PSA: Trade protocol exploit discovered, investigations ongoing

Bisq v1 has experienced an exploit in its trade protocol that allowed an attacker to drain a portion of available offers.

The impact is limited to offers that were actively taken by the attacker. Funds held in users’ Bisq Bitcoin wallets are not affected.

As an immediate mitigation, an emergency mechanism was activated to disable trading by setting the required trading version to 2.0.0 — a version that does not exist. This effectively prevents the attacker from continuing the exploit.

The attack appears to have started on May 1 in the early morning hours. We are continuing to investigate the full extent of the damage. Users with trades initiated on or after this time are advised to open mediation by selecting the trade and pressing Ctrl + O. A mediator will assess whether their trade was affected.

Preliminary investigation indicates that the attacker exploited a missing validation check using a modified client. We are working to reliably reproduce the issue and verify a fix. Once confirmed, we will release a hotfix based on the latest stable version. In parallel, we are conducting a comprehensive security review to identify any related or additional vulnerabilities.

For affected users, we are actively evaluating reimbursement options. We recognize that both the exploit and our response are critical to Bisq’s integrity, and we are dedicating all available resources to finding a solution that helps restore confidence.

Bisq 2, with the Bisq Easy trade protocol, is not affected. It is a separate codebase with a fundamentally different protocol design.

We will continue to provide updates through our official communication channels, including Matrix, the Bisq Forum, Telegram, Reddit, X, and Nostr.

We sincerely apologize for the impact this incident has had on our users. We are fully committed to addressing both the root cause and its consequences.

BEWARE OF SCAMMERS

Worried users will be more vulnerable to scammers posing as support agents.

SUPPORT STAFF WILL NEVER DM YOU FIRST

NEVER reply to DMs you receive, it will be a scammer trying to impersonate official staff

NEVER GIVE YOUR SEED TO ANYONE

Hi swv. Just confirming: A popup said to update to latest version, but I understand v2.0.0 doesn’t exist. Should I ignore the update for now until resolved? Thanks.

Yes, that version was used just as a way to stop further vulnerable offers.

1 Like

There isn’t even an issue report on the project’s GitHub:

Not to mention a fix.
What’s the situation? I made a transfer to someone an hour before the “outage.”

What happens now? Will they be able to confirm it?

Devs are working with this internally, github will show that when the new version is ready. You’ll be able to continue with your trade then, as you were the BTC buyer I suppose it was not directly affected by the attack, which was an exploit against BTC sellers as far as I know.

Yes, I know I wasn’t the target.

But since the platform is currently down, I’m worried the transaction won’t go through. And I’ve already made the transfer!

Thanks. I disabled an open offer. Am I able to cancel it and move the funds to my wallet until this is resolved?

Yes, but maybe keeping it disabled is better. By removing it, you lose the trading fee.

1 Like

Trades that are already open can be completed normally, if you’d like a support agent to check whether your trade was affected by the exploit, DM one of them (never answer to DMs you receive first) and share the deposit txid.

So, open unaffected trades can be completed normally.

2 Likes

@Borque Indicates that it’s an open offer, not an open trade. No one will be able to take an open offer until new version is released.

As you’ve said, open trades can be completed normally.

1 Like

yes I was actually replying to @jurkos :sweat_smile: