Blockaid: Ekubo has lost approximately $1.4 million in the attack.

PANews reported on May 6th that, according to Blockaid monitoring, Ekubo Protocol's custom extension contract on Ethereum was attacked in the early hours of the morning, resulting in the theft of approximately $1.4 million. Ekubo users themselves are unaffected; only users who authorized the V2 contract as token spenders are at risk. The vulnerability stems from the `IPayer.pay` callback function of the Ekubo extension contract. The `payer`, `token`, and `amount` parameters of `token.transferFrom` directly originate from the lock payload and are controlled by the attacker. The contract does not check whether the payer is the initiator of the lock or the authorized payer. Attackers can exploit users' previous ERC-20 authorizations to the contract, routed through Core locks to the extension contract, set any authorized user as the payer, and set themselves as the withdrawal recipient, thereby stealing assets.

Previous reports indicated that a security incident occurred in Ekubo's Swap routing contract on the EVM chain, and it was recommended to revoke authorization for the relevant addresses .

Share to:

Author: PA一线

This content is for market information only and is not investment advice.

Follow PANews official accounts, navigate bull and bear markets together
PANews APP
Coinbase launches BTC-INR trading pair for Indian users
PANews Newsflash