KiloEx announces hacker incident analysis: Due to the contract not rewriting key functions, the attacker has returned 90% of the assets stolen cross-chain.

robot
Abstract generation in progress

Odaily News KiloEx released a root cause analysis report on the hacker incident on April 21. The report pointed out that the incident was caused by its smart contracts where the TrustedForwarder contract inherited OpenZeppelin's MinimalForwarderUpgradeable but did not override the execute method, allowing the function to be called by anyone. The attack occurred from April 14, 18:52 to 19:40 (UTC), with the attacker deploying malicious contracts on chains such as opBNB, Base, BSC, Taiko, B2, and Manta to carry out the attack. After negotiating with the attacker, KiloEx agreed to keep 10% as a bounty, and the remaining assets (covering USDT, USDC, ETH, BNB, WBTC, and DAI) have all been refunded to the project's multi-signature wallet. The platform has completed the vulnerability fix and resumed operations.

View Original
The content is for reference only, not a solicitation or offer. No investment, tax, or legal advice provided. See Disclaimer for more risks disclosure.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)