PANews reported on April 21 that KiloEx released a root cause analysis report on the hacking incident, saying that the cause of the incident was that the TrustedForwarder contract in its smart contract inherited OpenZeppelin's MinimalForwarderUpgradeable but did not rewrite the execute method, causing the function to be called arbitrarily. The attack occurred from 18:52 to 19:40 (UTC) on April 14, and the attacker deployed malicious contracts on opBNB, Base, BSC, Taiko, B2 and Manta chains to launch the attack. After KiloEx negotiated with the attacker, the other party agreed to keep 10% as a bounty, and the remaining assets (covering USDT, USDC, ETH, BNB, WBTC and DAI) have all been returned to the project's multi-signature wallet. The platform has completed the vulnerability repair and resumed operations.
KiloEx publishes hacker incident analysis: TrustedForwarder contract in smart contract has vulnerability
- 2025-05-15
Open Gaming Manifesto: How does B3 solve Web3: Structural problems in the gaming industry?
- 2025-05-15
Binance report: 80% of Asian crypto users have adopted 2FA, but advanced security measures are not used enough
- 2025-05-15
Binance report: Meme coins account for 41% of the AI encryption market, but DeFAI is still growing
- 2025-05-15
Bernstein: Ethereum's surge is driven by institutional interest and Layer 2 demand
- 2025-05-14
Telegram shuts down thousands of channels associated with criminal crypto market 'Xinbi Guarantee'
- 2025-05-14
US Department of Justice indicts Sinaloa drug cartel members, blockchain analysis reveals they used cryptocurrency to finance fentanyl transactions