The Ekubo EVM chain's routing contract has been maliciously exploited. Users are advised to revoke the authorization of the relevant contract.

This article is machine translated
Show original

According to Foresight News , Ekubo has disclosed a security vulnerability in its transaction routing contract on the EVM chain. Liquidity providers and users on Starknet are not affected. The scope of the vulnerability is currently under investigation, and all users are advised to immediately go to revoke.cash to revoke the relevant contract authorization.

According to Yu Xian, founder of SlowMist, the Ekubo attackers used the payCallback mechanism to designate users who had granted unlimited token authorization to the contract as payers, thereby calling the WBTC transferFrom function to transfer the victim's assets. A total of 85 operations were performed, each time involving 0.2 WBTC. User 0x765DEC lost a total of 17 WBTC.

Source
Disclaimer: The content above is only the author's opinion which does not represent any position of Followin, and is not intended as, and shall not be understood or construed as, investment advice from Followin.
Like
Add to Favorites
Comments