TLDR Wasabi Protocol was exploited for more than $5 million. Attackers gained control of Wasabi’s privileged admin key. Affected chains include Ethereum, Base,TLDR Wasabi Protocol was exploited for more than $5 million. Attackers gained control of Wasabi’s privileged admin key. Affected chains include Ethereum, Base,

Wasabi Protocol Exploited for Over $5M After Admin Key Compromise

2026/04/30 21:34
3 min read
For feedback or concerns regarding this content, please contact us at crypto.news@mexc.com

TLDR

  • Wasabi Protocol was exploited for more than $5 million.
  • Attackers gained control of Wasabi’s privileged admin key.
  • Affected chains include Ethereum, Base, Berachain and Blast.
  • Stolen assets included WETH, USDC, PEPE, MOG and cbBTC.
  • Wasabi warned users not to interact with contracts during the probe.

Wasabi Protocol, a perpetuals trading platform operating across Ethereum, Base, Berachain, and Blast, has been exploited for more than $5 million after attackers gained control of a privileged admin key.

The attack affected multiple vaults and liquidity pools linked to the protocol. Blockchain security firms said the attacker used the compromised deployer wallet to grant admin permissions, upgrade contracts to malicious versions, and drain assets from Wasabi’s systems.

Wasabi Protocol Exploited for Over $5M After Admin Key Compromise

The Wasabi team said it was investigating the incident and warned users not to interact with its contracts until further notice. Virtuals Protocol also froze margin deposits powered by Wasabi as a precaution, while stating that its own security remained intact.

Wasabi Protocol Admin Key Compromise Led to Contract Takeover

Security firm Blockaid said the exploit began through an externally owned account known as wasabideployer.eth, which held the sole admin role in Wasabi’s permission system.

After gaining access to the deployer key, the attacker granted themselves privileged access without delay. They then used a helper contract to upgrade Wasabi’s perpetual vaults and pool contracts into malicious implementations designed to drain balances.

The exploit involved the Universal Upgradeable Proxy Standard, a common smart contract upgrade method. UUPS allows developers to update contract logic while keeping the same contract address. However, if admin control is compromised, attackers can replace legitimate code with malicious code.

Blockaid said Wasabi did not have a timelock or multisig protecting the admin role. A timelock would have delayed sensitive changes, while a multisig would have required multiple approvals before contract upgrades could take effect.

Multiple Chains and Assets Were Affected

The compromised contracts included Wasabi vaults on Ethereum and Base, including wWETH, sUSDC, wBITCOIN, wPEPE, sBTC, sVIRTUAL, sAERO, and sBRETT.

Other security firms said the exploit also touched Berachain and Blast. Stolen assets reportedly included WETH, PEPE, MOG, USDC, ZYN, REKT, cbBTC, AERO, and VIRTUAL.

Cyvers said the attacker consolidated stolen funds into ETH, bridged assets to Ethereum, and distributed funds across several addresses. BlockSec noted that some accounts involved in the activity appeared to have been funded through Tornado Cash.

Users holding Wasabi LP-share tokens were warned that the underlying assets backing those tokens may have been drained or remain at risk. Security researchers advised users to revoke active approvals tied to affected vault contracts.

DeFi Key Management Risks Remain in Focus

The Wasabi exploit adds to a difficult month for decentralized finance security. More than $600 million has been lost across multiple attacks in recent weeks, including large incidents involving Drift Protocol and Kelp DAO.

The Wasabi incident shares similarities with other admin-key compromise attacks. In such cases, the code may function as designed, but operational control is too concentrated in one private key.

Security experts said the absence of delay mechanisms and multi-party approval systems remains a major risk for protocols managing user funds across several chains.

The Wasabi team has not yet released a full post-mortem. Further updates are expected after forensic review of the compromised deployer wallet, contract upgrades, affected vaults, and fund movements.

The post Wasabi Protocol Exploited for Over $5M After Admin Key Compromise appeared first on CoinCentral.

Market Opportunity
Notcoin Logo
Notcoin Price(NOT)
$0.0003918
$0.0003918$0.0003918
+0.30%
USD
Notcoin (NOT) Live Price Chart
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact crypto.news@mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Tags:

You May Also Like

Telomir Pharmaceuticals Receives FDA Clearance for Phase 1/2 Trial of Telomir-Zn in Triple-Negative Breast Cancer

Telomir Pharmaceuticals Receives FDA Clearance for Phase 1/2 Trial of Telomir-Zn in Triple-Negative Breast Cancer

Telomir Pharmaceuticals receives FDA clearance for Telomir-Zn IND to treat triple-negative breast cancer, initiating Phase 1/2 trial. Learn more about this biotech
Share
Citybuzz2026/04/30 21:55
Cango Inc. Completes $65M Investment and Secures $10M Convertible Note Financing

Cango Inc. Completes $65M Investment and Secures $10M Convertible Note Financing

The post Cango Inc. Completes $65M Investment and Secures $10M Convertible Note Financing appeared on BitcoinEthereumNews.com. DALLAS, April 2, 2026 /PRNewswire
Share
BitcoinEthereumNews2026/04/02 18:21
Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be

The post Why The Green Bay Packers Must Take The Cleveland Browns Seriously — As Hard As That Might Be appeared on BitcoinEthereumNews.com. Jordan Love and the Green Bay Packers are off to a 2-0 start. Getty Images The Green Bay Packers are, once again, one of the NFL’s better teams. The Cleveland Browns are, once again, one of the league’s doormats. It’s why unbeaten Green Bay (2-0) is a 8-point favorite at winless Cleveland (0-2) Sunday according to betmgm.com. The money line is also Green Bay -500. Most expect this to be a Packers’ rout, and it very well could be. But Green Bay knows taking anyone in this league for granted can prove costly. “I think if you look at their roster, the paper, who they have on that team, what they can do, they got a lot of talent and things can turn around quickly for them,” Packers safety Xavier McKinney said. “We just got to kind of keep that in mind and know we not just walking into something and they just going to lay down. That’s not what they going to do.” The Browns certainly haven’t laid down on defense. Far from. Cleveland is allowing an NFL-best 191.5 yards per game. The Browns gave up 141 yards to Cincinnati in Week 1, including just seven in the second half, but still lost, 17-16. Cleveland has given up an NFL-best 45.5 rushing yards per game and just 2.1 rushing yards per attempt. “The biggest thing is our defensive line is much, much improved over last year and I think we’ve got back to our personality,” defensive coordinator Jim Schwartz said recently. “When we play our best, our D-line leads us there as our engine.” The Browns rank third in the league in passing defense, allowing just 146.0 yards per game. Cleveland has also gone 30 straight games without allowing a 300-yard passer, the longest active streak in the NFL.…
Share
BitcoinEthereumNews2025/09/18 00:41