Home » KiloEx reveals $7m smart contract exploit in post-mortem report

KiloEx reveals $7m smart contract exploit in post-mortem report

by Bella Baker
0 comments



Decentralized perpetual exchange KiloEx published a post-mortem on its $7 million exploit stemming from a critical smart contract vulnerability. 

According to the report, the issue originated from the TrustedForwarder contract, which inherited from OpenZeppelin’s MinimalForwarderUpgradeable but failed to override the “execute” method, leaving it permissionless.

This oversight allowed the attacker to manipulate trading positions across several chains. On April 13, the attacker initiated the exploit by withdrawing 1 ETH (ETH) from Tornado Cash to fund wallets across chains. 

The attacker executed the exploit in under an hour by abusing the open method to open and close positions at favorable prices.

The exploit was first detected by Cyvers Alerts, which flagged suspicious cross-chain activity across Base, Taiko, and BNB Chain. According to PeckShield, losses were spread across Base, opBNB, and BSC.

Hacker negotiations 

According to the report, and after sustained negotiations, the hacker agreed to a 10% bounty retention and systematically returned all stolen assets to KiloEx’s designated Safe multi-signature wallets.

KiloEx said the vulnerability has been fixed and emphasized that no open positions will face liquidation. Instead, all positions will be closed based on price snapshots taken before the attack. Profits and losses from the exploit period will not count toward final user balances.

The platform also said it worked with police and SlowMist to investigate the hack.



Source link

You may also like

Advertisement

Recent Posts

Subscribe

Subscribe my Newsletter for new blog posts, tips & new photos. Let's stay updated!

© 2024 Ai Crypto Watch. All rights reserved.