SharkTeam: Web3 Security Report for the First Half of 2024
Written by: SharkTeam
The losses caused by hacker attacks, phishing attacks, and Rugpull scams in the first half of 2024 were approximately US$1.492 billion, a year-on-year increase of 116.23% compared to the first half of 2023 (approximately US$690 million). This report aims to provide a comprehensive analysis of the global Web3 industry in the first half of 2024.SafetyWe hope that this report will provide readers with useful information and ideas to promote the development of Web3.Safety, and contribute to healthy development.
I. Overview
The losses caused by hacker attacks, phishing attacks, and Rugpull scams in the first half of 2024 were approximately US$1.492 billion, a year-on-year increase of 116.23% compared to the first half of 2023 (approximately US$690 million). This report aims to provide a comprehensive analysis of the global Web3 industry in the first half of 2024.SafetyWe hope that this report will provide readers with useful information and ideas to promote the development of Web3.Safety, and contribute to healthy development.
2. Trend Analysis
根据 SharkTeam 链上智能风险识别平台 ChainAegis 数据,2024 年上半年 Web3 领域共发生了 551 起安全事件(如图 1),损失金额累计超过 14.92 亿美元(如图 2),与去年同期相比,安全事件数量增加 25.51%,损失金额增幅达到了 116.23%。
Figure 1 Total Count of Security Incidents in 2024H1
Figure 2 Total Loss of Security Incidents in 2024H1
In the first half of 2024, there were a total of 134 hacker attack-type security incidents, an increase of 103.03% compared with the first half of 2023. The amount of losses reached US$1.08 billion, accounting for 73% (as shown in Figure 3), an increase of 147.71% compared with the first half of 2023 (436 million).
There were a total of 243 Rug Pull incidents in the first half of the year, a surge of 331.15% compared to 61 incidents in the first half of 2023, and the loss amount increased by 258.82%, totaling US$122 million, accounting for 8% of the total H1 loss amount.
There were 174 phishing attacks in total in H1, a year-on-year increase of 40.32%, with a loss of up to US$290 million, accounting for 19%.
Figure 3 Amount of Loss by Attack Type in 2024H1
Figure 4 Amount of Count by Attack Type in 2024H1
Looking at the H1 by month (see Figure 5, Figure 6), the loss in May was the most serious, about US$643 million, with 92 security incidents, including 31 hacker attacks, 34 Rugpull incidents, and 27 phishing attacks.
Figure 5 Web3 Security Incidents Loss Overview in 2024H1
Figure 6 Web3 Security Incidents Count Overview in 2024H1
2.1 Hacker Attacks
There were 134 hacker attacks in the first half of the year, with a total loss of $1.08 billion. (See Figure 7 for specific data)
On May 21, 2024, the Gala Games protocol on Ethereum was hacked, resulting in a loss of $21.8 million. After the attack, the project team immediately took action and blacklisted the hacker's address, freezing the account.TokenPermission to sell.
On May 31, 2024, DMM Bitcoin, a subsidiary of Japanese securities company DMM.com exchangeA huge unauthorized outflow of Bitcoin occurred, with the outflow amount being approximately 48 billion yen (approximately US$300 million), the seventh largest loss in history.cryptocurrencyThe attack was also the most costly attack since December 2022.
Figure 7 Overview of Hacking by Month in 2024H1
2.2 Rugpull & Scams
As shown in the figure below (Figure 8), the frequency of Rugpull & Scam incidents was as high as 63 in March, and the lowest frequency was in June, with a total of 24 incidents; the loss amount was the highest in April, about 47.45 million US dollars, among which the ZKasino project owner's running away was the main reason for the highest loss in April.
Figure 8 Overview of Rugpull&Scam by Month in 2024H1
2.3 Phishing Attacks
As shown in the figure below (Figure 9), phishing attacks occurred most frequently in January, with a total of 39 incidents, causing losses of approximately US$44.15 million; the lowest frequency occurred in February, with a total of 21 incidents, causing losses of approximately US$28.34 million. Although there were only 27 phishing incidents in May, the amount of losses caused was the highest in the first half of the year, reaching US$108 million. Among them, on May 3, 2024, a user was phished for 1,155 WBTC due to address pollution phishing techniques, worth more than US$70 million.
Figure 9 Overview of Phishing by Month in 2024H1
3. Typical Case Analysis
3.1 Analysis of Sonne Finance Attack
On May 15, 2024, Sonne Finance was attacked and the project lost more than 20 million US dollars.
