Io.net CEO Ahmad Shadid recently disclosed details of a Sybil attack on the network, emphasizing the company’s measures to bolster security.
According to a postmortem Shadid published on social media, the attackers exploited vulnerabilities to spoof GPU availability and receive rewards of the decentralized computing network based on Solana.
Following the discovery of the April 27 Sybil attack, Io.net’s team conducted a thorough analysis to understand how the attackers were able to exploit the network.
The incident began when an unexpected surge in GPU connections was noticed, with approximately 1.8 million fake GPUs trying to connect to the network.
“Over the last 120 hours, we worked to expel sybil attackers from the network, roll out multiple security patches, and put in place a new security model to prevent future incidents,” said Shadid. “During this time, I worked very closely with the team.”
Postmortem on 4/27 Incident Report$IO Nation,
Over the last 120 hours, we worked to expel sybil attackers from the network, roll out multiple security patches, and put in place a new security model to prevent future incidents. The network infrastructure is now fully…
— SHADID | $IO™ (@shadid_io) April 28, 2024
The attackers had exploited a vulnerability that allowed them to mimic the signals sent by genuine GPUs, thus fooling the network into recognizing them as legitimate.
“Like many startups, we move fast, and sometimes we break things,” stated Shadid. “In this case, something broke, and someone or some group sought to exploit that.”
Shadid noted that following the launch of their fundraising and incentives program in March, Io.net saw an exponential increase in GPU connections. Initially, these appeared normal with stable clustering
Read more on cryptonews.com