Li.Fi decentralized finance platform reports cyberattack and theft of $11M
Learn More
LI.FI reports that on July 16, 2024, they were hit by a significant security breach shortly after integrating a new smart contract facet. LI.FI is a decentralized finance (DeFi) platform designed to facilitate cross-chain bridging and decentralized exchange (DEX) aggregation. It offers users the ability to seamlessly swap and bridge digital assets across various blockchain networks.
The vulnerability allowed an attacker to access user self-custodial wallets with infinite token approval for the LI.FI contract, leading to an estimated theft of $11.6 million. The breach affected 153 wallets across the Ethereum and Arbitrum networks, with stolen assets including USDC, USDT, and DAI.
Upon detecting the breach, LI.FI's incident response team disabled the vulnerable facet on all chains. The team identified the root cause as a deployment oversight, where callers to the contract could make arbitrary calls to any contract without validation, a feature provided by the LibSwap library. Typically, these calls are validated against a whitelist of approved contract addresses and functions, but this check was missing in the new facet due to human error.
LI.FI is prioritizing the recovery of user assets, working with law enforcement and industry security teams to trace and recover the stolen funds. Additionally, LI.FI, with backing from major investors, is evaluating options to compensate affected users. Affected wallet holders are encouraged to complete a provided form for direct contact and assistance.
- Multiple audits by various firms
- Monthly retainer with an auditing firm for review of changes
- Backend infrastructure and API pen-testing (Whitebox & Blackbox) by external security firms
- Bug bounty programs
- Incident Response Framework
- Extensive security assessments of integrated third-party systems
- Multiple security policies in line with NIST standards
The team has begun reassessing the deployment review process to prevent similar incidents in the future. Continuous collaboration with security experts is underway to improve policies, and updates will be provided as progress is made.