BlockBeats News, April 21, KiloEx released a report on the root cause of the hack on April 21. The report pointed out that the incident was caused by the TrustedForwarder contract in its smart contract inheriting from OpenZeppelin's MinimalForwarderUpgradeable but failing to override the execute method, allowing this function to be called arbitrarily. The attack occurred from 18:52 to 19:40 (UTC) on April 14, with the attacker deploying malicious contracts on chains such as opBNB, Base, BSC, Taiko, B2, and Manta.
After negotiating with the attacker, KiloEx agreed to let them keep 10% as a bounty, and the remaining assets (including USDT, USDC, ETH, BNB, WBTC, and DAI) have all been returned to the project's multi-sig wallet. The platform has completed the vulnerability fix and resumed operations.
免责声明:投资有风险,本文并非投资建议,以上内容不应被视为任何金融产品的购买或出售要约、建议或邀请,作者或其他用户的任何相关讨论、评论或帖子也不应被视为此类内容。本文仅供一般参考,不考虑您的个人投资目标、财务状况或需求。TTM对信息的准确性和完整性不承担任何责任或保证,投资者应自行研究并在投资前寻求专业建议。