- SOL0%
- ETH0%
- BLAST0%
- BERA0%
BlockBeats News, May 10th, Wasabi Protocol released a security incident update, pointing out that attackers exploited a Spring Boot Actuator configuration vulnerability in its AWS infrastructure to steal the private key controlling an EVM smart contract, and made off with approximately $4.8 million in user funds and $900,000 in protocol treasury funds from the relevant contract.
The attack chain started with a public-facing server used for analytics, whose Actuator heap dump was not protected by a secure password, allowing the attacker to obtain credentials for another server and ultimately take control of the smart contract's private key. This incident only affects EVM deployments, including parts of the treasury on Ethereum, Base, Blast, and Berachain, while Solana deployments and Prop AMM remain unaffected.
Wasabi Protocol stated that they have not yet provided a final solution for user compensation, but ensuring that "all affected users are made whole" remains a top priority for the team. Future updates on the reimbursement progress will be posted in the Discord community.
免責聲明:當前內容均來自第三方觀點或由AI直接翻譯第三方觀點,CoinEx不保證內容的真實性、準確性和原創性,不構成CoinEx相關的任何投資建議。數字資產價格波動劇烈,請注意潛在風險。
- 幣種價格24H漲跌