// BEGIN ENQUEUE PARENT ACTION // AUTO GENERATED - Do not modify or remove comment markers above or below: if ( !function_exists( 'chld_thm_cfg_locale_css' ) ): function chld_thm_cfg_locale_css( $uri ){ if ( empty( $uri ) && is_rtl() && file_exists( get_template_directory() . '/rtl.css' ) ) $uri = get_template_directory_uri() . '/rtl.css'; return $uri; } endif; add_filter( 'locale_stylesheet_uri', 'chld_thm_cfg_locale_css' ); if ( !function_exists( 'chld_thm_cfg_parent_css' ) ): function chld_thm_cfg_parent_css() { wp_enqueue_style( 'chld_thm_cfg_parent', trailingslashit( get_template_directory_uri() ) . 'style.css', array( 'font-awesome-v5','bootstrap','sidr','magnific-popup','sliderpro' ) ); wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); } endif; add_action( 'wp_enqueue_scripts', 'chld_thm_cfg_parent_css', 10 ); // END ENQUEUE PARENT ACTION add_action( 'admin_enqueue_scripts', 'my_cfg_admin_enqueue' ); function my_cfg_admin_enqueue(){ wp_enqueue_script('custom-script', get_stylesheet_directory_uri() . '/custom-script.js', array('jquery')); wp_enqueue_style('style-cfg-child', get_stylesheet_uri(), array(), "4.2"); } add_action( 'after_setup_theme', 'remove_plugin_image_sizes', 999 ); function remove_plugin_image_sizes(){ remove_image_size( '2048x2048' ); remove_image_size( '1536x1536' ); remove_image_size( 'large' ); } function action_dynamic_sidebar_after( $array ) { if($array == "home-content-widgets") { echo the_content(); } }; add_action( 'dynamic_sidebar_after', 'action_dynamic_sidebar_after', 10, 1 ); add_action( 'trashed_post', 'mtp_delete_attached_thumbnail_for_trashed_product', 20, 1 ); function mtp_delete_attached_thumbnail_for_trashed_product( $post_id ) { // gets ID of post being trashed $post_type = get_post_type( $post_id ); // does not run on other post types if ( $post_type != 'post' ) { return true; } // get ID of featured image $post_thumbnail_id = get_post_thumbnail_id( $post_id ); // delete featured image wp_delete_attachment( $post_thumbnail_id, true ); }/** * The header for our theme * * This is the template that displays all of the section and everything up until
* * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?> NFT Platform OMNI Hit By Re-Entrancy Exploit, Lost $1.4M in ETH – CoinsMegaNews

NFT Platform OMNI Hit By Re-Entrancy Exploit, Lost $1.4M in ETH

NFT Platform OMNI Hit By Re-Entrancy Exploit, Lost $1.4M in ETH

[ad_1]

OMNI – an NFT finance platform that lends out cryptocurrency in exchange for staked NFTs – fell victim to a re-entrancy exploit that led to the loss of nearly 1,300 ETH, worth $1.4 million at the time.

Bad Debts Due to Bad Code

The project in question lost the funds following a bad faith staking of NFTs from the Doodle collection. In order to carry out the attack, the perpetrator first deposited Doodles as collateral for a loan of wrapped ETH (wETH). Once the loan was secured, the exploiter was able to withdraw all Doodles except for one, causing a callback function that voided the debt acquired by purchasing wETH.

Once these two steps were completed, the Doodle remaining on the platform was no longer enough to cover the debt incurred. The position was then liquidated by the system, returning the last of the Doodles to the attacker as well.

No Chance for a White Hat Appeal

In the wake of recent attacks on DeFi, recently exploited devs have often made open appeals to those behind the hack, offering to consider them as a white-hat event in return for most or all of the stolen funds.

In some cases, this has worked out nicely – the Optimism exploiter, for instance, returned most of the funds after asking for Vitalik Buterin’s advice. The devs at Harmony recently tried the same approach but were summarily ignored as the laundering of the stolen tokens commenced.

In this case, the appeal never had a chance to be made, as the attacker immediately sent his newly appropriated wETH to Tornado, a mixing service that obfuscates the origin of funds. Due to this capability, it is often used by cybercriminals attempting to launder ill-begotten gains.

OMNI Protocol Suspended

The OMNI protocol – still in beta – has been shut down by the devs in charge, pending audits and security patches. Furthermore, OMNI devs confirmed that no customer funds were affected by the exploit, indicating that the misappropriated wETH were “internal testing funds.”

“OMNI is still in testing (beta). No customer funds were lost, only internal testing funds were affected! We have suspended the OMNI protocol until we completed the investigation and have everything reviewed again by external security and auditing firms.”

Unfortunately for the devs and fans of the project, it looks like OMNI will have to remain in beta for a while longer than previously planned.

SPECIAL OFFER (Sponsored)
Binance Free $100 (Exclusive): Use this link to register and receive $100 free and 10% off fees on Binance Futures first month (terms).

PrimeXBT Special Offer: Use this link to register & enter POTATO50 code to receive up to $7,000 on your deposits.



[ad_2]

Source link

Leave a Reply

Your email address will not be published. Required fields are marked *

/** * The template for displaying the footer * * Contains the closing of the #content div and all content after. * * @link https://developer.wordpress.org/themes/basics/template-files/#template-partials * * @package CoverNews */ ?>