io.net Experienced a Cybersecurity Breach and Responded Promptly

io.net Experienced a Cybersecurity Breach and Responded Promptly

Reported by Cointelegraph, Io.net, a decentralized physical infrastructure network (DePIN), recently experienced a cybersecurity breach. Malicious users exploited exposed user ID tokens to execute a system query language (SQL) injection attack, which led to unauthorized changes in device metadata within the graphics processing unit (GPU) network.

Husky.io, Io.net’s chief security officer, responded promptly with remedial actions and security upgrades to protect the network. Fortunately, the attack did not compromise the GPUs’ actual hardware, which remains secure due to robust permission layers.

The breach was detected during a surge in write operations to the GPU metadata application programming interface (API), triggering alerts at 1:05 am Pacific Standard Time on April 25.

In response, security measures were reinforced by implementing SQL injection checks on APIs and enhancing the logging of unauthorized attempts. Additionally, a user-specific authentication solution using Auth0 with OKTA was swiftly deployed to address vulnerabilities related to universal authorization tokens.

Unfortunately, this security update coincided with a snapshot of the rewards program, exacerbating an expected decrease in supply-side participants. Consequently, legitimate GPUs that did not restart and update could not access the uptime API, causing a significant drop in active GPU connections from 600,000 to 10,000.

To address these challenges, Ignition Rewards Season 2 has been initiated in May to encourage supply-side participation. Ongoing efforts include collaborating with suppliers to upgrade, restart, and reconnect devices to the network.

The breach stemmed from vulnerabilities introduced while implementing a proof-of-work mechanism to identify counterfeit GPUs. Aggressive security patches before the incident prompted an escalation in attack methods, necessitating continuous security reviews and improvements.

The attackers exploited a vulnerability in an API to display content in the input/output explorer, inadvertently revealing user IDs when searching by device IDs. Malicious actors compiled this leaked information into a database weeks before the breach.

The attackers leveraged a valid universal authentication token to access the “worker-API,” enabling changes to device metadata without requiring user-level authentication.

Husky.io emphasized ongoing thorough reviews and penetration tests on public endpoints to detect and neutralize threats early. Despite challenges, efforts are underway to incentivize supply-side participation and restore network connections, ensuring the platform’s integrity while serving tens of thousands of compute hours per month.

Source

AI

Web3

Related News
TON Foundation offers path to 10-year UAE 'Golden Visa' for $100k in staked TON, $35k fee; UAE denies eligibility TON Foundation offers path to 10-year UAE 'Golden Visa' for $100k in staked TON, $35k fee; UAE denies eligibility
JPMorgan's blockchain unit tests new carbon credit tokenization application with S&P Global JPMorgan's blockchain unit tests new carbon credit tokenization application with S&P Global
Robinhood completes $200 million acquisition of crypto exchange Bitstamp Robinhood completes $200 million acquisition of crypto exchange Bitstamp
EOS rebrands to Vaulta amid pivot to 'web3 banking', plans to launch new token EOS rebrands to Vaulta amid pivot to 'web3 banking', plans to launch new token
Bankrbot ends Grok's unintentional token creation spree by disabling interactions on X Bankrbot ends Grok's unintentional token creation spree by disabling interactions on X
Latest News More More
1 Day Ago Chinese creditors push back against FTX's motion to forfeit payouts in restricted jurisdictions
July 4 Tether plans further Bitcoin mining expansion in South America with Adecoagro tie up
July 3 North Korean hackers use fake Zoom updates to deliver ‘NimDoor’ macOS malware targeting crypto firms
June 30 Ethereum community plans onchain ‘time capsule’ to mark 10th anniversary of network’s genesis block
June 25 Circle's post-IPO stock surge pushes market cap near Coinbase and USDC
delate
Use TokenInsight App All Crypto Insights Are In Your Hands
Open