Attacker: 0xae4a7cde7c99fb98b0d5fa414aa40f0300531f43
Attack transaction:
0x9312ae377d7ebdf3c7c3a86f80514878deb5df51aad38b6191d55db53e42b7f0
The attack process is as follows:
1. Flash loan 35,569,150 VELO and transfer these VELO tokens to soVELO contractmiddle
Because it is a direct transfer (donation), no soVELO Token is minted. contractIn the transaction, totalCash increased by 35,569,150 VELO, and totalSupply of soVELO remained unchanged.
2. 攻击者新建contract 0xa16388a6210545b27f669d5189648c1722300b8b,在新合约中对目标合约发起攻击,攻击过程如下:
(1) Transfer 2 soVELO to the new contract
(2) Declare soWETH and soVELO as collateral
(3) Borrow 265,842,857,910,985,546,929 WETH from soWETH
From the execution of the above borrow function, according to the return value of the getAccountSnapshot function, we find that:
For the soWETH contract, the new contract balance is 0, the loan amount is 0, and the exchange rate is 208,504,036,856,714,856,032,085,073
For the soVELO contract, the new contract balance is 2, which means 2wei of soVELO is pledged, the loan amount is 0, and the exchange rate is 17,735,851,964,756,377,265,143,988,000,000,000,000,000,000
exchangeRate is calculated as follows:
If you pledge 1 wei of soVELO, you can borrow no more than 17,735,851,964,756,377,265,143,988 VELO. To borrow 265,842,857,910,985,546,929 WETH, you need to pledge at least 265,842,857,910,985,546,929 soWETH.
-
soWETHPrice = 2,892,868,789,980,000,000,000,
-
soVELO price: soVELOPrice = 124,601,260,000,000,000
The amount of WETH that can be borrowed by pledging 1wei of soVELO is as follows:
1 * exchangeRate * soVELOPrice / soWETHPrice = 763,916,258,364,900,996,923
About 763 WETH. Only 1wei of soVELO collateral is enough to support this loan.
Borrow 265,842,857,910,985,546,929 WETH (about 265 WETH) and convert it into collateral soVELO. The minimum amount of soVELO required for collateral is:
265,842,857,910,985,546,929 * soWETHPrice / soVELOPrice / exchangeRate = 0.348
That is, 1wei of soVELO collateral will suffice.
In fact, only 1wei of the 2wei soVELO collateral was used for lending.
(4) Redemption of underlying assets, i.e. 35,471,603,929,512,754,530,287,976 VELO
exchangeRate = 17,735,851,964,756,377,265,143,988,000,000,000,000,000,000
The amount of collateral soVELO required to redeem 35,471,603,929,512,754,530,287,976 VELO is
35,471,603,929,512,754,530,287,976 * 1e18 / exchangeRate = 1.99999436
During the calculation, because the calculation uses truncation instead of rounding, the actual required collateral is 1wei of soVELO.
The actual collateral is 2 wei of soVELO, of which 1 wei is used for the above loan of 265 WETH, and the remaining 1 wei is used to redeem 35M VELO
(5) Transfer the borrowed 265 WETH and redeemed 35M VELO to the attack contract
3. Create a new contract 3 times (4 times in total) and repeat the attack.
4. Finally, repay the flash loan.
5. Vulnerability Analysis
The above attack exploited two vulnerabilities:
(1) Donation attack: Directly transfer (donate) VELO Token to the soVELO contract, changing the exchangeRate, allowing the attacker to borrow approximately 265 WETH with only 1 wei of soVELO as collateral.
(2) Calculation accuracy problem: By taking advantage of the accuracy loss in the calculation process and the modified exchangeRate, 35M VELO can be redeemed with only 1wei soVELO pledged.
6. Safety Recommendations
In response to this attack, we should follow the following precautions during development:
(1) During the design and development process of the project, the integrity and rigor of the logic must be maintained, especially in the areas of deposits, pledges, updating of status variables, and the trade-offs of multiplication and division results during calculations. As many situations as possible should be considered to ensure that the logic is complete and has no loopholes.
(2) Before the project goes online, a third-party professional auditing company needs to conduct a smart contract audit.
3.2 Analysis of common Web3 phishing methods and security recommendations
Web3 phishing is a common attack method against Web3 users.stealObtaining the user's authorization or signature, or inducing the user to make an erroneous operation, in order tostealPlagiarize UserwalletCrypto assets in .
In recent years, Web3 phishing incidents have continued to occur, and a black industry chain of Drainer as a Service (DaaS) has developed, posing a severe security situation.
