CoinInsight360.com logo CoinInsight360.com logo
America's Social Casino

Moralis Money
NullTx 2025-04-16 06:33:37

$7 Million Exploit Hits KiloEx: Flawed Access Control Allows Price Manipulation Across Multiple Chains

A critical flaw has been exposed in decentralized perpetual exchange KiloEx. On-chain analysis has revealed that a single attacker , using a serious exploit, siphoned off around $7 million in value by manipulating oracle prices. The attack, first noted by KiloEx’s Cyver alert system, caused operational issues across three separate chains—BNB Chain, Base, and Taiko. KiloEx—known for its oracle-based pricing mechanism—now has some serious explaining to do. 7M HACK ALERTOur system has detected multiple suspicious transactions involving @KiloEx_perp across several chains. An address funded via @TornadoCash has executed a series of exploitative transactions on the $BNB , $Base , and $Taiko chains — accumulating approximately $7M in… pic.twitter.com/od4UTsSrXs — Cyvers Alerts (@CyversAlerts) April 14, 2025 The exploit happened exactly how it was planned, using a weak contract design to get at some price feeds that were not secure. That makes this a problem in decentralized finance protocols, which have many other issues besides this one. But the DeFi protocols didn’t get this by accident; they got it because the Oracle problem is hard and because it is easy to mess up access control in smart contracts. Tornado Cash Funding and Cross-Chain Exploits The activity of the attacker first set off alarms when dubious transactions were observed being sent through Tornado Cash, a privacy protocol that is commonly used to obscure the origin of funds. After that, the attacker launched a coordinated exploit campaign against the KiloEx platform, hitting it on the BNB, Base, and Taiko chains. Taking advantage of the KiloEx architecture’s MinimalForwarder contract, the actor gained the ability to control price-setting mechanisms normally restricted to certain special privileged contracts. Then, he or she used that contrived access to do a price-manipulation number on a number of assets, opening and closing positions at various distorted price levels to drain funds from the platform. The Technical Breakdown: How the Attack Unfolded The exploit centers on the MinimalForwarder contract, which did not have important access control mechanisms. This contract makes a good entry point for executing function calls across the many KiloEx smart contracts. And the exploit took advantage of this chain of operations: 1. The function setPrices in the contract KiloPriceFeed enables us to change the oracle prices. It is meant to be called under normal conditions exclusively by the contract called Keeper. 2. The 0x7a498a61 function of the Keeper contract is responsible for executing the updates on prices and when new positions are opened. This function is set up to only accept calls from the PositionKeeper contract. 3. The PositionKeeper contract contains a function, 0xac9fd279, that executes calls to the Keeper contract. This function should only be accessible through the MinimalForwarder contract. 4. Where the exploit happened: the MinimalForwarder’s execute function. The attacker found that this function could be used to spoof any “from” address by providing a fake signature. Very importantly, the function didn’t check the call data itself first, allowing the attacker to build a call that went through PositionKeeper and Keeper to end up modifying and accessing prices right at the setPrices function. The root cause of the @KiloEx_perp exploit is the lack of access control checks in the top-level contract(MinimalForwarder), which leads to the manipulation of oracle prices. The attack path is as follows: 1. The setPrices function in the KiloPriceFeed contract, which can… https://t.co/0mpPteI8JU pic.twitter.com/q0Gs5sccG8 — SlowMist (@SlowMist_Team) April 15, 2025 This exploit path allowed the attacker to first push the price down and then use the resulting artificially low price to open a long position. They then did the opposite of the first step: they pushed the price up to an absurd level, closed the position, and took the immediate profit. It was all very legal, since no actual trading took place. Aftermath and Industry Implications The overall losses across the affected chains are approximated at about 7 million dollars. Blockchain analysts have observed that the sophistication of the exploit indicates the attacker possessed a profound knowledge of KiloEx’s smart contract framework and its weaknesses. This breach renews the focus on the need for robust access controls in smart contract systems, particularly those that involve oracles and leveraged trading mechanisms. In this instance, the absence of strict caller validation permitted an attacker to construct a multi-step execution path that circumvented intended protections and granted unauthorized control over the core price-setting function. Currently, KiloEx has not provided a thorough post-mortem or stated how it plans to make whole the users it affected. Meanwhile, the decentralized finance community at large is watching the situation closely. Many of its members are using the moment as an opportunity to call for more stringent audit standards and security testing — especially in protocols that bridge multiple blockchains and seem to have a large amount of user money at stake. Events of this kind emphasize the dangers of misjudging the intricacy of smart contracts and how easily attackers can take advantage of even the smallest slipups. As DeFi keeps blossoming, the industry must shift to address the security needs of a fast-growing and ever more connected ecosystem. Disclosure: This is not trading or investment advice. Always do your research before buying any cryptocurrency or investing in any services. Follow us on Twitter @nulltxnews to stay updated with the latest Crypto, NFT, AI, Cybersecurity, Distributed Computing, and Metaverse news ! Image(s): Shutterstock.com

https://www.digistore24.com/redir/325658/ceobig/
阅读免责声明 : 此处提供的所有内容我们的网站,超链接网站,相关应用程序,论坛,博客,社交媒体帐户和其他平台(“网站”)仅供您提供一般信息,从第三方采购。 我们不对与我们的内容有任何形式的保证,包括但不限于准确性和更新性。 我们提供的内容中没有任何内容构成财务建议,法律建议或任何其他形式的建议,以满足您对任何目的的特定依赖。 任何使用或依赖我们的内容完全由您自行承担风险和自由裁量权。 在依赖它们之前,您应该进行自己的研究,审查,分析和验证我们的内容。 交易是一项高风险的活动,可能导致重大损失,因此请在做出任何决定之前咨询您的财务顾问。 我们网站上的任何内容均不构成招揽或要约