BlockBeats News, April 21, KiloEx released a report on the root cause of the hack on April 21. The report pointed out that the incident was caused by the TrustedForwarder contract in its smart contract inheriting from OpenZeppelin's MinimalForwarderUpgradeable but failing to override the execute method, allowing this function to be called arbitrarily. The attack occurred from 18:52 to 19:40 (UTC) on April 14, with the attacker deploying malicious contracts on chains such as opBNB, Base, BSC, Taiko, B2, and Manta.
After negotiating with the attacker, KiloEx agreed to let them keep 10% as a bounty, and the remaining assets (including USDT, USDC, ETH, BNB, WBTC, and DAI) have all been returned to the project's multi-sig wallet. The platform has completed the vulnerability fix and resumed operations.
免責聲明:投資有風險,本文並非投資建議,以上內容不應被視為任何金融產品的購買或出售要約、建議或邀請,作者或其他用戶的任何相關討論、評論或帖子也不應被視為此類內容。本文僅供一般參考,不考慮您的個人投資目標、財務狀況或需求。TTM對信息的準確性和完整性不承擔任何責任或保證,投資者應自行研究並在投資前尋求專業建議。