In this article, SharkTeam will conduct a systematic analysis of common Web3 phishing methods and provide security prevention suggestions for your reference, hoping to help users better identify phishing scams and protect the security of their own encrypted assets.
-
Permit off-chain signature phishing
Permit is an extension of the authorization function under the ERC-20 standard. In simple terms, you can sign to approve other addresses to move your tokens. The principle is that you use your signature to indicate that the authorized address can use your tokens through this signature.TokenThen the authorized address takes your signature to perform the on-chain permit interaction, obtains the call authorization and can transfer your assets. Permit off-chain signature phishing is usually divided into three steps:
(1) Attackers forge phishing links or phishing websites to trick users into usingwalletSignature (no contract interaction, no on-chain).
(2) The attacker calls the permit function to complete the authorization.
(3) The attacker calls the transferFrom function to transfer the victim’s assets and complete the attack.
Here we first explain the difference between transfer and transferFrom. When we transfer ERC20 directly, we usually call the transfer function in the ERC20 contract, and transferFrom is usually used when authorizing a third party to transfer the ERC20 in our wallet to other addresses.
This signature is a Gas-free off-chain signature. After the attacker obtains it, he will perform the permit and transferFrom on-chain interactions. Therefore, the authorization record cannot be seen in the on-chain record of the victim's address, but can be seen in the attacker's address. Generally speaking, this signature is one-time and will not be repeated or continue to generate phishing risks.
-
Permit2 Off-chain Signature Phishing
Permit2 是 Uniswap 为了方便用户使用,在 2022 年底推出的一个智能合约,它是一个Token审批合约,允许代币授权在不同的 DApp In the future, as more and more projects integrate with Permit2, Permit2 contracts can be shared and managed in DApp A more unified authorization management experience is achieved in the ecosystem, and user transaction costs are saved.
Before the emergence of Permit2, token exchange on Uniswap required authorization (Approve) and then exchange (Swap), which required two operations and also required the gas fee of two transactions. After the launch of Permit2, users authorized the entire amount to Uniswap's Permit2 contract at one time, and each subsequent exchange only required an off-chain signature.
Although Permit2 improves the user experience, it is followed by phishing attacks against Permit2 signatures. Similar to Permit off-chain signature phishing, Permit2 is also off-chain signature phishing. This attack is mainly divided into four steps:
(1) The prerequisite is that the user’s wallet has used Uniswap before being phished and authorized the token amount to Uniswap’s Permit2 contract (Permit2 will allow the user to authorize the entire balance of the token by default).
(2) The attacker forges a phishing link or phishing page to induce the user to sign. The phishing attacker obtains the required signature information, which is similar to the Permit off-chain signature phishing.
(3) The attacker calls Permit2 Xiaobai NavigationThe contract's permit function completes the authorization.
(4) The attacker calls the transferFrom function of the Permit2 contract to transfer the victim’s assets and complete the attack.
Here, the attacker usually has multiple addresses to receive assets. Usually, the recipient with the largest amount is the attacker who carries out phishing, and the others are black market addresses that provide phishing as a service (the supplier addresses of phishing as a service DaaS, such as PinkDrainer, InfernoDrainer, AngelDrainer, etc.).
-
eth_sign on-chain blind signature phishing
eth_sign is an open signature method that can sign any hash. An attacker only needs to construct any malicious data that needs to be signed (such as token transfers, contract calls, obtaining authorization, etc.) and induce users to sign through eth_sign to complete the attack.
MetaMask will have a risk warning when performing eth_sign signing. Web3 wallets such as imToken and OneKey have disabled this function or provided risk warnings. It is recommended that all wallet manufacturers disable this method to prevent users from being attacked due to lack of security awareness or necessary technical accumulation.
-
personal_sign/signTypedData On-chain signature phishing
personal_sign and signTypedData are commonly used signature methods. Usually, users need to carefully check whether the initiator, domain name, signature content, etc. are safe. If there are risks, be extra vigilant.
In addition, if personal_sign and signTypedData are used as "blind signatures" as in the above case, users cannot see the plain text, which can be easily exploited by phishing gangs and increase the risk of phishing.
-
Authorized fishing
Attackers forge malicious websites or put Trojans on the official website of the project to trick users into confirming operations such as setApprovalForAll, Approve, Increase Approval, and Increase Allowance, thereby obtaining users' asset operation authorization and stealing them.
