Charts
DataOn-chain
VIP
Market Cap
API
Rankings
CoinOSNew
CoinClaw🦞
Language
  • 简体中文
  • 繁体中文
  • English
Leader in global market data applications, committed to providing valuable information more efficiently.

Features

  • Real-time Data
  • Special Features
  • AI Grid

Services

  • News
  • Open Data(API)
  • Institutional Services

Downloads

  • Desktop
  • Android
  • iOS

Contact Us

  • Chat Room
  • Business Email
  • Official Email
  • Official Verification

Join Community

  • Telegram
  • Twitter
  • Discord

© Copyright 2013-2026. All rights reserved.

简体繁體English
|Legacy

Wasabi Protocol drained for $4.5 million in apparent admin key compromise

CN
coindesk
Follow
3 hours ago
AI summarizes in 5 seconds.


What to know : Wasabi Protocol, a perpetuals trading platform on Ethereum and Base, was drained of about $4.55 million after attackers compromised its deployer admin key. The attacker used the compromised key to grant themselves admin privileges and UUPS-upgrade Wasabi’s vault contracts to malicious versions, draining assets from multiple pools on both chains. The incident, which lacked safeguards such as a timelock or multisig on the admin role, adds to more than $770 million in DeFi losses this year and echoes recent key-compromise exploits at Drift Protocol and Kelp DAO.

DeFi can't stop bleeding, and Wasabi Protocol is the latest to find out why.

Wasabi Protocol, a perpetuals trading platform built on Ethereum and Base, was drained of approximately $4.55 million on Thursday after attackers compromised the protocol's deployer key, security firm Blockaid said in an X post.

The hack is the latest in a month that has produced over $605 million in DeFi losses across at least 12 incidents.

The mechanic was an externally owned account, or EOA, called wasabideployer.eth held the sole ADMIN_ROLE in Wasabi's permission system.

An EOA is a wallet controlled by a private key, as opposed to a smart contract. Whoever holds the key controls the wallet. Once the attacker had access to the deployer key, they called grantRole on the permission contract to give themselves admin privileges with zero delay.

Their helper contract then upgraded Wasabi's perp vaults and LongPool to malicious implementations that drained the balances, Blockaid said.

The exploit relied on UUPS upgradeability, a pattern where a smart contract can swap out its underlying code while keeping the same address.

UUPS is widely used because it lets developers fix bugs without migrating users. It also means that if an attacker controls admin permissions, they can replace the contract's logic with anything they want, including code designed to steal funds.

Wasabi had no timelock or multisig protecting the admin role, Blockaid said. A timelock forces a delay between when an admin action is announced and when it executes, giving users time to react. A multisig requires multiple signers to approve a change. Wasabi had neither, leaving a single key holding full control over the protocol.

Compromised contracts include Wasabi's wWETH, sUSDC, wBITCOIN, wPEPE, and Long Pool vaults on Ethereum, plus its sUSDC, wWETH, sBTC, sVIRTUAL, sAERO, and sBRETT vaults on Base, per Blockaid.

Users holding Wasabi LP tokens were urged to revoke any active approvals to the vault contracts, since the underlying assets backing those tokens had either been drained or remained at risk.

The Wasabi attack closely mirrors the Drift Protocol exploit on April 1, when North Korea-linked attackers used a compromised admin key to drain $285 million from the Solana-based perpetuals exchange.

In that case, the attackers also exploited a single-key admin setup with no governance timelock, listing a fake token as collateral and raising withdrawal limits to drain real assets in roughly 12 minutes.

Three weeks later, on April 19, Kelp DAO lost $292 million when an attacker exploited a single-verifier configuration in the protocol's LayerZero bridge, releasing 116,500 unbacked rsETH that was then used as collateral to borrow real ether from Aave.

The cumulative DeFi loss total for 2026 has now passed $770 million across more than 30 reported incidents. April alone accounts for the majority of that figure.

Smaller breaches this month have hit CoW Swap ($1.2 million), Grinex ($13.74 million), Resolv Labs ($23 million), Volo Protocol ($3.5 million), among others.

What ties them together is not a new vulnerability. Each incident produces the same post-mortem language about lessons learned, but the next exploit usually arrives before the lessons get implemented.

Wasabi has not yet issued a public statement on the incident.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Selected Articles by coindesk

31 minutes ago
The long con: How North Korean spies spent months in-person to drain $285 million from Drift
43 minutes ago
CoinDesk 20 performance update: Aptos (APT) gains 4.4% as nearly all assets rise
1 hour ago
MARA Holdings to buy Long Ridge Energy in $1.5 billion AI data center push
View More

Table of Contents

|
|
APP
Windows
Mac
Share To

X

Telegram

Facebook

Reddit

CopyLink

Related Articles

avatar
avatarbitcoin.com
3 minutes ago
BYDFi Reviews 6th Anniversary with Prediction Market Launch
avatar
avatarbitcoin.com
3 minutes ago
Celsius Founder Alex Mashinsky Faces $4.72B FTC Judgment, Gets Lifetime Ban From Crypto
avatar
avatarDecrypt
18 minutes ago
Morning Minute: Bitcoin Falls After Powell\\\'s Likely Final FOMC
avatar
avatarcoindesk
31 minutes ago
The long con: How North Korean spies spent months in-person to drain $285 million from Drift
avatar
avatarbitcoin.com
43 minutes ago
Tether Investments Proposes Major Bitcoin Merger for XXI and Strike
APP
Windows
Mac

X

Telegram

Facebook

Reddit

CopyLink