Wu learned that Blockaid posted on Twitter that it detected and marked Sui perpetual contract Aftermath Finance as being under active attack. The attacker address 0x1a65…2d41e stole approximately 1.1 million USDC through 11 transactions within about 36 minutes. Blockaid stated that the attack targeted a fee accounting vulnerability in the perpetual contract liquidation system, allowing synthetic collateral to inflate and withdrawals from the protocol treasury.

USDC0.03%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments