HomeAboutWhat is web3?FAQLicenseTwitterMastodonBlueskyInstagramThreadsRSSLeaderboardGlossaryContributeNewsletterStore

Archived tweet

Back

Tweet by XLink:

XLink Security Update

We would like to keep everyone informed about the recent malicious attack on XLink. Yesterday, we discovered an exploit involving compromised private keys obtained through a phishing attack. The exploiter was able to drain some assets from the XLink bridge, prompting the Xlink team to pause smart contracts and the XLink bridge. 

KEY POINTS
-The exploiter took control of the XLink endpoints on BSC and Ethereum and upgraded them to a malicious implementation contract. This resulted in a withdrawal of ~$4.3 million worth of funds on BSC. However, this was recovered with the help of a whitehat (https://bscscan.com/address/0x27055ae433e9dcb30f6ebcc1a374cf5cc03c484e…) as we announced yesterday.
-Another $5 million worth of funds are locked on Ethereum, mainly LunarCrush tokens. The 
@LunarCrush
 team, in close coordination with the XLink team, has implemented measures to secure those tokens. There are some residual funds (less than $500k) that are still locked on Ethereum, but a majority of the funds have been either recovered or secured.
-aBTC was largely unaffected by this exploit, as the vast majority of the reserve assets are held in a custodian account at Cobo. (https://mempool.space/address/bc1qlhkfxlzzzcc25z95v7c0v7svlp5exegxn0tf58…).
-No endpoints other than BSC and Ethereum were affected by this exploit.

NEXT STEPS
-The exploiter’s wallets are being closely monitored, and all relevant parties, including our security partners, have been notified.
-The Xlink team is working diligently to return to a normal operations as soon as possible.

Thank you for your patience and continued support during these challenging times. Please be assured that we are taking all necessary steps to resolve this situation and provide assistance to the affected XLink community. 
Tweeted at 5:15 AM · May 16, 2024

Tweet #1

Links:

  • https://bscscan.com/address/0x27055ae433e9dcb30f6ebcc1a374cf5cc03c484e
  • https://mempool.space/address/bc1qlhkfxlzzzcc25z95v7c0v7svlp5exegxn0tf58

Text is licensed under a Creative Commons Attribution 3.0 Unported License. All attribution can be found on the attribution page.

Source code | Contribute