Wu said that according to information received, the USPD protocol posted on Twitter stating that it encountered a severe security vulnerability. Attackers used the "CPIMP (Proxy Middleman Hidden Proxy)" attack method to seize proxy contract administrator rights during the deployment phase, disguised themselves as an audited version, and after lurking for several months, launched an attack, minting approximately 98 million USPD and stealing around 232 stETH. The USPD team stated that this incident was not due to a smart contract logic flaw, and they have reported the relevant addresses to major exchanges to freeze the funds. They also stated that if the attacker returns 90% of the stolen assets, they can keep 10% as a bug bounty.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Wu said that according to information received, the USPD protocol posted on Twitter stating that it encountered a severe security vulnerability. Attackers used the "CPIMP (Proxy Middleman Hidden Proxy)" attack method to seize proxy contract administrator rights during the deployment phase, disguised themselves as an audited version, and after lurking for several months, launched an attack, minting approximately 98 million USPD and stealing around 232 stETH. The USPD team stated that this incident was not due to a smart contract logic flaw, and they have reported the relevant addresses to major exchanges to freeze the funds. They also stated that if the attacker returns 90% of the stolen assets, they can keep 10% as a bug bounty.