{"id":55050,"date":"2021-12-21T20:04:58","date_gmt":"2021-12-21T18:04:58","guid":{"rendered":"https:\/\/forklog.com\/en\/?p=55050"},"modified":"2025-09-03T23:28:40","modified_gmt":"2025-09-03T20:28:40","slug":"hackers-drained-more-than-8-8-million-visr-tokens-from-the-visor-defi-protocol","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/hackers-drained-more-than-8-8-million-visr-tokens-from-the-visor-defi-protocol\/","title":{"rendered":"Hackers drained more than 8.8 million VISR tokens from the Visor DeFi protocol"},"content":{"rendered":"<p>The Visor decentralised protocol was attacked using a reentrancy exploit and lost more than 8.8 million VISR tokens. This drew the attention of journalist Colin Wu and blockchain-security firm PeckShield Inc.<\/p>\n<p><!--more--><\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">liquidity management protocol Visor was attacked again by hackers. Hackers withdrew more than 8.8 million VISR tokens and sold them on Uniswap, causing the VISR tokens to plummet by nearly 95%, and it has used Tornado laundering <a href=\"https:\/\/t.co\/ZaoahPkJvh\">https:\/\/t.co\/ZaoahPkJvh<\/a><\/p>\n<p>\u2014 Wu Blockchain (@WuBlockchain) <a href=\"https:\/\/twitter.com\/WuBlockchain\/status\/1473317153461862403?ref_src=twsrc%5Etfw\">December 21, 2021<\/a><\/p><\/blockquote>\n<p> <script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>According to Wu, the hackers sold the withdrawn tokens on Uniswap. In the process of obfuscating the traces, a Tornado Cash mixer was used.<\/p>\n<p>Representatives of Visor confirmed the information about the incident. According to them, the exploit affected the vVISR staking contract.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">We are aware of an exploit of the vVISR staking contract and are implimenting a migration plan for affected VISR. No positions or hypervisor\u2019s are at risk.<\/p>\n<p>\u2014 Visor Finance (@VisorFinance) <a href=\"https:\/\/twitter.com\/VisorFinance\/status\/1473306777131405314?ref_src=twsrc%5Etfw\">December 21, 2021<\/a><\/p><\/blockquote>\n<p> <script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>The project team is developing a plan to migrate VISR tokens and reimburse funds. It will be based on a data snapshot taken before the attack.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p lang=\"en\" dir=\"ltr\">\ud83d\udea8 Visor will be implementing a token migration based upon a snapshot before the exploit. Trades subsequent to the vVISR exploit will not effect your redeemable amount.<\/p>\n<p>\u2014 Visor Finance (@VisorFinance) <a href=\"https:\/\/twitter.com\/VisorFinance\/status\/1473317327601078279?ref_src=twsrc%5Etfw\">December 21, 2021<\/a><\/p><\/blockquote>\n<p> <script async=\"\" src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>In 2021, Cream Finance was hacked three times. In February, an unknown attacker exploited a vulnerability in Iron Bank and <a href=\"https:\/\/forklog.com\/en\/news\/hacker-drains-37-5-million-from-cream-finance-defi-protocol\">withdrew tokens for a total of $37.5 million<\/a>.\u00a0<\/p>\n<p>In August, the project <a href=\"https:\/\/forklog.com\/en\/news\/hackers-drain-more-than-18m-from-cream-finance-defi-protocol\">was attacked<\/a> using a flash loan. The damage amounted to 462,079,976 AMP and 2,804 ETH (over $18 million).<\/p>\n<p>In October, an unknown attacker withdrew from <a href=\"https:\/\/forklog.com\/en\/news\/cream-finance-defi-protocol-hacked-again\">Cream Finance $130 million<\/a>. To do this, he used a flash loan within a complex transaction.<\/p>\n<p>Subscribe to the ForkLog channel on <a href=\"https:\/\/www.youtube.com\/channel\/UCC9FnXTC8_ENzaNSO5cHQ6g\" target=\"_blank\" rel=\"nofollow noopener\"> YouTube<\/a>!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Visor decentralised protocol was attacked using a reentrancy exploit and lost more than 8.8 million VISR tokens.<\/p>\n","protected":false},"author":1,"featured_media":55051,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"1","news_style_id":"1","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[3],"tags":[1154,1817],"class_list":["post-55050","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-analysis","tag-crimes","tag-news"],"aioseo_notices":[],"amp_enabled":true,"views":"12","promo_type":"1","layout_type":"1","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/55050","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=55050"}],"version-history":[{"count":1,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/55050\/revisions"}],"predecessor-version":[{"id":55052,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/55050\/revisions\/55052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/55051"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=55050"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=55050"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=55050"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}