The infamous DAO hack of 2016 remains one of the most significant events in cryptocurrency history. It reshaped Ethereum’s development and resulted in the creation of Ethereum Classic. The fiasco also demonstrated the risks and resilience of decentralized blockchain systems. This guide offers a comprehensive look at how The DAO hack unfolded, the implications of the hard and soft forks that followed, and its lasting impact on the Ethereum ecosystem.
KEY TAKEAWAYS
➤ The DAO hack of 2016 exposed critical vulnerabilities in Ethereum’s smart contract code.
➤ Ethereum’s hard fork created Ethereum (ETH) and Ethereum Classic (ETC), dividing the community over immutability.
➤ Reentrancy attacks highlighted critical smart contract flaws, prompting blockchain projects to prioritize security and code audits.
➤ The DAO hack shifted crypto funding from DAOs to ICOs, thereby decreasing oversight and increasing risks.
The DAO hack explained
➤ The DAO in a nutshell:
The DAO was a decentralized autonomous organization created on the Ethereum blockchain. It aimed to decentralize investment management by allowing stakeholders to vote on funding proposals directly.
The DAO’s structure relied solely on smart contracts to manage decisions and transactions without traditional intermediaries. This approach represented a groundbreaking concept for decentralized governance.
Put simply, The DAO hoped to establish a democratic system that reduced costs and minimized human errors by promoting decentralized decision-making. It quickly attracted massive investment, amassing over $150 million worth of ETH shortly after launch.
Note: When we refer to “The DAO” (with a capital T), we are discussing the DAO project that was hacked in 2016, not decentralized autonomous organizations in general.
However, the rapid adoption of The DAO also attracted scrutiny, with developers and security analysts raising concerns about potential vulnerabilities within its codebase.
After all, given the value locked within the DAO, even minor flaws could have major consequences. Any smart contract that handles substantial assets is naturally a prime target for potential attacks.
➤ In fact, a serious vulnerability had recently surfaced in another decentralized system, MakerDAO, which luckily avoided exploitation only because it was still in testing. The DAO, on the other hand, was fully operational, which made it an accessible target.
The hacker strikes: A timeline of events
The DAO hack began on June 17, 2016, when an anonymous hacker exploited a vulnerability within The DAO’s smart contracts. They ultimately succeeded in draining approximately $60 million worth of ETH (based on the valuation at that time).
The Ethereum community watched as funds steadily moved from The DAO into an account controlled by the hacker. Needless to say, the event sparked panic across the network.
By the end of the day, around one-third of The DAO’s assets had been transferred to the hacker’s account. And by the end of June 18, 2016, the ETH price had dropped from $20+ to below $13.
As it turned out, the breach exploited vulnerabilities within The DAO structure, specifically targeting a reentrancy flaw in its smart contracts.
Ethereum developers quickly scrambled in response and proposed several solutions to stop the hacker and recover the stolen funds. Multiple attempts were made to split The DAO and prevent further losses, but the votes required to implement the changes couldn’t be secured quickly enough.
A critical design flaw worsened the situation: The DAO’s unexpectedly large amount of pooled ETH was held in a single address, which made it an attractive and accessible target.
The attacker may have paused voluntarily after hearing about a proposed hard fork solution that could potentially reverse the theft.
However, the vulnerability within The DAO’s structure — specifically the reentrancy flaw — remained a significant risk. It underscored the need for rigorous smart contract auditing and testing.
The events that followed led to fundamental changes in the Ethereum blockchain’s structure.
➤ Not only did the exploit underscore the importance of smart contract auditing but it also led to the Ethereum and Ethereum Classic split, which remains a defining moment in cryptocurrency history.
Understanding the reentrancy attack: How the hack unfolded
The DAO hack hinged on a very specific type of vulnerability known as a reentrancy attack. This vulnerability allowed the hacker to repeatedly withdraw funds before the contract’s balance could update.
Here’s a breakdown of how reentrancy attacks work and why they were critical to The DAO breach:
1. Smart contract mechanics: Each withdrawal transaction in The DAO was handled by a function coded to send funds to the user’s wallet and then update the user’s balance within the ledger.
Example: Alice has 2 ETH in The DAO. When she withdraws 1 ETH, the contract sends 1 ETH to her wallet and then updates her balance to 1 ETH. This balance update after each withdrawal prevents any further withdrawals beyond her remaining 1 ETH.
2. The vulnerability: A reentrancy vulnerability allows external contracts to repeatedly interact with the main contract before a status update. This can lead to unexpected multiple executions of the same function — in this case, the withdrawal function.
Example: A loophole makes it possible for an external contract to interact with the main DAO contract before the balance update. For instance, although Alice’s balance shows 2 ETH, the flaw allows a malicious contract to trigger multiple withdrawals of 1 ETH each before the balance is corrected.
3. Exploitation process: The hacker used a malicious contract to call The DAO’s withdrawal function in a recursive loop. Each time funds were withdrawn, the contract re-entered the withdrawal function before the balance was updated, draining funds continuously.
