SlowMist Cosine: Ekubo contract has been maliciously exploited, with users already losing 17 WBTC tokens

robot
Abstract generation in progress

Odaily Planet Daily News: Slow Fog founder Yu Xian posted on the X platform stating, "Ekubo’s related contracts have been maliciously exploited. The reason is that if a user previously authorized the relevant tokens to: 0x8CCB1ffD5C2aa6Bd926473425Dea4c8c15DE60fd;

For example, this user 0x765DEC’s unlimited WBTC authorization (158 days ago): the attacker can designate an authorized user as the payer, and in payCallback, make the contract call WBTC transferFrom(victim, Ekubo Core, amount), then through Ekubo Core (0xe0e0e08A6A4b9Dc7bD67BCB7aadE5cF48157d444)'s withdraw/pay reconciliation process, transfer assets to the attacker. This operation was executed 85 times, each time 0.2 WBTC, ultimately causing user 0x765DEC to lose 17 WBTC. Users are advised to install the official alert and check the following contract authorizations: 0x8ccb1ffd5c2aa6bd926473425dea4c8c15de60fd (V2)

0x4f168f17923435c999f5c8565acab52c2218edf2 (V3)

Arbitrum: 0xc93c4ad185ca48d66fefe80f906a67ef859fc47d (V3).”

WBTC0.66%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments
  • Pin