News listFlash News: Sui ecosystem DeFi protocol AftermathFi hacked! $1.1 million USDC drained in 36 minutes
動區 BlockTempo2026-04-29 11:30:36USDC

Flash News: Sui ecosystem DeFi protocol AftermathFi hacked! $1.1 million USDC drained in 36 minutes

ORIGINAL快訊》Sui 生態 DeFi 協議 AftermathFi 遭駭!36 分鐘被抽走 110 萬美元 USDC
AI Impact AnalysisGrok analyzing...
📄Full Article· Automatically extracted by trafilaturaGemini 翻譯1314 words
Another hack hits the Sui ecosystem! Security firm Blockaid issued an emergency alert today (29th), reporting that the DeFi protocol AftermathFi on the Sui network suffered a vulnerability exploit. In just 36 minutes, the attacker successfully drained approximately $1.1 million in USDC from the protocol's vault. Preliminary investigations indicate that the attacker exploited a clearing house fee accounting vulnerability to infinitely inflate collateral. Officials and Mysten Labs have intervened to investigate. (Previous coverage: Apple Mac users beware! North Korean hacker group Lazarus launches new malware "Mach-O Man": one action takes over your computer) (Background: Polymarket hacked by xorcat, 300,000 records and vulnerability tools exposed; platform responds: it was designed to be public) A serious smart contract security incident has erupted in the Sui ecosystem! Renowned Web3 blockchain security firm Blockaid issued an emergency alert today (29th), stating that its systems detected and flagged an active exploit targeting the AftermathFi Perpetuals on the SuiNetwork. 🚨 Blockaid detected and flagged an active exploit on @AftermathFi Perpetuals on @SuiNetwork. ~$1.1M USDC was drained across 11 transactions in ~36 minutes by attacker 0x1a65086c85114c1a3f8dc74140115c6e18438d48d33a21fd112311561112d41e. The exploit targeted a bug in the perp…— Blockaid (@blockaid_) April 29, 2026 Exploiting an accounting bug, $1.1 million drained in 36 minutes According to preliminary investigation details disclosed by Blockaid, the hack was swift and precise: - Attack time and scale: In just about 36 minutes, the attacker initiated only 11 transactions to successfully steal $1.1 million (approximately 35 million TWD) in USDC from the protocol. - Attacker address: 0x1a65086c85114c1a3f8dc74140115c6e18438d48d33a21fd112311561112d41e. - Root cause: The attacker precisely exploited a logic vulnerability in the AftermathFi Perpetuals "clearing house fee accounting" module. This vulnerability allowed the hacker to abnormally "inflate" the value of their synthetic collateral, subsequently withdrawing real assets directly from the protocol's Vault. Mysten Labs and security firms intervene Faced with the sudden and significant loss, Blockaid stated that its security team is actively assisting the affected protocol AftermathFi and the Sui development team, Mysten Labs, with subsequent vulnerability patching and on-chain fund tracking. A more detailed post-mortem report is expected to be released later. Crypto market investors should closely monitor the latest announcements from AftermathFi and the status of contract pauses, and remain aware of the security risks associated with DeFi protocols in the Sui ecosystem.
Data Status✓ Full text extractedRead Original (動區 BlockTempo)
🔍Historical Similar Events· Keyword + Asset Matching6 items
💡 Currently matching via keywords + symbols (MVP) · Will be upgraded to embedding semantic search later
Raw Information
ID:6e6b75a85a
Source:動區 BlockTempo
Published:2026-04-29 11:30:36
Category:zh_news · Export Category zh
Symbols:USDC
Community Votes:+0 /0 · ⭐ 0 Important · 💬 0 Comments
Flash News: Sui ecosystem DeFi protocol AftermathFi hacked! $1.1 million USDC drained in 36 minutes | Feel.Trading