Scan to download
BTC $88,748.84 -1.07%
ETH $2,935.27 -0.86%
BNB $890.55 +0.38%
XRP $1.92 +0.70%
SOL $127.11 -0.00%
TRX $0.2968 -3.87%
DOGE $0.1244 +0.15%
ADA $0.3593 +0.02%
BCH $591.12 -0.27%
LINK $12.22 +0.17%
HYPE $23.29 +9.58%
AAVE $157.38 +0.25%
SUI $1.49 -0.10%
XLM $0.2110 +0.54%
ZEC $373.15 +4.74%
BTC $88,748.84 -1.07%
ETH $2,935.27 -0.86%
BNB $890.55 +0.38%
XRP $1.92 +0.70%
SOL $127.11 -0.00%
TRX $0.2968 -3.87%
DOGE $0.1244 +0.15%
ADA $0.3593 +0.02%
BCH $591.12 -0.27%
LINK $12.22 +0.17%
HYPE $23.29 +9.58%
AAVE $157.38 +0.25%
SUI $1.49 -0.10%
XLM $0.2110 +0.54%
ZEC $373.15 +4.74%

KiloEx's summary of the hacking incident: A bug in the TrustedForwarder contract led to this attack

2025-04-21 18:59:55
Collection

According to ChainCatcher's message, KiloEx stated in a post that the root cause analysis and summary of the hacking incident revealed that the incident was caused by its smart contract's TrustedForwarder contract inheriting OpenZeppelin's MinimalForwarderUpgradeable but failing to override the execute method, which allowed the function to be called arbitrarily.

The attack occurred between April 14, 18:52 and 19:40 (UTC), with the hacker deploying attack contracts across multiple chains including opBNB, Base, BSC, Taiko, B2, and Manta. After negotiations, the hacker agreed to retain 10% of the bounty and has returned all stolen assets (including USDT, USDC, ETH, BNB, WBTC, and DAI) to the multi-signature wallet designated by KiloEx.

ChainCatcher reminds readers to view blockchain rationally, enhance risk awareness, and be cautious of various virtual token issuances and speculations. All content on this site is solely market information or related party opinions, and does not constitute any form of investment advice. If you find sensitive information in the content, please click "Report", and we will handle it promptly.
app_icon
ChainCatcher Building the Web3 world with innovations.