Example: The hacker uses a malicious contract to call The DAO’s withdrawal function in a loop. Each time 1 ETH is sent, the contract re-enters the withdrawal function before updating the balance.This allows for multiple withdrawals of 1 ETH even though there was only 2 ETH in Alice’s account to begin with.
4. Lack of state updates: Since The DAO’s balance did not update with each withdrawal call, the hacker’s contract could siphon off funds repeatedly. Thus, they managed to drain The DAO’s holdings.
Example: Since the contract didn’t update the balance with each call, the hacker’s contract kept withdrawing 1 ETH repeatedly. This flaw allowed the hacker to drain far more than the original 2 ETH in Alice’s account.
Put simply, the reentrancy attack exploited the smart contract’s assumption that it would update balances after each withdrawal.
This oversight became a costly flaw, underlining the importance of meticulous coding practices in smart contracts — especially in decentralized autonomous organizations handling large amounts of funds.
Security measures and the community’s initial response
Ethereum developers quickly intervened as news of the attack spread. They managed to halt the hacker’s ability to access the stolen funds temporarily.
It turns out that the stolen Ethereum was stuck in a “child DAO,” a duplicate of the original DAO where the attacker had redirected the funds. Due to a 28-day holding period coded into the DAO, the hacker could not immediately access these funds. This gave the Ethereum community a window of time to decide on a response.
Buterin proposes a soft fork
On June 17, the day of the breach, Ethereum co-founder Vitalik Buterin confirmed that The DAO was under attack. He proposed a solution that involved a software fork — one that doesn’t require any rollback of transactions or blocks — to prevent further ETH loss.
The proposed fork would invalidate any transactions that attempt to withdraw ETH from addresses associated with The DAO. This way, the stolen funds would be frozen indefinitely.
Buterin clarified that this solution would not rewrite past transactions but would add a “switch” to Ethereum’s code. He added that doing so would block any movement of ETH from The DAO and related addresses.
This “one-time fix” aimed to lock the compromised ether in place permanently. Buterin further advised:
“Miners and mining pools should resume allowing transactions as normal, wait for the soft fork code, and prepare to download and run it if they support this approach for the Ethereum ecosystem. DAO token holders and Ethereum users should remain calm, while exchanges can safely resume ETH trading.”
— Vitalik Buterin, Ethereum co-founder via a blog post
In essence, this would add a blacklist to Ethereum’s code to prevent the attacker from accessing the stolen funds. Buterin’s proposal, while designed to protect DAO investors, required a majority of Ethereum nodes to adopt it. It sparked a heated debate over intervention and blockchain principles.
The alternative: A hard fork
Another more assertive proposal urged miners to fully reverse the hack so all stolen ETH return to The DAO. This way, token holders would be able to automatically redeem their funds and effectively end The DAO.
This approach would fundamentally change how the blockchain executes transactions, which would amount to challenging the principle of immutability. The question emerged: should Ethereum break this rule just once to restore the project’s integrity?
➤ So, overall three options were discussed by the community in response to the breach:
- Soft fork: A temporary solution that would freeze the hacker’s funds by blacklisting specific addresses associated with the attack. Doing so would block any further movement of funds.
- Hard fork: A permanent solution that would effectively “reverse” the hack, thereby restoring funds to the original DAO by altering the Ethereum ledger.
- No action: Some community members argued against any interference, believing that the blockchain should remain immutable even in the face of a security breach.
The attacker’s response: A controversial claim
In a surprising twist of event, an open letter, supposedly from The DAO attacker, surfaced online on Jun. 18, 2016. The letter addressed The DAO and Ethereum community, arguing that the ETH obtained from the hack was a “legal reward”.
The attacker went a step further by threatening legal action against anyone attempting to reverse his gains. However, several individuals noted that the cryptographic signature on this letter was invalid, which cast doubt on its authenticity.
Still, the message raised interesting points, arguing that smart contracts are designed to be self-enforcing, with no outside intervention altering their outcomes.
Later, the attacker reportedly hardened his stand by offering a reward (through an intermediary) to miners who opposed the proposed soft fork. This reward included 1 million ETH and 100 BTC to any nodes that resisted the fork and allowed his transactions.
Although these statements couldn’t be verified, they added another layer of complexity to an already volatile situation. The Ethereum community was left to watch and see how these developments would play out.
The immutability debate
Amid the ongoing debacle, the decision to fork Ethereum sparked philosophical debates about the purpose and principles of blockchain technology.
➤ Immutability in blockchain means that once data is recorded, it cannot be altered or removed.
Immutability ensures a permanent and tamper-proof ledger, which means no single party can change past transactions or records. At a conceptual level, immutability is indispensable when it comes to building trust in decentralized systems.
The debate divided the Ethereum community along two diametrically opposite points of view:
- One group believed that altering the blockchain to “erase” the hack set a dangerous precedent for future interventions. They argued that blockchain immutability is essential to decentralization, as it prevents any single authority from tampering with data.
