Peckshield has reported that Aave's Earning Farm has fallen victim to a reentrancy attack, leading to the theft of around $287,000 worth of Ether.
The connection between this attack and the vulnerabilities in Curve Finance's pools remains uncertain.
Coinlive reported previously on July 30 how reentrancy attacks drained over $61 million from the stable pools of the DeFi protocol.
The exploit in the Curve hack stemmed from a vulnerability impacting three iterations of the Vyper programming language, widely used by DeFi protocol developers.
Earning Farm stands as a user-friendly protocol catering to Ether, wrapped Bitcoin (wBTC), and USD Coin holders.
The protocol, as per its website, underwent a security audit by the Slowmist security firm.
This incident is not the first instance of an attack on the protocol. In October 2022, Earning Farm experienced two malicious hacks on its EFLeverVault due to flash loan attacks.
These attacks involve borrowing a substantial amount of cryptocurrency within a single transaction, manipulating its value through various transactions, and promptly repaying the loan, all within the same transaction.
Exploiting price inconsistencies and momentary imbalances within the system allows hackers to profit from these attacks
What measures are being taken to prevent similar attacks?
Many are wondering how the industry plans to safeguard against future attacks.
Blockchain security experts are increasingly advocating for comprehensive security audits and testing of smart contracts, which are the building blocks of these projects.
By identifying vulnerabilities and weaknesses early on, developers can proactively strengthen the protocols.