-weight: 400;">Validators fulfill various functions in blockchains, including the creation of transaction blocks and the updating of data oracles. Ronin uses a so-called “proof of authority” system for signing transactions, concentrating power in the hands of nine trusted actors.</span></p> <p><span style="font-weight: 400;">An April </span><a href="https://www.elliptic.co/blog/540-million-stolen-from-the-ronin-defi-bridge"><span style="font-weight: 400;">blog post</span></a><span style="font-weight: 400;"> on the incident from blockchain analysis firm Elliptic explains: “Funds can be moved out if five of the nine validators approve it. The attacker managed to get hold of the private cryptographic keys belonging to five of the validators, which was enough to steal the cryptoassets.”</span></p> <p><span style="font-weight: 400;">But after successfully infiltrating Ronin’s systems through the fake job ad, the hackers had control of just four out of the nine validators — meaning they needed another in order to take control. </span></p> <p><span style="font-weight: 400;">In its </span><a href="https://roninblockchain.substack.com/p/back-to-building-ronin-security-breach"><span style="font-weight: 400;">post-mortem</span></a><span style="font-weight: 400;">, Sky Mavis revealed that the hackers managed to use the Axie DAO (Decentralized Autonomous Organization) — a group set up to support the gaming ecosystem — to complete the heist. Sky Mavis had asked the DAO for help dealing with a heavy transaction load in November 2021. </span></p> <p><span style="font-weight: 400;">“The Axie DAO allowlisted Sky Mavis to sign various transactions on its behalf. This was discontinued in December 2021, but the allowlist access was not revoked,” said Sky Mavis in the blog post. “Once the attacker got access to Sky Mavis systems they were able to get the signature from the Axie DAO validator.”</span></p> <p><span style="font-weight: 400;">A month after the hack, Sky Mavis had increased the number of its validator nodes to 11, and said in the blog post that its long-term goal was to have more than 100. </span><span style="font-weight: 400;"> </span></p> <p><span style="font-weight: 400;">Sky Mavis declined to comment on how the hack was carried out when reached. LinkedIn didn’t respond to multiple requests for comment.</span></p> <p><span style="font-weight: 400;">Earlier today, ESET Research </span><a href="https://www.computerweekly.com/news/252522378/ESET-Lazarus-APT-hit-aero-defence-sector-with-fake-job-ads"><span style="font-weight: 400;">published an investigation</span></a><span style="font-weight: 400;"> showing that North Korea’s Lazarus had abused LinkedIn and WhatsApp by posing as recruiters to target aerospace and defense contractors. But the report did not tie that technique to the Sky Mavis hack. </span></p> <p><span style="font-weight: 400;">Sky Mavis </span><a href="https://www.theblock.co/post/140800/sky-mavis-raises-150-million-from-binance-to-reimburse-ronin-hack-victims"><span style="font-weight: 400;">raised $150 million</span></a><span style="font-weight: 400;"> in a round led by Binance in early April. The proceeds will be used alongside the company’s own funds to reimburse users affected by the exploit. The company </span><a href="https://www.coindesk.com/business/2022/06/24/axie-infinity-developer-sky-mavis-to-reimburse-victims-of-ronin-bridge-hack/"><span style="font-weight: 400;">said recently</span></a><span style="font-weight: 400;"> that it would begin returning funds to users on June 28. After coming to a sudden halt at the time of the hack, Ronin’s Ethereum bridge also </span><a href="https://www.theblock.co/post/153984/axie-infinitys-ronin-ethereum-bridge-to-restart-next-week"><span style="font-weight: 400;">relaunched last week</span></a><span style="font-weight: 400;">.</span></p> <p><span style="font-weight: 400;">The rate of DeFi hacks has accelerated rapidly this year, topping $2 billion in total funds lost, according to </span><a href="https://www.theblockcrypto.com/data/decentralized-finance/exploits/funds-stolen-by-defi-attackers"><span style="font-weight: 400;">The Block Research data</span></a><span style="font-weight: 400;">. On January 1, the number stood at $760 million. </span></p> <p><iframe frameborder="0" height="420" src="https://embed.theblockcrypto.com/data/decentralized-finance/exploits/funds-stolen-by-defi-attackers/embed" title="Funds stolen by DeFi attackers" width="100%"></iframe></p><br /><span class="copyright"><p>© 2023 The Block Crypto, Inc. All Rights Reserved. This article is provided for informational purposes only. It is not offered or intended to be used as legal, tax, investment, financial, or other advice.</p> </span>