PANews reported on April 21 that KiloEx released a root cause analysis report on the hacking incident, saying that the cause of the incident was that the TrustedForwarder contract in its smart contract inherited OpenZeppelin's MinimalForwarderUpgradeable but did not rewrite the execute method, causing the function to be called arbitrarily. The attack occurred from 18:52 to 19:40 (UTC) on April 14, and the attacker deployed malicious contracts on opBNB, Base, BSC, Taiko, B2 and Manta chains to launch the attack. After KiloEx negotiated with the attacker, the other party agreed to keep 10% as a bounty, and the remaining assets (covering USDT, USDC, ETH, BNB, WBTC and DAI) have all been returned to the project's multi-signature wallet. The platform has completed the vulnerability repair and resumed operations.
KiloEx publishes hacker incident analysis: TrustedForwarder contract in smart contract has vulnerability
- 2025-05-16
Wedbush: Apple is expected to release its AI roadmap in the coming weeks, China will be key
- 2025-05-16
Analyst: Cyberattack and SEC investigation will not have a substantial impact on Coinbase
- 2025-05-16
Anthropic: Claude now supports mobile web and Google Workspace research
- 2025-05-16
Solana Ecosystem Project SOON Establishes Foundation to Promote the Popularization of SVM
- 2025-05-16
New York Fed and Bank for International Settlements Release Research Report Testing Tokenized Monetary Policy Tools
- 2025-05-16
Bitget released its transparency report for April, with contract trading volume increasing by 17.3% month-on-month to US$757.6 billion