PANews reported on April 21 that KiloEx released a root cause analysis report on the hacking incident, saying that the cause of the incident was that the TrustedForwarder contract in its smart contract inherited OpenZeppelin's MinimalForwarderUpgradeable but did not rewrite the execute method, causing the function to be called arbitrarily. The attack occurred from 18:52 to 19:40 (UTC) on April 14, and the attacker deployed malicious contracts on opBNB, Base, BSC, Taiko, B2 and Manta chains to launch the attack. After KiloEx negotiated with the attacker, the other party agreed to keep 10% as a bounty, and the remaining assets (covering USDT, USDC, ETH, BNB, WBTC and DAI) have all been returned to the project's multi-signature wallet. The platform has completed the vulnerability repair and resumed operations.
KiloEx publishes hacker incident analysis: TrustedForwarder contract in smart contract has vulnerability
- 2025-05-11
Ledger has regained control of the Discord server
- 2025-05-11
Defillama founder: Hackers hacked into an address in Lido oracle multi-signature, stole 1.4 ETH and then exposed their whereabouts
- 2025-05-11
Bitfarms hit with class action lawsuit for failing to disclose internal control deficiencies
- 2025-05-10
Forbes: Trump Media and Technology Group's financial report reveals "significant deficiencies" in internal controls
- 2025-05-10
Tether CEO comments on European capital controls: Digital Euro sentiment intensifies
- 2025-05-09
Gate Research Institute on-chain report: Solana leads in transaction volume, BTC large amount of funds added