Bitget App
Trade smarter
Buy cryptoMarketsTradeFuturesEarnWeb3SquareMore
Trade
Spot
Buy and sell crypto with ease
Margin
Amplify your capital and maximize fund efficiency
Onchain
Going Onchain, without going Onchain!
Convert
Zero fees, no slippage
Explore
Launchhub
Gain the edge early and start winning
Copy
Copy elite trader with one click
Bots
Simple, fast, and reliable AI trading bot
Trade
USDT-M Futures
Futures settled in USDT
USDC-M Futures
Futures settled in USDC
Coin-M Futures
Futures settled in cryptocurrencies
Explore
Futures guide
A beginner-to-advanced journey in futures trading
Futures promotions
Generous rewards await
Overview
A variety of products to grow your assets
Simple Earn
Deposit and withdraw anytime to earn flexible returns with zero risk
On-chain Earn
Earn profits daily without risking principal
Structured Earn
Robust financial innovation to navigate market swings
VIP and Wealth Management
Premium services for smart wealth management
Loans
Flexible borrowing with high fund security
Bittensor identifies vulnerability behind $8 million exploit in post-mortem

Bittensor identifies vulnerability behind $8 million exploit in post-mortem

The BlockThe Block2024/07/04 11:46
By:The Block

Quick Take Bittensor has identified the issue behind an $8 million security exploit involving certain network wallets. In a post-mortem, the Opentensor Foundation said the attack was traced back to a malicious package upload.

The Opentensor Foundation (OTF), the organization behind the decentralized AI project Bittensor TAO -3.93% , has identified the root cause of an $8 million security exploit on Bittensor wallets, attributing it to a malicious package upload in a post-mortem report .

The attack began at 7:06 p.m. UTC on July 2, according to the foundation, with the attacker draining funds from the affected Bittensor wallets to their own. OTF detected an “abnormality in transfer volume” at 7:26 p.m., subsequently placing the network validators behind a firewall in “safe mode” at 7:41 p.m. to prevent any nodes from connecting to the chain, halting transactions, and allowing the team time to investigate.

“The attack was traced back to the PyPi Package Manager version 6.12.2, where a malicious package was uploaded, compromising user security,” the OTF wrote.

The Bittensor PyPI package is a Python library that enables interaction with the Bittensor network. However, masquerading as a legitimate Bittensor package, the malicious version contained code designed to steal private keys, the foundation said. When users downloaded the package and decrypted their keys, the information was sent to a remote server controlled by the attacker, allowing them to steal funds from the victims.

Anyone who downloaded the malicious package between May 22 and May 29 and then performed certain staking, voting power delegation or transfer operations was likely affected by the vulnerability, according to the OTF.

Those who did not perform these operations or were using a third-party application are unlikely to have been affected, it added, stating the attack did not affect the blockchain itself, and the underlying Bittensor protocol remains “uncompromised and secure.”

Mitigating the vulnerability and tracing the attacker

The OTF said it has removed the malicious 6.12.2 package from the PyPi Package Manager repository and continues to review the Bittensor code on Github, claiming no other vulnerabilities have been identified so far.

After completing the code review, the OTF said the Bittensor blockchain will gradually resume normal operations, enabling users to make transactions again. According to a Bittensor block explorer , the last transaction was finalized around 35 hours ago.

The foundation recommended that affected users create a new wallet and transfer their funds once the blockchain resumes. It also advised upgrading to the latest version of Bittensor if they had not already done so.

The foundation added that it is working with several crypto exchanges and the broader Bittensor community to try and trace the attacker and potentially salvage victims’ funds.

The OTF said it would provide another update within 24 hours and would be enhancing its verification process, audit frequency, security standards and monitoring procedures in the future.

$8 million worth of TAO stolen

Bittensor core developers halted the blockchain network following the suspected security exploit, first noted by onchain analyst ZachXBT.

“Bittensor was halted due to additional thefts earlier today potentially as a result of private key leakage,” he explained in a Telegram update, adding that $8 million worth of TAO — approximately 32,000 native Bittensor (TAO) tokens — were stolen in the attack.

The incident contributed to a 15% decline in the TAO token's value to around $230 on Wednesday, according to The Block's Bittensor price page . TAO is currently trading for $227.59, down 3.5% over the past 24 hours.

TAO/USD price chart. Image: The Block/TradingView .


0

Disclaimer: The content of this article solely reflects the author's opinion and does not represent the platform in any capacity. This article is not intended to serve as a reference for making investment decisions.

PoolX: Locked for new tokens.
APR up to 10%. Always on, always get airdrop.
Lock now!

You may also like

Subscribe to TANSSI Savings and enjoy up to 15% APR

Bitget Announcement2025/07/15 11:00

TACUSDT now launched for futures trading and trading bots

Bitget Announcement2025/07/15 10:40

Bitget Spot Bot adds PUMP/USDT

Bitget Announcement2025/07/15 08:00