TLDR Wasabi Protocol was exploited for more than $5 million. Attackers gained control of Wasabi’s privileged admin key. Affected chains include Ethereum, Base,TLDR Wasabi Protocol was exploited for more than $5 million. Attackers gained control of Wasabi’s privileged admin key. Affected chains include Ethereum, Base,

Wasabi Protocol Exploited for Over $5M After Admin Key Compromise

2026/04/30 21:34
3분 읽기
이 콘텐츠에 대한 의견이나 우려 사항이 있으시면 crypto.news@mexc.com으로 연락주시기 바랍니다

TLDR

  • Wasabi Protocol was exploited for more than $5 million.
  • Attackers gained control of Wasabi’s privileged admin key.
  • Affected chains include Ethereum, Base, Berachain and Blast.
  • Stolen assets included WETH, USDC, PEPE, MOG and cbBTC.
  • Wasabi warned users not to interact with contracts during the probe.

Wasabi Protocol, a perpetuals trading platform operating across Ethereum, Base, Berachain, and Blast, has been exploited for more than $5 million after attackers gained control of a privileged admin key.

The attack affected multiple vaults and liquidity pools linked to the protocol. Blockchain security firms said the attacker used the compromised deployer wallet to grant admin permissions, upgrade contracts to malicious versions, and drain assets from Wasabi’s systems.

Wasabi Protocol Exploited for Over $5M After Admin Key Compromise

The Wasabi team said it was investigating the incident and warned users not to interact with its contracts until further notice. Virtuals Protocol also froze margin deposits powered by Wasabi as a precaution, while stating that its own security remained intact.

Wasabi Protocol Admin Key Compromise Led to Contract Takeover

Security firm Blockaid said the exploit began through an externally owned account known as wasabideployer.eth, which held the sole admin role in Wasabi’s permission system.

After gaining access to the deployer key, the attacker granted themselves privileged access without delay. They then used a helper contract to upgrade Wasabi’s perpetual vaults and pool contracts into malicious implementations designed to drain balances.

The exploit involved the Universal Upgradeable Proxy Standard, a common smart contract upgrade method. UUPS allows developers to update contract logic while keeping the same contract address. However, if admin control is compromised, attackers can replace legitimate code with malicious code.

Blockaid said Wasabi did not have a timelock or multisig protecting the admin role. A timelock would have delayed sensitive changes, while a multisig would have required multiple approvals before contract upgrades could take effect.

Multiple Chains and Assets Were Affected

The compromised contracts included Wasabi vaults on Ethereum and Base, including wWETH, sUSDC, wBITCOIN, wPEPE, sBTC, sVIRTUAL, sAERO, and sBRETT.

Other security firms said the exploit also touched Berachain and Blast. Stolen assets reportedly included WETH, PEPE, MOG, USDC, ZYN, REKT, cbBTC, AERO, and VIRTUAL.

Cyvers said the attacker consolidated stolen funds into ETH, bridged assets to Ethereum, and distributed funds across several addresses. BlockSec noted that some accounts involved in the activity appeared to have been funded through Tornado Cash.

Users holding Wasabi LP-share tokens were warned that the underlying assets backing those tokens may have been drained or remain at risk. Security researchers advised users to revoke active approvals tied to affected vault contracts.

DeFi Key Management Risks Remain in Focus

The Wasabi exploit adds to a difficult month for decentralized finance security. More than $600 million has been lost across multiple attacks in recent weeks, including large incidents involving Drift Protocol and Kelp DAO.

The Wasabi incident shares similarities with other admin-key compromise attacks. In such cases, the code may function as designed, but operational control is too concentrated in one private key.

Security experts said the absence of delay mechanisms and multi-party approval systems remains a major risk for protocols managing user funds across several chains.

The Wasabi team has not yet released a full post-mortem. Further updates are expected after forensic review of the compromised deployer wallet, contract upgrades, affected vaults, and fund movements.

The post Wasabi Protocol Exploited for Over $5M After Admin Key Compromise appeared first on CoinCentral.

시장 기회
Notcoin 로고
Notcoin 가격(NOT)
$0.0003913
$0.0003913$0.0003913
+0.17%
USD
Notcoin (NOT) 실시간 가격 차트
면책 조항: 본 사이트에 재게시된 글들은 공개 플랫폼에서 가져온 것으로 정보 제공 목적으로만 제공됩니다. 이는 반드시 MEXC의 견해를 반영하는 것은 아닙니다. 모든 권리는 원저자에게 있습니다. 제3자의 권리를 침해하는 콘텐츠가 있다고 판단될 경우, crypto.news@mexc.com으로 연락하여 삭제 요청을 해주시기 바랍니다. MEXC는 콘텐츠의 정확성, 완전성 또는 시의적절성에 대해 어떠한 보증도 하지 않으며, 제공된 정보에 기반하여 취해진 어떠한 조치에 대해서도 책임을 지지 않습니다. 본 콘텐츠는 금융, 법률 또는 기타 전문적인 조언을 구성하지 않으며, MEXC의 추천이나 보증으로 간주되어서는 안 됩니다.