-
Address pollution phishing
Address pollution phishing is also one of the phishing methods that has been rampant recently. The attacker monitors on-chain transactions and then forges malicious addresses based on the counterparty addresses in the target user's historical transactions. Usually, the first 4 to 6 digits and the last 4 to 6 digits are the same as the correct counterparty address. These malicious forged addresses are then used to make small transfers or worthless token transfers to the target user's address.
If the target user copies the counterparty address from historical transaction orders for transfer in subsequent transactions due to personal habit, it is very likely that the assets will be transferred to a malicious address by mistake due to carelessness.
On May 3, 2024, 1,155 WBTC were phished due to the pollution phishing method of this address, which was worth more than 70 million US dollars.
Correct address: 0xd9A1b0B1e1aE382DbDc898Ea68012FfcB2853a91
Malicious address: 0xd9A1C3788D81257612E2581A6ea0aDa244853a91
Normal transaction:
https://etherscan.io/tx/0xb18ab131d251f7429c56a2ae2b1b75ce104fe9e83315a0c71ccf2b20267683ac
Address pollution:
https://etherscan.io/tx/0x87c6e5d56fea35315ba283de8b6422ad390b6b9d8d399d9b93a9051a3e11bf73
Misdirected transactions:
https://etherscan.io/tx/0x3374abc5a9c766ba709651399b6e6162de97ca986abc23f423a9d893c8f5f570
-
More covert phishing, using CREATE2 to bypass security detection
At present, various wallets and security plug-ins have gradually realized visual risk reminders for phishing blacklists and common phishing methods, and the signature information is displayed more and more completely, which improves the ability of ordinary users to identify phishing attacks. However, attack and defense technologies are always confronting each other and constantly evolving, and more covert phishing methods are constantly emerging, so we need to be vigilant. Using CREATE2 to bypass the blacklist detection of wallets and security plug-ins is a common method recently.
Create2 is an opcode introduced during the Ethereum 'Constantinople' upgrade, allowing users to create smart contracts on Ethereum. The original Create opcode generates a new address based on the creator's address and nonce, while Create2 allows users to calculate the address before the contract is deployed. Create2 is a very powerful tool for Ethereum developers, enabling advanced and flexible contract interactions, parameter-based contract address pre-calculation, off-chain transactions, and flexible deployment and adaptation of specific distributed applications.
Create2 brings benefits as well as new security risks. Create2 can be abused to generate new addresses with no malicious transaction history, bypassing the wallet's blacklist detection and security alerts. When the victim signs a malicious transaction, the attacker can deploy a contract on a pre-calculated address and transfer the victim's assets to that address, and this is an irreversible process.
Features of this attack:
Allowing predictive creation of contract addresses, enabling attackers to trick users into granting permissions before the contract is deployed.
Since the contract has not been deployed at the time of authorization, the attack address is a new address, and the detection tool cannot issue an early warning based on the historical blacklist, which makes it more concealed.
Here is an example of phishing using CREATE2:
https://etherscan.io/tx/0x83f6bfde97f2fe60d2a4a1f55f9c4ea476c9d87fa0fcd0c1c3592ad6a539ed14
In this transaction, the victim transferred the sfrxETH in the address to the malicious address (0x4D9f77), which is a new contract address without any transaction records.
However, when opening the creation transaction of this contract, it can be found that the contract completed a phishing attack at the same time as it was created, transferring assets from the victim's address.
https://etherscan.io/tx/0x77c79f9c865c64f76dc7f9dff978a0b8081dce72cab7c256ac52a764376f8e52
Looking at the execution of this transaction, we can see that 0x4d9f7773deb9cc44b34066f5e36a5ec98ac92d40 is created after calling CREATE2.
In addition, by analyzing the relevant addresses of PinkDrainer, it can be found that this address creates new contract addresses through CREATE2 every day for phishing.
https://etherscan.io/address/0x5d775caa7a0a56cd2d56a480b0f92e3900fe9722#internaltx
-
Fishing as a Service
Phishing attacks are becoming increasingly rampant. Due to the huge profits from illegal activities, a black industry chain of Drainer as a Service (DaaS) has gradually developed. The more active ones include:
Inferno/MS/Angel/Monkey/Venom/Pink/Pussy/Medusa, etc. Phishing attackers purchase these DaaS services and quickly and easily build thousands of phishing websites and fraudulent accounts, rushing into this industry like a flood and threatening the security of users' assets.
