Skip to content
Est. MMXXVIVol. VI · № 273RSS
Blockchain Breaches

An archive of cryptocurrency security incidents — hacks, exploits, bridge failures and rug pulls, documented with on-chain evidence.

Dossier № 143Governance Attack

Atlantis Loans Malicious Governance

A quietly-passed governance proposal on BNB Chain granted attackers token-spend approval over every Atlantis Loans user wallet, draining $2.5M from depositors.

Date
Chain(s)
Status
Funds Stolen

On June 23, 2023, the BNB Chain lending protocol Atlantis Loans suffered a governance attack that drained approximately $2.5 million from users. A malicious governance proposal — submitted and passed with minimal community attention — upgraded the protocol's token contracts to grant the attacker spending approval over every wallet that had ever interacted with Atlantis.

What happened

Atlantis Loans was governed by an on-chain DAO whose proposals could modify the protocol's contracts. The attack abused this governance power directly:

  1. The attacker acquired enough governance tokens to submit and pass a proposal (the protocol's governance participation was low, lowering the bar).
  2. The proposal — disguised or simply unnoticed by the small active community — modified the protocol's contracts to add an approve granting the attacker's address an allowance over the tokens of every user who had interacted with Atlantis.
  3. The proposal passed and executed through normal governance flow.
  4. Once the malicious approvals were live on-chain, the attacker called transferFrom against every affected user's balance, draining ~$2.5M in tokens.

The drain hit users' own wallets, not just protocol reserves — anyone who had ever granted Atlantis token approvals (the standard pattern for any DeFi lending protocol) was exposed.

Aftermath

  • Atlantis Loans urgently broadcast for all users to revoke approvals to the protocol's contracts.
  • Many users who acted quickly avoided loss; those who didn't see the warning in time were drained.
  • The protocol effectively ended; no meaningful recovery.

Why it matters

Atlantis Loans is a clean case study for governance as an attack vector against users, not just treasury. Most governance-attack discussion focuses on stealing the protocol's funds (Beanstalk, Audius). Atlantis is more insidious: the malicious proposal didn't drain a treasury — it weaponised the protocol's existing token approvals against its own users.

The structural lessons:

  1. Low-participation governance is a standing vulnerability. When a protocol's governance can be passed by a small token position and the active community is small enough that proposals go unscrutinised, governance is effectively an unguarded admin key. The defence — quorum requirements, timelocks long enough for community review, proposal-content monitoring — is well-documented but unevenly applied, especially on smaller protocols.

  2. Governance can modify the contracts users have approved. Users granting "unlimited approval" to a lending protocol are implicitly trusting not just the current code but whatever the governance system can change the code into. This is the same generalisation the Tornado Cash governance attack made one month earlier: the code you trusted at approval time is not the code that will necessarily run.

  3. Approval revocation is the only user-side defence, and it's reactive. By the time the malicious proposal executes, the only thing a user can do is revoke faster than the attacker can transferFrom. The structural fix — bounded/expiring approvals — limits this blast radius, which is one of the major reasons modern wallets default to it.

Atlantis Loans, Tornado Cash governance, and Beanstalk together form the catalogue's core illustration that on-chain governance is a privileged-code-change mechanism, and any privileged-code-change mechanism is an attack surface proportional to how easily it can be captured.

Sources & on-chain evidence

  1. [01]halborn.comhttps://www.halborn.com/blog/post/explained-the-atlantis-loans-hack-june-2023
  2. [02]medium.comhttps://medium.com/neptune-mutual/understanding-atlantis-loans-exploit-3716f7e765b4
  3. [03]rekt.newshttps://rekt.news/atlantis-loans-rekt

Related filings