Scan to download
BTC $81,231.50 +0.26%
ETH $2,361.96 -0.74%
BNB $634.22 +1.04%
XRP $1.42 +1.28%
SOL $87.31 +2.73%
TRX $0.3446 +1.61%
DOGE $0.1155 +3.46%
ADA $0.2635 +4.22%
BCH $478.58 +7.42%
LINK $9.84 +3.02%
HYPE $43.99 +2.64%
AAVE $93.73 +0.88%
SUI $0.9837 +4.11%
XLM $0.1611 +1.67%
ZEC $540.72 +28.28%
BTC $81,231.50 +0.26%
ETH $2,361.96 -0.74%
BNB $634.22 +1.04%
XRP $1.42 +1.28%
SOL $87.31 +2.73%
TRX $0.3446 +1.61%
DOGE $0.1155 +3.46%
ADA $0.2635 +4.22%
BCH $478.58 +7.42%
LINK $9.84 +3.02%
HYPE $43.99 +2.64%
AAVE $93.73 +0.88%
SUI $0.9837 +4.11%
XLM $0.1611 +1.67%
ZEC $540.72 +28.28%

Ekubo Protocol's custom extension contract was attacked, resulting in a loss of approximately 1.4 million dollars

2026-05-06 10:03:45
Collection

According to the security agency Blockaid (@blockaid_), the Ekubo Protocol is currently experiencing ongoing attacks on a v2 custom extension contract on Ethereum, resulting in a loss of approximately $1.4 million.

The root cause of the attack lies in the fact that the IPayer.pay callback of this extension does not effectively restrict the source of the parameters, allowing attackers to control the payer, token, and amount parameters, thereby arbitrarily transferring authorized tokens. Users of the core Ekubo protocol are not affected, but users who have authorized this v2 contract as a token spender face direct risks. Blockaid recommends that relevant users immediately revoke their authorization.

app_icon
ChainCatcher Building the Web3 world with innovations.