Take Inferno Drainer as an example. This is a notorious phishing gang that implements phishing by embedding malicious scripts on different websites. For example, they spread seaport.js, coinbase.js, and wallet-connect.js, disguised as popular Web3 protocol functions (Seaport, WalletConnect, and Coinbase) to induce users to integrate or click. After the user confirms, the user's assets will be automatically transferred to the attacker's address. At present, more than 14,000 websites containing malicious Seaport scripts, more than 5,500 websites containing malicious WalletConnect scripts, more than 550 websites containing malicious Coinbase scripts, and more than 16,000 malicious domain names related to Inferno Drainer have been found, and the brand names of more than 100 crypto brands have been affected.
In the framework of phishing as a service, usually 20% of the stolen assets are automatically transferred to the Inferno Drainer organizer address, and the phishing implementer keeps the remaining 80%. In addition, Inferno Drainer regularly provides free services for creating and hosting phishing websites, and sometimes phishing services also require a fee of 30% of the defrauded funds. These phishing websites are designed for phishing attackers who are able to attract victims to visit but lack the technical ability to create and host websites or simply do not want to perform this task themselves.
So, how does this DaaS scam work? Here’s a step-by-step description of Inferno Drainer’s crypto scam scheme:
1) Inferno Drainer promotes their service through a Telegram channel called Inferno Multichain Drainer, and sometimes the attackers also access the service through the Inferno Drainer website.
2) The attacker uses the DaaS service function to set up and generate his own phishing website and spread it through X (Twitter), Discord and other social media.
3) Victims are lured into scanning QR codes or other methods contained on these phishing websites to connect their wallets.
4) The Drainer checks the victim’s most valuable and easily transferable assets and initiates a malicious transaction.
5) The victim confirms the transaction.
6) Assets were transferred to criminals. Of the stolen assets, 20% was transferred to the Inferno Drainer developer and 80% was transferred to the phishing attacker.
-
Safety Tips
(1) First of all, users must not click on unknown links disguised as positive news such as rewards or airdrops;
(2) There are more and more cases of official social media accounts being hacked. Official messages may also be phishing messages, and official messages are not necessarily absolutely safe.
(3)在使用钱包、DApp 等应用时,一定要注意甄别,谨防伪造站点、伪造 App;
(4) Any transaction or message that requires confirmation needs to be handled with caution, and cross-confirmation should be done based on the target, content, and other information. Refuse blind signatures, stay vigilant, and doubt everything to ensure that every step is clear and safe.
(5) In addition, users need to understand the common phishing attack methods mentioned in this article and learn to actively identify phishing features. Understand common signatures, authorization functions and their risks, and understand the contents of fields such as Interactive (interactive URL), Owner (authorizer address), Spender (authorized party address), Value (authorized quantity), Nonce (random number), Deadline (expiration time), and transfer/transferFrom (transfer).
IV. Analysis of FIT21 Act
On May 23, 2024, the U.S. House of Representatives officially passed the FIT21 Crypto Act (Financial Innovation and Technology for the 21st Century Act) with 279 votes in favor and 136 votes against. U.S. President Biden announced that he would not veto the bill and called on Congress to cooperate on a "comprehensive and balanced regulatory framework for digital assets."
FIT21 aims toBlockchainIt provides a way for projects to be launched safely and effectively in the United States, clarifies the boundaries of responsibility between the U.S. Securities and Exchange Commission (SEC) and the Commodity Futures Trading Commission (CFTC), distinguishes whether digital assets are securities or commodities, and strengthenscryptocurrencyexchangeregulation to better protect American consumers.
4.1 What are the important contents of FIT21 Act?
-
Definition of Digital Assets
IN GENERAL.—The term 'digital asset' means any fungible digital representation of value that can be exclusively possessed and transferred, person to person, without necessary reliance on an intermediary, and is recorded on a cryptographically secured public distributed ledger.
The bill defines "digital assets" as an exchangeable digital representation that can be transferred from person to person without relying on an intermediary and recorded on a cryptographically protected public distributed ledger. This definition includes a wide range of digital forms, fromcryptocurrencyto tokenized physical assets.
-
Classification of digital assets
The bill proposes several key elements to distinguish whether digital assets are securities or commodities:
(1) Investment Contract (The Howey Test)
If the purchase of a digital asset is considered an investment and the investor expects to make a profit through the efforts of the entrepreneur or a third party, the asset is generally considered a security based on the standard established by the U.S. Supreme Court in SEC v. WJ Howey Co., commonly known as the Howey test.
