Drift discloses attack details, multi-signature was compromised and used to execute attacks through pre-signed transactions

robot
Abstract generation in progress

ME News update, April 2 (UTC+8). Drift Protocol disclosed that the execution process of this security incident was as follows: the attack began with a test withdrawal transaction initiated from its insurance fund. About 1 minute later, the attacker took over administrator privileges and carried out subsequent actions via two pre-signed durable nonce transactions. The project team stated that this attack was caused by a combination of factors, including the delayed execution of pre-signed transactions and the compromise of multi-signature approval, or it may have been related to targeted social engineering attacks or transaction misdirection. Drift is currently working with multiple security institutions to investigate the cause, and in coordination with cross-chain bridges, exchanges, and law enforcement agencies to trace and freeze the related funds; a detailed post-incident reconstruction report will be published later. (Source: ChainCatcher)

View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin