🎉 Gate xStocks Trading is Now Live! Spot, Futures, and Alpha Zone – All Open!
📝 Share your trading experience or screenshots on Gate Square to unlock $1,000 rewards!
🎁 5 top Square creators * $100 Futures Voucher
🎉 Share your post on X – Top 10 posts by views * extra $50
How to Participate:
1️⃣ Follow Gate_Square
2️⃣ Make an original post (at least 20 words) with #Gate xStocks Trading Share#
3️⃣ If you share on Twitter, submit post link here: https://www.gate.com/questionnaire/6854
Note: You may submit the form multiple times. More posts, higher chances to win!
📅 July 3, 7:00 – July 9,
KiloEx released a summary of the hacker incident: a bug in the TrustedForwarder contract in the smart contracts led to this attack.
According to Deep Tide TechFlow news, on April 21, KiloEx released a root cause analysis and post-incident summary of the hacking event. The incident was caused by its smart contracts, where the TrustedForwarder contract inherited from OpenZeppelin's MinimalForwarderUpgradeable but did not override the execute method, resulting in the function being callable by anyone.
The attack occurred from April 14, 18:52 to 19:40 (UTC), with the Hacker implementing the attack by deploying attack contracts on multiple chains including opBNB, Base, BSC, Taiko, B2, and Manta. After negotiation, the Hacker agreed to retain 10% of the bounty and has returned all stolen assets (including USDT, USDC, ETH, BNB, WBTC, and DAI) to the multi-signature wallet designated by KiloEx.