(2) Use and consumption
If a digital asset is primarily used as a medium for consumption of goods or services rather than as an investment in the expectation of capital appreciation, such as tokens that can be used to purchase specific services or products, although in the actual market these assets may also be purchased and held speculatively, from the perspective of design and primary use, it may not be classified as a security, but rather as a commodity or other non-security asset.
(3) Degree of decentralization
The Act specifically emphasizesBlockchainThe degree of decentralization of the network. If the network behind a digital asset is highly decentralized, with no centralized authority controlling the network or the asset, the asset may be more likely to be considered a commodity. This is important because there are key differences between the definitions of "commodities" and "securities," which have implications for how they are regulated.
The U.S. Commodity Futures Trading Commission (CFTC) will regulate digital assets as a commodity, “if it operatesBlockchainOr digital ledgers are functional and decentralized."
美国证券交易委员会(SEC)将把数字资产作为一种证券进行监管,「如果其相关的Blockchain是功能性的,但不是严格去中心化的」。
该法案将去中心化定义为,「除其他要求外,没有人拥有单方面控制Blockchain或其使用的权力,并且没有发行人或关联人控制数字资产 20% 或更多的所有权或投票权」。
The specific criteria for defining the degree of decentralization are as follows:
-
Control and Influence: In the past 12 months, no individual or entity has had the unilateral power, directly or by contract, arrangement or otherwise, to control or materially change the functionality or operation of the blockchain system.
-
Ownership Distribution: In the past 12 months, no individual or entity associated with the digital asset issuer has a combined ownership of more than 20% of the total digital asset issued.
-
Voting and Governance: No individual or entity associated with the digital asset issuer has been able to unilaterally direct or influence the voting power of more than 20% of the digital asset or related decentralized governance system in the past 12 months.
-
Code Contributions and Modifications: In the past three months, the digital asset issuer or related personnel have not made substantial, unilateral modifications to the source code of the blockchain system, unless these modifications are to address security vulnerabilities, maintain routines, prevent network security risks or other technical improvements.
-
Marketing and Promotion: In the past 3 months, the digital asset issuer and its affiliates have not marketed the digital asset to the public as an investment.
Among these definition criteria, the more rigid ones are the distribution of ownership and governance rights. The boundary line of 20% is of great significance for the definition of digital assets as securities or commodities. At the same time, because of the openness, transparency, traceability and non-tamperability of blockchain, the quantification of this definition standard will become clearer and fairer.
(4) Functions and technical characteristics
The connection between digital assets and the underlying blockchain technology is also one of the important factors in determining the direction of regulation. This connection usually includes how digital assets are created, issued, traded and managed:
-
Asset issuance: Many digital assets are issued through the programmatic mechanism of blockchain, which means that their creation and distribution are based on preset algorithms and rules rather than human intervention.
-
Transaction verification: Transactions of digital assets need to be verified and recorded through the consensus mechanism in the blockchain network to ensure the correctness and immutability of each transaction.
-
Decentralized governance: Some digital asset projects have implemented decentralized governance, where users holding specific tokens can participate in the project’s decision-making process, such as voting on the project’s future development direction.
These characteristics directly affect how assets are regulated. If digital assets primarily provide economic returns through automated processes on the blockchain or allow voting to participate in governance, they may be considered securities because it indicates that investors are expecting to gain benefits through management or corporate efforts. If digital assets function primarily as a medium of exchange or are used directly to obtain goods or services, they may be more likely to be classified as commodities.
-
Promotion and sales of digital assets
How digital assets are promoted and sold in the market is also an important part of FIT21. If a digital asset is marketed primarily through the expected return on investment, it may be considered a security. The content here is extremely important because it regulates the regulatory framework for digital assets and will affect what the next digital asset that may be available through a spot ETF will be.
(1) Registration and supervision responsibilities
There are two definitions of digital assets: digital commodities and securities. The bill stipulates that the supervision of digital assets will be jointly responsible by two main agencies, depending on the definition:
-
Commodity Futures Trading Commission (CFTC): Responsible for regulating digital commodity trading and related market participants.
-
Securities and Exchange Commission (SEC): Responsible for regulating digital assets that are deemed to be securities and the platforms on which they are traded.
(2) Lock-up period for token insiders
Original text of the bill: "A restricted digital asset owned by a related person or an affiliated person may only be offered or sold after 12 months after the later of— (A) the date on which such restricted digital asset was acquired; or (B) the digital asset maturity date."
The clause requires that insiders’ token holdings be locked up for at least 12 months from the date of acquisition, or 12 months from the defined “digital asset maturity date”, whichever is the later.
