KiloEx Releases Hack Incident Analysis: Due to a missing function override in the smart contract, the attacker was able to steal assets cross-chain and has since returned 90%.

Blockbeats
Yesterday

BlockBeats News, April 21, KiloEx released a report on the root cause of the hack on April 21. The report pointed out that the incident was caused by the TrustedForwarder contract in its smart contract inheriting from OpenZeppelin's MinimalForwarderUpgradeable but failing to override the execute method, allowing this function to be called arbitrarily. The attack occurred from 18:52 to 19:40 (UTC) on April 14, with the attacker deploying malicious contracts on chains such as opBNB, Base, BSC, Taiko, B2, and Manta.

After negotiating with the attacker, KiloEx agreed to let them keep 10% as a bounty, and the remaining assets (including USDT, USDC, ETH, BNB, WBTC, and DAI) have all been returned to the project's multi-sig wallet. The platform has completed the vulnerability fix and resumed operations.

Disclaimer: Investing carries risk. This is not financial advice. The above content should not be regarded as an offer, recommendation, or solicitation on acquiring or disposing of any financial products, any associated discussions, comments, or posts by author or other users should not be considered as such either. It is solely for general information purpose only, which does not consider your own investment objectives, financial situations or needs. TTM assumes no responsibility or warranty for the accuracy and completeness of the information, investors should do their own research and may seek professional advice before investing.

Most Discussed

  1. 1
     
     
     
     
  2. 2
     
     
     
     
  3. 3
     
     
     
     
  4. 4
     
     
     
     
  5. 5
     
     
     
     
  6. 6
     
     
     
     
  7. 7
     
     
     
     
  8. 8
     
     
     
     
  9. 9
     
     
     
     
  10. 10