COINPURO - Crypto Currency Latest News logo COINPURO - Crypto Currency Latest News logo
Coinpaper 2026-04-29 12:41:34

Ignored Warning Led to ZetaChain’s $334K Crypto Exploit

The vulnerability had reportedly been submitted earlier through the project’s bug bounty program but was dismissed as intended behavior. In its post-mortem, ZetaChain said the attacker combined multiple design flaws, including unrestricted cross-chain instructions, overly broad contract execution permissions, and leftover unlimited token approvals from previous wallet interactions. The attacker also allegedly prepared in advance by funding wallets through Tornado Cash. ZetaChain Hack Raises New Questions ZetaChain recently suffered an exploit that resulted in losses of approximately $334,000. The attackers drained protocol-controlled funds across multiple blockchain networks including Ethereum, Arbitrum, Base, and BNB Smart Chain. Importantly, no user funds were impacted. The incident attracted a lot of attention because the vulnerability behind the attack had reportedly been identified earlier through ZetaChain’s bug bounty program, but was dismissed by the team as intended. After the exploit, ZetaChain released a post-mortem explaining that the breach was not caused by a single catastrophic flaw, but rather by several smaller design weaknesses that became dangerous when combined. According to the report, the protocol’s gateway contract allowed anyone to submit arbitrary cross-chain instructions without sufficient restrictions. Once those instructions reached their destination chain, the gateway could execute commands on nearly any smart contract. Although a blocklist existed, it was too limited and failed to prevent common token transfer functions. Another key issue involved wallets that previously interacted with the gateway and still had unlimited token approvals active. These approvals had not been revoked or cleaned up. By combining open cross-chain messaging, overly broad execution permissions, and lingering token approvals, the attacker was able to instruct the gateway to transfer tokens from affected wallets directly into their own addresses. ZetaChain stated that the exploit was carefully planned rather than opportunistic. Investigators found that the attacker funded their wallet through Tornado Cash several days before the breach, deployed a custom draining contract on ZetaChain, and conducted an address poisoning campaign that was designed to manipulate transaction histories and potentially confuse victims or monitoring systems. In response, the protocol started rolling out security fixes. The arbitrary call functionality was permanently disabled on mainnet nodes, and the token approval process has been redesigned so that future deposits use exact-amount approvals instead of unlimited permissions. The team also said it is reviewing how bug bounty submissions are handled, especially cases where separate low-risk issues can be chained together into a serious exploit. Part of ZetaChain’s post-mortem report

가장 많이 읽은 뉴스

coinpuro_earn
면책 조항 읽기 : 본 웹 사이트, 하이퍼 링크 사이트, 관련 응용 프로그램, 포럼, 블로그, 소셜 미디어 계정 및 기타 플랫폼 (이하 "사이트")에 제공된 모든 콘텐츠는 제 3 자 출처에서 구입 한 일반적인 정보 용입니다. 우리는 정확성과 업데이트 성을 포함하여 우리의 콘텐츠와 관련하여 어떠한 종류의 보증도하지 않습니다. 우리가 제공하는 컨텐츠의 어떤 부분도 금융 조언, 법률 자문 또는 기타 용도에 대한 귀하의 특정 신뢰를위한 다른 형태의 조언을 구성하지 않습니다. 당사 콘텐츠의 사용 또는 의존은 전적으로 귀하의 책임과 재량에 달려 있습니다. 당신은 그들에게 의존하기 전에 우리 자신의 연구를 수행하고, 검토하고, 분석하고, 검증해야합니다. 거래는 큰 손실로 이어질 수있는 매우 위험한 활동이므로 결정을 내리기 전에 재무 고문에게 문의하십시오. 본 사이트의 어떠한 콘텐츠도 모집 또는 제공을 목적으로하지 않습니다.