This ability to delay sales helps prevent insiders from taking advantage of undisclosed information or unfairly influencing market prices. By aligning the interests of insiders with the long-term goals of the project, it helps avoid speculation and market manipulation, helping to create a more stable and fair market environment.
(3) Restrictions on sales of digital assets by related parties
Original text of the Act: "Digital assets may be sold by an affiliated person under the following conditions: (1) The total volume of digital assets sold by the person does not exceed 1% of the outstanding volume in any three-month period; (2) the affiliated person must immediately report to the Commodity Futures Trading Commission or the Securities and Exchange Commission any order to sell more than 1% of the outstanding volume."
Digital assets may be sold by related persons in the following circumstances:
-
In any 3-month period, the total amount of digital assets sold shall not exceed 1% of the stock;
-
A related person must immediately report to the Commodity Futures Trading Commission or the Securities and Exchange Commission any orders to sell in excess of 1% in stock.
This measure ensures market stability and health by limiting the amount of sales by related persons in a short period of time, preventing market manipulation and excessive speculation.
(4) Project information disclosure requirements
The original text of the bill: "Digital asset issuers must disclose the information described in Section 43 on a public website prior to selling digital assets under Section 4(a)(8)."
The specific information required by the project disclosure is not detailed in the excerpt provided, but will typically include:
-
The nature of the digital asset: what the digital asset represents (e.g., shares in a company, rights to future earnings, etc.);
-
Related risks: potential risks involved in investing in this digital asset. ;
-
Development Status: The current status of the project or platform related to the digital asset, such as development milestones or market readiness;
-
Financial information: any financial details or forecasts related to the digital asset;
-
Management team: Information about the people behind the project or company that issues the digital asset.
The bill requires digital asset issuers to provide detailed project information, including the nature, risks, and development status of the assets, so that investors can make informed investment decisions. This move enhances market transparency and protects the interests of investors.
(5) Principle of safe isolation of customer funds
Original text of the bill: "Digital commodity exchanges shall hold customer funds, assets, and property in a manner that minimizes the risk of loss or unreasonable delay in access by customers to their funds, assets, and property."
This regulation requires digital asset service providers to take measures to ensure the security of customer funds and prevent customer fund loss or access delays due to operational problems of the service provider.
(6) Customer funds and company operating funds must not be mixed
Original text of the bill: "Funds, assets, and property of a customer shall not be commingled with the funds of the digital commodity exchange or be used to secure or guarantee the trades or balances of any other customer or person."
This means that service providers must strictly separate customer funds from company operating funds to ensure the independence of customer funds, avoid using customer funds for unauthorized activities, and enhance the security and transparency of funds.
In certain operations, such as for settlement convenience, it is allowed to deposit customer funds and funds of other institutions in the same account if it complies with regulations. However, it is necessary to ensure the separate management and proper record of these funds to ensure the safety of each customer's funds and property.
4.2 Encourage and support innovation
The FIT21 Act also contains many provisions that encourage and support innovation.
-
Establishment of the CFTC-SEC Joint Advisory Committee
The CFTC-SEC Joint Advisory Committee on Digital Assets was established to:
-
Advise the Commission on its rules, regulations, and policies related to digital assets;
-
Further promote regulatory coordination on digital asset policies among the Commissions;
-
Research and disseminate methods for describing, measuring, and quantifying digital assets;
-
Study the potential of digital assets, blockchain systems and distributed ledger technologies to improve the operational efficiency of financial market infrastructures and better protect financial market participants;
-
Discuss the implementation of this bill and its amendments by the Committee.
The goal of this committee is to promote cooperation and information sharing between the two major regulators on digital asset supervision.
-
Strengthening and expanding the SEC’s Strategic Center for Innovation and Financial Technology (FinHub)
The bill proposes to strengthen and expand the SEC’s Strategic Center for Innovation and Fintech (FinHub), with the goal of:
-
Help develop the Commission’s approach to technological advances;
-
Examining financial technology innovations by market participants;
-
Coordinate the Commission’s response to emerging technologies in financial, regulatory, and supervisory systems.
Its responsibilities are:
-
Promote responsible technological innovation and fair competition within the Commission, including around financial technology, regulatory technology and supervisory technology;
-
Providing internal education and training on FinTech to the Commission;
-
Advise the Commission on financial technology that serves the Commission's functions;
-
Analyze the impact of technological advances and regulatory requirements on fintech companies;
-
Provide advice to the Commission on rulemaking or other agency or staff actions related to fintech;
-
Providing information about the Commission and its rules and regulations to businesses in the emerging fintech sector;
-
Companies working in emerging technology areas are encouraged to engage with the Commission and obtain its feedback on potential regulatory issues.
