[RFC] - Implement Chainalysis Crypto Incident Response plan for Ajna’s Smart Contracts
Summary (TL;DR)
This is a proposal to adopt Chainalysis Incident Response to protect Ajna in the event of a hack or exploit. After a hack commences, investigative response time is the most critical vector to asset recovery. Chainalysis Incident Response (CIR), the leading crypto asset recovery solution, is an important security measure to have in place to protect Ajna in the event of a hack. It also serves as a strong deterrent to help minimize the risk of a hack in the first place.
References
● Website: Chainalysis Professional Crypto Investigations & Special Programs
● Customer Stories / Customer References:
- Blog post on the Axie Infinity Hack & Successful Asset Recovery: “$30 Million
Seized: How the Crypto Community Is Making It Difficult for North Korean
Hackers To Profit” - Twitter Post from Morpho: “Morpho Labs has partnered up with Chainalysis to
strengthen the Incident Response Plan for Morpho protocol!” - Twitter Post from Algorand: “We have engaged Chainalysis to help trace
compromised wallet transfers and freeze funds if they are deposited in an
exchange that integrates with and acts upon Chainalysis data.”
● Source Data: - Chainalysis: The Chainalysis 2023 Crypto Crime Report, including original data
and research into cryptocurrency-based crime. - Security Intelligence: Cryptocurrency-Related Crime Boomed in 2022
- Sharedum: Top 10 DeFi Hacks You Should Know in 2023
- Cointelegraph: DeFi exploits and access control hacks cost crypto investors
billions in 2022: Report
Main Objective
Context: Hackers are stealing more cryptocurrency from DeFi platforms than ever before. In last year’s “Crypto Crime Report,” Chainalysis detailed how DeFi protocols in 2021 became the primary target of crypto hackers. That trend intensified in 2022 and is expected to continue. By the numbers, 2022 was the biggest year ever for crypto hacking, with $3.8B stolen, primarily from DeFi protocols and by North Korea-linked attackers. DeFi protocols as victims accounted for 82.1% of all cryptocurrency stolen by hackers in 2022 — a total of $3.1 billion — up from 73.3% in 2021. As a result, it has become a top priority for DeFi projects to have protection in place above smart contract audits.
Motivation: Response time is one of the most important factors in successful asset recovery as a fast response significantly increases the opportunity to control and recover funds before they are gone (sent to a fiat off-ramp, moved to a sanctioned exchange, etc.) By procuring Chainalysis CIR, Ajna would have Chainalysis’ world-class team of professional investigators, cybersecurity experts, and data engineers on standby in the event of a hack or exploit, ready to respond immediately and thus increasing the likelihood of recovering funds. To date, Chainalysis has aided in the recovery of over $11B in stolen funds through our own investigations and others we supported.
Further, Chainalysis’ reputation is known across the world. By implementing CIR and
broadcasting your Chainalysis partnership like Morpho did in the tweet above, you’re creating a strong deterrent. Hackers know that even if they do exploit your protocol, they won’t be able to easily profit from the stolen funds, thus diminishing their financial incentive to attack.
Benefit Recap
● Deter Hacks. The best outcome is you never get hacked. CIR helps deter hackers by letting them know a leading global crypto investigative team is on your side. Chainalysis is also partnering with Hypernative to detect zero day cyber attacks to help prevent funds from being stolen in the first place.
● Project your Community, Boost your Brand. By adopting CIR, you can show the Ajna community (and the broader DeFi community) that you’re taking serious action when it comes to cybersecurity and consumer protections, thus improving your brand
reputation and differentiating yourself in the market.
● Partner with the Best. With CIR, Ajna can tap into Chainalysis’ expertise for complex blockchain analysis and investigations. The CIR team is ready to respond to
cybersecurity breaches, ransomware attacks, recovery of stolen cryptocurrency, and
perform other analyses involving blockchain data. The team consists of respected
professional investigators, cybersecurity experts, and data engineers.
● Reaction Time. Having a proactive solution in place decreases the time to respond
and increases the likelihood of asset freezing and recovery by the customer or law
enforcement should the worst happen.
● Technical Skills. The ability to trace funds through various types of complex platforms is a crucial part of the CIR incident response and the ability of our customers to recover funds successfully. This applies to identified mixer platforms but also unidentified mixers and new bridging protocols between blockchains.
● Network. Chainalysis has a huge customer base and, with it, a sizable network with
personal connections to almost all significant exchanges and services in the crypto
space. Also, their strong relationship with Law Enforcement Agencies around the
world makes them very efficient in engaging the relevant entities when needed.
● ROI: In over 80% of all cases where an incident has occurred, Chainalysis investigators have been able to give our customers valuable information that leads to recovery of more than what their CIR fee was. This demonstrates a great return on investment for CIR customers.
Scope of Work
-
Monitoring & Alerts
● Objective: To provide a robust monitoring and alert system to assess smart contracts
and on-chain holdings for potential security threats or anomalies.
● Tasks: a) Conduct an initial assessment of client’s smart contracts and asset holdings. b) Set up the HyperNative tool, tailored to the client’s specific needs. c) Establish thresholds and criteria for alerts based on potential vulnerabilities or unauthorized activities. d) Provide ongoing monitoring and promptly relay alerts to designated client contacts. -
OpSec Guidelines
● Objective: To lead a Web3-specific discussion that ensures the client’s operational
security is at its highest standard.
● Tasks: a) Conduct an operational security discussion specific to Web3 threat vectors and assets at risk. b) Create a report detailing potential vulnerabilities, risks, and recommendations of how to improve Web3 specific Operational Security. c) Support the OpSec through quarterly reports of emerging threats and trends and immediate communication of urgent or imminent risks in the market that may be applicable. *Note: This OpSec review is not intended for the complete technology stack. It is specifically focused on wallets/vaults, access points, community engagement and external social communication. -
Emergency Response Plan
● Objective: To help establish a well-defined and actionable crisis management plan to handle potential security breaches or threats.
● Tasks: a) Develop an external communication strategy to inform stakeholders,
partners, and users, ensuring accurate information dissemination. b) Create an internal communication protocol to ensure immediate and cohesive action across the team. c) Outline a technical response procedure to identify, isolate, and mitigate threats in real-time. -
Incident Response
● Objective: To provide swift action in the event of a security incident, ensuring minimal damage and maximum recovery potential.
● Tasks: a) Trace and attribute unauthorized or suspicious transactions to their source. b) Engage with involved platforms, exchanges, or Web3 entities to assist in obtaining a temporary freeze on suspect funds. c) Provide detailed reports of incidents to assist in legal or organizational action. -
Recovery Support
● Objective: To assist clients in the aftermath of a security incident in the fund recovery process.
● Tasks: a) Offer digital forensics services to understand the depth and source of the breach. b) Provide malware disassembly, identifying potential threats and ensuring their removal. c) Aid in the asset recovery process, leveraging relationships with platforms and exchanges. d) Provide recommendations and guidance on post-incident best practices to prevent recurrence.
Considerations/Risks
There is a significant risk of not adopting a proactive asset recovery plan (that is, not having a plan in place before an attack). Waiting until after a hack occurs to partner with Chainalysis will create a significant delay in their ability to act, as it takes time to go through the approval and contracting process. As mentioned above, time is of the essence in a hack, and any delays reduce the chance of asset freezing and recovery.
Specification
Procuring Proactive CIR costs $25,000 for 12 months of coverage (paid upfront). This
includes up to 100 hours of investigative work and support for any hacks or incidents that occur in the covered 12 month period. Approval of this grant shall begin the onboarding process for CIR, and transfer of payment for 12 months of coverage.