Scallop’s abandoned V2 contract was exploited; after 150k SUI were stolen, it announced full reimbursement

SUI-1,87%

Scallop SUI被盜

Sui Network decentralized lending protocol Scallop, on April 26 (Sunday), released an official announcement via the X platform confirming that it suffered a vulnerability attack. The attacker extracted about 150,000 SUI from a discarded rewards contract associated with the sSUI spool. According to the official statement, the core liquidity pool and user deposits were not affected. The protocol has resumed deposits and withdrawals, and it confirms it will fully compensate all losses with company funds.

Event timeline and Scallop’s official response

According to Scallop’s official X platform announcement (April 26 at 12:50 UTC), the attack target was an affiliated incentive contract for the sSUI spool. This contract is the incentive layer for SUI depositors and is not the core lending logic. Within minutes after the incident, the Scallop team froze the affected contracts. The core contracts were frozen until they were unfrozen within two hours, and withdrawals and deposits resumed at 14:42 UTC.

Scallop’s official statement says: “Scallop will fully make up 100% of the losses.”

Vulnerability technical analysis: the uninitialized counter in the 2023 abandoned package

Scallop合約攻擊分析

(Source: Vadim)

According to independent on-chain analysis, the attack entry point was the discarded V2 spool package deployed by Scallop in November 2023, more than 17 months before this attack occurred. Under Sui Network’s technical architecture, deployed packages cannot be changed; unless version control is explicitly set, old versions can still be called.

The attacker identified an uninitialized last_index counter in the package. This counter is used to track the accumulated rewards of stakers. The attacker staked about 136,000 sSUI; the system treated this position as one that had been in existence since the spool started in August 2023. After about 20 months of exponential accumulation, the spool index grew to about 1.19 billion, enabling the attacker to obtain about 162 trillion reward points, which they exchanged for 150,000 SUI in a 1:1 ratio.

The on-chain transaction record can be looked up by hash: 6WNDjCX3W852hipq6yrHhpUaSFHSPWfTxuLKaQkgNfVL

Recent DeFi vulnerability incident records on Sui

According to public reports, in early April 2026, the Volo Protocol on Sui Network suffered a similar attack. The attack target was also an affiliated contract rather than core protocol logic, with losses of about $3.5 million. In addition, about a week before that attack, an Ethereum network bridge attack occurred in which about $292 million in unsecured liquidity re-staking tokens were stolen.

As of the time this report was published, both the Sui Foundation and Mysten Labs had not issued any public statements regarding the Scallop incident. According to Scallop’s official explanation, the protocol plans to conduct a comprehensive audit of all existing old-version packages; the audit timeline is yet to be determined.

FAQ

When did this vulnerability attack occur, and what was the scale of the losses?

According to Scallop’s official X platform announcement, the attack took place on April 26, 2026 (Sunday) at 12:50 UTC. The attacker extracted about 150,000 SUI from the abandoned sSUI spool incentive contract. The core lending liquidity pool and user deposits in other markets were not affected.

What official commitments did Scallop make regarding this attack?

According to Scallop’s official statement, the protocol froze the affected contracts within minutes after the attack and restored full operational functionality at 14:42 UTC (about two hours after the announcement was published). Scallop confirmed it would fully compensate all losses with company funds, that user earnings would not be affected, and that it plans to conduct a comprehensive audit of all existing old-version packages.

What was the root technical cause of this vulnerability, and how is it related to Sui Network’s technical architecture?

According to independent on-chain analysis, the vulnerability stemmed from an uninitialized last_index counter in a discarded V2 spool package deployed in November 2023. On Sui Network, deployed packages are immutable; unless version control is explicitly set, old versions can still be called. This allowed the attacker to exploit abandoned code from more than 17 months earlier to extract 150,000 SUI.

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Related Articles

Solana Selects Falcon for Post-Quantum Cryptography, Migration Preparations Complete

Gate News message, April 27 — Solana's official team published a comprehensive quantum computing roadmap, reaffirming that quantum threats remain years away while the ecosystem has already completed extensive research and technical preparation. Two independent validator client development teams,

GateNews2h ago

Alphea Launches AI-Native Layer 1 Blockchain with Autonomous Agent Execution

Gate News message, April 27 — Alphea, a newly unveiled Layer 1 blockchain platform designed for AI infrastructure, officially presented its decentralized execution environment at Hong Kong Web3 Festival 2026. The platform integrates execution, persistent memory, and verifiable computation as

GateNews2h ago

Lise Completes World's First Tokenized IPO on Regulated Exchange

Gate News message, April 27 — Lise (Lightning Stock Exchange), a Paris-based regulated exchange, has closed what it describes as the world's first initial public offering (IPO) executed on a fully regulated, natively tokenized market infrastructure. ST GROUP, a French industrial SME supplying

GateNews3h ago

Maple Finance's Cross-Chain Bridge Surpasses $7B in Total Volume

Gate News message, April 27 — Maple Finance announced Monday that its cross-chain bridge has processed over $7 billion in total volume, marking a significant milestone for the protocol. The achievement reflects growing adoption of Maple's dollar yield assets across multiple blockchain ecosystems, d

GateNews3h ago

Bitcoin Fork Controversy: eCash Plan Targets Satoshi’s Hidden Holdings

A new Bitcoin hard fork proposal by developer Paul Sztorc has triggered intense debate across the crypto community. The planned fork, named eCash, is expected to launch in August 2026 and would distribute tokens to Bitcoin holders at a 1:1 ratio. However, the proposal has drawn criticism due to

CryptometerIo3h ago

Tether Launches Mining Development Kit (MDK), Open-Source Framework for Bitcoin Miners

Gate News message, April 27 — Tether announced the launch of Mining Development Kit (MDK), an open-source, full-stack development framework designed to provide unified control over the entire infrastructure stack for Bitcoin miners and developers. MDK features an open modular architecture with

GateNews5h ago
Comment
0/400
No comments