FinHub's primary mission is to promote policy development related to fintech and provide guidance and resources to market participants on emerging technologies. It is required to provide Congress with a report on FinHub's activities in the previous fiscal year each year. It is also required to provide documents and information that ensure that FinHub has full access to the Commission and any self-regulatory organization to perform the functions of FinHub. The Commission should establish a detailed record system (as defined in Section 552a of Title 5 of the United States Code) to assist FinHub in communicating with relevant parties.
-
Establishment of the CFTC’s laboratory (LabCFTC)
The bill proposes the establishment of LabCFTC, whose objectives are to:
-
Promote responsible financial technology innovation and fair competition for the benefit of the American public;
-
Act as an information platform to inform the Commission of new financial technology innovations;
-
Providing advocacy to financial technology innovators to discuss their innovations and the regulatory framework established by this Act and regulations promulgated thereunder.
Its responsibilities are:
-
Provide advice to the Commission on rulemaking or other agency or staff actions regarding financial technology;
-
Providing internal education and training to the Commission on financial technology;
-
Provide advice to the Commission on financial technology to strengthen the Commission’s oversight function;
-
To engage with academics, students and professionals on financial technology issues, ideas and techniques relevant to the activities of this Act;
-
Providing information to those working in the emerging technology sector regarding the role of the Commission, its rules and regulations, and registered futures associations;
-
Personnel working in the field of emerging technologies are encouraged to engage with and obtain feedback from the Committee on potential regulatory issues.
Similar to FinHub, LabCFTC’s mission is to promote the formulation of relevant policies and provide technical guidance and communication. LabCFTC is also required to provide Congress with a report on its activities every year. It should also ensure that LabCFTC has full access to documents and information from the Commission and any self-regulatory organization or registered futures association to perform LabCFTC’s functions and establish a detailed record system.
-
Emphasize and strengthen research on decentralized finance, non-homogeneous digital assets, derivatives, etc.
The Commodity Futures Trading Commission (CFCA) and the Securities and Exchange Commission (SEC) should jointly conduct research on innovative content such as decentralized finance (DeFi), non-fungible digital assets (NFTs), derivatives, etc., study their development trends, and evaluate their impact on traditional financial markets and potential regulatory strategies.
In this part, the attitude towards Crypto compliance is basically established. The clearer direction is the research on DeFi and NFT, which means that DeFi and NFT may also usher in gradually clear regulatory strategies in the future.
4.3 The significance of FIT21
Although the crypto industry has existed for more than a decade, there is no comprehensive regulatory framework for digital assets globally. The existing regulatory framework is fragmented, incomplete and lacks clarity. This regulatory uncertainty not only hinders the development of innovative businesses, but also provides opportunities for bad actors.
Therefore, the adoption of FIT21 is of great significance.
Its passage has an important positive effect on establishing a regulatory environment that supports the development of blockchain technology, and at the same time puts forward relatively clear requirements for protecting the crypto market and consumer safety. Specifically, it includes: clearly specifying that different types of digital assets are regulated by the CFTC or SEC; setting consumer protection measures, such as customer fund isolation, lock-up period for token insiders, limiting annual sales volume and disclosure requirements, etc.
Blockchain technology and digital assets are another epoch-making invention of human civilization after the Internet. They have huge development potential and prospects. We are all trendsetters of the new era by embracing supervision and innovative development.
V. Conclusion
Compared with the first half of 2023, the total losses caused by hacker attacks, project Rugpull, phishing scams, etc. in the first half of 2024 increased significantly, reaching 1.492 billion US dollars. Overall, the situation in the field of Web3 security is very serious.
However, the overall market situation is improving, the security awareness of project parties and Web3 users is gradually increasing, and relevant compliance policies are also being steadily improved.
Web3 is a new world, full of imagination and opportunities. I believe that in this land, security and compliance will play an increasingly important role in protecting the security of users’ encrypted assets.
The article comes from the Internet:SharkTeam: Web3 Security Report for the First Half of 2024
In the past 24 hours, many new popular currencies and topics have appeared in the market, and they may be the next wealth creation opportunities. Written by: Bitget Research Institute Summary Yesterday, the US dollar index returned to 106, and emerging markets and risky assets were under pressure. After Blast released the airdrop, the main Layer2 airdrops were basically completed. Among them: The sectors with relatively strong wealth creation effects are: Ethereum…