- The other group was of the view that the unique nature of the attack justified intervention. They argued that the hard fork was necessary to restore community trust and prevent future attacks, as allowing the hack to stand might damage Ethereum’s reputation irreparably.
➤ Ultimately, the hard fork proposal gained the most support, which led to the split between Ethereum and Ethereum Classic.
The resulting Ethereum Classic chain continues to champion immutability, while Ethereum’s main chain has focused on building a more secure and adaptable blockchain.
The Ethereum hard fork: Dividing the blockchain
On July 20, 2016, Ethereum developers implemented the hard fork to create a new version of the Ethereum network. In this new version, the stolen funds were returned to the original DAO.
This decision effectively “rewound” Ethereum’s history to a point before the hack occurred and erased the attacker’s transactions. The hard fork’s outcome was controversial, as it contradicted blockchain’s core principle of immutability.
As a result, Ethereum was split into two chains:
- Ethereum (ETH): The chain that adopted the hard fork to prioritize security and user trust.
- Ethereum Classic (ETC): The chain that rejected the hard fork to uphold the principle of immutability. It maintained the original history, including The DAO hack,
Ultimately, the hard fork divided the Ethereum community, with each chain continuing to operate independently. This landmark event has since served as a stark reminder of the challenges of decentralized governance and blockchain security.
Ethereum vs. Ethereum Classic in a nutshell
Feature | Ethereum (ETH) | Ethereum Classic (ETC) |
---|---|---|
Origin | Created after The DAO hack and subsequent hard fork in 2016 | Original Ethereum blockchain, kept unaltered post-DAO hack |
Core philosophy | Prioritizes security and user confidence by allowing changes to correct issues | Upholds immutability and the preservation of the blockchain’s legacy |
Consensus mechanism | Proof-of-stake (PoS) | Proof-of-work (PoW) |
Development community | Large and active, with significant funding and regular upgrades | Comparatively a smaller community with fewer resources and updates |
Main use cases | Decentralized applications (DApps), DeFi, NFTs, smart contracts | Smart contracts, DApps |
Security focus | Continuous upgrades and security-focused improvements (e.g., PoS transition) | Emphasizes code immutability; less frequent upgrades |
Transaction fees | Lower after Ethereum’s transition to PoS | Generally higher due to PoW-based processing |
Supply cap | No fixed cap; ETH supply is managed through protocol upgrades | Fixed cap of 210 million ETC |
Popularity and adoption | High, widely adopted by developers, enterprises, and users | Moderate, with support from purists and original blockchain proponents |
Future roadmap | Continuous upgrades (e.g., sharding, scalability improvements) | Conservative upgrades with a focus on security and stability |
Lessons learned
The DAO hack marked a turning point for blockchain security. It highlighted the need for comprehensive smart contract audits and reentrancy protection.
Ethereum’s response to the attack included security upgrades and guidelines to prevent similar vulnerabilities. Here are some of the critical security lessons learned:
- Smart contract auditing: The DAO hack underscored the importance of rigorous code reviews and auditing processes before deploying smart contracts.
- Reentrancy protection: Developers learned to implement safeguards against reentrancy attacks by using checks-effects-interactions patterns that ensure state updates occur before external calls.
- Multi-signature contracts: The hack highlighted the importance of multi-signature authorization to add layers of security to high-value transactions.
- Community response mechanisms: The hack demonstrated the need for community-wide consensus mechanisms in the event of future crises, as debates around immutability and intervention continue to shape blockchain governance.
Put simply, the breach prompted developers to adopt more stringent testing practices. It left a lasting impact on the Ethereum ecosystem and the broader blockchain industry.
How The DAO hack changed blockchain security
The DAO hack ultimately served as an important lesson for the broader blockchain space. It pushed the entire blockchain industry to prioritize security. In hindsight, the incident shifted crypto funding models from collective DAOs to ICOs, thereby reducing oversight and due diligence.
That said, while ICOs allowed easier access to capital, they also led to a rise in scams with limited protections for investors. Despite these changes, the visionary spirit that drove early Ethereum projects remains relevant, and The DAO’s legacy still inspires the pursuit of secure, decentralized applications.
Frequently asked questions
What is autonomous in DAO?
What is the difference between a DAC and a DAO?
How much was stolen in The DAO hack?
What happened to the first DAO?
Could The DAO hack have been prevented?
What is the difference between Ethereum and Ethereum Classic?
What were the consequences of The DAO hack?
Disclaimer
In line with the Trust Project guidelines, the educational content on this website is offered in good faith and for general information purposes only. BeInCrypto prioritizes providing high-quality information, taking the time to research and create informative content for readers. While partners may reward the company with commissions for placements in articles, these commissions do not influence the unbiased, honest, and helpful content creation process. Any action taken by the reader based on this information is strictly at their own risk. Please note that our Terms and Conditions, Privacy Policy, and Disclaimers have been updated.